IT news in your industry sector

Email Alerts

Register now to receive ComputerWeekly.com IT-related news, guides and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Fingerprint scanners most popular alternative to banking passwords

    Fingerprint scanning technology is the most favoured biometric security alternative to passwords for UK bank customers

  • GCHQ certifies six cyber-security masters degrees

    GCHQ has certified six masters degrees focused on cyber-security as the government attempts develop the expertise required to make the UK as part of the National Cyber Security Programme.

  • Optimising your OmniPayments: Consumers, payments and the future

    Catering to the consumers of today means helping them pay how they want to. Yet with the plethora of options available in the market, it is vital for businesses to find the optimum time to implement new payment options. Developing a wider Omnichannel strategy can help retailers deliver on the overall shopping experience that the consumers of today and tomorrow expect e.g. loyalty, returns and refunds. This report, the culmination of months of research into consumer payment behaviours, has been created to provide a helping hand to anyone looking to take advantage of the new payment technology options at the optimum time for their business.

  • How to make IT governance work

    Governance is undoubtedly an important subject for any organisation, but what does it really involve?

  • PayPal launches UK startup accelerator programme in London

    PayPal's accelerator programme will select up to five technology startups from the UK and host them in the London offices for six months

  • Why Google could become the Amazon of banking

    Internet giants will not replace banks but will disrupt the sector through other services taking consumers away from traditional banks

  • Gartner: Deriving value from Big Data for CRM

    Big data presents many CRM opportunities, but to be effective and derive business value, customer insights generated by well-managed and analysed big data must be put into action. During the next few years, most companies will struggle to realise customer relationship management (CRM) business value from big data strategies. The first key to success will be identifying relevant customer processes across marketing, sales, customer service and e-commerce that can benefit from actionable, big data customer insights. Once a customer process has been identified as a big data opportunity, CRM leaders working with CIOs should follow four critical steps to derive business value:

  • Fair exchange protocols with anonymity and non-repudiation for payments

    The integration of electronic transactions throughout the spectrum of business and our individual daily activities is undeniably widespread. The shift from the standard bricks-and-mortar environment with point of sale (POS) transactions to the virtual, electronic, card-not-present (CNP) environment have expanded the attack surface and created the need for higher security in transactions. This report looks in detail at two key principles necessary for secure payments: fair exchange and non-repudiation for the participants.

  • Mobile Expense Management

    Managing mobile costs is a challenge for all organisations, especially as responsibilities and budget authority often sit in several places—IT, finance, personnel, managers and, of course, the employees themselves. This situation becomes even more complex and problematic for those organisations that span more than one country or have to use multiple suppliers within one country. Getting to grips with these costs in a way that does not undermine the value of mobile flexibility is paramount, and organisations need to gather sufficient detail to effectively manage and analyse their mobile costs. Organisations need to get a grip of mobile spending. Trends such as BYOD might be leading to a reduction in capital expenditure, but there are operational communications, software and security costs and many will be growing. Increased use of mobile to extend and improve business processes should not be inadvertently restrained, but no budgets are limitless.

  • Herding Geese: The Retail Supply Chain

    On September 9th, 2002 Walmart announced that it had selected software from a small company called iSoft to power its new Internet-based EDI system. This was the shot heard round the world in the EDI industry. The new Internet EDI technology, called AS2, would circumvent the VANs, enabling businesses to exchange transactions directly over the Internet. Walmart’s announcement had catastrophic impacts to the EDI VAN business that had a virtual monopoly on supply chain B2B transactions for decades. Most analysts would place the EDI VAN sector in the category of a melting ice cube. In fact, in 2002 experts predicted that EDI VANs would be dead by the year 2010, if not 2005. However, the EDI VAN business is still a $1 billion sector in the year 2012.

  • VIEW MORE ON : Financial services IT
  • GCHQ certifies six cyber-security masters degrees

    GCHQ has certified six masters degrees focused on cyber-security as the government attempts develop the expertise required to make the UK as part of the National Cyber Security Programme.

  • How to make IT governance work

    Governance is undoubtedly an important subject for any organisation, but what does it really involve?

  • Nucleus Research ROI Vendor Comparison Scorecard

    This tool provides a single page scorecard for comparing vendors across 14 weighted factors. It generates an overall score for each vendor along with a risk assessment based on the weighting of the factors. (End-user organizations may use this tool to analyse technology decisions but the tool may not be redistributed or modified in any way. Please contact Nucleus Research client services for further information.)

  • Using ICT financing for strategic gain

    Many small and medium business (SMB) organisations are already using financing in their business, whether this is for company cars, coffee and snack vending machines or office printers, photocopiers and scanners. However, information and communications technology (ICT) financing and leasing has not had the same success, even though it can help to iron out peaks and troughs in ICT budgets and help to create a better, longer-term ICT strategy that is optimised to support a business. This report, covering new research with 102 SMBs in the UK, provides insights into views on various aspects of the use of financing and leasing of ICT hardware and software and comparisons with existing use for other areas such as vehicles and office equipment.

