Computer Weekly is the leading provider of news, analysis, and opinion for the UK IT
VIEW OUR COMPLETE EZINE LIBRARY
View the latest CIO interviews, videos and guides to help you develop your IT leadership
PC, Servers, Storage, Data centre, Mobile, Networking, Chips & processors, Printers
Operating systems, Open source, Windows, Developer, Mobile, Database, Business applications, SOA, Web, Middleware, BI, Virtualisation, Collaboration, Licensing, Financial applications, Cloud applications, CRM, ERP, HR software
Outsourcing, Consultancy, Hosting, Cloud, Offshore, Startups
Antivirus, IAM, Risk management, Data protection, Continuity, Cybercrime, Data Breach Incident Management and Recovery, Data Breach Incident Management and Recovery, Web Application Security, Cloud security , Compliance Regulation and Standard Requirements, Secure Coding and Application Programming, Network Security Management, Endpoint and NAC Protection
Network hardware, Network software, VoIP, Unified communications, Wireless, Mobile, Telecoms networks and broadband communications, Datacentre networking, Network routing and switching, Network monitoring and analysis, Network security strategy, WAN performance and optimisation, Software-defined networking, Internet of Things
Smartphone, Laptop, Tablet, Mobile software, Mobile networking
E-commerce, Social media, Web development, Cloud, Internet infrastructure
Jobs, Technical skills, Management skills, Training
DR/security, Green IT, Data centre backup power and power distribution, Data centre cooling infrastructure, Systems management, Clustering for high availability and HPC, Performance, monitoring and optimisation, Data centre capacity planning, Server and OS, Virtualisation, Desktop virtualisation platforms
Big data, Content management, BPM, Business intelligence and analytics, Database management, Data warehousing, MDM/Integration, Quality/governance
Disk systems, Backup, Virtualisation and storage, Storage switches, Cloud storage, Disaster recovery, Storage management, Compliance and storage
Learn how to protect your company's data, improve digital customer experience, manage workplace
mobility, implement cloud computing and tackle big data challenges.
Learn how IBM's Smarter Computing will transform your IT environment by helping you successfully
deploy and manage a cloud storage infrastructure and grow your business.
Free downloads of our independent ehandbooks; Buyer's Guides, Supplier Profiles, Survey Results
Browse these keywords to find relevant content on ComputerWeekly.com
Antivirus, firewall and IDS products
Application security and coding requirements
Big data analytics
Business continuity planning
Business intelligence and analytics
Business intelligence software
Business process management (BPM)
CW500 and IT leadership skills
Chips and processor hardware
Cloud computing services
Cloud computing software
Clustering for high availability and HPC
Collaboration software and productivity software
Computer peripherals and printers
Computer storage hardware
Customer relationship management (CRM)
Data breach incident management and recovery
Data centre backup power and power distribution
Data centre capacity planning
Data centre cooling infrastructure
Data centre disaster recovery and security
Data centre energy efficiency and green IT
Data centre hardware
Data centre networking
Data centre performance troubleshooting, monitoring and optimisation
Data centre systems management
Data protection regulations and compliance
Data protection, backup and archiving
Data quality management and governance
Enterprise resource planning (ERP) software
Hackers and cybercrime prevention
Healthcare and NHS IT
IT education and training
IT efficiency and sustainability
IT for charity organisations
IT for consulting and business services
IT for financial services
IT for government and public sector
IT for leisure and hospitality industry
IT for manufacturing
IT for media and entertainment industry
IT for retail and logistics
IT for small and medium-sized enterprises (SME)
IT for telecoms and internet organisations
IT for transport and travel industry
IT for utilities and energy
IT innovation, research and development
IT jobs and recruitment
IT legislation and regulation
IT management skills
IT operations management and IT support
IT project management
IT risk management
IT supplier relationship management
IT technical skills
Identity and access management products
Integration software and middleware
Internet of Things (IoT)
Laptops and notebooks
Managed services and hosting services
Managing IT and business issues
Managing servers and operating systems
Master data management (MDM) and integration
Microsoft Windows software
Mobile apps and software
Network monitoring and analysis
Network routing and switching
Network security management
Network security strategy
Offshore IT services
Open source software
Operating systems software
Privacy and data protection
Regulatory compliance and standard requirements
SAN, NAS, solid state, RAID
Security policy and user awareness
Server virtualisation platforms and management
Service-oriented architecture (SOA)
Social media technology
Software development tools
Software-defined networking (SDN)
Storage fabric, switches and networks
Storage management and strategy
Telecoms networks and broadband communications
Virtualisation and storage
Virtualisation management strategy
Voice networking and VoIP
WAN performance and optimisation
Web application security
Consultant Rick Davidson urges CIOs to take the lead on improving customer service in the digital age -- and spells out the signs of a customer service strategy gone wrong.
What big company doesn’t want a social networking platform that lets employees really connect, communicate and create? Take it from a pro: The benefits are many and, yes, it is hard to do.
At Spark Summit East, Databricks talked up a storm about its new Spark cloud offering in an effort to distinguish the data processing engine from MapReduce and the Hadoop stack: The Data Mill reports.
SearchSecurity.com is pleased to partner with Gary McGraw to feature his monthly Silver Bullet software security podcasts, which discuss best practices in software security.
Qualys has added a free, public API to its SSL testing services, which will enable an enterprise to test any website or server for SSL vulnerabilities.
Expert Matt Pascucci describes how implementing mobile device management products can protect smartphones and tablets, as well as enterprise networks and infrastructures.
Alcatel-Lucent Enterprise has introduced a switch gateway in its latest high-density OmniSwitch that improves data throughput between virtualized applications and a VXLAN.
Microsoft provides Office 365 MDM at no cost, giving subscribers basic capabilities for mobile device management and the option of upgrading to the paid service Intune.
ICYMI: Industry leaders Cisco, Intel and Arista join a consortium to create standards to allay power, heat concerns fueled by 400 GbE protocol.
A spate of new converged and hyper-converged systems give IT shops a potent combination of flash storage and pre-integration.
Data center security is paramount to ensuring the safety of your employees and data. But what happens when you let a fool into your facility?
New deeply skilled mainframe staffers won't pop up overnight, so use a mix of in-house and outsourcing tactics to support another decade on big iron.
At times, it seems a Hadoop usurper, but the open source Spark processing engine is best viewed as another step on the long road of computing technology.
As data sources continue to increase, organizations are reconsidering enterprise data warehouses for a more flexible approach to data management.
In a Q&A, consultant Rick Sherman offers tips on integrating cloud and on-premises applications, and discusses potential barriers and the technologies that can help get the job done.