ComputerWeekly ComputerWeekly TechTarget
    Join CW+
    Login Register Cookies
    • News
    • In Depth
    • Blogs
    • Opinion
    • Videos
    • Photo Stories
    • Premium Content
    • Webinars
    • Download 2024 IT salary survey
    RSS
    • IT Management
      • IT leadership & CW500
      • IT architecture
      • IT efficiency
      • Governance
      • Innovation
      • Legislation & regulation
      • Operations & support
      • Project management
      • Strategy
      • Supplier management
      • Business issues
      • Sponsored Communities
    • Industry Sectors
      • Healthcare IT
      • Charity IT
      • Business services IT
      • Financial services IT
      • Government & public sector IT
      • Leisure & hospitality IT
      • Manufacturing IT
      • Media & entertainment IT
      • Retail IT
      • SME IT
      • Telecoms & internet
      • Transport & travel IT
      • Utilities IT
      • IT suppliers
    • Technology Topics
      Datacentre View All
      • Clustering for high availability and HPC
      • Containers
      • Converged infrastructure
      • Datacentre backup power and power distribution
      • Datacentre capacity planning
      • Datacentre cooling infrastructure
      • Disaster recovery/security
      • Green IT
      • Performance, monitoring and optimisation
      • Systems management
      • DevOps
      • IaaS
      • Server and Operating Systems
      • PaaS
      • Virtualisation
      • SaaS
      • Desktop virtualisation platforms
      Enterprise software View All
      • AI and automation
      • Blockchain
      • Business applications
      • Business intelligence
      • Cloud applications
      • Collaboration
      • CRM
      • Database
      • ERP
      • Financial applications
      • HR software
      • Middleware
      • Microservices
      • Windows
      • Mobile
      • Open source
      • Operating systems
      • SOA
      • Software development
      • Software licensing
      • Virtualisation
      • Web software
      IT in Europe and Middle East View All
      • IT in France
      • IT in the Nordics
      • IT in Benelux
      • IT in Germany
      • IT in Italy
      • IT in Poland
      • IT in Russia
      • IT in Spain
      • IT in the Middle East
      • IT in Turkey
      Information Management View All
      • Big data
      • Business intelligence and analytics
      • BPM
      • Content management
      • Database management
      • Quality/governance
      • Data warehousing
      • MDM/Integration
      IT in Asia-Pacific View All
      • IT in ASEAN
      • IT in Australia & New Zealand
      • IT in India
      Internet View All
      • Cloud
      • E-commerce
      • Internet infrastructure
      • Social media
      • Web development
      IT skills View All
      • Diversity in IT
      • Training
      • Jobs
      • Management skills
      • Technical skills
      Hardware View All
      • Chips & processors
      • Printers
      • Storage
      • Data centre
      • Mobile
      • Networking
      • PC
      • Servers
      IT security View All
      • Antivirus
      • Secure Coding and Application Programming
      • Continuity
      • Cloud security
      • Data Breach Incident Management and Recovery
      • Endpoint and NAC Protection
      • Cybercrime
      • IAM
      • Risk management
      • Network Security Management
      • Data protection
      • Compliance Regulation and Standard Requirements
      • Security policy and user awareness
      • Web Application Security
      IT services View All
      • Cloud
      • Consultancy
      • Outsourcing
      • Hosting
      • Offshore
      • Startups
      Mobile View All
      • Laptop
      • Mobile software
      • Mobile networking
      • Smartphone
      • Tablet
      Networking View All
      • Datacentre networking
      • Internet of Things
      • Mobile
      • Network hardware
      • Network monitoring and analysis
      • Network routing and switching
      • Network security strategy
      • Network software
      • Software-defined networking
      • Telecoms networks and broadband communications
      • Unified communications
      • VoIP
      • WAN performance and optimisation
      • Wireless
      Storage View All
      • AI and storage
      • Cloud storage
      • Containers and storage
      • Data management
      • Backup
      • Compliance and storage
      • Disaster recovery
      • Flash and SSDs
      • Hyper-convergence
      • Object storage
      • Disk systems
      • Software-defined storage
      • Storage switches
      • Storage management
      • Storage performance
      • Tape storage
      • Virtualisation and storage
      Please select a category
      • Datacentre
      • Enterprise software
      • IT in Europe and Middle East
      • Information Management
      • IT in Asia-Pacific
      • Internet
      • IT skills
      • Hardware
      • IT security
      • IT services
      • Mobile
      • Networking
      • Storage
    • Follow:
    • ComputerWeekly.com.br
    • ComputerWeekly.de
    • ComputerWeekly.es
    • LeMagIT.fr
    • MicroScope.co.uk

