In Depth
In Depth
IT strategy
-
A business case for games play at work
How businesses can use computer games techniques to motivate staff at work Continue Reading
-
How to monitor and improve the health of your datacentre
Any datacentre manager looking to support the business should take an end-to-end systems management approach to keep the datacentre in shape Continue Reading
-
From chess to ping pong: How Pegasystems is capturing the Fortune 500
Pegasystems is winning business from the world's leading companies as business process management technology enters the mainstream Continue Reading
-
Best practices in software asset management for a flexible, resilient IT
Managing software assets is vital in order to maintain a highly flexible and up-to-date IT platform and more importantly remain compliant Continue Reading
-
Sweating your datacentre’s IT assets - is it a good idea?
Amid economic uncertainties, businesses want to get more from existing IT assets. But does it make sense from an IT point of view? Continue Reading
-
GE uses big data to power machine services business
GE, one of the UK's largest manufacturers, is using big data analytics with data generated from machine sensors to predict maintenance needs Continue Reading
-
How to manage your assets and control business costs
Asset lifecycle management allows the IT department to improve governance, mitigate risk and improve service quality and efficiency Continue Reading
-
CW500: Managing the mobile workforce (part 1)
Mobile working has transformed Colt Telecommunications beyond recognition over the past three years Continue Reading
-
Outsourcing IT services: goals and negotiations
Tactical and strategic negotiations are important to businesses of all sizes, from SMEs to the largest enterprises Continue Reading
-
The consumerisation of IT: it’s a trickle, not a tide, but you still need to be ready
If media headlines and supplier claims are to be believed, organisations today are faced with an unstoppable tide of many different types of personal device connected to the corporate network Continue Reading
-
Self-encrypting drives: SED the best-kept secret in hard drive encryption security
The SED solves many common data loss problems and is easy to use and manage with minimal impact on system performance – yet relatively few businesses and governments use SEDs. Continue Reading
-
IT and marketing: working together for business success
The IT department builds things that scale and last, while marketing wants the next big thing - and needed it yesterday. How can heads of technology work effectively with marketing? Cliff Saran investigates Continue Reading
-
Green IT: How to deliver value to your business
IT leaders are under pressure to make sure IT investments are made in the right places and realising that sometimes-elusive goal of measuring tangible value from IT. Continue Reading
-
IPv6: The security risks to business
IT security professionals say the security holes that will open up in many business organisations as the world moves over to internet protocol version six (IPv6) constitute a substantial security concern Continue Reading
-
What is big data and how can it be used to gain competitive advantage?
Cliff Saran discovers how big data can deliver big business benefits without excessive IT investment Continue Reading
-
Why more businesses are nearshoring in Eastern Europe
Low-cost, highly skilled IT labour and a relatively close proximity to the UK is making Eastern Europe an increasingly attractive destination to UK businesses Continue Reading
-
Case study: How a small business can benefit from SaaS
Professional beauty products distributor SweetSquared considers using Microsoft Office 365 alongside browser-based SaaS. Continue Reading
-
How to combat advanced persistent threats: APT strategies to protect your organisation
Simple defence strategies will go a long way to preparing businesses for APTs Continue Reading
-
Top five IT finance and asset management issues
CIOs and anyone involved in IT procurement should assess the benefits of leasing and alternative financing over making capital purchases for new IT equipment, software and services. Cliff Saran looks at the options. Continue Reading
-
Case study: Nissan Saves €10 million on LEAF Battery Production
In 2010 Nissan launched the world’s first mass produced electric car available from a major manufacturer, the LEAF (Leading, Environmentally friendly, Affordable, Family car). Continue Reading
-
Clarion Events Extends the Life of its System i and JD Edwards environment with Magic Software
Clarion Events is one of the UK's leading exhibition and event organisers. For over 30 years Clarion Events has been creating and developing stimulating and effective exhibitions, conferences and seated events in the UK, EMEA, Asia and America. ... Continue Reading
-
Case study: Examples and Results from the Hotel, Online, Retail, and Consumer Products Industries
A popular lodging company, with several thousand locations around the world, needed to improve the conversion rate for booking rooms on its own Web site vs. on online travel agency sites. Web-savvy customers, searching for the best deals, were ... Continue Reading
-
Case study: Bell Canada rings up big revenues with Infor CRM
Bell Mobility, a division of Bell Canada Enterprises, implemented an Infor customer relationship management solution, Interaction Advisor, and worked with Infor to transform Bell Mobility’s two call centers - with a combined 550 customer service ... Continue Reading
-
Secure your SCADA architecture by separating networks
Many critical national infrastructure systems include supervisory control and data acquisition (SCADA) functionality. These systems can be viewed as the set of software, computers and networks that provide remote co-ordination of controls systems ... Continue Reading
-
EDS report on 'dangerous' Chinook software published for the first time
Computer Weekly is publishing, for the first time, a technical analysis of the software installed on the Chinook Mk2 helicopter, the Chinook model which featured in the RAF's worst peacetime crash. Continue Reading
-
Deduce the location of the remaining domino tiles
Go to the homepage >> Try more puzzlers... Continue Reading
-
Web 2.0 profiles
C hris Middleton profiles two very different approaches to so-called " w ikinomics " . One is a small not-for-profit organisation... Continue Reading
-
existing article from PC
In June 2008 tGOOGLE HYPERLINK IS HERE NHS Trust became the first trust to install the London Configuration Release...
