Operating systems, Open source, Windows, Software development, Mobile, Database, Business applications, SOA, Web software, Middleware, Business intelligence, Virtualisation, Collaboration, Software licensing, Financial applications, Cloud applications, CRM, ERP, HR software, AI and automation, Microservices
Antivirus, IAM, Risk management, Data protection, Continuity, Cybercrime, Data Breach Incident Management and Recovery, Security policy and user awareness, Web Application Security, Cloud security , Compliance Regulation and Standard Requirements, Secure Coding and Application Programming, Network Security Management, Endpoint and NAC Protection
Network hardware, Network software, VoIP, Unified communications, Wireless, Mobile, Telecoms networks and broadband communications, Datacentre networking, Network routing and switching, Network monitoring and analysis, Network security strategy, WAN performance and optimisation, Software-defined networking, Internet of Things
Disaster recovery/security, Green IT, Datacentre backup power and power distribution, Datacentre cooling infrastructure, Systems management, Clustering for high availability and HPC, Performance, monitoring and optimisation, Datacentre capacity planning, Server and Operating Systems, Virtualisation, Desktop virtualisation platforms, SaaS, IaaS, PaaS, DevOps, Converged infrastructure, Containers
Disk systems, Backup, Virtualisation and storage, Storage switches, Cloud storage, Disaster recovery, Storage management, Compliance and storage, Flash and SSDs, Hyper-convergence, Software-defined storage, Object storage, Storage performance
Learn how to protect your company's data, improve digital customer experience, manage workplace mobility, implement cloud computing and tackle big data challenges.Click Here
Learn how IBM's Smarter Computing will transform your IT environment by helping you successfully deploy and manage a cloud storage infrastructure and grow your business.Click here
See more topics related to: Predictive Analytics Software
ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.
Cloud expert James Staten discusses the challenges IT leaders face when implementing cloud initiatives.
In this SearchCIO video, Wendy Cofran, CIO at Century Health Systems, explains why data sharing poses one of the top obstacles to business-IT alignment in the healthcare space.
UsTrendy, an online fashion marketplace started in 2008, was born digital, but it took time for CEO Sam Sisakhti to fully harness the value of technology.
The Fruitfly Mac malware has decades-old code, but has been conducting surveillance attacks for over two years without detection. Expert Nick Lewis explains how it works.
A Gmail phishing attack brought users to fake login pages designed to look like Google's. Expert Nick Lewis explains how users can prevent similar phishing attacks.
Cisco claims it can accurately detect malware activity in encrypted traffic using machine learning, but some experts worry about privacy implications.
Cisco has launched a Catalyst switching line that provides a redesigned platform for the campus network. The Cisco DNA software console provides the policy-based management layer.
IDC's quarterly report shows continued Ethernet switch market growth; Cisco says global IP traffic will almost triple by 2021; and CenturyLink launches managed Wi-Fi service.
Arista has upgraded its spine-leaf architecture for service providers and huge data centers. The update includes a new spine switch and line cards.
The latest threat to server security could be the firmware. That's the emphasis of at least one server maker, hoping to help users thwart new attacks -- and spark server demand.
Admins can use vSphere permissions to assign VM controls to different IT groups within their enterprise. Follow the networking example below to get started.
DCIM software can improve the management and operation of your data center. Choose the right vendor for your company to control costs, manage energy and track activity.
To date, the Hadoop data scientist has had to be a superhero. Self-service tools will change that, but not overnight.
IBM pulled the plug on its distribution of Hadoop in favor of reselling Hortonworks' bundle of big data technologies, a decision that reduces the number of Hadoop vendors to four.
Moving relational data into Hadoop is not a slam dunk. To avert programming complexities, a major Texas school turned to commercial tools to stock the Hadoop data lake.