In Depth
In Depth
Mobile hardware
-
Decoding zero trust in endpoint security: A practical guide for CISOs
The exponential increase in endpoints has vastly expanded the average organisation’s attack surface – address this by applying zero-trust best practice to endpoints Continue Reading
-
Five key questions about disaster recovery as a service
Disaster recovery as a service builds recovery data and systems into the cloud, accessible from anywhere. We look at the difference vs cloud backup, DRaaS use cases, the cost, and the firms that provide it Continue Reading
-
SME disaster recovery: Five key points to consider
We look at key DR considerations for SMEs, including RPOs, RTOs, infrastructure needed for effective continuity and the right combination of cloud and in-house provision Continue Reading
-
IT departments need holistic circular economies to fight climate change
With sustainability moving up the boardroom agenda, IT managers should revamp procurement strategies to align with the principles of the circular economy, but what does this mean for managing the IT lifecycle? Continue Reading
-
Macs in the enterprise – what you need to know
A guide to managing Apple Mac hardware and operating systems in the enterprise Continue Reading
-
Digital surveillance of remote workers may increase enterprise risk
From productivity tools to security threats, we explore how digital surveillance is forcing remote workers towards shadow IT Continue Reading
-
How to manage endpoint security in a hybrid work environment
The future of the workplace is clearly hybrid, but this has untold implications around endpoint security. How can businesses overcome these? Continue Reading
-
Ecolabels and data sanitisation key to recycling and reusing IT assets
Ecolabels on hardware and data sanitisation of devices are key to recycling and reusing old IT equipment respectively, helping enterprises avoid unnecessary asset destruction and contributing to increasingly high levels of electronic waste globally Continue Reading
-
How Malaysia’s industries are tapping IoT
Computer Weekly speaks to four industries that claim to have benefited from various IoT deployments and how it has changed their businesses Continue Reading
-
Australian firms soldier on amid Covid-19 outbreak
From the largest financial institutions to small companies, Aussie firms have been dialling up their use of technology tools to keep their businesses humming during the coronavirus pandemic Continue Reading
-
Upcoming conflict minerals regulation does not cover major technology companies
A forthcoming regulation designed to stem the flow of conflict minerals is unlikely to change the behaviour of technology companies because loopholes in the new rules mean they are not covered Continue Reading
-
Building a 5G city: Bristol’s valuable lessons for the UK’s digital future
West of England Combined Authority is taking part in DCMS’s 5G Testbeds and Trials programme, exploring applications for tourism and entertainment. We find out how it is applying its learnings to life in Bristol and Bath Continue Reading
-
Private 5G networks: Are they the right choice for you?
The concept of dedicated private mobile networks for large enterprises is not a new one, but with the advent of ultrafast 5G networks, they are starting to attract more interest Continue Reading
-
What 5G applications will transform your business?
The UK’s mobile network operators have started work on their 5G roll-outs, but what applications are most likely to gain enterprise traction for the new standard? Continue Reading
-
Securing your mobile estate – best practice for CIOs
The prevalence of mobile devices in every part of daily life is shaping how enterprises make choices about software and network infrastructure, but how do businesses go about securing these vast new endpoint estates? Continue Reading
-
Microsoft’s modern desktop management
How cloud services make the critical business of keeping Windows 10 patched and up to date easier for administrators Continue Reading
-
Serving up managed desktops
Microsoft is dropping its table d’hôte-like Windows 7 menu in favour of a more tapas-style offering, in the form of Windows 10. This will mean big changes for sysadmins Continue Reading
-
Mobile phones and health: is 5G being rolled out too fast?
