Web 2.0: Understanding participation
Voice Firewalls - the next compelling technology
Web scam suicide
Top web name blunders
Software must be made green
Computer Weekly on CNN
Top Whitehall 200k IT jobs – hopefuls given only 2 weeks to apply
SAP posts strong results but slow take up for Business ByDesign SaaS
Best of the blogs: Computer Weekly launches its first IT Blog Awards
The immorality of putting the naive and vulnerable on-line
Restraint of ego
We can’t have enough security products
Is that a blade server in your jacket?
Microsoft drives Mrs. Daisy with ‘senior PC’
Wi-Fi gizmo competes with undersea toaster
Is security really a business enabler?
Skip Vista - you know it makes sense
Nerds go wild at no-holds barred malware contest
User generated content - an IT strategy
Mid-week funny: Paxman resists
Ray Stanton and Bruce Schneier interviews
Fujitsu makes revised offer on NPfIT contract
World-class? - please no
Traffic stats and the top 10 blogs
Real hackers stay close to the action
The key message from Web 2.0
BT CRM vs Salesforce.com CRM
Portable Identity and the BBC
Grand Theft Auto IV and computer games - what's the fuss?
IT skills worth learning – how do you decide?
Security Software as a Service
Can we have more testing please
Petty local government bureaucracy alive and well!
BBC bias towards Microsoft proved (not)
On trial - role of the CISO
Microsoft Yahoo - deadline pases
Navigating the Security Conference Circuit
Microsoft/Yahoo – Your Comments
Microsoft Yahoo AGM attack
EDS reports growth in first quarter
Second Life: the business opportunity explained
Microsoft: Yahoo deadline expires
Error messages you never want to see - no. 2
290 patient safety incidents reported under NPfIT scheme
Error messages you never want to see
1-2-3 you’re back in the room
Caption competition and Infosec leaves Olympia for its neighbour
Security still a people problem
Video: Second Life CEO on stepping down
Nigerian 419 scam on LinkedIn
Mobile Internet woes on the eeePC
Weekly video round up - twitter you tweets
Clinton penetrates Obama’s portal
What is good practice? Directors' Guides published
Second Life courtroom drama video
E-crime Unit - will it or won't it?
Businesses build Second Life experience
Some of the good and bad at HC2008 - a summing up
Infosec day two - midday lunchtime
Where are you IBM? (we now know where MS is!)
Stripper misses day in court thanks to computer error
Death by Data Protection III: paralysis from the top.
What's coming up today from Infosec
Identity systems will save the world
Yahoo earnings surge 281.7% in latest results
Reindeer meat and a new industry portal
Infosec 2008 - what's going on on day one
Whitehall advertises for NHS CIO
The Commodore 64 is our life
HC2008 - the lighter side of Healthcare Computing event in Harrogate
Cobol programmers back in demand
BT Openreach and SLAs - not up to scratch?
How to prove ROI on Web 2.0 projects
It's hot at Infosec 2008
Flame fizzles out on CNN attack
Another world, another time
Small-scale NPfIT look-alike in Australia is in trouble
Why I won't be at Infosecurity (but there's a competition if you are)
Phorm - 4 key rules that ISPs must obey
IT workers could swing US elections
Infosecurity Europe 2008
We are the weakest link
O2's mobile broadband service - what you should know...
Web 2.0 spending to increase - but who pays?
Have NPfIT contract talks in the south stalled?
Web 2.0 - creating digital lightening rods
Environment Agency takes phishing rather too literally?
Judge says ministerial statement about ID Card gateway reviews and FOI was "wrong"
Centralisation – Does it Really Help Security?
Laptop repairs? If in doubt hammer IT
Right on the case Mr White
The battle for the Internet
Laptop privacy on the train
Post-It note proves revealing
Career management: How to get headhunted
Daytime TV turns IT contractor to life of crime
Weekly video round-up