- Mainframe Operating Systems
- Network Operating Systems
- PC Operating Systems
- PDA Operating Systems
- Real Time Operating Systems
- Windows Server Software
Operating systems, Open source, Windows, Developer, Mobile, Database, Business applications, SOA, Web, Middleware, BI, Virtualisation, Collaboration, Licensing, Financial applications, Cloud applications, CRM, ERP, HR software
Antivirus, IAM, Risk management, Data protection, Continuity, Cybercrime, Data Breach Incident Management and Recovery, Security policy and user awareness, Web Application Security, Cloud security , Compliance Regulation and Standard Requirements, Secure Coding and Application Programming, Network Security Management, Endpoint and NAC Protection
Network hardware, Network software, VoIP, Unified communications, Wireless, Mobile, Telecoms networks and broadband communications, Datacentre networking, Network routing and switching, Network monitoring and analysis, Network security strategy, WAN performance and optimisation, Software-defined networking, Internet of Things
DR/security, Green IT, Data centre backup power and power distribution, Data centre cooling infrastructure, Systems management, Clustering for high availability and HPC, Performance, monitoring and optimisation, Data centre capacity planning, Server and OS, Virtualisation, Desktop virtualisation platforms, SaaS, IaaS, PaaS
Information technology in Poland, Information technology in Russia, Information technology in Turkey, Information technology in Italy, Information technology in Spain, Information technology in France, Information technology (IT) in Germany, Information technology in the Nordics, IT in the Middle East
Learn how to protect your company's data, improve digital customer experience, manage workplace mobility, implement cloud computing and tackle big data challenges.Click Here
Learn how IBM's Smarter Computing will transform your IT environment by helping you successfully deploy and manage a cloud storage infrastructure and grow your business.Click here
See more topics related to: Kernels | Mainframe Operating Systems | Network Operating Systems | OS/400 | PC Operating Systems | PDA Operating Systems | Windows Server Software | Applications Software | BIOS | Computer Software Industry | Database Management Software | Network Management Software | OLTP | Programming Languages | Software Migration
ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.
A bimodal IT strategy should be seen for what it is: a way to transition from the old to the new world of business, according to Derek Roos.
Who owns IoT data? The more pertinent question raised by the evolution of IoT is what does humanity look like in an IoT age, says Harvey Koeppel.
"Digital ecosystem" was the catchphrase at this year's MIT Sloan CIO Symposium. To vie as competitors, companies need to play by a new directive: Share or be left out.
Latentbot malware has layers of obfuscation that makes it hard to detect. Expert Nick Lewis explains how its process works, beginning with a phishing email, and how to stop it.
A hard to detect type of Linux malware, Rekoobe, can download files to user systems. Expert Nick Lewis explains the malware's key functionality and how to mitigate attacks.
Rule 41 changes face bipartisan opposition in Senate with the Wyden-Paul bill to rein in the expansion of authority to let the government hack unlimited numbers of devices with a single warrant.
Cisco sales last quarter revealed weakness in its switching and router business, as revenue from software subscriptions and cloud-based services increased.
In this week's roundup, a blogger expresses frustration with Broadcom, and analysts assess the next generation of endpoint security market and monitoring.
Cisco announces a CCNA update for routing and switching designed to embrace virtualization and SDN in training and testing.
The most common data center operating system gets its final 6.x updates with the addition of a local backup archiving tool before transitioning to just security and stability updates.
Among other benefits, edge computing -- a critical component for many IoT applications -- can boost performance and enhance security. But it isn't without its challenges.
Despite its critical role in cloud application performance, the enterprise CPU is often overlooked. Learn about next generation hardware, and why it's important to cloud.
SAS Data Governance provides organizations with data governance tools for organizing, managing and accessing their data assets, and establishing enterprise-wide data policies.
New cloud apps seem ready-made for NoSQL. This may cause Oracle to put more focus on its Oracle NoSQL database, which is often overlooked amid a crush of NoSQL contenders.
In an interview, consultant Lakshmi Randall foresees changes in how data management is organized and executed as the overall data landscape shifts due to the adoption of big data systems.