Continue Reading -
Facing up to security perils of outbound traffic
What about the threat from within and, more specifically, the security issues that arise from outbound traffic risks? Continue Reading
-
Chinook helicopter disaster - computer software failure or pilot error?
Chinook helicopter crash: was it computer software failure or a cause we'll never know? This article gives the background to the Chinook helicopter disaster with links to all the relevant articles published by ComputerWeekly and other useful web ... Continue Reading
-
Managed VoIP keeps regatta's communications afloat
The world's largest rowing regatta utilises managed VoIP to ease its year-round communications needs -- and for a temporary system during its celebrated two-day event. Continue Reading
-
Vanderbilt hospital fights archive growth with grid
Vanderbilt University Medical Centre simplifies document management using Bycast's archiving grid system. Continue Reading
-
Checklist for purchasing hardware-based encryption
Encryption appliances sit inline on a network and use specially designed electronics to encrypt data at line speeds, essentially eliminating the performance penalty imposed by encryption software running on a general server. While software-based ... Continue Reading
-
CRM strategies for SMBs
Keeping your customers happy is job number one. With CRM software, luckily, that job becomes a lot easier. Here we present our top five CRM tips for SMBs. Continue Reading
-
Open source strategies for SMBs
One way to make the most of a tight budget is to invest in open source technologies. Not only are they generally more secure than most off-the-shelf proprietary products, they're usually free too. Here we present our top five open source tips for ... Continue Reading
-
How to select the right IP PBX
Selecting the right IP PBX system for your company can be complicated. Here are some important things to consider when purchasing an IP PBX. Continue Reading
-
Storage session downloads: infrastructure track
This track looks at San and Nas issues, virtualization, distance demands, remote offices and how to build out systems. Continue Reading
-
Surviving e-discovery
It's been eight months since the Federal Rules of Civil Procedure were amended, and e-discovery rulings are all over the map, creating chaos for companies that must comply. Continue Reading
-
SaaS apps being deployed by business units, not IT
When it comes to deploying applications via SaaS, IT is still behind the curve. What's preventing IT from getting control over the programs business units want? Continue Reading
-
Experts: IDS is here to stay
IDS technology has survived predictions that it would be replaced by IPS. One expert says it will remain a separate product while IPS is folded into firewalls. Continue Reading
-
Backup reporting expands to add capacity planning
Aptare adds capacity planning for primary data storage to its product line, joining Symantec in recent attempts to broaden the appeal of reporting software. Continue Reading
-
Asterisk PBX solves enterprise's growing communication problem
An Asterisk-based PBX proved to be the solution to one enterprise's communications growing pains. Continue Reading
-
VoIP models and services: Complete guide
With clear, concise explanations of existing VoIP business models and deployment methodologies, this guide will enable you to weigh the pros and cons of each based on your needs. Continue Reading
-
Does compliance make encryption always necessary?
Many organisations look to encryption to protect sensitive data. Yet hundreds of millions of people who use the Internet also use encryption, yet most of them don't even know it. Continue Reading
-
ISO 27001 could bridge the regulatory divide, expert says
Karen Worstell, former CISO at Microsoft and AT&T Wireless, now on the advisory board of Neupart A/S, explains how ISO 27001 can be used to help companies comply with a variety of regulations and standards Continue Reading
-
Videoconferencing tool gives Uno an edge
Videoconferencing has given Pizzeria Uno the ability to bring together more than 200 people and has enabled more efficient and cost-effective communication. Continue Reading
-
Data migration product specifications
Part of the Tiered Storage Buying guide focusing on product specifications for data migration tools. Continue Reading
-
IBM chief engineer talks green storage
IBM engineer Clod Barrera discusses the growing energy crisis in storage, the need for better power efficiency metrics and the future for "green" products. Continue Reading
-
Storage Decisions Downloads: Executives' storage guide
Ideas of where firms' storage should be and where it's headed. Also key ways to integrate new technologies, processes and ideas without going over budget. Continue Reading
-
Prevent network hacks with secure Web browsing
Hackers can penetrate your network in almost unlimited ways these days, and that includes through your Web browser. Learn how to improve Web browser security and keep these hackers out of your network. Continue Reading
-
Big Microsoft Vista concerns for Big Pharma
The second installment of an ongoing series examining the challenges of deploying Windows Vista and the considerations that go into the decision to roll out the new OS. Continue Reading
-
Is a merger or acquisition in Sourcefire's future?
