IT Blogs, Technology & Computing Blogs | ComputerWeekly.com

Blogs

Recent Blog Posts

  • Computer Weekly Editor's Blog

    Privacy Shield is no solution for data protection - EU should put personal data in the hands of its citizens

    Many US and European businesses no doubt breathed a sigh of relief when the European Commission announced it had agreed a basis for replacing the defunct Safe Harbour data protection agreement with the US government. Now we have a Privacy Shield in place to ensure that European citizens' personal data is s...

  • Quocirca Insights

    Blue Coat, from surf control to riding the security wave

    The IT security sector is good for producing start-ups that soon disappear, seemingly without trace. Of course, this is not a bad thing. Whilst it is true some wither on the venture capital vine, many others get acquired as the good idea they came up with (or imitated) gets recognised as a necessity and th...

  • CW Developer Network

    What to expect from the Samsung Developer Conference 2016

    Software runs the world, of course... so much so that smartphone manufacturers now host software development conferences. The Samsung Developer Conference 2016 (SDC 2016) will be held from April 27 to April 28 at San Francisco's Moscone West Center The firm is going to host its event centered around the th...

  • Downtime

    Ninety nine million year old spider with nine legs discovered

    Scientists thought for a moment that they had made the momentous discovery of a spider with nine legs, but were disappointed to find the said arachnid actually had a hard-on.Not just a hard-on, but one that has lasted almost 100 million years. The spider, Halitherses Grimaldii, which is related to the Dadd...

  • The Full Spectrum

    How DNS information can help cut millions from your infrastructure costs

    A guest post by Chris Griffiths, director of new products and business development at Nominet.One of the hardest things about infrastructure planning in our web-enabled world is estimating capacity needs, especially from a network perspective. Having a piece of content go viral can mean the difference betw...

  • Quocirca Insights

    The rapid morphing of the 'datacentre'

    On-premise. Co-location. Public cloud.  These terms are being bandied about as if they are 'either/or', whereas the reality is that many organisations will end up with a mix of at least two of them. This is why it is becoming important to plan for a hybrid datacentre - one where your organisation has ...

  • Open Source Insider

    Microsoft Office Extensibility: did legal technology just get interesting?

    The world of law and the legal trade, for most people, is generally either a) incredibly fascinating b) deathly boring or c) a system you don't want to think about while you are serving an extended prison sentence. For those of who think of law as crusty, dull and altogether drab... the technology trade is...

  • CW Developer Network

    One louder: the DevOps toolchain stack

    Poor old DevOps, the 'Dev plus Ops' portmanteau has been subject to more hype than most burgeoning technologies. Just when you had gotten used to the notion of software application development and IT operations coming together... the industry starts to spin the nomenclature and naming conventions in this s...

  • When IT Meets Politics

    Who is winning the Broadband war? BT, Sky, Virgin or the Altnets

    BT claims to have achieved a 71% share of new broadband customers  in the most recent quarter. But Thinkbroadband reports the number as 177,000 of which only 130,000 were new to BT. The difference appears to include many of the 120,000 upgrades. Meanwhile the number of BT's new TV customers is 97,000 ...

  • WITsend

    It's time to make Imposter Syndrome a thing of the past for women in technology

    In this guest post, Denise Hudson Lawson, enterprise learning architect for online learning provider Pluralsight explains why women should build a network to leave imposter syndrome behind. I recently had the privilege of speaking at a GeekGirl Meetup, an event aimed at women working in technology as well ...

  • WITsend

    FDM everywoman in Technology Awards finalists announced

    The finalists for this year's Everywoman in Technology Awards have been announced prior to the awards ceremony in February 2016. After filtering hundreds of applications, judges from IBM, EMC, Microsoft, American Express, Salesforce and Fujitsu, amongst others, have selected 34 women to appe...

  • Downtime

    A drone in the claw is worth two in the bush

    The Dutch police has launched an initiative to target drones. We've some people use air rifles to shoot down drones. Now here's a totally natural alternative: a proper bird of prey who will happily grab any quadropter out of the sky... You know what they say about blokes with transmitters that have extra ...

  • When IT Meets Politics

    Is Government willing to pay for a surveillance regime that is fit for purpose? The question to which the Science and Technology Select Committee report leads.

    Do read the full report of the Science and Technology Select Committee "Investigatory Powers Bill: technology issues" released this morning, not just the press cover or even just the summary. It is barely 30 pages (plus appendices) long. Then think about the tension between the desire of Government to cons...

  • Open Source Insider

    Open source contribution is not just code

    Contributing to open source technology is all about code contributions and code commits -- right? Actually, no... it kind of goes further than that. Feed back feedback A subject that we have covered on Computer Weekly's Open Source Insider blog before, this week opensource.com itself digs through the other...

  • When IT Meets Politics

    More CISOs looking to recruit cyber-security trainers than leaders, analysts, engineers or pen testers

    I have often said our IT skills crises is not of skills, but of employers who train and have been looking at why that is. Evidence is emerging that the shortage of trainers is a prime cause. The headlines from the Harvey Nash/PGI 2016 Cybersecurity are not unexpected: "Half of all boards lack real understa...

