- UDDI Business Registry
- Application Integration
- B2B Integration
- Composite Applications Software
Operating systems, Open source, Windows, Software development, Mobile, Database, Business applications, SOA, Web software, Middleware, Business intelligence, Virtualisation, Collaboration, Software licensing, Financial applications, Cloud applications, CRM, ERP, HR software, AI and automation, Microservices, Blockchain
Antivirus, IAM, Risk management, Data protection, Continuity, Cybercrime, Data Breach Incident Management and Recovery, Security policy and user awareness, Web Application Security, Cloud security , Compliance Regulation and Standard Requirements, Secure Coding and Application Programming, Network Security Management, Endpoint and NAC Protection
Network hardware, Network software, VoIP, Unified communications, Wireless, Mobile, Telecoms networks and broadband communications, Datacentre networking, Network routing and switching, Network monitoring and analysis, Network security strategy, WAN performance and optimisation, Software-defined networking, Internet of Things
Disaster recovery/security, Green IT, Datacentre backup power and power distribution, Datacentre cooling infrastructure, Systems management, Clustering for high availability and HPC, Performance, monitoring and optimisation, Datacentre capacity planning, Server and Operating Systems, Virtualisation, Desktop virtualisation platforms, SaaS, IaaS, PaaS, DevOps, Converged infrastructure, Containers
Disk systems, Backup, Virtualisation and storage, Storage switches, Cloud storage, Disaster recovery, Storage management, Compliance and storage, Flash and SSDs, Hyper-convergence, Software-defined storage, Object storage, Storage performance
Learn how to protect your company's data, improve digital customer experience, manage workplace mobility, implement cloud computing and tackle big data challenges.Click Here
Learn how IBM's Smarter Computing will transform your IT environment by helping you successfully deploy and manage a cloud storage infrastructure and grow your business.Click here
See more topics related to: .NET | UDDI Business Registry | Application Integration | ASP.NET | B2B Integration | BPEL | Composite Applications Software | eBusiness | ESB | Middleware | NetWeaver | SOA | SOAP | UDDI Specification | Web Services Architecture | Web Services Management | Web Services Security | WebSphere | WS-Security | WSDL
ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.
Companies are in hot pursuit of the benefits offered by cutting-edge technologies, but mitigating security risks often gets scant attention. CIOs need to change that. Here's how.
Jason Hong talks about Carnegie Mellon's work in social cybersecurity, a new discipline that uses techniques from social psychology to improve our ability to be secure online.
In this SearchCIO video, Charles Hooper, author of 59 Minutes to Great Storytelling, gives advice for giving a great presentation, including his "three Gs."
Researchers claim malicious actors could commit mobile data theft by using shared third-party libraries and abusing elevated privileges that the permissions granted.
SMS authentication is often used to secure telematics information, but it may not be strong enough. Expert Judith Myerson discusses why, and how to improve the protection of this data.
DevOps practices can help improve enterprise security. Frank Kim of the SANS Institute explains how infosec teams can embrace them.
Data center operators are beginning to use modified link-state protocols on their large-scale data center fabrics, according to the IETF. What's behind the switch?
Before purchasing a network security system, consider where your data is located, who has access, where security tools will be deployed and if they're part of a unified strategy.
Bloggers explore the growing role of cybersecurity machine learning, the capabilities of Microsoft's containers and how well SIEM works for threat detection.
Blockchain mostly runs in the cloud today, but some hardware vendors have considered how it might fit into the data center -- despite the few benefits that it will create.
To ensure your mainframe is fault-tolerant, resilient and ready to support a growing number of apps, follow these best practices for hardware allocation, automation and more.
Azure Stack will bring the services of Azure public cloud into the enterprise data center when it goes GA in September, but initially it won't be ready for large deployments.
Data management teams are asking more questions about data security, Gartner analyst Merv Adrian says in a Q&A. But new factors are complicating the process of securing databases, he adds.
Database vendors have beefed up the security tools in their software -- and that's a good thing because attackers are increasingly targeting database systems to steal sensitive data.
Data management startup Dremio has aimed its Apache Arrow expertise at the problem of self-service data delivery. In-column caches and optimization speed queries across varied data stores.