    Quizzes

    Quizzes

    • System Mechanic 12 Competition

      Enter here.  Continue Reading

    Latest TechTarget resources
    • CIO
    • Security
    • Networking
    • Data Center
    • Data Management
    Search CIO
    • 9 common risk management failures and how to avoid them

      As enterprises rework their business models and strategies to meet various new challenges, risks abound. Here are nine risk ...

    • Traditional vs. enterprise risk management: How do they differ?

      Traditional risk management and enterprise risk management are similar in their aim to mitigate risks that can harm a company. ...

    • Domestic manufacturing policy emphasizes U.S. tech, products

      Bringing manufacturing back to the U.S. might be a lofty goal for some products, but companies like Apple are making moves to ...

    Search Security
    • Is post-quantum cryptography the next Y2K?

      Quantum computing threatens public-key encryption, which organizations use to secure communications and data. Migrating to ...

    • How to become a bug bounty hunter

      With the right strategy, tools and skills, software testers and security researchers can earn extra income as bug bounty hunters.

    • Stop AI bot traffic: Protecting your organization's website

      As crawlers and bots bog down websites in the era of AI, some researchers say that the solution for the Internet's most ...

    Search Networking
    • Intel to spin off networking business in cost-cutting gambit

      In a familiar move, the semiconductor giant's Network and Edge unit will operate independently with Intel's backing.

    • How platform-based networking enables network management

      Platform-based networking tweaks the platformization model to become a comprehensive tool set for network administrators.

    • An introduction to satellite network architecture

      Satellite network architecture consists of three segments: space, ground and control. Satellite networks enhance networking ...

    Search Data Center
    • AWS tables Virginia data center after community pushback

      The proposed 7.2 million-square-foot operation -- one of the world's largest -- would have added to Amazon's $35 billion data ...

    • Intel cuts spending, eyes data center recovery after mixed Q2

      CEO Lip-Bu Tan says the company's layoff plan is mostly complete as Intel tries to rebound after financial woes in recent years.

    • Trump's fossil-fueled AI Action Plan pushes deregulation

      The Trump administration's AI Action Plan and executive orders include deregulation that would fast-track data center and chip ...

    Search Data Management
    • What is data lineage? Techniques, best practices and tools

      Organizations can bolster data governance efforts by tracking the lineage of data in their systems. Get advice on how to do so ...

    • Collibra's acquisition of Deasy targets unstructured data

      With AI development on the rise, the vendor's latest purchase better enables customers to combine the complete array of relevant ...

    • StarTree adding Iceberg support to simplify, speed analysis

      With open table data storage formats gaining popularity, the vendor's pending support for Apache Iceberg promotes flexibility ...

    • About Us
    • Editorial Ethics Policy
    • Meet The Editors
    • Contact Us
    • Our Use of Cookies
    • Advertisers
    • Business Partners
    • Media Kit
    • Corporate Site
    • Contributors
    • Reprints
    • Answers
    • E-Products
    • Events
    • In Depth
    • Guides
    • Opinions
    • Quizzes
    • Photo Stories
    • Tips
    • Tutorials
    • Videos
    • Computer Weekly Topics

    ©2025 TechTarget, Inc. d/b/a Informa TechTarget. All Rights Reserved.

    Privacy Policy
    Cookie Preferences
    Cookie Preferences
    Do Not Sell or Share My Personal Information

    Close