Opinion
Opinion
IT hardware
-
Bit by Bit: Novel techniques to shrink AI's carbon footprint
We look at some of the new techniques that promise to reduce energy usage of AI by 65% Continue Reading
-
A new security partnership to build a silicon valley in South Wales
The £140m acquisition of Newport Wafer Fab by American firm Vishay is to be welcomed but the UK needs needs security, stability and strategic investment to grow our domestic semiconductor capability, writes Alun Cairns MP Continue Reading
-
Tech trends: what will be hot in 2024?
Five major technology trends for 2024 Continue Reading
-
The future of business software will put users front and centre
Today, quantum computing and AI; yesterday, cloud and blockchain. As sure as Moore’s law, there is always a Next Big Thing Continue Reading
-
Hybrid work: How cloud PCs can drive collaboration
Organisations around the globe are grappling with remote working and are looking at various technologies to support flexible working practices Continue Reading
-
IT Sustainability Think Tank: Corporate devices and the circular economy
With sustainability moving up the boardroom agenda, CIOs and IT managers should look to revamp their IT procurement strategies to align with the principles of the circular economy, but why and what does this mean when it comes to managing the ... Continue Reading
-
IT Sustainability Think Tank: Incorporating circular economy principles into IT procurement
With sustainability moving up the boardroom agenda, CIOs and IT managers should look to revamp their IT procurement strategies to align with the principles of the circular economy, but where should they start? Continue Reading
-
Hybrid cloud storage: The devils are in the details
When it comes to storage, one thing is clear – cloud does not change everything Continue Reading
-
Avoid complexity in data storage decisions
With more options for on- and off-premise data storage, the need for simplicity is greater than ever Continue Reading
-
Changing the rules against cyber attacks
UKRI’s John Goodacre reveals how projects supported by the Digital Security by Design Challenge aim to improve cyber security resilience, beginning with the very fundamentals of computing Continue Reading
-
Rebooting the hospitality sector with technology
Technology is playing a crucial role as the hospitality sector rebounds after the coronavirus pandemic Continue Reading
-
Gartner: Purchasing enterprise PCs during a global chip shortage
How can organisations purchase enterprise PCs during a global chip shortage? They need to outsmart the crisis Continue Reading
-
Sparsely staffed offices: the new post-pandemic cyber gap
With many offices still operating at limited capacity, a red teaming expert reveals how his job is getting easier, and why this is a problem Continue Reading
-
Security Think Tank: A return to the office is not a return to normal
With Covid-19 restrictions easing, offices are welcoming back remote workers this summer, bringing with them their notebooks and mobiles, and creating an endpoint management headache for CISOs. What do security teams need to account for to protect ... Continue Reading
-
Security Think Tank: Reopening is an opportunity to reassess wider security posture
With Covid-19 restrictions easing, offices are welcoming back remote workers this summer, bringing with them their notebooks and mobiles, and creating an endpoint management headache for CISOs. What do security teams need to account for to protect ... Continue Reading
-
Security Think Tank: As offices reopen, address patching and ‘build drift’
With Covid-19 restrictions easing, offices are welcoming back remote workers this summer, bringing with them their notebooks and mobiles, and creating an endpoint management headache for CISOs. What do security teams need to account for to protect ... Continue Reading
-
Security Think Tank: Returning workers to the office: Is your security posture up to date?
With Covid-19 restrictions easing, offices are welcoming back remote workers this summer, bringing with them their notebooks and mobiles, and creating an endpoint management headache for CISOs. What do security teams need to account for to protect ... Continue Reading
-
Going back to office networks, only to dismantle them once and for all
With Covid-19 restrictions easing, offices are welcoming back remote workers this summer, bringing with them their notebooks and mobiles, and creating an endpoint management headache for CISOs. What do security teams need to account for to protect ... Continue Reading
-
Security Think Tank: Hydration, hiring, hacking – lessons in post-Covid risk
With Covid-19 restrictions easing, offices are welcoming back remote workers this summer, bringing with them their notebooks and mobiles, and creating an endpoint management headache for CISOs. What do security teams need to account for to protect ... Continue Reading
-
Security Think Tank: To secure printers think process, technology and people
Though rarely discussed in a cyber context, the prevalence of connected printers and MFPs poses security risks both technological and physical. What does a print security strategy need to take into account? Continue Reading
-
Security Think Tank: Time to accept printers will leak data
Though rarely discussed in a cyber context, the prevalence of connected printers and MFPs poses security risks both technological and physical. What does a print security strategy need to take into account? Continue Reading
-
Security Think Tank: What must a secure print strategy take into account?
