• May 31, 2013 31 May'13

    Beware: WordPress alert

    Although WordPress is considered a mature platform, regular updates address serious security vulnerabilities that may be used by an attacker targeting a WordPress site.  Continue Reading

  • May 31, 2013 31 May'13

    Computer Weekly Buyer's Guide to asset management

    IT departments need information on what assets they have, where they are, who is using them, the services they support, what they cost and how they are configured. They must also be able to ascertain whether the business is compliant, the value the ...  Continue Reading

  • May 31, 2013 31 May'13

    Computer Weekly Buyer's Guide to mobile device management

    The trend for consumerisation and employees using their own devices for work comes as concerns over data security mount. In this 11-page buyer’s guide, Computer Weekly examines how to formulate a strategic policy for mobile device management (MDM) ...  Continue Reading






  • How do I size a UPS unit?

    Your data center UPS sizing needs are dependent on a variety of factors. Develop configurations and determine the estimated UPS ...

  • How to enhance FTP server security

    If you still use FTP servers in your organization, use IP address whitelists, login restrictions and data encryption -- and just ...

  • 3 ways to approach cloud bursting

    With different cloud bursting techniques and tools from Amazon, Zerto, VMware and Oracle, admins can bolster cloud connections ...