Sourcefire founder and Chief Technology Officer Martin Roesch, talks about how Sourcefire fits into Security 3.0 theme and how the firm may be involved in a future merger or acquisition. Continue Reading
-
Why hacking contests, 'month-of' projects don't help
Ivan Arce, chief technology officer of Core Security Technologies explains why he thinks hacking contests and public vulnerability disclosure projects do little to improve IT security. Continue Reading
-
The Art of Software Security Testing
Identifying software security flaws including the proper methods for examining file formats. Continue Reading
-
Data retrieval strategies: Document management software overview
The role of document management software in data storage and how it can mitigate risk for the enterprise. Continue Reading
-
Unified communication case studies: What you need to know
Learn how others overcame the expected and the unexpected challenges of a UC deployment in our case studies. Continue Reading
-
The man behind the Month of Search Engine Bugs speaks
Ukrainian security researcher Eugene Dokukin, more widely known by his online name MustLive, is about to launch a new "Month-of" flaw disclosure project focusing on search engine bugs, at a time when many security professionals are dismissing such ... Continue Reading
-
Admins run into trouble with Microsoft updates
A DNS service failure and an ongoing WSUS glitch are among this month's frustrations as IT administrators try to deploy the latest security patches from Microsoft. Continue Reading
-
ISCSI TCP/IP TOE card specifications
Key specifications for a cross-section of popular iSCSI TOE cards. Continue Reading
-
Storage consolidation: WAN acceleration and WAFS technology overview
One important avenue of storage consolidation is the consolidation of remote office storage; this is where WAN acceleration and WAFS technology comes into play. Continue Reading
-
IP storage switch and router specifications
Key specifications for a cross section of popular IP storage switch and router products. Continue Reading
-
Skype to the desk phone saves company a bundle
Skype on the desk phone has helped a Chicago-based furniture maker save a considerable amount of money on long-distance voice charges. Continue Reading
-
Inside MSRC: Windows Vista security update explained
Microsoft's Christopher Budd details the first Windows Vista security updates. Continue Reading
-
When disaster recovery and data classification collide
Attendees at a disaster recovery seminar discussed the complex application dependencies when disaster recovery and data classification combine. Continue Reading
-
Will data breach be the end of TJX?
This week in Security Blog Log: Industry experts say companies can learn from a data breach and even prosper from it. But is TJX following the right example? Continue Reading
-
IT pros eye Windows Server 2003 SP2 with caution
Despite its security and stability enhancements, IT pros say they are in no rush to deploy Windows Server 2003 SP2 Continue Reading
-
Symantec threat report under the microscope
This week in Security Blog Log: Infosec professionals dissect Symantec's latest threat report and express a range of views in the blogosphere. Continue Reading
-
Measuring Vista's true security muscle will take time
Researchers are digging through the Windows Vista code right now, and when they find flaws we'll hear about it. But it's the ones we don't hear about that should keep us up at night. Continue Reading
-
Mobile data services development trends in 2007
Darrell Jordan-Smith takes a look at new data services architectures and development tools emerging in 2007 and the ongoing development efforts of the Java Community and others. Continue Reading
-
LexisNexis fights crime with storage
The document search company is offering a new data forensics service staffed by former federal agents and powered by commodity NAS. Continue Reading
-
PING with Mark Odiorne
Mark Odiorne, CISO at Scottish Re, provides insights on pen testing procedures, prioritising security for senior management and keeping compliant. Continue Reading
-
RFID dispute: Vendors still hostile toward full disclosure
Many vendors still believe that security by obscurity is still the best policy and make it a priority to silence vulnerability researchers. Continue Reading
-
Outsourced VoIP helps devastated company recover
Outsourced VoIP helped a Berkeley company keep up business as usual after a fire destroyed its offices. Continue Reading
-
RFID privacy, security should start with design
Companies planning to deploy radio frequency identification technology (RFID) must demand that privacy and security issues are addressed early. Continue Reading
-
Microsoft takes a blogosphere beating over Vista UAC
This week in Security Blog Log: Industry experts take Microsoft to task over a "very severe hole" in the design of Vista's User Account Controls (UAC) feature. Continue Reading
-
Data breach: If customers don't act, data will remain at risk
To make enterprises take data security seriously, customers must take control of their personally identifiable information and stop handing it out to businesses. Continue Reading
-
Questions fly as EMC Retrospect fades
All signs point to the end of life for EMC's Retrospect backup software for small businesses. Sources say the company cannot support an SMB software channel. Continue Reading
