Operating systems, Open source, Windows, Software development, Mobile, Database, Business applications, SOA, Web software, Middleware, Business intelligence, Virtualisation, Collaboration, Software licensing, Financial applications, Cloud applications, CRM, ERP, HR software, AI and automation, Microservices
Antivirus, IAM, Risk management, Data protection, Continuity, Cybercrime, Data Breach Incident Management and Recovery, Security policy and user awareness, Web Application Security, Cloud security , Compliance Regulation and Standard Requirements, Secure Coding and Application Programming, Network Security Management, Endpoint and NAC Protection
Network hardware, Network software, VoIP, Unified communications, Wireless, Mobile, Telecoms networks and broadband communications, Datacentre networking, Network routing and switching, Network monitoring and analysis, Network security strategy, WAN performance and optimisation, Software-defined networking, Internet of Things
Disaster recovery/security, Green IT, Datacentre backup power and power distribution, Datacentre cooling infrastructure, Systems management, Clustering for high availability and HPC, Performance, monitoring and optimisation, Datacentre capacity planning, Server and Operating Systems, Virtualisation, Desktop virtualisation platforms, SaaS, IaaS, PaaS, DevOps, Converged infrastructure, Containers
Disk systems, Backup, Virtualisation and storage, Storage switches, Cloud storage, Disaster recovery, Storage management, Compliance and storage, Flash and SSDs, Hyper-convergence, Software-defined storage, Object storage, Storage performance
Learn how to protect your company's data, improve digital customer experience, manage workplace mobility, implement cloud computing and tackle big data challenges.Click Here
Learn how IBM's Smarter Computing will transform your IT environment by helping you successfully deploy and manage a cloud storage infrastructure and grow your business.Click here
See more topics related to: Executive Management
ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.
One facet of a digital transformation framework involves finding a way to expose data and functionality in legacy apps to a new environment. BPM expert Dan Morris knows how.
The rapidly evolving techno-society is increasing competition for all kinds of businesses and forcing them to create a plan for enterprise transformation. Here's advice to help.
Business velocity has changed the conversation around IT service delivery. Achieving 'fast flow' through system-wide optimization of IT processes can enable better, faster IT.
A researcher claims to have found Symantec SSL API issues with extremely dangerous consequences, but a lack of evidence causes confusion.
Universal second factor devices can be used to strengthen authentication on major websites such as Facebook. Expert Matthew Pascucci explains how U2F works.
US-CERT encouraged users to use newer versions of Windows SMB, since version one is out of date. Expert Matthew Pascucci explains how to tell if SMB v1 is on your systems.
This week, bloggers look into load-balancer performance, congressional changes to ISP rules and software-defined perimeters.
With attacks soaring, how should IT organizations mount an effective defense and boost ransomware security awareness?
The latest Juniper line cards provide more connection options for companies using the vendor's data center interconnect technology.
IoT is still an emerging field, but data center admins should at least consider certification options to make their resume stand out in the long haul.
Some mainframe users find it tough to navigate IBM's sub-capacity pricing model. Consider tools like SCRT to more efficiently manage your z Systems software costs.
Hyper-converged infrastructure can cause new data center cooling challenges. Before implementation, determine which temperatures and cooling units will work best.
Blockchain data technology disruption may be in the offing. IDC's Stewart Bond says architecture at the core of controversial bitcoin may show a new path to data integrity.
Distributed data lakes with Hadoop clusters and other systems create new data management and governance needs that are hard to meet with existing tools, says IT analyst Mike Ferguson.
Businesses constantly need to evolve their programs for governing data. Nationwide's finance data governance team shares how it stepped up data governance strategy and processes.