- Applications Software
- Systems Software
- Application Development
- Applications Management
- Applications Management Services
- Computer Hardware
- Computer Software Industry
Operating systems, Open source, Windows, Developer, Mobile, Database, Business applications, SOA, Web, Middleware, BI, Virtualisation, Collaboration, Licensing, Financial applications, Cloud applications, CRM, ERP, HR software
Antivirus, IAM, Risk management, Data protection, Continuity, Cybercrime, Data Breach Incident Management and Recovery, Security policy and user awareness, Web Application Security, Cloud security , Compliance Regulation and Standard Requirements, Secure Coding and Application Programming, Network Security Management, Endpoint and NAC Protection
Network hardware, Network software, VoIP, Unified communications, Wireless, Mobile, Telecoms networks and broadband communications, Datacentre networking, Network routing and switching, Network monitoring and analysis, Network security strategy, WAN performance and optimisation, Software-defined networking, Internet of Things
DR/security, Green IT, Data centre backup power and power distribution, Data centre cooling infrastructure, Systems management, Clustering for high availability and HPC, Performance, monitoring and optimisation, Data centre capacity planning, Server and OS, Virtualisation, Desktop virtualisation platforms
Information technology in Poland, Information technology in Russia, Information technology in Turkey, Information technology in Italy, Information technology in Spain, Information technology in France, Information technology (IT) in Germany, Information technology in the Nordics
Learn how to protect your company's data, improve digital customer experience, manage workplace mobility, implement cloud computing and tackle big data challenges.Click Here
Learn how IBM's Smarter Computing will transform your IT environment by helping you successfully deploy and manage a cloud storage infrastructure and grow your business.Click here
See more topics related to: Applications Software | Malware | Systems Software | Application Development | Applications Management | Applications Management Services | Computer Hardware | Computer Software Industry | Hardware | Licensing | Piracy | Software and Information Industry Association | Software Architectures | Software Asset Management | Software Best Practices | Software Configuration Management | Software Engineers | Software Installation | Software Manuals | Software Quality Assurance | Software Selection | Software Testing
ComputerWeekly.com Research Library Copyright © 1998-2015 Bitpipe, Inc. All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.
"Crossing the Chasm" author Geoffrey Moore has developed a framework on how to talk digital investments with the business: The Data Mill reports.
The Apple Watch offers nuggets of data that could drive employee productivity. We asked our readers to weigh in on the potential usefulness of the Apple Watch for business.
The platform business model develops and derives value from the ecosystem of users it connects. CIOs need to be in on it.
A data breach warranty may seem like a tempting way to survive a costly attack, but it may not be all it's hyped up to be. Expert Mike Chapple examines.
Video: Robert 'RSnake' Hansen of WhiteHat Security discusses Web browser security, third-party software vulnerabilities and the sad state of browser security throughout the industry.
Before deploying and implementing a data loss prevention product, enterprises should have an effective data classification policy in place. Expert Bill Hayes explains how that can be done.
Harvesting your networking data to generate business intelligence can be done -- if you know how to begin.
Cisco plans to acquire OpenDNS and use its security-as-a-service products to reduce the number of IoT threats customers face.
Industry analysts discuss steps to protect WLANs against honeypot APs and how Juniper's alliance with Ruckus could shake up the market.
Purchases of racks, cabling, power equipment and data center infrastructure management software top the list for data center spending.
Virtualization, rapid refreshes and shadow IT make it harder for IT departments to really know -- and properly license and support -- what they have. You need an IT asset management system to show you.
The increasing expectation for high quality content and the growth of IoT will be helped as edge computing brings nodes closer to end users.
SonarW is a columnar data warehouse built especially to handle JSON data. It can support data warehousing for MongoDB systems and some data lakes.
Hadoop data lakes offer an enticing location for large data sets. But consultant Andy Hayler says more examples of successful big data projects are needed to help boost their adoption.
Machine learning is a hot technology in analytics applications -- and it also underpins new data preparation tools that let business analysts and users integrate data for analysis.