Blogs

Recent Blog Posts

  • WITsend

    Dame Wendy Hall to present 4th Karen Spärck Jones Lecture

    Professor Dame Wendy Hall will present the 4th Karen Spärck Jones Lecture this year entitled: 'How to enjoy a career in computing.'   The annual event sponsored by BCS, The Chartered Institute for IT, and IBM honours women in computing research.   Dame Wendy Hall is a professor of computer scienc...

  • Computer Weekly Data Bank

    Hardware Spend - Oil & Other Fuel Industries

    Hardware expenditure by oil & other fuel companies is in excess of £600 per employee.  That is twice the national norm.  Analysis by size of organisation reveals a much higher multiple for smaller organisations whilst for large enterprises there is almost parity.Source: IT & Telecom Spend...

  • Quocirca Insights

    Print security: The cost of complacency

    Quocirca research reveals that enterprises place a low priority on print security despite over 60% admitting that they have experienced a print-related data breach.Any data breach can be damaging for any company, leaving it open to fines and causing damage to its reputation and undermining customer confide...

  • CWDN

    Wearable technology isn't real yet, is it?

    So we all know that Google Glass is (kind of) available now and it represents one of the most progressive manifestations yet of real 'wearable' technology, right? But really real wearables are still (arguably) some way off surely? Or to put it another way, we might be happy to play with wearable electronic...

  • Open Source Insider

    When IoT connected fridges send out spam

    So anyway, Juniper Research predicted last week that the number of "connected appliances" (i.e. Internet-of-Things style devices) in so-called SmartHomes will reach 10 million by 2017. In the same vein, Società Fabbricato of Italy also predicted that Internet of Things (IoT) devices in homes will reach 77 ...

  • Inspect-a-Gadget

    INFOGRAPHIC: Destructive data loss

    Since the discovery of the OpenSSL Heartbleed bug, organisations and individuals alike have shown great concern over their data and how best to protect it. With the growing use of smartphones and BYOD in businesses, there is also an increased security risk if organisations do not properly employ a mobile d...

  • WITsend

    Five things I've learned about building an innovative technology company

    This is a guest post by Vicky Brock, CEO of Clear Returns. Vicky recently won 'Innovator of the Year', sponsored by Ocado, in the 2014 FDM everywoman in Technology awards. Clear Returns won IBM SmartCamp in 2012 and Ecommerce Innovation of the Year at the Scotland IS Awards, 2014. Five things I've learned ...

  • Inspect-a-Gadget

    Gadget Show Live 2014: 3D printing

    Ever since last year, the 3D printing sensation has been steadily growing, with Gartner predicting that 3D printer sales will double by 2015. This year 3D printing is still a prominent trend, except now the printers are smaller and cheaper, making them more easily accessible to businesses or even home user...

  • Open Source Insider

    Why Heartbleed did not harm open source

    Unless you live in a cave, Victorian style external toilet or Bear Grylls style treehouse in the Outer Hebrides it is safe to say you will have read about the Heartbleed bug. The Heartbleed bug is an OpenSSL cryptographic library flaw that allows attackers to steal sensitive information from remote servers...

  • When IT Meets Politics

    Surviving the post Heartbleed Cyber Security Skills Crunch

    IT users and suppliers, particularly those in financial services and its suppliers are about to be hit by an IT Skills shortfall akin to that during the run up to Y2K: for similar reasons. A surge in demand for skills in short supply is hitting an industry which has not recruited sufficient trainees for ov...

  • Open Source Insider

    Open source carrots, broccoli, celery, kale & coffee pods

    Reading over the Easter holidays (as one does) a good book like When Computing Got Personal: A history of the desktop computer [Kindle Edition] by Matt Nicholson, one is reminded that the birth of open source as a wider movement goes back further than the last 25 years of Linux. Nicholson helps to remind u...

  • David Lacey's IT Security Blog

    The Electronic Pearl Harbour gets a step closer

    As I expected we keep finding more and more security vulnerabilities in devices that shouldn't have them: essential control systems that govern the safety of critical infrastructure. The latest batch have been found by my IOActive colleagues in satellite communication (SATCOM) systems. IOActive analyzed an...

  • David Lacey's IT Security Blog

    Security: From Theoretical Business Enabler to Essential Overhead

    Dropped through my door last week was the flyer advertising Infosecurity Europe 2014. The theme is "Security as a business enabler - are you fit for 2014?" It is an unfortunate choice of words, reflecting a profession that is hopelessly out of touch with reality. There is nothing remotely new about this id...

  • WITsend

    It's crucial we inspire women to consider a career in the industry

    This is a guest blog by Katrina Roberts, Vice President - Global Network and International Consumer Technologies Europe, American Express, from Brighton, winner of 'Leader of the Year in a corporate organisation category - sponsored by BP. The FDM everywoman in Technology Awards are a celebration of the c...

