Archive
Browse the full archive of Computer Weekly online content - see our most recent articles listed below, or browse by year of publication.
2006 Stories
-
December 30, 2006
30Dec2006
News
Raft of conferences planned for 2007
Increased IT industry confidence, and a desire to get close to the senior IT user community has brought a burgeoning number of events, seminars, exhibitions, roundtables and conferences for 2007. Continue Reading
-
December 26, 2006
26Dec2006
News
Looking back at information security in 2006
In this special edition of Security Wire Weekly, senior news writer Bill Brenner reviews his top interviews of 2006. Continue Reading
-
December 25, 2006
25Dec2006
News
Top 10 storage stories of 2006
SAN and NAS converged and shook up the industry, iSCSI went mission-critical, users conquered tiered storage and more. Continue Reading
-
December 21, 2006
21Dec2006
News
Weekly compilation of storage news:IBM, Seagate plan to rethink hard drives and memory
IBM and Seagate separately announce research projects into futuristic storage hardware; Morgan Stanley charged again over email; Dell CFO resigns; Xyratex acquires Ario IP. Continue Reading
-
December 21, 2006
21Dec2006
News
Skype Trojan: Much ado about nothing?
This week in Security Blog Log: A Trojan horse has captured headlines by targeting Skype users. But some believe the threat is being blown out of proportion. Continue Reading
-
December 21, 2006
21Dec2006
News
Microsoft investigates Windows Vista flaw
Local users could gain elevated system privileges and run malicious commands by exploiting an error within the Windows server library. Vista is among the OS versions affected. Continue Reading
-
December 20, 2006
20Dec2006
In Depth
Top client security tips of 2006
A network user without the proper know-how is a ticking time bomb when it comes to security. Check out our top five client hardening tips of 2006 to get a head start on protecting yourself from potentially dangerous users. Continue Reading
-
December 20, 2006
20Dec2006
News
Top 10 storage acquisitions of 2006
Industry consolidation was fast and furious this year. We rank the deals by quality, not quantity. Continue Reading
-
December 20, 2006
20Dec2006
News
Seagate to acquire EVault for $185M
The disk drive maker has plans to tuck the online backup and archiving service provider into its services group. Continue Reading
-
December 20, 2006
20Dec2006
News
Skandia UK signs up HCL for five-year IT outsourcing deal
Skandia UK has signed a five-year £105m IT outsourcing contract with HCL Technologies. Continue Reading
-
December 20, 2006
20Dec2006
News
Schneider to step down as Dell CFO
Jim Schneider, Dell's chief financial officer, is leaving the company. Continue Reading
-
December 20, 2006
20Dec2006
News
Eight security holes patched in Firefox browser
Mozilla has patched eight security holes, five of them “critical“, in its open source Firefox 2.0 web browser. Continue Reading
-
December 19, 2006
19Dec2006
News
Microsoft releases Vista APIs to security vendors
Microsoft released a draft set of programming interfaces allowing security vendors to develop software using the Windows kernel on 64-bit systems. Continue Reading
-
December 19, 2006
19Dec2006
In Depth
Cleversafe envisions a new world of storage
An organisation led by the inventor of the wireless thin client aims to combine storage and the Internet, and change how we think of both storage and computing. Continue Reading
-
December 19, 2006
19Dec2006
News
Mozilla fixes multiple Firefox flaws
Digital miscreants could exploit flaws in Mozilla's popular Firefox browser to bypass security programs, access sensitive information and conduct cross-site scripting attacks. Continue Reading
-
December 19, 2006
19Dec2006
News
Trackable clothing unveiled
Covert Asset Tracking Systems (CATS.eye) is to launch a trackable clothing range that can be traced through the internet. Continue Reading
-
December 19, 2006
19Dec2006
News
Hamleys website suffers web glitch - offers toys 60% below true price
The website of Hamleys toy store has suffered a glitch which allowed customers to order goods at up to 60% below their true price. Continue Reading
-
December 19, 2006
19Dec2006
News
Broadband lines reach 264 million
The worldwide total of broadband lines reached 263.8 million at the end of September, with a total of 16.9 million lines added over the quarter. Continue Reading
