Operating systems, Open source, Windows, Developer, Mobile, Database, Business applications, SOA, Web, Middleware, BI, Virtualisation, Collaboration, Licensing, Financial applications, Cloud applications, CRM, ERP, HR software
Antivirus, IAM, Risk management, Data protection, Continuity, Cybercrime, Data Breach Incident Management and Recovery, Security policy and user awareness, Web Application Security, Cloud security , Compliance Regulation and Standard Requirements, Secure Coding and Application Programming, Network Security Management, Endpoint and NAC Protection
Network hardware, Network software, VoIP, Unified communications, Wireless, Mobile, Telecoms networks and broadband communications, Datacentre networking, Network routing and switching, Network monitoring and analysis, Network security strategy, WAN performance and optimisation, Software-defined networking, Internet of Things
DR/security, Green IT, Data centre backup power and power distribution, Data centre cooling infrastructure, Systems management, Clustering for high availability and HPC, Performance, monitoring and optimisation, Data centre capacity planning, Server and OS, Virtualisation, Desktop virtualisation platforms, SaaS, IaaS, PaaS
Information technology in Poland, Information technology in Russia, Information technology in Turkey, Information technology in Italy, Information technology in Spain, Information technology in France, Information technology (IT) in Germany, Information technology in the Nordics
Learn how to protect your company's data, improve digital customer experience, manage workplace mobility, implement cloud computing and tackle big data challenges.Click Here
Learn how IBM's Smarter Computing will transform your IT environment by helping you successfully deploy and manage a cloud storage infrastructure and grow your business.Click here
ComputerWeekly.com Research Library Copyright © 1998-2015 Bitpipe, Inc. All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.
Google's new app streaming feature takes mobile deep linking to the next level. Is this good or bad news for developers? Also in SearchLight: Encryption is back in the spotlight following Paris attacks; the Word of the Year is an emoji.
Still debating the merits of gut feel vs. data-driven decisions? Take a page from Jeff Ma's book, which tells how he used data to win millions at blackjack.
The IoT services boom is on, says Gartner. What does that mean for CIOs? Also in Searchlight: Four indicted in last year's JP Morgan hack; Google's self-driving car pulled over.
The OWASP Top Ten list is not a compliance standard but a set of best practices for enterprises looking to boost Web app security. Here's how to get the most out of OWASP Top Ten.
Adobe CSO Brad Arkin spoke at the recent Privacy. Security. Risk. 2015 event about his experiences dealing with the company's massive data breach two years ago.
A data breach notification policy is important to have, but deciding how to alert customers can be tough. Expert Mike Chapple explains some best practices.
Last decade's 'load balancers' are today's 'application delivery platforms.' Time to get up to date, too, on what else is new in app delivery tech.
Equipped with advanced security features such as cloud intelligence, botnet detection, sandboxing and more, the Zscaler Web gateway is deployed solely through the cloud.
Aerohive has unveiled an API platform that delivers wireless network data to business application developers.
I have 80 Windows servers in the data center. What can I use for daily event log monitoring?
Mainframes are well-suited for mobile apps, and though these systems are known to be safe, there are ways to tighten mainframe security.
SUSE Manager maintains control over server patching on SUSE and Red Hat OSes, but what happens with Red Hat's shift away from Spacewalk?
Big data may be all the rage, but data warehouse platforms are still being utilized by companies of all sizes. Expert Craig S. Mullins takes a look at the technology.
IBM's planned purchase of The Weather Co.'s data operations may be a bellwether event from which data professionals can learn.
We asked attendees at a conference on NoSQL databases about the challenges faced by users of the software. Their responses cited issues such as scalability, data modeling and analytics.