IT Blogs, Technology & Computing Blogs | ComputerWeekly.com

Blogs

Recent Blog Posts

  • WITsend

    BCSWomen Guinness World Record attempt this June

    I keep hearing about a BCSWomen Guinness World Record attempt from the women in IT community, so here are some details to share with you on how to get involved. On Saturday 13 June (10:30am-3pm) BCSWomen are coordinating universities, organisations and BCS branches to code apps in an attempt to break the G...

  • CW Developer Network

    What is a block chain?

    Software application development professionals working on security related technologies touching so-called cryptocurrencies will be aware of the block chain (or blockchain). This is a network-based 'inviolable ledger' that, in terms of form and function, is fully public and is constantly being updated and ...

  • Downtime

    Google and its "no comment" GIF

    Rumour and speculation is the fuel that much of the tech journalism world runs on, and for press officers working at firms like Google, responding to it all must be a wearying experience. So much so, the search giant has found an alternative (and ultimately more interesting) way of responding to such stori...

  • Downtime

    Cisco's postal service needs some work

    Cisco has hit on a novel way to stop the US National Security Agency (NSA) from tampering with its networking kit by sending its customer orders to the wrong address. The shady US surveillance unit was previously accused by notorious whistle blower Edward Snowden of intercepting Cisco deliveries of network...

  • Open Source Insider

    Facebook 'likes' (other firm's datacentre construction techniques)

    Facebook's outstanding international reputation for information ownership and privacy develops one stage further this month. The social networking behemoth is being sued by BladeRoom Group, a British engineering company that claims Facebook has stolen its datacentre construction techniques. BladeRoom claim...

  • Downtime

    Smartphones lack smart users

    Most smartphones lack smart users a survey by mobile security firm Lookout has revealed, with 52% of people who claimed to be security savvy admitting they do not read privacy policies for mobile apps.Just over a third of smartphone users polled said they did not set up a passcode password to protect their...

  • Inspect-a-Gadget

    Could stores reallocate resources using electronic shelf labels?

    At this year's Retail Business Technology Expo I was introduced to a company called DisplayData, which put me on to a nifty little device called an electronic shelf label, or ESL. Electronic labels, which can be updated remotely, are displayed under products in a store, replacing traditional paper labels. ...

  • Open Source Insider

    Do SmartBears shhh (sponsor Swagger), in the woods?

    The world's most obvious questions are of course: 1. Does the Pope wear a pointy hat? 2. Does Lady Gaga wear a telephone on her head? 3. Do bears shhh in the woods? Question 3 relating to the query: does open source API testing and development tools company SmartBear now assume sponsorship of Swagger API p...

  • Public Sector IT

    UK open contracts pledges and fudges

    2010 - 2015The coalition government broke its transparency pledge to publish all public contracts in full. It has attempted to backtrack, claiming it never really intended to publish all its contracts in the first place.Much of the work it did under the programme amounted meanwhile to little more than a st...

  • Open Source Insider

    MongoDB on Couchbase agility: nice idea, now let's talk about real flexibility

    Couchbase went all bullish this week and said that its Multi-Dimensional Scaling capabilities in release 4.0 of Couchbase Server are the best thing since sliced bananas. The firm was all technical and polite to start with and said that multi-dimensional database scaling provides the option to isolate datab...

  • Networks Generation

    Blasts From The Past

    Been doing a few catch-ups with old vendor friends recently; one was Brocade - and more of this next month - which has a REAL SDN/NFV story - and another was NetScout; networking monitoring!!!! Except that network monitoring now goes way beyond SNMP probes and Sniffers.Speaking with NetScout's Phil Gray, w...

  • Computer Weekly Editor's Blog

    After rural payments embarrassment - the test for GDS is to 'make things open, make it better'

    The failure of the rural payment digital service last week - and its subsequent replacement by paper forms - is not the IT disaster some would claim, but it is an embarrassment for the Government Digital Service (GDS). The project, budgeted to cost around £154m, has not seen all that money wasted. Only £73...

  • Quocirca Insights

    Doing more with video conferencing

    While video conferencing is not a new technology, several factors appear to be driving forward the adoption of video as a communications tool, especially for personal use. Whether Skyping with distant relatives, using video in gameplay or creating recordings to share on YouTube, video has become much more...

  • Open Source Insider

    Telco sector OPNFV project champions open network services

    The Open Platform for NFV (OPNFV) project is gaining momentum. This group is a community-led industry-supported open source reference platform for Network Functions Virtualisation (NFV). TechTarget defines NFV as an initiative to virtualise the network services that are (or were previously) being carried ...

  • Public Sector IT

    < transparency review >Cameron's Contracts Can't-Finder

    Five years after prime minister David Cameron stunned new-age computer policy wonks with his election pledge to publish all government contracts "in full", it looks like the only thing he issued in full was hot air.Because a lot of contracts weren't there on the Contracts Finder website he launched for the...