-
December 19, 2006
19Dec2006
News
Dell faces Nasdaq de-listing
Dell is facing a de-listing from the Nasdaq stock exchange after failing to report its full third quarter earnings on time. Continue Reading
-
December 19, 2006
19Dec2006
News
Pensions IT will stay in public sector
The government is to commission a new IT infrastructure to run its proposed "personal accounts" pensions savings scheme. Continue Reading
-
December 19, 2006
19Dec2006
News
Check Point gets big IDS boost from NFR deal
Analysts say Check Point would gain much-needed intrusion detection and prevention capabilities through its acquisition of NFR Security. The deal should erase bad memories of the aborted Sourcefire deal. Continue Reading
-
December 18, 2006
18Dec2006
In Depth
Top network security tips of 2006
The top Windows networking security tips of 2006 cover a range of topics, including network isolation, open source Windows security tools, VPN security and more. Continue Reading
-
December 18, 2006
18Dec2006
News
VoIP hacking exposed in new book
VoIP hacking is a reality, and in a new book, two VoIP security experts outline the tools and tricks to avoid a system-crushing hack. Continue Reading
-
December 18, 2006
18Dec2006
News
Cisco WLAN design best practices
Wireless LAN (WLAN) technology has built-in security features, but a one-size-fits-all approach won't ensure adequate security for your organization. This tip provides best practices for designing your security architecture, including user community... Continue Reading
-
December 18, 2006
18Dec2006
News
WLAN interference and clogged pipes -- happy holidays!
WLAN interference caused by decorations and slowed traffic due to online shopping are just some of the network woes of the holidays. Continue Reading
-
December 18, 2006
18Dec2006
Tip
What are the fundamentals of ATM and ISDN?
Lisa Phifer explains the fundamentals of ATM and ISDN and why they are used. Continue Reading
-
December 18, 2006
18Dec2006
News
Councils seek simpler user authentication
A group of councils are working together to create a new means of authenticating citizens so that they can more easily access e-government services. Continue Reading
-
December 17, 2006
17Dec2006
News
Criminals find safety in cyberspace
A new report from McAfee shows how criminals are enjoying a sense of safety and anonymity in cyberspace that they never had on the street. And they're making more money. Continue Reading
-
December 17, 2006
17Dec2006
In Depth
Enterprises are open to Asterisk
Organisations have become so comfortable with VoIP and standards that open-source technologies like Asterisk are being given serious consideration over big iron PBX platforms. Learn all about Asterisk here. Continue Reading
-
December 17, 2006
17Dec2006
In Depth
Top storage tips 2006
What's on the minds of storage techies. What's hot, what's not, what works, what doesn't work. These expert tips cover the storage issues that take top honours when it comes to disaster recovery, NAS, SAN, backup and storage management. Continue Reading
-
December 17, 2006
17Dec2006
News
NAS gateway purchase considerations
NAS gateways overcome the inherent limitations of scale and flexibility by utilizing externally connected storage as external standalone disk arrays. NAS storage capacity is typically expanded by simply adding more disks to the appliance, but this ... Continue Reading
-
December 17, 2006
17Dec2006
News
Top 10 VoIP tips of 2006
Echo and latency issues top the list in 2006, as seen in our top 10 list of most popular tips. If you have missed any of these tips, now is the time to catch up before the end of the year. Continue Reading
-
December 15, 2006
15Dec2006
News
Cardiff launches intelligent document system
Cardiff, a division of Autonomy Corporation, has launched a new system to allow firms to get more out of their on-screen documents. Continue Reading
-
December 14, 2006
14Dec2006
In Depth
Review: Prevx1 not ready for prime time
Prevx1 will require significant improvement in management and detection capabilities before it can be considered a serious contender for enterprise deployments. Continue Reading
-
December 14, 2006
14Dec2006
In Depth
Review: Reconnex's iGuard needs improvements
Reconnex's iGuard is maturing, though it still needs some usability improvements such as wizards, customisable reports and the ability to drill down on the graphs. Continue Reading
