Operating systems, Open source, Windows, Software development, Mobile, Database, Business applications, SOA, Web software, Middleware, Business intelligence, Virtualisation, Collaboration, Software licensing, Financial applications, Cloud applications, CRM, ERP, HR software, AI and automation, Microservices
Antivirus, IAM, Risk management, Data protection, Continuity, Cybercrime, Data Breach Incident Management and Recovery, Security policy and user awareness, Web Application Security, Cloud security , Compliance Regulation and Standard Requirements, Secure Coding and Application Programming, Network Security Management, Endpoint and NAC Protection
Network hardware, Network software, VoIP, Unified communications, Wireless, Mobile, Telecoms networks and broadband communications, Datacentre networking, Network routing and switching, Network monitoring and analysis, Network security strategy, WAN performance and optimisation, Software-defined networking, Internet of Things
Disaster recovery/security, Green IT, Datacentre backup power and power distribution, Datacentre cooling infrastructure, Systems management, Clustering for high availability and HPC, Performance, monitoring and optimisation, Datacentre capacity planning, Server and Operating Systems, Virtualisation, Desktop virtualisation platforms, SaaS, IaaS, PaaS, DevOps, Converged infrastructure, Containers
Disk systems, Backup, Virtualisation and storage, Storage switches, Cloud storage, Disaster recovery, Storage management, Compliance and storage, Flash and SSDs, Hyper-convergence, Software-defined storage, Object storage, Storage performance
Learn how to protect your company's data, improve digital customer experience, manage workplace mobility, implement cloud computing and tackle big data challenges.Click Here
Learn how IBM's Smarter Computing will transform your IT environment by helping you successfully deploy and manage a cloud storage infrastructure and grow your business.Click here
ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.
This month's cyberattacks clearly show the cost of skimping on cybersecurity. Unfortunately, the ROI for ample IT security is not as transparent for some companies, explains MIT's Michael Siegel.
Want to get a sense of how much CIO roles and responsibilities have changed? Try explaining your cloud strategy to your IT mentors.
iRobot is making a play for the smart home, and it's using a cutting-edge technology to do so.
Companies doing business in EU face challenge to get GDPR compliant as enforcement of the strict new General Data Protection Regulation is just one year away.
Rakos malware is attempting to build a botnet by attacking embedded Linux systems. Expert Nick Lewis explains how enterprises can prevent attacks on their systems.
A system breach is inevitable, and BDS products provide a valuable means of detection. But a strategy that blends both defense and offense is the best approach to security.
Distributed computing has changed the face of networking; application performance tools help IT make sense of performance problems when issues crop up.
This week, bloggers look into the open source networking option SNAS, SIEM for enterprises and automating device configurations.
Console unveils a cloud interconnect service that offers a more secure and stable connection between multiple cloud providers.
A lack of open source development support adds to enterprise OpenStack criticism, as the platform inches forward with traditional IT customers and partners.
Despite a rapidly changing IT industry driven mostly by cloud, the on-premises data center is here to stay, according to a survey by the Uptime Institute.
A major change in SUSE Manager 3 is that it's primarily built on Salt, rather than Spacewalk. Learn what else has changed, and how IT can take advantage of the latest release.
Operational data stores and data warehouses both store operational data, but the similarities between them end there -- and they both have a role to play in analytics architectures.
Kafka is a linchpin in many on-premises data pipelines. Now, Confluent has a Kafka cloud service to ease this distributed system's ascent to cloud nirvana.
Data lakes offer a more expansive alternative to data warehouses for analytics uses. TDWI analyst Philip Russom offers advice on how to get things right in a data lake architecture.