Operating systems, Open source, Windows, Software development, Mobile, Database, Business applications, SOA, Web software, Middleware, Business intelligence, Virtualisation, Collaboration, Software licensing, Financial applications, Cloud applications, CRM, ERP, HR software, AI and automation, Microservices
Antivirus, IAM, Risk management, Data protection, Continuity, Cybercrime, Data Breach Incident Management and Recovery, Security policy and user awareness, Web Application Security, Cloud security , Compliance Regulation and Standard Requirements, Secure Coding and Application Programming, Network Security Management, Endpoint and NAC Protection
Network hardware, Network software, VoIP, Unified communications, Wireless, Mobile, Telecoms networks and broadband communications, Datacentre networking, Network routing and switching, Network monitoring and analysis, Network security strategy, WAN performance and optimisation, Software-defined networking, Internet of Things
Disaster recovery/security, Green IT, Datacentre backup power and power distribution, Datacentre cooling infrastructure, Systems management, Clustering for high availability and HPC, Performance, monitoring and optimisation, Datacentre capacity planning, Server and Operating Systems, Virtualisation, Desktop virtualisation platforms, SaaS, IaaS, PaaS, DevOps, Converged infrastructure, Containers
Disk systems, Backup, Virtualisation and storage, Storage switches, Cloud storage, Disaster recovery, Storage management, Compliance and storage, Flash and SSDs, Hyper-convergence, Software-defined storage, Object storage, Storage performance
Learn how to protect your company's data, improve digital customer experience, manage workplace mobility, implement cloud computing and tackle big data challenges.Click Here
Learn how IBM's Smarter Computing will transform your IT environment by helping you successfully deploy and manage a cloud storage infrastructure and grow your business.Click here
See more topics related to: Predictive Analytics Software
ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.
The recent WannaCry ransomware attack reminds CIOs and CISOs there are no good excuses for bad security. Also in Searchlight: Google's 'AI-first' agenda, net neutrality in trouble.
App development teams are at an inflection point: They can act as sole producers -- and fail to meet digital demands -- or enable business-led IT with application building blocks.
In this video, IBM's Pramod Achanta enumerates the benefits and challenges of implementing blockchain technology and offers pointers to identify blockchain's business use cases.
The Switcher Trojan spreads to Android devices through the wireless router to which they are connected. Expert Nick Lewis explains how this attack is carried out.
The BGP anycast addressing technique could potentially be used for malicious purposes. Expert Judith Myerson explains how this might work and what types of attacks to look out for.
Bad data can create more than just 'fake news.' Expert Char Sample explains how cognitive hacking and weaponized information can undermine enterprise security.
This week, bloggers look into the open source networking option SNAS, SIEM for enterprises and automating device configurations.
Console unveils a cloud interconnect service that offers a more secure and stable connection between multiple cloud providers.
HPE offers its traditional line of high-end campus switches, as well as Aruba switches, such as the 3180 series, for high-speed connectivity to SMBs and large enterprises.
A major change in SUSE Manager 3 is that it's primarily built on Salt, rather than Spacewalk. Learn what else has changed, and how IT can take advantage of the latest release.
A new generation of Dell EMC servers, storage and hyper-converged, with only minor enhancements, made the combined companies' initial outing a low-key affair.
Emerging technologies such as containers, HCI and big data have blurred the lines between compute and storage platforms, breaking down traditional IT silos.
Operational data stores and data warehouses both store operational data, but the similarities between them end there -- and they both have a role to play in analytics architectures.
Kafka is a linchpin in many on-premises data pipelines. Now, Confluent has a Kafka cloud service to ease this distributed system's ascent to cloud nirvana.
Data lakes offer a more expansive alternative to data warehouses for analytics uses. TDWI analyst Philip Russom offers advice on how to get things right in a data lake architecture.