In Depth
In Depth
Operating systems software
-
Why developers must work smarter, not just faster, with generative AI
With a lot to play for, including legal precedents, how can dev teams approach GenAI risks with a view to strong mitigation strategies? Continue Reading
-
Sea-Lion explained: Southeast Asia’s first large language model
The Sea-Lion large language model was built to cater to the language and cultural diversity of Southeast Asia, which is currently underserved by existing models that mostly originate from the West Continue Reading
-
What do the US’s new software security rules mean for UK organisations?
The White House announced recently that all software supplied to the US government and its agencies needs to be secure, so what does this mean for the UK and EU security sectors? Continue Reading
-
Key ingredients for a successful API recipe
We look at how application programming interfaces can provide connectivity to drive internal and external business processes Continue Reading
-
Finland brings cryostats and other cool things to quantum computing
Not only is Finland the clear leader in refrigeration technology for quantum computers, but it also leads in fundamental research into the underlying quantum information theory Continue Reading
-
Patching: Balancing technical requirements with business considerations
With an increasing reliance on subscription models alongside the regular patching of software, updates have become an essential part of modern business practices. However, care needs to be taken to ensure the optimum patching process is implemented Continue Reading
-
Chromebooks and G Suite: a good working alternative
We look at Chromebooks as collaboration clients, both in Google-oriented and mixed-platform environments Continue Reading
-
Why the browser is the computer
When he was CEO of Sun Microsystems, Scott McNealy once said that the network is the computer. Today, users spend most of their time in a browser Continue Reading
-
Inside the distros: A year in Linux development
Linux will turn 30 in three years. We look at how far the major Linux distributions – or distros – have come over the past year and what they might be able to bring in the future Continue Reading
-
Future of the server operating system
We look at the evolution of the server operating system, and how the next generation is moving into the cloud Continue Reading
-
CW@50: How UK home brew gave computing to the masses
From batch processing to the graphical user interface, from desktop PCs to smartphones, from luggables to wearables, computing has come a long way since Computer Weekly was first published in 1966. We look at some of the personal computers that ... Continue Reading
-
CW@50: From ICL to ITIL
Standardisation helps industries to grow. Here in the UK, a number of highly influential standards emerged that have become building blocks for the modern computer industry Continue Reading
-
Workplace IT services in flux: wherever, whenever, whatever
Enterprise computing is in upheaval as the emphasis shifts towards automation and user-device provision. Continue Reading
-
Windows XP end of support: What to do next
CIOs may not wish to carry on running a 12-year-old desktop OS, but thousands of incompatible applications leave many with no choice Continue Reading
-
How to secure Macs in the enterprise
Apple computers are becoming increasingly used in the enterprise - we look at how to securely introduce Macs in the corporate network Continue Reading
-
Blade servers: How to decide on Unix or Linux
If you’re contemplating Unix or Linux for your blade server, or a migration from one to the other, in this guide you will find everything you need to make up your mind. Useful Unix and Linux command lines also included. Continue Reading
-
Case study: How a small business can benefit from SaaS
Professional beauty products distributor SweetSquared considers using Microsoft Office 365 alongside browser-based SaaS. Continue Reading
-
Facing up to security perils of outbound traffic
What about the threat from within and, more specifically, the security issues that arise from outbound traffic risks? Continue Reading
-
Chinook helicopter disaster - computer software failure or pilot error?
