Computer Weekly is the leading provider of news, analysis, and opinion for the UK IT community.
View the latest CIO interviews, videos and guides to help you develop your IT leadership
PC, Servers, Storage, Data centre, Mobile, Networking, Chips & processors, Printers
Operating systems, Open source, Windows, Developer, Mobile, Database, Business applications, SOA, Web, Middleware, BI, Virtualisation, Collaboration, Licensing, Financial applications, Cloud applications, CRM, ERP, HR software
Outsourcing, Consultancy, Hosting, Cloud, Offshore, Startups
Antivirus, IAM, Risk management, Data protection, Continuity, Cybercrime, Data Breach Incident Management and Recovery, Data Breach Incident Management and Recovery, Web Application Security, Cloud security , Compliance Regulation and Standard Requirements, Secure Coding and Application Programming, Network Security Management, Endpoint and NAC Protection
Network hardware, Network software, VoIP, Unified communications, Wireless, Mobile, Telecoms networks and broadband communications, Datacentre networking, Network routing and switching, Network monitoring and analysis, Network security strategy, WAN performance and optimisation, Software-defined networking
Smartphone, Laptop, Tablet, Mobile software, Mobile networking
E-commerce, Social media, Web development, Cloud, Internet infrastructure
Jobs, Technical skills, Management skills, Training
DR/security, Green IT, Data centre backup power and power distribution, Data centre cooling infrastructure, Systems management, Clustering for high availability and HPC, Performance, monitoring and optimisation, Data centre capacity planning, Server and OS, Virtualisation, Desktop virtualisation platforms
Big data, Content management, BPM, Business intelligence and analytics, Database management, Data warehousing, MDM/Integration, Quality/governance
Disk systems, Backup, Virtualisation and storage, Storage switches, Cloud storage, Disaster recovery, Storage management, Compliance and storage
Gain insights into addressing the challenges of the mobile enterprise with these tips and
videos, and learn how BlackBerry Enterprise Service 10 can help you balance end-user and corporate
IT organisations of all sizes are tasked with simplifying operations and cutting costs. Access
the videos, case studies and papers on this website to learn how Dell Efficient Enterprise can
Find out how to make the most of your applications investments and address business challenges
in areas such as mobility, integration and sourcing strategies.
Learn how Cisco’s cloud and mobility solutions can help organisations revise strategies to meet
internal and external demands, and gain greater expert insights with white papers, videos and
Free downloads of our independent ehandbooks; Buyer's Guides, Supplier Profiles, Survey Results
Browse these keywords to find relevant content on ComputerWeekly.com
Antivirus, firewall and IDS products
Application security and coding requirements
Big data analytics
Business continuity planning
Business intelligence and analytics
Business intelligence software
Business process management (BPM)
CW500 and IT leadership skills
Chips and processor hardware
Cloud computing services
Cloud computing software
Clustering for high availability and HPC
Collaboration software and productivity software
Computer peripherals and printers
Computer storage hardware
Customer relationship management (CRM)
Data breach incident management and recovery
Data centre backup power and power distribution
Data centre capacity planning
Data centre cooling infrastructure
Data centre disaster recovery and security
Data centre energy efficiency and green IT
Data centre hardware
Data centre networking
Data centre performance troubleshooting, monitoring and optimisation
Data centre systems management
Data protection regulations and compliance
Data protection, backup and archiving
Data quality management and governance
Enterprise resource planning (ERP) software
Hackers and cybercrime prevention
Healthcare and NHS IT
IT education and training
IT efficiency and sustainability
IT for charity organisations
IT for consulting and business services
IT for financial services
IT for government and public sector
IT for leisure and hospitality industry
IT for manufacturing
IT for media and entertainment industry
IT for retail and logistics
IT for small and medium-sized enterprises (SME)
IT for telecoms and internet organisations
IT for transport and travel industry
IT for utilities and energy
IT innovation, research and development
IT jobs and recruitment
IT legislation and regulation
IT management skills
IT operations management and IT support
IT project management
IT risk management
IT supplier relationship management
IT technical skills
Identity and access management products
Integration software and middleware
Laptops and notebooks
Managed services and hosting services
Managing IT and business issues
Managing servers and operating systems
Master data management (MDM) and integration
Microsoft Windows software
Mobile apps and software
Network monitoring and analysis
Network routing and switching
Network security management
Network security strategy
Offshore IT services
Open source software
Operating systems software
Privacy and data protection
Regulatory compliance and standard requirements
SAN, NAS, solid state, RAID
Security policy and user awareness
Server virtualisation platforms and management
Service-oriented architecture (SOA)
Social media technology
Software development tools
Software-defined networking (SDN)
Storage fabric, switches and networks
Storage management and strategy
Telecoms networks and broadband communications
Virtualisation and storage
Virtualisation management strategy
Voice networking and VoIP
WAN performance and optimisation
Web application security
Not all rogue IT is bad for business. Here, we look at how CIOs keep tabs of the tech outside of IT and handling risk.
The consumerization of IT and increasing demands for business agility are forcing the evolution of rogue IT. How are CIOs responding?
When thinking of rogue IT in today's enterprise, envision the Big Bad Wolf from Little Red Riding Hood.
Speakers at RSA Conference 2014 said information security incident response teams must identify and prep key participants well before incidents occur.
Expert Nick Lewis details how the Tilon malware strain utilizes a unique communication protocol with its C&C infrastructure.
Expert Nick Lewis explains the logic behind the 'Bouncer' attack toolkit and its seemingly contradictory use of whitelisting security methods.
With the ratification of the IEEE 802.11ac standard, Ethernet is all but dead. But is your organization's network ready for gigabit speeds?
The white-box switch market grew exponentially in 2013 thanks to hyperscale companies and cloud providers, but will enterprises buy in?
SN blogs: MWC highlights new mobile technology, Apple comes out with improvements to its MDM program, and analysts discuss big data and security.
OpenLDAP configuration isn't for the faint of heart. LDAP pros weigh in on what you should and shouldn't do when deploying the directory server.
Server refresh cycles can be more nuanced than a rip and replace of used servers. Consider these options for longer server lifecycles.
When a process fails, go for the kill. You know how to start and stop Linux services, but what happens when you need to kill one?
Enlist senior-level champions from both business and IT to guide a data governance program and achieve harmony between the two sides.
Organizations should meet a few key program development goals prior to implementing an MDM initiative, according to MDM expert Anne Marie Smith.
Highlighting the benefits of an MDM program from both technical and business perspectives is essential to gaining support for funding.