ComputerWeekly ComputerWeekly TechTarget
    Join CW+
    Login Register Cookies
    • News
    • In Depth
    • Blogs
    • Opinion
    • Videos
    • Photo Stories
    • Premium Content
    • Webinars
    • Download 2024 IT salary survey
    RSS
    • IT Management
      • IT leadership & CW500
      • IT architecture
      • IT efficiency
      • Governance
      • Innovation
      • Legislation & regulation
      • Operations & support
      • Project management
      • Strategy
      • Supplier management
      • Business issues
      • Sponsored Communities
    • Industry Sectors
      • Healthcare IT
      • Charity IT
      • Business services IT
      • Financial services IT
      • Government & public sector IT
      • Leisure & hospitality IT
      • Manufacturing IT
      • Media & entertainment IT
      • Retail IT
      • SME IT
      • Telecoms & internet
      • Transport & travel IT
      • Utilities IT
      • IT suppliers
    • Technology Topics
      Datacentre View All
      • Clustering for high availability and HPC
      • Containers
      • Converged infrastructure
      • Datacentre backup power and power distribution
      • Datacentre capacity planning
      • Datacentre cooling infrastructure
      • Disaster recovery/security
      • Green IT
      • Performance, monitoring and optimisation
      • Systems management
      • DevOps
      • IaaS
      • Server and Operating Systems
      • PaaS
      • Virtualisation
      • SaaS
      • Desktop virtualisation platforms
      Enterprise software View All
      • AI and automation
      • Blockchain
      • Business applications
      • Business intelligence
      • Cloud applications
      • Collaboration
      • CRM
      • Database
      • ERP
      • Financial applications
      • HR software
      • Middleware
      • Microservices
      • Windows
      • Mobile
      • Open source
      • Operating systems
      • SOA
      • Software development
      • Software licensing
      • Virtualisation
      • Web software
      IT in Europe and Middle East View All
      • IT in France
      • IT in the Nordics
      • IT in Benelux
      • IT in Germany
      • IT in Italy
      • IT in Poland
      • IT in Russia
      • IT in Spain
      • IT in the Middle East
      • IT in Turkey
      Information Management View All
      • Big data
      • Business intelligence and analytics
      • BPM
      • Content management
      • Database management
      • Quality/governance
      • Data warehousing
      • MDM/Integration
      IT in Asia-Pacific View All
      • IT in ASEAN
      • IT in Australia & New Zealand
      • IT in India
      Internet View All
      • Cloud
      • E-commerce
      • Internet infrastructure
      • Social media
      • Web development
      IT skills View All
      • Diversity in IT
      • Training
      • Jobs
      • Management skills
      • Technical skills
      Hardware View All
      • Chips & processors
      • Printers
      • Storage
      • Data centre
      • Mobile
      • Networking
      • PC
      • Servers
      IT security View All
      • Antivirus
      • Secure Coding and Application Programming
      • Continuity
      • Cloud security
      • Data Breach Incident Management and Recovery
      • Endpoint and NAC Protection
      • Cybercrime
      • IAM
      • Risk management
      • Network Security Management
      • Data protection
      • Compliance Regulation and Standard Requirements
      • Security policy and user awareness
      • Web Application Security
      IT services View All
      • Cloud
      • Consultancy
      • Outsourcing
      • Hosting
      • Offshore
      • Startups
      Mobile View All
      • Laptop
      • Mobile software
      • Mobile networking
      • Smartphone
      • Tablet
      Networking View All
      • Datacentre networking
      • Internet of Things
      • Mobile
      • Network hardware
      • Network monitoring and analysis
      • Network routing and switching
      • Network security strategy
      • Network software
      • Software-defined networking
      • Telecoms networks and broadband communications
      • Unified communications
      • VoIP
      • WAN performance and optimisation
      • Wireless
      Storage View All
      • AI and storage
      • Cloud storage
      • Containers and storage
      • Data management
      • Backup
      • Compliance and storage
      • Disaster recovery
      • Flash and SSDs
      • Hyper-convergence
      • Object storage
      • Disk systems
      • Software-defined storage
      • Storage switches
      • Storage management
      • Storage performance
      • Tape storage
      • Virtualisation and storage
      Please select a category
      • Datacentre
      • Enterprise software
      • IT in Europe and Middle East
      • Information Management
      • IT in Asia-Pacific
      • Internet
      • IT skills
      • Hardware
      • IT security
      • IT services
      • Mobile
      • Networking
      • Storage
    • Follow:
    • ComputerWeekly.com.br
    • ComputerWeekly.de
    • ComputerWeekly.es
    • LeMagIT.fr
    • MicroScope.co.uk