  • CW Developer Network

    Computaris: dialling into the ugly truth on SS7

    Telecommunications is rife for hacking, or at least that's what people say. The problem is, many of our telco-level communications protocols, systems, subsystems and substrates have been around a long time -- and that's what makes them vulnerable. Razvan Rusu, Computaris presales manager says that, as of n...

  • Downtime

    Kaspersky's sauna nights with the KGB

    When it comes to kicking back after work, most people open a bottle of wine, binge-watch a favourite show on Netflix and/or hit the gym to work off some of the day's frustrations. Not anti-virus kingpin Eugene Kaspersky, though, who seems to have a penchant for spending his downtime in a sauna with a handf...

  • When IT Meets Politics

    A Budget to free up the Business Broadband market - the superhighway to economic recovery.

    The Digital Communications Infrastructure Structure Strategy announced in parallel with the Budget shows that DCMS and Treasury have responded to the inputs to the consultation last year and  raised their sights. The new targets are 100 mbs to all but the most remote households but, more importantly, ...

  • Downtime

    Smart ass watches

    Here's a couple of things to do  with your new smart watch:You can check if your heart is still beating during the 25th PowerPoint slide in your boss's presentationWhen you get mugged, you are now able to give the mugger the app that allows him to drive away in your swanky BMW.Play the Intel Inside c...

  • ITWorks

    Poor leadership the biggest barrier to workplace flexibility

    This is a guest blog by Steve Gandy, CEO at MeetingZone. No one should be in any doubt that technology can enable people to work together anytime, anywhere any place and on any device. But although the UK's flexible working policy has been in effect since 2014 it's clear from recent research by Censuswide ...

  • Downtime

    Solar eclipse pings network

    Downtime experienced the full effects of the solar eclipse today with its network inadvertently failing. Since London is all cloudy, the best views were those on the live stream from other parts of the country that were blessed with clear skies. Obviously the streaming had nothing to do with our network go...

  • When IT Meets Politics

    The reason for the ambiguity of the budget statement on Verify has been explained to me. The future cannot be successfully outsourced

    Yesterday this blog was devoted to Jim Prideaux's take on the budget. Last night a reader pointed out the reason for the ambiguity, The success of HMRC's record tax take this spring was critically dependent on taxpayers ignoring Verify . Moreover, one of the highlights of the budget speach was the abolitio...

  • Public Sector IT

    Farmers go bovine over prototype mapping tool

    Mark Grimshaw, chief executive of the Rural Payments Agency is either an imbecile or a charlatan, if Farmers Weekly is anything to go by.He's been telling the agricultural press that his agency's prototype mapping tool is a failure. That's like saying a recipe is duff because your soufflé collapsed on your...

  • ITWorks

    From lab to market - Part 1

    Normal 0 false false false EN-US JA X-NONE /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-...

  • Computer Weekly Editor's Blog

    George Osborne set the UK on a digital roll - now a new government must accelerate the momentum

    It's rare that I'm inclined to congratulate George Osborne, but recognition is due to the Chancellor for making his latest budget the most tech-friendly ever. Every year, Computer Weekly is inundated with press releases before the Budget from various interest groups calling on the Chancellor to include thi...

  • Open Source Insider

    Tutanota: open source encrypted email

    Tutanota is a German open source encrypted email startup lauded as a direct alternative to Google Gmail The product this month comes out of beta after a beta programme that has seen nearly 100,000 users test it out over what is a full year. Tutanota automatically encrypts all your data on your device. A us...

  • When IT Meets Politics

    Internet: in dog we trust? Jim Prideaux points out the ambiguity in the Budget statement on the future of Government Verify

    I was working on a posting on the way the budget and the parallel announcement of the Digital Communications Infrastructure strategy   should help transform the climate for investment when Jim Prideaux , one of whose concerns is the hollowing out of the security skills of Government, pointed out ...

  • Quocirca Insights

    Redundant array of inexpensive 'things'

    There has been plenty of hype surrounding the internet of things (IoT) and especially super smart things such as the iconic Nest (now Google) thermostat. While many of these devices are interesting, they often come with premium pricing for an expansive set of features doesn't fit all needs - some things ar...

  • CW Developer Network

    The zeitgeist for the Internet of Things: 'thingalytics'

    The Internet of Things, The Internet of Everything, The Internet of Connected & Embedded Things and The Internet of Data... ... take your pick, they all mean (mostly) the same thing. The notion of connected devices and the IoT is now becoming quite familiar to us and many users have started to adopt these ...

  • Data Matters

    Beyond the BI Tipping Point

    This is a guest blog by James Richardson, business analytics strategist at Qlik, and former Gartner analyst  So what happens now that data discovery is the "new normal"?* Well, I'm no prognosticator - it was the task I always found strangest when I was an industry analyst - but we can make some reason...