ComputerWeekly ComputerWeekly TechTarget
Join CW+
Login Register Cookies
  • News
  • In Depth
  • Blogs
  • Opinion
  • Videos
  • Photo Stories
  • Premium Content
  • Webinars
  • Download 2024 IT salary survey
RSS
  • IT Management
    • IT leadership & CW500
    • IT architecture
    • IT efficiency
    • Governance
    • Innovation
    • Legislation & regulation
    • Operations & support
    • Project management
    • Strategy
    • Supplier management
    • Business issues
    • Sponsored Communities
  • Industry Sectors
    • Healthcare IT
    • Charity IT
    • Business services IT
    • Financial services IT
    • Government & public sector IT
    • Leisure & hospitality IT
    • Manufacturing IT
    • Media & entertainment IT
    • Retail IT
    • SME IT
    • Telecoms & internet
    • Transport & travel IT
    • Utilities IT
    • IT suppliers
  • Technology Topics
    Datacentre View All
    • Clustering for high availability and HPC
    • Containers
    • Converged infrastructure
    • Datacentre backup power and power distribution
    • Datacentre capacity planning
    • Datacentre cooling infrastructure
    • Disaster recovery/security
    • Green IT
    • Performance, monitoring and optimisation
    • Systems management
    • DevOps
    • IaaS
    • Server and Operating Systems
    • PaaS
    • Virtualisation
    • SaaS
    • Desktop virtualisation platforms
    Enterprise software View All
    • AI and automation
    • Blockchain
    • Business applications
    • Business intelligence
    • Cloud applications
    • Collaboration
    • CRM
    • Database
    • ERP
    • Financial applications
    • HR software
    • Middleware
    • Microservices
    • Windows
    • Mobile
    • Open source
    • Operating systems
    • SOA
    • Software development
    • Software licensing
    • Virtualisation
    • Web software
    IT in Europe and Middle East View All
    • IT in France
    • IT in the Nordics
    • IT in Benelux
    • IT in Germany
    • IT in Italy
    • IT in Poland
    • IT in Russia
    • IT in Spain
    • IT in the Middle East
    • IT in Turkey
    Information Management View All
    • Big data
    • Business intelligence and analytics
    • BPM
    • Content management
    • Database management
    • Quality/governance
    • Data warehousing
    • MDM/Integration
    IT in Asia-Pacific View All
    • IT in ASEAN
    • IT in Australia & New Zealand
    • IT in India
    Internet View All
    • Cloud
    • E-commerce
    • Internet infrastructure
    • Social media
    • Web development
    IT skills View All
    • Diversity in IT
    • Training
    • Jobs
    • Management skills
    • Technical skills
    Hardware View All
    • Chips & processors
    • Printers
    • Storage
    • Data centre
    • Mobile
    • Networking
    • PC
    • Servers
    IT security View All
    • Antivirus
    • Secure Coding and Application Programming
    • Continuity
    • Cloud security
    • Data Breach Incident Management and Recovery
    • Endpoint and NAC Protection
    • Cybercrime
    • IAM
    • Risk management
    • Network Security Management
    • Data protection
    • Compliance Regulation and Standard Requirements
    • Security policy and user awareness
    • Web Application Security
    IT services View All
    • Cloud
    • Consultancy
    • Outsourcing
    • Hosting
    • Offshore
    • Startups
    Mobile View All
    • Laptop
    • Mobile software
    • Mobile networking
    • Smartphone
    • Tablet
    Networking View All
    • Datacentre networking
    • Internet of Things
    • Mobile
    • Network hardware
    • Network monitoring and analysis
    • Network routing and switching
    • Network security strategy
    • Network software
    • Software-defined networking
    • Telecoms networks and broadband communications
    • Unified communications
    • VoIP
    • WAN performance and optimisation
    • Wireless
    Storage View All
    • AI and storage
    • Cloud storage
    • Containers and storage
    • Data management
    • Backup
    • Compliance and storage
    • Disaster recovery
    • Flash and SSDs
    • Hyper-convergence
    • Object storage
    • Disk systems
    • Software-defined storage
    • Storage switches
    • Storage management
    • Storage performance
    • Tape storage
    • Virtualisation and storage
    Please select a category
    • Datacentre
    • Enterprise software
    • IT in Europe and Middle East
    • Information Management
    • IT in Asia-Pacific
    • Internet
    • IT skills
    • Hardware
    • IT security
    • IT services
    • Mobile
    • Networking
    • Storage
  • Follow:
  • ComputerWeekly.com.br
  • ComputerWeekly.de
  • ComputerWeekly.es
  • LeMagIT.fr
  • MicroScope.co.uk