    Quizzes

    Quizzes

    • System Mechanic 12 Competition

      Enter here.  Continue Reading

    Latest TechTarget resources
    • CIO
    • Security
    • Networking
    • Data Center
    • Data Management
    Search CIO
    • Project vs. program vs. portfolio management, explained

      Project, program and portfolio management are related, but they represent three distinct disciplines. Learn about the ...

    • Capital One AI partnerships aim to build trust, grow talent

      Capital One's relationships with the National Science Foundation and several universities seek to improve AI's responsiveness and...

    • 10 free IT strategic planning templates and examples for CIOs

      As technology becomes a business differentiator, a well-thought-out IT strategy plan is more crucial than ever. These IT strategy...

    Search Security
    • News brief: U.S. Cyber Trust Mark update and how to prepare

      Check out the latest security news from the Informa TechTarget team.

    • Cyber Trust Mark certification and how IoT devices will qualify

      The U.S. Cyber Trust Mark aims to validate IoT devices that meet a certain security threshold. Explore key NIST recommendations ...

    • What is Triple DES and why is it disallowed?

      Triple DES offered 112-bit security through its three-step encryption process, but NIST deprecated it in 2018 and disallowed its ...

    Search Networking
    • 11 common wireless security risks you don't have to take

      Wi-Fi is a boon to productivity, but it can also create serious security issues. Learn how any company can uncover and fortify ...

    • A network cable management guide

      When organizing cable clutter, network engineers should follow best practices, such as labeling, using cable ties and maintaining...

    • End-to-end network observability for AI workloads

      AI-driven technologies require new practices after they're integrated into networks. For AI to run properly, networks must have ...

    Search Data Center
    • Experts: Intel government stake won't fix long-term woes

      A deal giving the U.S. federal government a 10% stake in Intel in exchange for funds won't necessarily ensure the company's ...

    • AWS launches virtual servers with custom Intel Xeon 6 chips

      The companies tout a collaboration that will offer better price performance and memory bandwidth for memory-intensive workloads.

    • The increasing concern of data center land acquisition

      Data center land acquisition is increasing due to the growing demand for capacity and AI workloads. By 2030, facility areas are ...

    Search Data Management
    • Fivetran's Tobiko Data acquisition aids data transformation

      The purchase provides the data integration vendor with its own data transformation framework to augment capabilities it provides ...

    • Neo4j's latest targets graph database performance at scale

      Infinigraph enables the vendor's platform to handle the scale of hybrid transactional/analytical processing workloads used to ...

    • ESG data collection: Guide and best practices

      Sustainability initiatives won't succeed without quality data. Following an ESG data collection framework and best practices ...

    • About Us
    • Editorial Ethics Policy
    • Meet The Editors
    • Contact Us
    • Our Use of Cookies
    • Advertisers
    • Business Partners
    • Media Kit
    • Corporate Site
    • Contributors
    • Reprints
    • Answers
    • E-Products
    • Events
    • In Depth
    • Guides
    • Opinions
    • Quizzes
    • Photo Stories
    • Tips
    • Tutorials
    • Videos
    • Computer Weekly Topics

    ©2025 TechTarget, Inc. d/b/a Informa TechTarget. All Rights Reserved.

    Privacy Policy
    Cookie Preferences
    Cookie Preferences
    Do Not Sell or Share My Personal Information

    Close