May 2011
-
May 26, 2011
26
May'11
UK legal profession cetain of uncertainties of Indian data protection law
The Indian Data protection law, which was introduced last month, has created uncertainty in the outsourcing sector and clarification is needed on a rule that could create a burdensome business ... Continue Reading
-
May 26, 2011
26
May'11
Chrome OS not as secure as it looks, says Trend Micro
Google's Chrome operating system is not as secure at it might look at first glance, says Rik Ferguson, director of security research at Trend Micro. Continue Reading
-
May 26, 2011
26
May'11
Microsoft launches online Marketplace app store
Microsoft is to launch an online version of its Windows Phone mobile application store, Marketplace. Continue Reading
-
May 26, 2011
26
May'11
Data warehouse and business intelligence projects fail to meet companies' requirements
Over half of businesses gave their business intelligence and data warehouse projects a rating of "average" when asked how well they met business objectives. Continue Reading
-
May 26, 2011
26
May'11
EC privacy law demands companies gain consent for cookies from today
From today, UK and other European companies face internet privacy law that bans the way most identify and track regular online customers. Continue Reading
-
May 26, 2011
26
May'11
Twinfield offers mileage accounting on iPhone
Online accounting services provider Twinfield has created an iPhone application that will enable users to automatically record time and mileage. Available as a free download from the Apple AppStore, the app uses global positioning to track mileage. Continue Reading
-
May 26, 2011
26
May'11
Hope for Mckinnon, but has anything changed?
This is a bit off my beaten track as it has nothing to do with outsourcing, but as Computer Weekly has followed the case of Pentagon hacker Gary Mckinnon so closely I thought it worth writing about ... Continue Reading
-
May 26, 2011
26
May'11
Cross-site scripting attack on Hotmail highlights personal e-mail risk to business
A vulnerability in the Hotmail site has enabled hackers to steal an unknown number of messages from users' accounts, according to security firm Trend Micro. Continue Reading
-
May 26, 2011
26
May'11
Analytical tools for measuring customer sentiment
Businesses often use a set of multiple-choice questions to gather customers' views on the company, yet the most interesting customer feedback generally appears in free text form. How can businesses analyse this data? Continue Reading
-
May 26, 2011
26
May'11
Marks & Spencer makes progress on the web
Following the adoption of a sharper focus on the web over the past 12 months, sales at Marks & Spencer's online operation M&S Direct increased by 31% during the year to 17 April, the retailer said in its annual results. Continue Reading
-
May 26, 2011
26
May'11
The cookies monster: How to deal with the new cookies law
From 26 May 2011, the law concerning the use of cookies and similar technologies for storing information on a user's computer equipment is changing. Henrietta Neate looks at what the new law says and what you will need to do to ensure that you ... Continue Reading
-
May 26, 2011
26
May'11
The Lorenz SZ42 encryption machine
-
May 26, 2011
26
May'11
Radio receivers for message interception
-
May 26, 2011
26
May'11
The Heath Robinson
-
May 26, 2011
26
May'11
The Heath Robinson machine
-
May 26, 2011
26
May'11
The computers that won the war: Bletchley Park's codebreaking equipment is rebuilt
The Tunny Gallery, opened at The National Museum of Computing at Bletchley Park on 26 May 2011, tells the incredible story of the interception and decryption of German High Command radio teleprinter messages during World War Two. Continue Reading
-
May 26, 2011
26
May'11
The preparation of message tapes using a Perforator
-
May 26, 2011
26
May'11
The Tunny machine
-
May 26, 2011
26
May'11
Tunny in action - 2
-
May 26, 2011
26
May'11
Tunny in Action - 1