- Business Insurance
- Loss Prevention
- Occupational and Environmental Safety
- Public Health Emergencies
- Basel II
Operating systems, Open source, Windows, Developer, Mobile, Database, Business applications, SOA, Web, Middleware, BI, Virtualisation, Collaboration, Licensing, Financial applications, Cloud applications, CRM, ERP, HR software
Antivirus, IAM, Risk management, Data protection, Continuity, Cybercrime, Data Breach Incident Management and Recovery, Data Breach Incident Management and Recovery, Web Application Security, Cloud security , Compliance Regulation and Standard Requirements, Secure Coding and Application Programming, Network Security Management, Endpoint and NAC Protection
Network hardware, Network software, VoIP, Unified communications, Wireless, Mobile, Telecoms networks and broadband communications, Datacentre networking, Network routing and switching, Network monitoring and analysis, Network security strategy, WAN performance and optimisation, Software-defined networking
DR/security, Green IT, Data centre backup power and power distribution, Data centre cooling infrastructure, Systems management, Clustering for high availability and HPC, Performance, monitoring and optimisation, Data centre capacity planning, Server and OS, Virtualisation, Desktop virtualisation platforms
IT organisations of all sizes are tasked with simplifying operations and cutting costs. Access the videos, case studies and papers on this website to learn how Dell Efficient Enterprise can help.Click Here
Access the resources in this section to discover how Fluke Networks’ products help optimise wired and wireless network and application performance while minimising downtime and ensuring data.Click Here
See more topics related to: Business Insurance | Loss Prevention | Occupational and Environmental Safety | Public Health Emergencies | Basel II | CobiT | Financial Management | Insurance Industry | IT Auditing | Penetration Testing | Product Liability Law | Risk Assessment | Security
ComputerWeekly.com Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.
CIOs harness the power of cloud computing and fine-tune their individual cloud model to the business' benefit.
Two small businesses with big website requirements explain how they ultimately got what they wanted in a website developer.
SearchCIO has rounded up free templates from around the Web providing guidance on IT vendor selection, social sharing and mobile device policies.
When it comes to app risk management, who is ultimately responsible: business leaders or security professionals? A new report weighs in.
Expert Ernie Hayden explains how critical infrastructure organizations can use the NIST cybersecurity framework to assess, improve infosec practices.
Does your enterprise track eliminated firewall rules? It's one of the change management best practices suggested by expert Brad Casey.
Cloud visibility is a major challenge. Luckily, there are options for creating observation posts in hybrid infrastructures. Here are some to consider.
NAC technology is stepping up to the plate to give better BYOD access control to enterprises.
Meru and Aerohive build affordable 802.11ac access points to put premium Gigabit Wi-Fi within reach of more businesses.
IT departments want to shrink their list of suppliers -- but should it be longer? Cloud, mobility and big data have IT rethinking vendor selection.
It was all about openness at the Red Hat Summit 2014. From OpenShift to OpenStack to open source innovations, Red Hat was buzzing about the cloud.
IT teams can play heroes when database performance issues disrupt applications. Try these five tips for performance tuning before there's a problem.
Expert Matt Mueller offers advice to data management pros who are interested in developing their big data skill set.
Co-operative Allegiance Retail Services is deploying a cloud-based big data stack to replace a homegrown system that fell short on analytics power.
Hadoop has the ability ultimately to break down siloed data stores, Ron Bodkin says in a Q&A.