-
December 14, 2006
14Dec2006
In Depth
Review: Deep Security is a solid IPS
Third Brigade's Deep Security is a well-designed, effective product with strong configuration and policy control capabilities. Continue Reading
-
December 14, 2006
14Dec2006
News
Employers to seek more security talent in '07
Learn what certifications are growing in demand and how employers are looking at the job market in 2007. Continue Reading
-
December 14, 2006
14Dec2006
News
Hitachi spies opportunity in added San and Nas
Hitachi Data Systems (HDS) is to make major moves in the global high-performance computing (HPC) storage market. Continue Reading
-
December 14, 2006
14Dec2006
News
Find approved courses online with new tool
Finding details of higher education courses that are accredited by the BCS is now possible via a special search option on the BCS website. Continue Reading
-
December 14, 2006
14Dec2006
News
NAS gateway specifications
A NAS gateway offers file-based accesses to external storage on a disk array -- or a SAN, where users can take advantage of superior performance and reliability while maintaining a level of simplicity. Since storage is moved off of the NAS device, ... Continue Reading
-
December 14, 2006
14Dec2006
News
Schneier: Data breach at UCLA barely newsworthy
This week in Security Blog Log: Security luminary Bruce Schneier and others sound off on the UCLA data breach that exposed 800,000 people to identity fraud. Continue Reading
-
December 13, 2006
13Dec2006
In Depth
Microsoft Vista could improve Internet security
Two new Microsoft Vista features -- Kernel Patch Protection and User Account Control -- could prove especially useful in preventing serious malware infections. Continue Reading
-
December 13, 2006
13Dec2006
In Depth
Review: Lancope StealthWatch 5.5 offers more than IDS
Hot Pick: StealthWatch goes far beyond traditional intrusion detection, with powerful network-monitoring features. The optional IDentity-1000 is an essential addition. Continue Reading
-
December 13, 2006
13Dec2006
News
Review: Sky's the limit with Skybox View 3.0
Hot Pick: Skybox View 3.0 offers a unique and flexible approach for assessing and managing specific threats and overall risk to your digital assets. Continue Reading
-
December 13, 2006
13Dec2006
In Depth
Hot technologies for 2007
"Storage" magazine's editors reviewed technology developments, product introductions and storage standards to come up with this short list of must-have technologies for 2007. Continue Reading
-
December 13, 2006
13Dec2006
News
Hosted VoIP eliminates cost, complexity
Hosted VoIP is being adopted at increasing rates as more and more companies look to avoid the excess costs and complexities of on-premise solutions. Continue Reading
-
December 13, 2006
13Dec2006
News
Third zero-day found in Microsoft Word
For the third time in a week, a zero-day flaw has been found in Microsoft Word. Users should be cautious when opening attachments from unknown sources. Continue Reading
-
December 13, 2006
13Dec2006
News
Host-based replication
While the lines of distinction among data protection technologies such as backup, continuous data protection and replication have blurred, host-based replication can play a key role in your overall data protection strategy. Continue Reading
-
December 13, 2006
13Dec2006
News
VoIP management tools: Calculating ROI
Before purchasing management tools for VoIP, you may need to calculate the return on investment (ROI) to justify the cost of those tools. In this tip, Gary Audin explains how to calculate ROI and provides specific checklists for calculating the ROI ... Continue Reading
-
December 13, 2006
13Dec2006
News
Hosted VoIP eliminates cost, complexity
Hosted VoIP is being adopted at increasing rates as more and more companies look to avoid the excess costs and complexities of on-premise solutions. Continue Reading
-
December 13, 2006
13Dec2006
News
Oyster and Barclaycard to launch e-money scheme
The Oyster card is to combine with Barclaycard to offer a ‘wave and pay’ scheme in the capital within a year, it was announced today. Continue Reading
-
December 13, 2006
13Dec2006
News
Sun updates Java Standard Edition
Sun Microsystems has launched version six of its Java Standard Edition platform, which supports the integration of Java technology with other programming languages Continue Reading
