Operating systems, Open source, Windows, Software development, Mobile, Database, Business applications, SOA, Web software, Middleware, Business intelligence, Virtualisation, Collaboration, Software licensing, Financial applications, Cloud applications, CRM, ERP, HR software, AI and automation, Microservices, Blockchain
Antivirus, IAM, Risk management, Data protection, Continuity, Cybercrime, Data Breach Incident Management and Recovery, Security policy and user awareness, Web Application Security, Cloud security , Compliance Regulation and Standard Requirements, Secure Coding and Application Programming, Network Security Management, Endpoint and NAC Protection
Network hardware, Network software, VoIP, Unified communications, Wireless, Mobile, Telecoms networks and broadband communications, Datacentre networking, Network routing and switching, Network monitoring and analysis, Network security strategy, WAN performance and optimisation, Software-defined networking, Internet of Things
Disaster recovery/security, Green IT, Datacentre backup power and power distribution, Datacentre cooling infrastructure, Systems management, Clustering for high availability and HPC, Performance, monitoring and optimisation, Datacentre capacity planning, Server and Operating Systems, Virtualisation, Desktop virtualisation platforms, SaaS, IaaS, PaaS, DevOps, Converged infrastructure, Containers
Disk systems, Backup, Virtualisation and storage, Storage switches, Cloud storage, Disaster recovery, Storage management, Compliance and storage, Flash and SSDs, Hyper-convergence, Software-defined storage, Object storage, Storage performance
Learn how to protect your company's data, improve digital customer experience, manage workplace mobility, implement cloud computing and tackle big data challenges.Click Here
Learn how IBM's Smarter Computing will transform your IT environment by helping you successfully deploy and manage a cloud storage infrastructure and grow your business.Click here
ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.
Large application vendors have essentially cornered the cloud CRM market, Forrester says, bringing more risks than rewards. But that doesn't mean CIOs should keep from the cloud.
How do you make developers, who sometimes operate at breakneck speeds, care about security? Why not gamify it, Lev Lesokhin of CAST said in this SearchCIO video interview.
A recent article on biological malware got Niel Nickolaisen thinking about how to minimize security risks in emerging tech. Here are two approaches that will help.
Former CIA officer Valerie Plame discusses why America's cyberdefense is lagging behind -- and what the government and private sector should do to reverse the trend.
An Apache Struts vulnerability is still being exploited, even though it has already been patched. Expert Nick Lewis explains why the Struts platform still carries risk for users.
The U.S. Defense Intelligence Agency wants to isolate, study, customize and reengineer malware from adversaries to be used as its own offensive cyberweapons.
Top-line Cisco revenues fell in the July quarter, as the company's legacy switching business continued to weaken. Cisco could soon reach two straight years of revenue declines.
Bloggers examine WatchGuard firewall appliances, explore transparency as a vendor virtue and assess the role of 5G in future SD-WAN deployments.
Network infrastructure management processes and architectures are being retooled by IT teams, as today's enterprises prepare for network modernization of legacy systems.
DCIM software addresses a diverse range of data center needs and functions. Learn about the vendors in the market and the accompanying specialties and functions that they offer.
Nearly half of enterprises do not save money with the public cloud, and say they have figured out how to beat public cloud costs with their own private cloud.
Because the Uptime Institute focuses primarily on power and cooling, alternative data center certifications have emerged. Their chances of replacing Uptime, however, seem slim.
Data management teams are asking more questions about data security, Gartner analyst Merv Adrian says in a Q&A. But new factors are complicating the process of securing databases, he adds.
Database vendors have beefed up the security tools in their software -- and that's a good thing because attackers are increasingly targeting database systems to steal sensitive data.
Data management startup Dremio has aimed its Apache Arrow expertise at the problem of self-service data delivery. In-column caches and optimization speed queries across varied data stores.