  • Business Reimagined

    Are you happy with the way you work? Are you engaged, energised in the office? Or do you sometimes feel that your days are dominated by process and technology? Reimagining business is about waking up to a new environment, based on collaborative and flexible working, on technology that, used correctly, liberates rather than constrains. The future of work must be based on being open, on focusing on results, not process and on empowerment, not hierarchy. Dave Coplin, Chief Envisioning Officer at Microsoft UK, has been immersed in the technologies that are making waves in the workplace.

  • Enterprise finally embraces TPM-based security

    Enterprises are finally embracing TPM-based security systems, but why has it taken so long?

  • European IT Law Briefing: Practical steps for companies using social media

    This briefing from leading European law offers practical legal advice for organisations who want to use social in France, Germany, UK and Italy. The briefing is based on a seminar by the law firms: SKW (Germany), Portolano (Italy), Bersay (France), at the offices of Kemp Little (UK) in London on 30th April 2013.

  • Security Think Tank: Design and build in security and resilience from the start

    How can organisations build cyber security resilience?

  • WAN Speak Musings – Volume I

    The network is a dynamic place and the knock-on impact on the rest of IT is more than just a case of occasional lost connectivity or slow response. This report contains 12 short articles that look not just at direct wide area network (WAN)issues, but also at other areas of the ITC platform and the possible impact on an organisation.

  • Tackle IAM with a risk-based approach, says KPMG

    A risk-based approach is the best way to tackle identity and access management, says KPMG

  • VIEW MORE ON : SME IT
  • GCHQ certifies six cyber-security masters degrees

    GCHQ has certified six masters degrees focused on cyber-security as the government attempts develop the expertise required to make the UK as part of the National Cyber Security Programme.

  • Tackle IAM with a risk-based approach, says KPMG

    A risk-based approach is the best way to tackle identity and access management, says KPMG

  • IT outsourcing spending growth continues

    IT outsourcing contracts signed in Europe in the first three months of 2014 see high growth

  • How to configure Mac OS X Server

    In the previous article in this series, we showed you how to secure a Mac using the functions built into its operating system, OS X. These functions range from simple password protection and patch management through to full-disk encryption. However, these are not the only security functions available. Indeed, OS X has a whole security and management infrastructure available for administrators called Managed Preferences, which can be managed most easily using OS X Server.

  • How to be influential online

    Communicating persuasively may be a tricky art to perfect, but when it’s done properly, the pay-off can be huge, which is why marketing campaigns continue to siphon off huge amounts of corporate money every year. If you want your message to reach and influence your target audience there is one golden rule you must follow: tailor your communication style to the medium you’re using.

  • How to source cyber threat intelligence

    Some pointers on how to select the best sources of cyber threat intelligence

  • The Mindset of the Chief Information Officer

    This study evaluates the leadership role that Chief Information Officers performs in helping their organisations achieve their commercial goals. It examines the skills and behaviours that contribute to their success and considers the relationships the CIO has with the CEO, the executive team and other influential stakeholders. This study, which draws on interviews with leading CIOs, provides senior IT executives with insights to help them reflect on their leadership roles and to consider areas for their own professional development.

  • Supporting requirements management in TOGAF

    Requirements management is an important activity in the process of designing and managing enterprise architectures. Requirements from various stakeholders form the basis for any change to an organization and its architecture. The quality of these requirements, the extent to which they are realized, and the ease with which they can be changed, determine the quality of any enterprise architecture. Nonetheless, many enterprise architecture modeling techniques focus on what the enterprise should do by representing “as-is” and “to-be” architectures in terms of informational, behavioral, and structural models at the different architectural layers (e.g., business, application, and technical infrastructure). Little or no attention is paid to represent (explicitly) the reasons; i.e., the why, behind the to-be architectures in terms of motivations, rationale, goals, and requirements.

  • Business Secretary calls for TSB’s funding to be doubled

    Business Secretary Vince Cable has urged the government to double the Technology Strategy Board’s (TSB) funding

  • Open Group technical document: IT Specialist Certification Accreditation Policy

    Clearly “book learning” is a critical first step to becoming effective at anything. But the effectiveness, potential, and the degree and value of contribution rise to a new level as relevant skills and experience are gained in a topical area. It is clearly important to “know” a subject, but it is more valuable to have applied that knowledge. It is for this reason that The Open Group IT Specialist Certification (ITSC) program is based on an assessment of people skills, technical skills, and experience, not just tests of knowledge.

  • VIEW MORE ON : Business services IT