April 2014
-
April 14, 2014
14
Apr'14
Businesses lack skills for change management projects
Change management projects are on the rise, but businesses lack employees with relevant tech and business skills Continue Reading
-
April 14, 2014
14
Apr'14
Businesses are beginning to adopt context-based security
It is more than 10 years since context-aware security was proposed. We look at how the technology has evolved. Continue Reading
-
April 14, 2014
14
Apr'14
Women in London Tech Group driving benefits of a diverse workforce
Women in London Tech Group, part of Tech London Advocates, drives message of diversity in the workforce Continue Reading
-
April 14, 2014
14
Apr'14
Telco firm cuts incident response time by 80%
US telco IDT has reduced its incident response time by 80% through integration, consolidation and automation Continue Reading
-
April 14, 2014
14
Apr'14
Employers more likely to take on young people with work experience
Young candidates with Traineeship experience are more likely to gain job roles, according to ICM Research Continue Reading
-
April 14, 2014
14
Apr'14
Fearless women in IT setting their own tone on the startup scene
Females are turning to tech startups as a career route, according to FDM everywoman woman of the year Torie Chilcott Continue Reading
-
April 14, 2014
14
Apr'14
Government pledges to reduce digital divide by 25%
The government has launched a Digital Inclusion Strategy to reduce the number of offline people in the UK by 25% Continue Reading
-
April 14, 2014
14
Apr'14
Heartbleed denial reveals loophole for NSA spying
The NSA has denied it exploited the Heartbleed security flaw, but US officials have revealed a loophole that would allow such actions Continue Reading
-
April 14, 2014
14
Apr'14
Are retailers using data analytics to their advantage?
Computer Weekly looks at the challenges the retail sector faces in taking advantage of data analysis Continue Reading
-
April 13, 2014
13
Apr'14
System Software Spend - Top Spending Industry Sectors
Public administration organisations are the top spenders on system software with a commitment approaching £600m. Next in line are telecommunication companies with an expenditure of over £400m. ... Continue Reading
-
April 13, 2014
13
Apr'14
Male or female we're all here to get the job done
This is a guest blog by Sheree Atcheson founder of Women Who Code UK (Belfast and London). Continue Reading
-
April 12, 2014
12
Apr'14
Opening Box to open source
Opening Box to open source Continue Reading
-
April 11, 2014
11
Apr'14
Nordics lead initiative to share European patient records data
The Nordic countries have played a leading role in epSOS, an EU project to establish infrastructure for patient records data exchanges Continue Reading
-
April 11, 2014
11
Apr'14
Co-op Bank plans to 'fix the fundamentals' and invest in IT
The Co-operative Bank intends to invest in IT systems following a troubled year Continue Reading
-
April 11, 2014
11
Apr'14
IT Priorities 2014 Special Report
Computer Weekly editors draw on their expertise to explain the main technology trends for IT in the UK and across Europe in 2014. Continue Reading
-
April 11, 2014
11
Apr'14
Detecting the use of TrueCrypt
This article in our Royal Holloway Information Security series looks at the clues that can point digital forensics investigators to evidence of TrueCrypt data encryption. Continue Reading
-
April 11, 2014
11
Apr'14
Secure internet routing
This article in our Royal Holloway Information Security series assesses whether Resource Public Key Infrastructure can provide a framework for effective security. Continue Reading
-
April 11, 2014
11
Apr'14
Undercover economist Tim Harford decries data visualisation dazzle
The Undercover Economist author says 200 years of statistical science should not be cast aside for the blandishments of ‘big data’ propagandists Continue Reading
-
April 11, 2014
11
Apr'14
Encryption in the cloud
This article in our Royal Holloway Information Security series assesses challenges of providing effective encryption to data stored in the cloud. Continue Reading
-
April 11, 2014
11
Apr'14
The future of digital forensics
This article in our Royal Holloway Information Security series looks at the challenges investigators face when tackling the complexities of full disk encryption. Continue Reading