Operating systems, Open source, Windows, Developer, Mobile, Database, Business applications, SOA, Web, Middleware, BI, Virtualisation, Collaboration, Licensing, Financial applications, Cloud applications, CRM, ERP, HR software
Antivirus, IAM, Risk management, Data protection, Continuity, Cybercrime, Data Breach Incident Management and Recovery, Security policy and user awareness, Web Application Security, Cloud security , Compliance Regulation and Standard Requirements, Secure Coding and Application Programming, Network Security Management, Endpoint and NAC Protection
Network hardware, Network software, VoIP, Unified communications, Wireless, Mobile, Telecoms networks and broadband communications, Datacentre networking, Network routing and switching, Network monitoring and analysis, Network security strategy, WAN performance and optimisation, Software-defined networking, Internet of Things
DR/security, Green IT, Data centre backup power and power distribution, Data centre cooling infrastructure, Systems management, Clustering for high availability and HPC, Performance, monitoring and optimisation, Data centre capacity planning, Server and OS, Virtualisation, Desktop virtualisation platforms, SaaS, IaaS, PaaS
Information technology in Poland, Information technology in Russia, Information technology in Turkey, Information technology in Italy, Information technology in Spain, Information technology in France, Information technology (IT) in Germany, Information technology in the Nordics, IT in the Middle East
Learn how to protect your company's data, improve digital customer experience, manage workplace mobility, implement cloud computing and tackle big data challenges.Click Here
Learn how IBM's Smarter Computing will transform your IT environment by helping you successfully deploy and manage a cloud storage infrastructure and grow your business.Click here
ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.
Blockchain observers talk a lot about the widespread impact the technology will have on various industries, but pinpointing use cases and putting them into action isn't so easy. In July's CIO Decisions, dive into potential blockchain use cases and the four key steps to implementation.
The systems that will form the backbone of future business applications will be available in the cloud, says consultant Judith Hurwitz.
Today's programming models are things of the past, says consultant Judith Hurwitz. Cognitive computing systems use data to devise applications that reflect the world as we see it.
BYOD isn't a new trend, but tablet security policy is increasingly important as users choose them over laptops for work. Expert Mike O. Villegas discusses tablet security policies.
Threats evolve, so your mobile security must too. Learn how an app container, app wrapper and other tactics help keep bad guys away from corporate assets.
Nearly 10 million patient records have been posted for sale on a dark web market, putting the personally identifiable information of many at risk for abuse.
Cisco spends $293 million on technology that secures mobile users' access to the cloud. It's the latest addition to the Cisco security portfolio.
Startup Mist rolls out a wireless service that blends artificial intelligence, virtual Bluetooth Low Energy beacons and unprecedented visibility into network performance.
This week, bloggers look at a startup using microsegmentation to create a secure communication channel, FireEye and customized managed network services.
IT teams need to strike a balance between keeping up with the latest technology and being cost-effective. Proper IT lifecycle management techniques can help.
With RHEL hitting platform maturity, Red Hat's future includes Microsoft integration, expanded management and a smaller footprint.
Data center challenges come in all shapes and sizes, but by keeping close tabs on systems and data, admins can be ready to react.
IBM InfoSphere Information Server for Data Integration provides a single, unified platform for application integration, cloud integration, data quality and master data management.
Thanks to ubiquitous mobile technology, field data is more readily accessible to ESRI's Survey123 for ArcGIS. A relief organization used the software to aid Syrian war refugees.
SAP Data Services can be used alone or with other SAP products to provide data integration, transformation, data quality, data profiling and text data processing.