-
December 13, 2006
13Dec2006
News
Eclipse adoption rate on the increase
The adoption rate of the open source Eclipse integrated development environment has more than doubled in Europe, the Middle East and Africa, industry analysts have revealed. Continue Reading
-
December 13, 2006
13Dec2006
News
Swindon is broadband capital
Swindon is still the broadband capital of Britain, research on coverage has revealed. Continue Reading
-
December 13, 2006
13Dec2006
News
Broadwick brings IntelliContact to mid-sized market
Broadwick has released IntelliContact Enterprise, a version of its e-mail marketing application, for mid-sized organisations. Continue Reading
-
December 13, 2006
13Dec2006
News
Webroot tackles spyware and viruses
Webroot Software has announced Webroot SME Security software, which is designed to protect SMBs from spyware and viruses. Continue Reading
-
December 12, 2006
12Dec2006
News
SAP targets smaller users with hosted ERP service
SAP is to extend its service oriented architecture strategy during 2007, with a suite of ERP products designed for small and medium sized companies. Continue Reading
-
December 12, 2006
12Dec2006
News
Expert offers tips to bolster messaging security
In this edition of Security Wire Weekly, Burton Group analyst Diana Kelley explains how to lock down messaging programs as part of our three-day special report on the subject. Continue Reading
-
December 12, 2006
12Dec2006
News
Firms consider alternatives to Office
A fifth of organisations are looking at alternatives to Microsoft's Office suite, although most expect to migrate to the recently-released Office 2007 in a few years, according to Forrester Research. Continue Reading
-
December 12, 2006
12Dec2006
News
Symantec issues NetBackup security alert
Symantec issues an alert and patch to vulnerabilities in NetBackup 6.0, 5.1 and 5.0. Continue Reading
-
December 12, 2006
12Dec2006
News
Mixing SAS and SATA disk drives can cause problems
Mixing SAS and SATA disk drives in the same enclosure can cause interoperability issues, but vendors are finding workarounds. Continue Reading
-
December 12, 2006
12Dec2006
News
Data breach at Boeing exposes 382,000 employees
The third theft of a Boeing laptop in the last 13 months has exposed the data of nearly 400,000 employees and retirees. Continue Reading
-
December 12, 2006
12Dec2006
Tip
Intrusion detection systems -- introduction to IDS and IPCop
This article, excerpted from the book ""Configuring IPCop Firewalls: Closing Borders with Open Source,"" explores how intrusion detection systems (IDS) and intrusion prevention systems (IPS) including Snort and IPCop protect the network from ... Continue Reading
-
December 12, 2006
12Dec2006
News
Fujitsu to buy TDS for £43m
Fujitsu Services is to acquire a majority stake in German outsourcing and consultancy firm TDS, through deals with a total value of about Euros 64m. (£43m). Continue Reading
-
December 11, 2006
11Dec2006
News
Storage Decisions Session Downloads: Executive Track (LV 2006)
Our "Executive track" sessions give C-level technology executivesan idea of where their storage should be and ideas on where it's headed. Continue Reading
-
December 11, 2006
11Dec2006
News
Adidas scores savings with global recruitment system
Adidas aims to halve its recruitment costs when it rolls out a global recruitment tool next year. It will use the tool to match job applicants to positions not just in their home countries but across the world. Continue Reading
-
December 11, 2006
11Dec2006
In Depth
Storage Decisions Session Downloads: Smart Shopper Track (LV 2006)
Very few storage managers have carte blanche when it comes to storage spending. Sessions in our "Smart Shopper track" help managers get the most bang for their storage buck. Continue Reading
-
December 11, 2006
11Dec2006
In Depth
Storage Decisions Session Downloads: Architecture Track (LV 2006)
More than 70% of the attendees of Storage Decisions say they are setting up or evaluating a tiered storage architecture. Featured in this track are Tiered Storage School sessions along with other sessions that can help any manager set up or ... Continue Reading
-
December 11, 2006
11Dec2006
News
Government needs to build trust to drive use of e-services, say IT heads