Chinook helicopter crash: was it computer software failure or a cause we'll never know? This article gives the background to the Chinook helicopter disaster with links to all the relevant articles published by ComputerWeekly and other useful web ... Continue Reading
-
How to select the right IP PBX
Selecting the right IP PBX system for your company can be complicated. Here are some important things to consider when purchasing an IP PBX. Continue Reading
-
Data migration product specifications
Part of the Tiered Storage Buying guide focusing on product specifications for data migration tools. Continue Reading
-
Prevent network hacks with secure Web browsing
Hackers can penetrate your network in almost unlimited ways these days, and that includes through your Web browser. Learn how to improve Web browser security and keep these hackers out of your network. Continue Reading
-
Big Microsoft Vista concerns for Big Pharma
The second installment of an ongoing series examining the challenges of deploying Windows Vista and the considerations that go into the decision to roll out the new OS. Continue Reading
-
Admins run into trouble with Microsoft updates
A DNS service failure and an ongoing WSUS glitch are among this month's frustrations as IT administrators try to deploy the latest security patches from Microsoft. Continue Reading
-
Inside MSRC: Windows Vista security update explained
Microsoft's Christopher Budd details the first Windows Vista security updates. Continue Reading
-
IT pros eye Windows Server 2003 SP2 with caution
Despite its security and stability enhancements, IT pros say they are in no rush to deploy Windows Server 2003 SP2 Continue Reading
-
Web 2.0 tools of the trade
As Web 2.0 technologies become more popular, IT professionals are answering questions from business units on how it can be used. Continue Reading
-
Measuring Vista's true security muscle will take time
Researchers are digging through the Windows Vista code right now, and when they find flaws we'll hear about it. But it's the ones we don't hear about that should keep us up at night. Continue Reading
-
Inside MSRC: Microsoft updates WSUSSCAN issue
Christopher Budd of the Microsoft Security Response Center is urging customers to deploy the latest versions of the Systems Management Server Inventory Tool for Microsoft Updates or Microsoft Baseline Security Analyzer to receive all the current ... Continue Reading
-
Adobe Reader flaws spook security experts
Security experts sound the alarm over Adobe Reader flaws that could be exploited for cross-site scripting attacks and other mayhem. Continue Reading
-
Top Web security tips of 2006
Check out the top five Web security tips of 2006 to get advice on securing Internet Explorer, ISA Server and Radius and a set of tools designed to secure the Web browsing experience. Continue Reading
-
Recordless email: magical or menacing?
A new startup promises recordless email. Is this a stroke of genius that will reward the company with billions of Internet bucks, or is it the end of the world as we know it? Continue Reading
-
Security Blog Log: Dissecting Firefox 2.0
This week, bloggers examine the security features of Firefox 2.0 and come away with mixed reviews. Does it fare better than Internet Explorer 7? Continue Reading
-
Inside MSRC: Time to rethink security workarounds
Christopher Budd of the Microsoft Security Response Center recommends implementing one of several security workarounds to ensure a secure infrastructure until this month's most important Windows update can be installed. Continue Reading
-
Thwarting IM management challenges
Product review: Information Security magazine's Sandra Kay Miller says Symantec's IM Manager 8.0 has limited public network features, but offers excellent reporting Continue Reading
-
Akonix A-Series offers complex, best-of-breed IM security
Product review: Information Security magazine's Sandra Kay Miller says The Akonix A-Series instant messaging security appliances works well but needs better documentation. Continue Reading
-
Automated provisioning quiz answers
the key questions answered Continue Reading
-
SMB finds the perfect host
When All3Media, a medium-sized TV programming producer, inherited an inflexible communications system, it turned to a more appealing, hosted alternative. Continue Reading
-
B&Q boosts efficiency and cuts costs by replacing e-mail with workflow software
-
Storage 911: How to troubleshoot your storage
Our emergency guide takes you through the steps you can take to prevent disaster, and then, more importantly, offers an organized list of usual suspects, from the complex to the deceptively simple. Continue Reading
-
Thought for the day: Flights of fancy
The Windows versus Linux debacle continues to escalate into a heady mix of emotion, mud-slinging and complexity Continue Reading
-
Thought for the day: Flights of fancy
Launch a Java-based office suite? Simon Moores questions the sanity of any company that would consider doing so, even if it is... Continue Reading
-
Insurance lacks pulling power
Insurance companies need to give their e-initiatives a radical makeover as their present inward focus is driving customers away Continue Reading
-
Growing pains
Five e-commerce companies tell E-Business Review how they overcame initial teething problems Continue Reading
-
Growing pains of dotcom start ups
-
Spring has sprung for Spring
Spring Group has moved its business environment on-line with the development of a fully integrated web operating system. Continue Reading