Computer Weekly is the leading provider of news, analysis, and opinion for the UK IT
VIEW OUR COMPLETE EZINE LIBRARY
View the latest CIO interviews, videos and guides to help you develop your IT leadership
PC, Servers, Storage, Data centre, Mobile, Networking, Chips & processors, Printers
Operating systems, Open source, Windows, Developer, Mobile, Database, Business applications, SOA, Web, Middleware, BI, Virtualisation, Collaboration, Licensing, Financial applications, Cloud applications, CRM, ERP, HR software
Outsourcing, Consultancy, Hosting, Cloud, Offshore, Startups
Antivirus, IAM, Risk management, Data protection, Continuity, Cybercrime, Data Breach Incident Management and Recovery, Data Breach Incident Management and Recovery, Web Application Security, Cloud security , Compliance Regulation and Standard Requirements, Secure Coding and Application Programming, Network Security Management, Endpoint and NAC Protection
Network hardware, Network software, VoIP, Unified communications, Wireless, Mobile, Telecoms networks and broadband communications, Datacentre networking, Network routing and switching, Network monitoring and analysis, Network security strategy, WAN performance and optimisation, Software-defined networking, Internet of Things
Smartphone, Laptop, Tablet, Mobile software, Mobile networking
E-commerce, Social media, Web development, Cloud, Internet infrastructure
Jobs, Technical skills, Management skills, Training
DR/security, Green IT, Data centre backup power and power distribution, Data centre cooling infrastructure, Systems management, Clustering for high availability and HPC, Performance, monitoring and optimisation, Data centre capacity planning, Server and OS, Virtualisation, Desktop virtualisation platforms
Big data, Content management, BPM, Business intelligence and analytics, Database management, Data warehousing, MDM/Integration, Quality/governance
Disk systems, Backup, Virtualisation and storage, Storage switches, Cloud storage, Disaster recovery, Storage management, Compliance and storage
Learn how to protect your company's data, improve digital customer experience, manage workplace
mobility, implement cloud computing and tackle big data challenges.
Learn how IBM's Smarter Computing will transform your IT environment by helping you successfully
deploy and manage a cloud storage infrastructure and grow your business.
Free downloads of our independent ehandbooks; Buyer's Guides, Supplier Profiles, Survey Results
Browse these keywords to find relevant content on ComputerWeekly.com
Antivirus, firewall and IDS products
Application security and coding requirements
Big data analytics
Business continuity planning
Business intelligence and analytics
Business intelligence software
Business process management (BPM)
CW500 and IT leadership skills
Chips and processor hardware
Cloud computing services
Cloud computing software
Clustering for high availability and HPC
Collaboration software and productivity software
Computer peripherals and printers
Computer storage hardware
Customer relationship management (CRM)
Data breach incident management and recovery
Data centre backup power and power distribution
Data centre capacity planning
Data centre cooling infrastructure
Data centre disaster recovery and security
Data centre energy efficiency and green IT
Data centre hardware
Data centre networking
Data centre performance troubleshooting, monitoring and optimisation
Data centre systems management
Data protection regulations and compliance
Data protection, backup and archiving
Data quality management and governance
Enterprise resource planning (ERP) software
Hackers and cybercrime prevention
Healthcare and NHS IT
IT education and training
IT efficiency and sustainability
IT for charity organisations
IT for consulting and business services
IT for financial services
IT for government and public sector
IT for leisure and hospitality industry
IT for manufacturing
IT for media and entertainment industry
IT for retail and logistics
IT for small and medium-sized enterprises (SME)
IT for telecoms and internet organisations
IT for transport and travel industry
IT for utilities and energy
IT innovation, research and development
IT jobs and recruitment
IT legislation and regulation
IT management skills
IT operations management and IT support
IT project management
IT risk management
IT supplier relationship management
IT technical skills
Identity and access management products
Integration software and middleware
Internet of Things (IoT)
Laptops and notebooks
Managed services and hosting services
Managing IT and business issues
Managing servers and operating systems
Master data management (MDM) and integration
Microsoft Windows software
Mobile apps and software
Network monitoring and analysis
Network routing and switching
Network security management
Network security strategy
Offshore IT services
Open source software
Operating systems software
Privacy and data protection
Regulatory compliance and standard requirements
SAN, NAS, solid state, RAID
Security policy and user awareness
Server virtualisation platforms and management
Service-oriented architecture (SOA)
Social media technology
Software development tools
Software-defined networking (SDN)
Storage fabric, switches and networks
Storage management and strategy
Telecoms networks and broadband communications
Virtualisation and storage
Virtualisation management strategy
Voice networking and VoIP
WAN performance and optimisation
Web application security
Make way for DevSecOps. According to Gartner analyst David Cearley, CIOs need to add security professionals to their DevOps teams.
The number of mobile devices now outnumbers the number of people in the world. Mass mobilization calls for next-generation security tools and some forward thinking on the part of CIOs.
A new technology called runtime application self-protection is being touted as a next big thing in application security. But not everyone is singing its praises.
According to HP Security Research, threat intelligence best practices can be difficult to implement, and even the most trustworthy sources must be tested for fidelity.
Emerging malware, like the Vawtrak banking malware, has the ability to block enterprise antimalware measures. Expert Nick Lewis explains how to mitigate the risk.
Medical device security is a growing concern. Expert Mike Villegas shares how to make sense of the new FDA cybersecurity guidelines for medical device manufacturers.
IBM and Juniper say they will work together to deliver customer intelligence to cloud and communications service providers.
Midokura has refreshed MidoNet with features that provide a bridge for VMware customers looking to move to OpenStack without using proprietary virtual networking technology.
Wave 2 Gigabit Wi-Fi will usher in speeds of up to 7 Gbps. Expert Lisa Phifer explains what you need to do to get ready.
Most of the IT budget goes to maintaining the data center hardware and software. Consider outsourcing for better support.
What's the difference between a nano server and a PC? Timing.
What's the impact on I/O when you run in a CPU-constrained mainframe environment?
The Open Data Platform has arrived, but not all Hadoop vendors are on board. The initiative, aimed at boosting interoperability, formed a backdrop for discussion at the Strata + Hadoop World 2015 conference.
Database expert Craig S. Mullins examines the criteria and characteristics you should consider when determining if a relational database management system is right for your company.
Building and running enterprise Hadoop applications takes more than data crunching. First, Hadoop data must be absorbed into company processes, a Western Union IT manager says.