A lack of trust is hampering take-up of online government services, according to a recent BCS Thought Leadership Debate. This is partially a result of several high-profile e-government failures and because of a general lack of confidence in ... Continue Reading
-
December 11, 2006
11Dec2006
In Depth
Storage IPOs, brilliant or brainless
Just when we thought the fast and loose spending of the dot-com bubble was well behind us, a few recent storage company IPOs remind us that we really haven't gotten a lot smarter. Continue Reading
-
December 11, 2006
11Dec2006
News
Microsoft fixes two zero-day flaws
The December security update from Microsoft includes patches for zero-day flaws in Visual Studio and Windows Media Player, but two zero-day flaws in Word remain unfixed. Continue Reading
-
December 11, 2006
11Dec2006
Podcast
Podcast: Mobile device threats are real, white-hat hacker says
Learn how easy it is for a hacker to gain access to a mobile device, whether employees are aware of security for their devices and why Bluetooth headsets should be turned off. Continue Reading
-
December 11, 2006
11Dec2006
In Depth
Inside MSRC: Visual Studio flaw, tool extensions explained
Christopher Budd of the Microsoft Security Response Center sheds detail about a flaw in Visual Studio 2005 and explains that support for Software Update Services 1.0 will be extended. Continue Reading
-
December 11, 2006
11Dec2006
News
IT pros look for ways to lock down IM
Special Report: To control growing IM threats, administrators are trying to limit which programs can be used or ban the technology altogether. But that's not always possible. Continue Reading
-
December 11, 2006
11Dec2006
In Depth
Infrastructure security: Remote access DMZ
An excerpt from Chapter 7: Infrastructure security from "How to Cheat at Managing Information Security," by Mark Osborne. Continue Reading
-
December 11, 2006
11Dec2006
News
Vendors to crank up SaaS offerings to SMBs next year
SMBs will outpace enterprises when it comes to IT spending in 2007 -- and vendors will delve deeper into SaaS to reach them. Continue Reading
-
December 11, 2006
11Dec2006
News
Hot Skills: Make the web development world your oyster with Perl
Perl is an easy-to-learn language for just about everything Continue Reading
-
December 11, 2006
11Dec2006
In Depth
Storage Decisions Session Downloads: Engineering Track (LV 2006)
Managers need to engineer the most flexible and complete storage network. This track looks at SAN and NAS issues, distance demands, remote offices and how to build out systems. Continue Reading
-
December 11, 2006
11Dec2006
News
SIP desktop phone blends functionality, style
VoIP desktop phones are no longer the clunky hunks of plastic that take up space on your desk. Siemens yesterday launched a new family of SIP phones that are as slick as they are functional. Continue Reading
-
December 11, 2006
11Dec2006
News
Integration aids fight against fraud
Credit rating agency Experian has increased fraud detection rates by 20% after integrating two previously separate hosted applications. Continue Reading
-
December 11, 2006
11Dec2006
News
“Staggering” rise in cybercrime threat, warns McAfee
The threat to business from cybercrime is increasing at a “staggering rate” as organised criminals groom a new generation of hackers, security experts have warned. Continue Reading
-
December 11, 2006
11Dec2006
News
Rowanmoor Pensions taps all-in-one computing environment
Pension scheme provider Rowanmoor Pensions has signed a three-year contract with ADS Portal to supply a complete computing environment for the company. Continue Reading
-
December 11, 2006
11Dec2006
News
Finance teams need to kick the spreadsheet habit
Finance departments’ dependence on moth-eaten technology to manage their budgeting, forecasting and reporting is damaging their business performance. Continue Reading
-
December 10, 2006
10Dec2006
News
Zantaz buys data classification partner Singlecast
Email archiving player Zantaz has purchased data classification startup Singlecast, which can categorise and apply policies to data before an email takes up storage space. Continue Reading
-
December 10, 2006
10Dec2006
In Depth
Storage Decisions Session Downloads (NYC 2006)
Take a look at the sessions that floored at the Storage Decisions conference in New York City, September 27-29, 2006. Continue Reading
-
December 10, 2006
10Dec2006
News
Does technology kill jobs?