  • Open Source Insider

    Walmart's bricks & mortar to digital business journey

    Walmart has released its OneOps cloud management platform for continuous app lifecycle management - and, in line with this news, Couchbase has announced support for @WalmartLab's release of OneOps to the open source community through Github. Walmart uses Couchbase Server in a cloud environment to power a d...

  • Data Matters

    Mike Ferguson on a decade of Hadoop

    This is a guest blogpost by analyst Mike Ferguson on the 10th anniversary of Hadoop's becoming a separate Apache subproject. In the 10 years since Hadoop became an Apache project the momentum behind it as a key component platform in big data analytics has been nothing short of enormous. In that time we hav...

  • Computer Weekly Editor's Blog

    Google tax debate is just an early example of social upheaval from the digital revolution

    In many ways it is a shame that the most likely reason for a technology company to hit the headlines in national newspapers and on TV is because they don't pay enough taxes. For all the largely justified criticism of Google's £130m tax settlement with the UK government, surely most people in the technology...

  • Open Source Insider

    And now for something completely analytical... Pentaho goes native Python

    Pentaho (let's remember to call it a Hitachi Group company) has announced news of its labs team now completing development of native integration for Python. So what? Well, the core spin here is: that new thing called 'data science' being placed in the hands of the developer community with added crispy topp...

  • Downtime

    IT to automate domestic chores

    Jones has not had much success with Version 1 of his efforts to connect his washing machine to the internet. But help is at hand. Panasonic is working on creating a 'Laundroid,' a washing machine robot that washes, dries and folds clothes. Yeah, but does it wear the clothes, says Jones. His Version 2 lets ...

  • Downtime

    Google staff don't like to be poached... with chicken eggs anyway.

    It had all the ingredients for a smart way of letting London's tech talent know that they exist, but one company in the recruitment game didn't bank on Michelin Star tastes Clozer, which is a platform to connect sales professionals and companies anywhere in the world, tried to attract talent through free p...

  • When IT Meets Politics

    BDUK "state aid" to be brought into line with EU law and good practice

    Thee is much to be welcomed in the BDUK "focused market engagement" exercise to get views, by 24th February, from Local Authorities and Network Operators on the replacement for its previous procurement arrangements to get superfast (whatever that means) broadband "to 95% of premises by 2017". The State Aid...

  • StorageBuzz

    Object storage vs NAS . . . in the same product

    It has been an interesting month in object storage, with developments that push the technology along but also provided an interesting footnote regarding file access that illustrate an interesting stage of the evolution of object storage. On the one hand HPE and Scality announced a partnership that will see...

  • The Full Spectrum

    No, nobody is going to nationalise Openreach

    It's always been reasonably clear - provided you don't work for BT of course - that the Broadband Delivery UK (BDUK) procurement and delivery model was not fit for purpose, lacked ambition, and hindered the work of small altnets and community projects.So now that BDUK is pretty well-advanced, and we're wel...

  • CW Developer Network

    Did Fortinet leave the firewall backdoor open to hackers?

    Malicious software developers love a good hacking opportunity, this much is already known -- they are even happier when they find a "coder's backdoor" left open for what would usually be two reasons. Reasons for a backdoor experience Reason #1 -- Access for 'management control' issues by the vendor who pro...

  • CW Developer Network

    Plumbing goes digital -- smart cities need BIM

    Progman is a provider of Mechanical, Electrical and Plumbing (MEP) design software used in Building Information Modeling (BIM) from Turku in Finland. (Ed -- MEP & BIM software, who knew?) The firm has now launched a free browsing library available at magicloud.com MEP designers and software application dev...

  • Open Source Insider

    IBM z Systems mainframes, unlikely champions of open source?

    The mainframe isn't dead at all, of course we already knew this to be true. Three basic mainframe truths for the decade 1. There's a profitable market in mainframe modernisation and integration technologies (and related COBOL usage) 2. IBM for one enjoys a growing market for mainframe manufacturing... Dell...

  • The Full Spectrum

    A fudged, rushed broadband report damages the case for an independent Openreach. Good job, Grant Shapps

    I wanted to put pen to paper today and explain a few things about the tone of our coverage of the British Infrastructure Group's 'Broadbad' report, which was released over the weekend of 23-4 January.In the report, put together by the Conservatives' Grant Shapps, a group of over 100 MPs renewed called for ...

  • Open Source Insider

    Avast builds on Android anti-malware pedigree with new HQ

    Avast Software was kind of 'one of those Central and Eastern Europe' (CEE) security firms along with the other usual suspects that most of us can name... and then, it kind of became something more than that and started to boast more users than its competitors -- so that then... consequently, it has more th...

  • CW Developer Network

    DevOps specialist firms start to 'fuse'

    The CWDN blog is really not interested in funding, corporate ventures, mergers, buy-outs or even corporate parties (unless we are invited, obviously)... this much should be said. Due to this proviso, it is from a purely technical viewpoint that we make mention of the formation of Sendachi. Not a Japanese c...