  • Public Sector IT

    Profit lures London councils into IT sales venture

    Two London councils have embarked on a scheme to sell IT services for profit after concluding their cost-saving backoffice merger could grab them a big slice of the £144bn local government market.Giving their project the code-name Romulus, after the rapacious founder of the ancient City of Rome, the London...

  • Quocirca Insights

    Internet of Things - Architectures of Jelly

    In today's world of acronyms and jargon, there are increasing references to the Internet of things (IoT), machine to machine (M2M) or a 'steel collar' workforce. It doesn't really matter what you call it, as long as you recognise it's going to be BIG. That is certainly the way the hype is looking - billion...

  • CWDN

    Jevons Paradox: why better technology leads to 'even more' technology

    Better technology innovation and more intuitive software application development should lead to more efficiency and therefore less technology being needed, right? Wrong. Comments made by Ovum's principal analyst for software Roy Illsley at his firm's recent industry congress meeting point to the Jevons Par...

  • Computer Weekly Data Bank

    IT & Telecom Spend - Distributive Trades Companies

    In the distributive trades sector, post & courier firms devote the largest proportion of their turnover to expenditure on IT & telecom.  At some 3% this is half as much again as the next tier consisting of water transport, land transport and transportation support organisations.Source: IT &...

  • When IT Meets Politics

    Can BT claim a rates reduction for an "unbundled" exchange that has no other users?

    Further to my blog calling for readers to input to the Treasury Consultation on Business Rates, I have been asked "what is meant by unbundled?". The example sent to me is Shurdington which geography buffs will realise should be in the heart of one of the UKs high tech business areas - the "commuter belt" f...

  • When IT Meets Politics

    Treasury Consultation on Business Rates: speak now or shut up

    The Treasury Consultation on the Administration of Business Rates gives a long overdue opportunity for those who believe that innovative broadband suppliers are unfairly treated. I have blogged regularly on the way in which the business rates system penalises the competitors to BT and how this has come abo...

  • ITWorks

    Nesta quiz reveals attitudes on innovation and technological change

    Nesta has published research into Britain's attitudes on innovation and technological change, categorising respondents of its quiz into five personas.   The Innovation Population quiz revealed the differences in attitudes between men and women and affluent and less affluent people.   One in five ...

  • CWDN

    Fusion-io's SQL Server-snuggle

    Second only to the programming spin that focuses on DevOps is the emergence of what we might call the rise of the true 'data developer'. The data (or database) developer is focused on tools that can reduce transaction latencies inside modern data warehouse environments, very often now employing in-memory c...

  • Investigating Outsourcing

    Steria and Sopra merge to get on more supplier lists

    Interesting story last week that two of France's IT service providers have come together in a "friendly" merger that will cut costs and probably more importantly make them more attractive to potential customers and get them on more multi-sourced IT lists. The merger will create a group with €3.1bn sales, 3...

  • Downtime

    Google helps taxman indirectly

    Watch out...the HMRC is using big data analytics to catch corporate tax avoiders. The taxman is taking advantage of open source Hadoop technology to scour tax returns for compliance. So it is rather poetic that the taxman is using Hadoop, an open source implementation of Google's proprietary MapReduce func...

  • Downtime

    Heartbleed perpetrators to receive babysitting sentences

    The perpetrators of the Heartbleed bug hack on UK parenting website Mumsnet are to be punished in the most appropriate manner if they are ever apprehended.Mumsnet members will receive a calendar of the next 10 years and will be asked to fill in days they need a babysitter. A clever matching engine will int...

  • Quocirca Insights

    Managing a PC estate

    Although there is much talk of a move towards virtual desktops, served as images from a centralised point, for many organisations, the idea does not appeal.  Whatever the reason (and there may be many as a previous blog here points out), staying with PCs leaves the IT department with a headache - not ...

  • Investigating Outsourcing

    Could Facebook/bank destroy the retail banking giants?

    I have written a few articles recently about how large internet companies like Google, Facebook and Twitter could be the biggest threat to retail banks for many of their services.Facebook is moving into financial services. Read this article I wrote.  In the meantime banks are struggling with a lack of...

  • When IT Meets Politics

    Has Heartbleed done more than Snowden to dent consumer confidence in the online world?

    If Mumsnet, which takes the privacy of its users very seriously, has been compromised by heartbleed, who is safe? Until I read that Mumsnet had been affected, I was planning to say that incidence shows the strength, as well as weakness, of the open source software that runs the Internet. If the Wikipaedia ...

  • Downtime

    Vein technology to pay for your coffee

    We haven't even managed to get mobile payments up and running successfully and the furthest we've really got with fingerprint technology is being able to unlock our expensive iPhone 5s, but an adventurous student at Lund University in Sweden has decided to leap ahead of the trends by demonstrating how it i...

  • CWDN

    The geek is dead: a new superhero power-class emerges

    IT automation company Chef has played its annual PR joker trump card this week and suggested that a new 'power-class' of developers is emerging. NOTE: The firm produces a model for automating IT infrastructure and applications that drive what it calls 'self-reliance' across development and operations teams...