The Big Question is an initiative between Computer Weekly and recruitment consultancy PSD. Each week we put the Big Question to top IT professionals to get their take on a current talking point. Continue Reading
-
December 10, 2006
10Dec2006
News
Inside the numbers: Messaging (in)security
In August, SearchSecurity.com surveyed 250 IT pros from a variety of industries about messaging security programs. Here are some of the questions we asked and their responses. Continue Reading
-
December 10, 2006
10Dec2006
News
Messaging insecurity fuels data leakage fears
Special Report: The proliferation of messaging technology means more opportunity for malware to take root and sensitive data to be lifted. Continue Reading
-
December 10, 2006
10Dec2006
News
Microsoft suffers third zero-day in a week
A second zero-day flaw in Word has been uncovered, Microsoft said Sunday. It's the software giant's third zero-day in a week. Continue Reading
-
December 10, 2006
10Dec2006
News
Hitachi, BlueArc announce OEM partnership
What had been rumored to be an acquisition has turned out to be an OEM deal, but HDS has also made an investment in BlueArc, indicating an acquisition could be the next step. Continue Reading
-
December 10, 2006
10Dec2006
News
Storage Decisions in the wild, wild west
Dedupe, iSCSI, backup, virtualisation and cowboys in Stetson hats -- Storage Decisions Las Vegas 2006 had it all. Continue Reading
-
December 10, 2006
10Dec2006
News
Windows Vista security settings
Microsoft's Windows Vista is here. Here, Current Analysis senior analyst Andrew Braunberg discusses what network admins need to know about tightening up Vista security. Continue Reading
-
December 09, 2006
09Dec2006
News
Storage IQ: Key technologies for 2006
We keep a close eye on what technologies our readers are most interested in. Here are the year's 25 most commonly searched terms. Do you know them all? Continue Reading
-
December 07, 2006
07Dec2006
In Depth
Zero-day tracker a hit, but IT shops need better strategy
This week in Security Blog Log: Reaction to eEye's new zero-day tracker is positive, but some experts say it won't help unless IT shops have a layered defense to start with. Continue Reading
-
December 07, 2006
07Dec2006
News
Dell, Microsoft tout joint NAS product
The new NX1950 product is vastly more expensive than its counterparts from HP and NetApp, but it scales higher, supports clusters and has redundant controllers. Continue Reading
-
December 07, 2006
07Dec2006
News
Building smarter networks [Day Three]
In the third and last part of Ian Yates's interview with Dimension Data's Paul Wilkinson, the pair consider how to implement gigabit and ten gigabit ethernet. Continue Reading
-
December 07, 2006
07Dec2006
News
NAS management software specifications
Network attached storage (NAS) appliances and gateways must be configured and managed using NAS management software that allows administrators to allocate space, manage RAID and storage behaviors, perform routine maintenance, and other tasks. ... Continue Reading
-
December 06, 2006
06Dec2006
News
Microsoft to fix Visual Studio, Windows flaws
Microsoft plans to release five security updates to address vulnerabilities in Windows and a flaw in Visual Studio as part of its monthly security bulletin release cycle. Continue Reading
-
December 06, 2006
06Dec2006
News
Zero-day flaw found in Windows Media Player
Attackers could exploit a new zero-day flaw in Windows Media Player to cause a denial of service or launch malicious code. The threat is Microsoft's second zero-day flaw in a week. Continue Reading
-
December 06, 2006
06Dec2006
In Depth
MySpace, YouTube successes open door to Web 2.0 dangers
Web 2.0, and Ajax in particular, are introducing new threats to life on the Web. Many people are rushing to add interactive features to their Web applications using Ajax, but as columnist Mike Cobb explains, security has often been overlooked. Continue Reading