Though rarely discussed in a cyber context, the prevalence of connected printers and MFPs poses security risks both technological and physical. What does a print security strategy need to take into account? Continue Reading
-
Security Think Tank: Printers can’t be an ‘add-on’ in your cyber strategy
Though rarely discussed in a cyber context, the prevalence of connected printers and MFPs does pose security risks both technological and physical. What does a print security strategy need to take into account? Continue Reading
-
Security Think Tank: Steps to a coherent print security strategy
Though rarely discussed in a cyber context, the prevalence of connected printers and MFPs poses security risks both technological and physical. What does a print security strategy need to take into account? Continue Reading
-
Security Think Tank: Printer risks go deep into IT history
Though rarely discussed in a cyber context, the prevalence of connected printers and MFPs does pose security risks both technological and physical. What does a print security strategy need to take into account? Continue Reading
-
Why the London Data Charter could be a foundation stone in the city’s recovery
London First’s director of connectivity and competitiveness, David Lutton, explains why data is at the core of the capital’s recovery plan Continue Reading
-
The new future of work
We may come to stop talking about ‘remote’ working altogether after the coronavirus pandemic. It could become just ‘working’ – part of the normal mix of how things are done Continue Reading
-
A beginner’s guide to quantum computer programming
Quantum computing takes a radically different approach to programming. IBM’s education head discusses how to get started Continue Reading
-
Putting edge computing centre stage in the UK’s fourth industrial revolution
The fourth industrial revolution will see every sector become a data-driven digital sector, with computing at the edge – which has power implications Continue Reading
-
Quantum sensing: A new frontier for revolutionary technology
Sensors are increasingly commonplace thanks to the internet of things – but the next generation of sensing technology promises dramatic new capabilities Continue Reading
-
Security Think Tank: In-depth protection is a matter of basic hygiene
The belief that effective perimeter security is the best way to protect data is a fallacy that is being repeatedly exposed. We must recognise the need for a data-centric security model to protect data from both internal and external threats, but ... Continue Reading
-
Storage: How ‘tail latency’ impacts customer-facing applications
Henry He of Virtual Instruments looks at tail latency, the small percentage of storage I/O that could be causing big and costly problems for business applications Continue Reading
-
Why rugged mobile devices can be important in digital transformation
Highly durable mobile devices should not be only considered for especially challenging work environments - there are considerations for many businesses Continue Reading
-
Audiovisual systems need more efficient integration and management
The spread of audiovisual systems for communication and collaboration needs to be supported in a similar manner to corporate IT, not facilities management Continue Reading
-
Visual collaboration needs more than just pixels and pointers
The merging of audio-visual and information technologies presents new opportunities for collaboration and data sharing Continue Reading
-
Douglas Engelbart, the forgotten hero of modern computing
Half a century ago, Douglas Engelbart demonstrated an experimental computer that laid the foundations for modern computing. His vision to use computing power to solve complex problems in all areas of human activity has become reality, but not in the... Continue Reading
-
As data volumes grow, backup needs analytics, says StorageCraft CEO
Backup appliance maker’s CEO says backup needs analytics so customers can prioritise restore of critical data in a world where volumes increase by 50% a year Continue Reading
-
Mind your drone business
Amazon is just the tip of the iceberg – companies are pouring hundreds of millions into the development of commercial drones Continue Reading
-
The desire for perfect recycling is making the e-waste problem worse
Shipping our electronic waste to poorer countries isn't going to solve the problem of recycling – there's a more economic solution Continue Reading
-
Taking the quantum leap: What is quantum technology for business?
Quantum computers are many years away, but the first applications of quantum technology will arrive in only one or two years – so businesses need to be ready Continue Reading
-
Hacking the internet of things just got easier – it’s time to look at your security
Are you taking security for internet-connected devices seriously enough? Continue Reading
-
How a new ISO standard helps you take control of your IT assets
The updated ISO standard 19770-1:2017 offers IT managers a way to bring their hardware and software assets under a single management standard Continue Reading
-
Why police forces need to be honest about mass mobile phone surveillance
Police forces across the UK are covering up their use of sophisticated mass surveillance devices, known as IMSI-catchers - the Bristol Cable and Liberty are campaigning for proper transparency Continue Reading
-
Robots will transform, not replace, human work
Claims that robots will steal our jobs are commonplace – but humans will find themselves working side by side with robots, rather than being replaced by them Continue Reading
-
The problem of smart cities and connectivity in the UK
Only once leaders develop a framework for local economic and societal development can the “smart city” buzz can evolve into “intelligent communities” Continue Reading
-
Living with Google Glass – not quite useful enough to overcome the dork-factor
Businesses will use Google Glass first, says Simon Dring after spending a few days living with the technology. Continue Reading
-
Intel x86 and IBM Power CPUs: Which, when, why?
There are only three processors left in the market for mission-critical applications. Which should you chose ? Continue Reading
-
Array-based or vSphere Replication for VMware SRM?
What’s the best replication method for VMware Site Recovery Manager (SRM)? GlassHouse Technologies’ Paul Grimwood runs the rule over array-based replication and vSphere Replication Continue Reading
-
Nirvanix failure – a blow to the cloud storage model?
Cloud storage firm Nirvanix has given customers a deadline to retrieve their data. Are the reasons for its failure specific to Nirvanix or a real blow to cloud storage overall? Continue Reading
-
When to use flash SSD instead of SAS or SATA?
When to use flash SSDs instead of SAS or SATA spinning disk is all down to application requirements, says David Boyle, senior consultant at GlassHouse Technologies (UK) Continue Reading
-
The history of the next-generation firewall
Security expert Rik Ferguson explains how next-generation firewalls were developed and what protection they provide businesses. Continue Reading
-
Tackling the challenges of the next-generation firewall
Security expert Brian Honan shares top tips on installing and maintaining a next-generation firewall Continue Reading
-
What are the opportunities mCommerce offers?
Throughout 2010, a flurry of announcements from players in the mobile value chain placed the spotlight squarely on the potential of the mCommerce market and highlighted it as a valuable revenue driver in a tough and competitive economic environment,... Continue Reading
-
Mac vs PC: Which should I buy?
Which is better – Macs or PCs? Computer Weekly content editor Faisal Alani gives his opinion on their respective advantages and disadvantages Continue Reading