February 2009
-
February 11, 2009
11
Feb'09
Lack of best practise means cloud computing introduces new risks for users, providers
Melbourne IT says the results of its cloud computing beta show would-be users – and would-be providers – have a lot to learn about cloud computing, virtualisation and cloud-driven business processes before utility computing delivers. Continue Reading
-
February 11, 2009
11
Feb'09
iSCSI vs. Fiber Channel for your first SAN
Learn the differences between iSCSI and FIber channel and how the choice will impact the performance and capabilities of your first SAN. Continue Reading
-
February 10, 2009
10
Feb'09
How to make sure your network is ready for unified comms
Learn how to ensure your network is ready for multiple voice and video streams to deliver a great unified comms experience. Continue Reading
-
February 10, 2009
10
Feb'09
Social network sites sign EU cyberbully deal
Google, YouTube, Facebook and MySpace are among 17 social networking sites to sign a European Commission deal to prevent cyber-bullying and protect the privacy of users under 18. Continue Reading
-
February 10, 2009
10
Feb'09
Do you use Twitter? Do you want to use it?
Do you use Twitter? Continue Reading
-
February 10, 2009
10
Feb'09
ComputerWeekly's calendar of IT industry events
ComputerWeekly's calendar of IT industry events Continue Reading
-
February 10, 2009
10
Feb'09
Office 2007 Deployment: The Main Script Part 5
In this installment learn how to get round installing Office Customisations without having to manually allow it to proceed. Continue Reading
-
February 10, 2009
10
Feb'09
Satyam chief faces cost cutting dilemma
The newly appointed CEO at troubled Indian IT supplier Satyam faces a dilemma when planning how to cut costs. Continue Reading
-
February 10, 2009
10
Feb'09
Mexican mobile users to be fingerprinted in crime crackdown
Mobile phone users in Mexico are to be fingerprinted as part of a plan to crack down on crime. Continue Reading
-
February 10, 2009
10
Feb'09
Obama orders review of cyber security
T he US president has ordered a 60-day review of federal cyber security to establish what is being done to protect vital U S military systems. U S intelligence... Continue Reading
-
February 10, 2009
10
Feb'09
Limiting staff web use delivers big savings
CIOs could save themselves a lot of money by limiting recreational use of corporate networks by staff.
An international survey of more than 1,000 CIOs...
Continue Reading -
February 10, 2009
10
Feb'09
January brings yet more growth for online shopping
Online sales increased another 19% in January as the internet continues to encroach on the high street's traditional turf.
January was a surprisingly...
Continue Reading -
February 10, 2009
10
Feb'09
Intel plans new smartphone chips
Intel intends making a new push to crack the mobile chip market for smartphones.
Intel is targeting the likes of the Apple iPhone, the BlackBerry and...
Continue Reading -
February 10, 2009
10
Feb'09
Top 20 online tools for mobile working
More and more workers are taking to mobile working, either through choice or circumstance. As a result, knowing where to get the best free or low-cost web and mobile tools is essential. Continue Reading
-
February 10, 2009
10
Feb'09
Wireless and web firms attract venture capitalists
Investment in internet and wireless services firms grew by 66% in 2008. The year saw the most money invested by high tech venture capitalists since 2001. Continue Reading
-
February 10, 2009
10
Feb'09
Interview: Satyam CEO speaks to Computer Weekly
AS Murty took over as CEO at troubled Indian IT supplier Satyam. Despite a 15-year career at the company, nothing could have prepared him for his new role. Continue Reading
-
February 10, 2009
10
Feb'09
Can you hack a set top box ?
Is it possible for hackers to tap into your set top box ? Computer Weekly reader Jeremy Jones thinks so. Jeremy has sent us a video showing some bizarre subtitles that have appeared on his ... Continue Reading
-
February 10, 2009
10
Feb'09
How to beat the recession using underutilised technology
What are we missing? What’s been overlooked? History shows that exploiting underutilised technology is a way of getting out of trouble. Continue Reading
-
February 10, 2009
10
Feb'09
Twitter for business: How to make it work for your business
There’s been an awful lot of hype surrounding Twitter recently – celebs spending their days telling tales of fellow celebrities, and people posting pictures of snowmen during the recent bad weather in the UK. Continue Reading
-
February 10, 2009
10
Feb'09
What's in a number?
I was amused to read about the latest estimates of the number of intelligent alien civilisations, recently reported in the International Journal of Astrobiology. Apparently the discovery of more ... Continue Reading