-
New security vendors take on sophisticated attackers
IT Security vendors are developing technologies that show promise in preventing unknown attacks and protecting machines with zero-day vulnerabilities. Continue Reading
-
Vendors: Cut the hype, truth is what sells
Storage virtualisation technologies have been purchased and implemented successfully for years. The rest of the IT infrastructure must try to catch up and, ultimately, the only thing not virtualised within the datacentre will be the last guy ... Continue Reading
-
TJX breach: There's no excuse to skip data encryption
Companies complain that database encryption products are too expensive and difficult to manage, but customer loss and breach notification costs outweigh encryption expenses. Continue Reading
-
PatchLink offers solid flaw management
PatchLink Update 6.3 is a solid solution to the enterprise patch management problem and demonstrates its true power in a Windows environment. Continue Reading
-
WiMax clearing path to mainstream
A number of industry moves have made WiMax almost ready for the mainstream. But there's good news and bad news to consider before making the move. Continue Reading
-
Inside MSRC: Microsoft updates WSUSSCAN issue
Christopher Budd of the Microsoft Security Response Center is urging customers to deploy the latest versions of the Systems Management Server Inventory Tool for Microsoft Updates or Microsoft Baseline Security Analyzer to receive all the current ... Continue Reading
-
Why don't we have clustered FC block storage?
Is it odd that the industry has made such serious strides toward incorporating clustering concepts in both file-based storage and IP -based storage, but not Fibre Channel storage? Continue Reading
-
Adobe Reader flaws spook security experts
Security experts sound the alarm over Adobe Reader flaws that could be exploited for cross-site scripting attacks and other mayhem. Continue Reading
-
Storage Outlook '07: In search of better data management
Brian Peterson, storage architect for a Midwest-based Fortune 100 company, says better data management and business processes will be the main goal in 2007. Continue Reading
-
Security pros glean insight from '06
Corporate acquisitions, an abundance of spam, and the White House's take on cybersecurity mark 2006. Continue Reading
-
Storage Outlook '07: Seeking better backups and archives
Tom Becchetti, senior infrastructure engineer for a major national financial services company, says compliance, backup and archiving will be top priorities in 2007. Continue Reading
-
Top client security tips of 2006
A network user without the proper know-how is a ticking time bomb when it comes to security. Check out our top five client hardening tips of 2006 to get a head start on protecting yourself from potentially dangerous users. Continue Reading
-
Top network security tips of 2006
The top Windows networking security tips of 2006 cover a range of topics, including network isolation, open source Windows security tools, VPN security and more. Continue Reading
-
Top storage tips 2006
What's on the minds of storage techies. What's hot, what's not, what works, what doesn't work. These expert tips cover the storage issues that take top honours when it comes to disaster recovery, NAS, SAN, backup and storage management. Continue Reading
-
Review: Reconnex's iGuard needs improvements
Reconnex's iGuard is maturing, though it still needs some usability improvements such as wizards, customisable reports and the ability to drill down on the graphs. Continue Reading
-
Review: Deep Security is a solid IPS
Third Brigade's Deep Security is a well-designed, effective product with strong configuration and policy control capabilities. Continue Reading
-
Microsoft Vista could improve Internet security
Two new Microsoft Vista features -- Kernel Patch Protection and User Account Control -- could prove especially useful in preventing serious malware infections. Continue Reading
-
Review: Lancope StealthWatch 5.5 offers more than IDS
Hot Pick: StealthWatch goes far beyond traditional intrusion detection, with powerful network-monitoring features. The optional IDentity-1000 is an essential addition. Continue Reading
-
Hot technologies for 2007
"Storage" magazine's editors reviewed technology developments, product introductions and storage standards to come up with this short list of must-have technologies for 2007. Continue Reading
-
Storage IPOs, brilliant or brainless
Just when we thought the fast and loose spending of the dot-com bubble was well behind us, a few recent storage company IPOs remind us that we really haven't gotten a lot smarter. Continue Reading
-
Infrastructure security: Remote access DMZ
An excerpt from Chapter 7: Infrastructure security from "How to Cheat at Managing Information Security," by Mark Osborne. Continue Reading
-
Zero-day tracker a hit, but IT shops need better strategy
This week in Security Blog Log: Reaction to eEye's new zero-day tracker is positive, but some experts say it won't help unless IT shops have a layered defense to start with. Continue Reading
-
Managed and hosted VoIP: muddling through
For companies looking for an alternative to a premise-based phone system, there are plenty available, and they come in all shapes and sizes. Get a clearer understanding of exactly what's available so you can ask the right questions to get the ... Continue Reading