Issue OverviewIT in Europe - October 2012
This special issue of IT in Europe looks at the true definition of cloud computing. We analyse the various different types of cloud storage and assess what they mean for IT leaders. IT security chiefs talk about the key role they will play in making the move to the cloud. We ask if the lack of standards and interoperability is hindering cloud adoption, and we examine the future of business applications in the cloud. Read the latest issue now. Access >>>
Premium Content for Free.
Is cloud data storage right for your organisation?
by Antony Adshead and Manek Dubash
Find out if cloud data storage is a serious option for you with this evaluation of its suitability for primary, nearline, backup and archive data
- Is cloud data storage right for your organisation? by Antony Adshead and Manek Dubash
Cloud likely future for business applications
by Andy Hayler, Contributor
Outsourcing your business application headaches, together with the flexibility of its leasing model will make the cloud the way forward for large enterprises as well as small businesses.
- Cloud likely future for business applications by Andy Hayler, Contributor
CISOs key to transition to cloud, says (ISC)2
by Warwick Ashford
CISOs have an important role in moving their organisations to a cloud computing environment, says professional certification body (ISC)2
Lack of cloud standards and interoperability hinders cloud adoption
by Archana Venkatraman
IT uses private cloud services to overcome data centre space/energy issues, but poor cloud standards lower cloud quality.
Interview: Dave Scammell, CEO of Sohonet
by Jennifer Scott
We speak to the head of Sohonet, a service provider built for the film and media industry in the centre of London
- CISOs key to transition to cloud, says (ISC)2 by Warwick Ashford
More Premium Content Accessible For Free
Computer Weekly buyer's guide to endpoint security
In this 11-page buyer’s guide, Computer Weekly looks at how to meet the challenge of ensuring that mobile devices comply with your enterprise’s ...
Social Engineering in IT Security
This extract from Sharon Conheady’s book, Social Engineering in IT Security, gives an overview of Social Engineering techniques and explains how ...
Gartner: Digital transformation: How to survive the information crisis
It is time to revisit out-of-date policies and strategies to avoid minor issues becoming major disasters, say Gartner analysts Saul Judah and Andrew ...