Quizzes

Quizzes

  • System Mechanic 12 Competition

    Enter here.  Continue Reading

Latest TechTarget resources
  • CIO
  • Security
  • Networking
  • Data Center
  • Data Management
Search CIO
  • Key differences between chief data officers vs. CIOs

    CDOs and CIOs hold distinct roles in the tech-driven C-suite. Both roles are key to improving data collection and usage ...

  • Chief digital officer vs. chief technology officer: An explainer

    For many enterprise organizations, CDOs focus mostly on digital strategy and customer engagement, while CTOs focus on managing ...

  • Enterprise risk management team: Roles and responsibilities

    Every facet of business operations is exposed to risks, requiring a risk management team that's composed of a diverse mix of ...

Search Security
  • How to spot and expose fraudulent North Korean IT workers

    North Koreans have infiltrated countless U.S. companies as remote IT workers. That means your top developer could also work for ...

  • RSAC 2025: Cyware operationalizes threat intelligence with AI, automation

    Keeping up with threat intelligence, given its exponential growth, is tough. What businesses need is automatic triaging of alerts...

  • Key network security takeaways from RSAC 2025

    Themes on display at the conference reflected the cybersecurity industry's effort to streamline security operations, while ...

Search Networking
  • 12 remote access security risks and how to prevent them

    Enterprises face myriad remote access security concerns, but training and clear communication can help bolster security programs ...

  • How to use Cilium Hubble for network observability

    Cilium's Hubble tool provides network observability while working in Kubernetes. This guide explains how Hubble works and how to ...

  • HPE Aruba deepens network security and OpsRamp visibility

    A new 'digital circuit breaker' capability for HPE Private Clouds, increased visibility of third-party hardware with OpsRamp and ...

Search Data Center
  • Nutanix CEO talks customer challenges and platform updates

    Many customers are still looking for a VMware exit and need a modernized platform, Nutanix President and CEO Rajiv Ramaswami says...

  • Benefits and challenges of underground data centers

    Underground data centers offer sustainable alternatives to traditional facilities. They occupy less surface land, provide a ...

  • Differences between Green Globes vs. LEED for data centers

    Consider Green Globes and LEED certifications when building green data centers. Learn the differences in how the assessments are ...

Search Data Management
  • Latest Neo4j release aims to simplify graph technology

    Prebuilt algorithms that reduce the complexity of queries and connectivity to any data source are designed to make graph-based ...

  • Snowflake launches auto industry-specific AI capabilities

    The latest AI Manufacturing Data Cloud update adds features aimed at helping auto manufacturers deal with massive amounts of data...

  • The difference between data cleansing and data transformation

    Data cleansing corrects errors to improve data quality, while data transformation changes data format and structure to support ...

  • About Us
  • Editorial Ethics Policy
  • Meet The Editors
  • Contact Us
  • Our Use of Cookies
  • Advertisers
  • Business Partners
  • Media Kit
  • Corporate Site
  • Contributors
  • Reprints
  • Answers
  • E-Products
  • Events
  • In Depth
  • Guides
  • Opinions
  • Quizzes
  • Photo Stories
  • Tips
  • Tutorials
  • Videos
  • Computer Weekly Topics

All Rights Reserved, Copyright 2000 - 2025, TechTarget

Privacy Policy
Cookie Preferences
Cookie Preferences
Do Not Sell or Share My Personal Information

Close