European countries are rolling out 5G mobile communications at breakneck speed as they seek to gain a competitive edge over the US and Asia. But some scientists have raised questions about the effects of 5G mobile phone radiation on public health ... Continue Reading
-
Ready, headset, go: Retailers racing ahead with VR for staff training
Has virtual reality found its prime retail user case as a staff training tool? Recent moves from Costa Coffee and Walmart suggest it has Continue Reading
-
Sustainability and the smartphone: How to give your old device a second life
Find out what happens to your smartphone after you’re finished with it and why you should commit to the circular economy Continue Reading
-
The value of unified endpoint management
Given the diversity of devices people can use for work, IT needs to look at how it can unify device security Continue Reading
-
How to make sense of desktop as a service
Does it make sense to move the desktop to the cloud? We look at DaaS and VDI Continue Reading
-
PCs shape up for the digital workplace
The digital workplace demands increasing functionality, mobility and connectivity. We look at how desktop IT is changing Continue Reading
-
How to find the right mobility strategy for your SME
Small businesses still need a strategy to make the most of mobility, so what should business owners look out for? Continue Reading
-
Why the browser is the computer
When he was CEO of Sun Microsystems, Scott McNealy once said that the network is the computer. Today, users spend most of their time in a browser Continue Reading
-
Developers at the mobile edge
We look at the challenges and opportunities to be found in creating mobile apps for an expanding array of devices Continue Reading
-
The death of the mainframe is greatly exaggerated, says CA
With mainframe software tools forming a key part of its overall growth strategy, CA Technologies remains proud of its mainframe heritage Continue Reading
-
UK sale of surveillance equipment to Macedonia raises questions over export licence policy
The UK approved an export licence for the sale of surveillance equipment to Macedonia – while the country was engaged in an illegal surveillance programme against its citizens. A senior minister was consulted on the decision Continue Reading
-
Where the device hits the network – a mobile device management update
As business becomes increasingly mobile, we look at the latest trends in mobile device management to give businesses the edge Continue Reading
-
End user devices require careful orchestration
Options for access to IT have soared since the desktop PC’s heyday, and organisations must conduct a balancing act Continue Reading
-
My first IoT project: A guide for businesses
We’ve all had a good giggle about having our fridges hacked – but now it’s time to get real. What are the first steps enterprises should take when implementing their first internet of things project? Continue Reading
-
CW@50: From Captain Kirk to 5G – 50 years of mobile
As Computer Weekly prepares to celebrate the 50th anniversary of our first edition in 1966, we look back at 50 years of British innovation and development in mobile networking Continue Reading
-
How the development of standards will affect the internet of things
As the internet of things (IoT) grows, so will the number of applications developed to control internet-connected devices and objects Continue Reading
-
The internet of things is coming: Is your datacentre ready?
Gartner estimates the IoT will see 26 billion units installed by 2020 – channelling huge volumes of data traffic into datacentres Continue Reading
-
Big Apple revolution: How to manage Macs in the enterprise
Apple’s products were once niche devices. Now, following a consumer-led initiative, they are widely used across the enterprise Continue Reading
-
Write-through, write-around, write-back: cache explained
Cache is vital for application deployment, but which one to choose – write-through, write-around or write-back cache? We examine the options Continue Reading
-
Create a mobile policy employees can trust
With Gartner predicting a fifth of all enterprise BYOD projects would fail by 2016, we look at how businesses can embrace mobility successfully Continue Reading
-
The future of the tablet computer in the enterprise
Tablets come in all manner of profiles and on a variety of platforms – but which will shape up as the workplace favourite of the future? Continue Reading
-
BlackBerry Enterprise Server – Should you stay or should you go?
John Chen’s recent open letter to BlackBerry customers holds many promises for the future Continue Reading
-
Wireless charging: The story so far...
Rupert Goodwins looks into the technology behind wireless charging and whether it is good enough yet for wider adoption Continue Reading
-
Top 10 gadget reviews of 2012
Inspect-a-Gadget has been busy reviewing a range of gadgets over the past 12 months and it has been another big year in the world of tech Continue Reading
-
Shore up your organisation’s fleet with the right MDM
There are many mobile device management products, but approaches vary. We outline how to choose the right one for your business Continue Reading
-
The consumerisation of IT: it’s a trickle, not a tide, but you still need to be ready
If media headlines and supplier claims are to be believed, organisations today are faced with an unstoppable tide of many different types of personal device connected to the corporate network Continue Reading
-
Google adds real-time traffic data to Android map app
Google has updated its algorithms to support real-time data for its map application for smartphones running on the Android operating system (OS). Continue Reading
-
What is Near Field Communication (NFC)?
Near-field communication (NFC) allows data to be exchanged between devices via short-range, high frequency wireless communication technology by combining the interface of a smartcard and reader into a single device. Continue Reading
-
Mobile data services development trends in 2007
Darrell Jordan-Smith takes a look at new data services architectures and development tools emerging in 2007 and the ongoing development efforts of the Java Community and others. Continue Reading
-
Infrastructure security: Remote access DMZ
An excerpt from Chapter 7: Infrastructure security from "How to Cheat at Managing Information Security," by Mark Osborne. Continue Reading
-
Future mobile
Antony Savvas explores the future mobile network Continue Reading