April 2014
-
April 22, 2014
22
Apr'14
Cyber attacks move to cloud with increased adoption, report shows
Cyber attacks are migrating to the cloud with increased adoption, a report reveals. Continue Reading
-
April 22, 2014
22
Apr'14
UK finance firms to face planned hacking
Finance firms in the UK could be attacked by ethical hackers on behalf of financial services regulators to identify weaknesses in cyber security Continue Reading
-
April 22, 2014
22
Apr'14
Microsoft invests in next-gen energy technologies to power datacentres
Microsoft is investing in next-generation energy technologies such as microturbines and distributed generation for datacentre power Continue Reading
-
April 22, 2014
22
Apr'14
Surviving the post Heartbleed Cyber Security Skills Crunch
An obvious "solution" is therefore to offer apprenticeship contracts to those you wish to retain or redeploy, to fill the gaps in their knowledge, as well as to new recurits, and then volunteer to ... Continue Reading
-
April 22, 2014
22
Apr'14
Adapting to life after Heartbleed
In this week’s Computer Weekly, we investigate the most significant flaw in recent history to impact the internet. The Heartbleed bug in OpenSSL leaves millions of internet servers vulnerable to attack. Hackers have already exploited Heartbleed to ... Continue Reading
-
April 22, 2014
22
Apr'14
Disaster recovery is vital in software-defined datacentre era
Jon Toigo argues against virtualisation advocates that say the software-defined datacentre, with its high availability and clustering, does away with the need for disaster recovery Continue Reading
-
April 22, 2014
22
Apr'14
Women in tech learn how to make the web work for them
Women in tech gather at Somerset house to learn digital skills and how to create their own part of the web Continue Reading
-
April 22, 2014
22
Apr'14
Talent shortage is threatening growth of London’s technology sector
A shortage of talent and immigration legislation has been blamed for hampering technology growth in London Continue Reading
-
April 22, 2014
22
Apr'14
New iOS malware highlights threat to Apple mobile devices
New malware is stealing Apple ID credentials from jailbroken iPhones and iPads, warn security researchers Continue Reading
-
April 21, 2014
21
Apr'14
The pros and cons of WAN optimisation
For many businesses, WAN optimisation can provide significant performance improvements, but projects can prove to be costly and complex. Continue Reading
-
April 21, 2014
21
Apr'14
Open source carrots, broccoli, celery, kale & coffee pods
open source extends way beyond the boundaries that you may initially denote to the movement Continue Reading
-
April 20, 2014
20
Apr'14
The Electronic Pearl Harbour gets a step closer
As I expected we keep finding more and more security vulnerabilities in devices that shouldn't have them: essential control systems that govern the safety of critical infrastructure. The latest ... Continue Reading
-
April 20, 2014
20
Apr'14
Security: From Theoretical Business Enabler to Essential Overhead
Dropped through my door last week was the flyer advertising Infosecurity Europe 2014. The theme is "Security as a business enabler - are you fit for 2014?" It is an unfortunate choice of words, ... Continue Reading
-
April 17, 2014
17
Apr'14
It's crucial we inspire women to consider a career in the industry
The FDM everywoman in Technology Awards are a celebration of the contribution that women make to technology and more broadly the role they play in business. Recently I was honoured to have been ... Continue Reading
-
April 17, 2014
17
Apr'14
Profit lures London councils into IT sales venture
Two London councils have embarked on a scheme to sell IT services for profit after concluding their cost-saving backoffice merger could grab them a big slice of the £144bn local government ... Continue Reading
-
April 17, 2014
17
Apr'14
Computer Weekly networking case studies
Jennifer Scott and Steve Evans discover what made the winning entries stand out from the crowd in the 2014 Computer Weekly European Awards for networking. Continue Reading
-
April 17, 2014
17
Apr'14
Collaborative conversation in the post-email enterprise
Email is no longer an effective means of collaboration and some companies have even banned it - but what is the alternative? Continue Reading
-
April 17, 2014
17
Apr'14
Dell skips smartphones to focus on convergence
With the smartphone industry grinding to a halt,Dell has chosen to take the software avenue rather than trying to push into the smartphone space. Continue Reading
-
April 17, 2014
17
Apr'14
IBM hardware struggles, with first quarter earnings a fifth lower than last year
IBM reports 21% drop in first quarter revenue as it continues to "take actions to transform parts of the business" Continue Reading
-
April 17, 2014
17
Apr'14
Datacentre lessons learnt from Heartbleed bug
The Heartbleed bug, an OpenSSL flaw affecting millions of websites, has some lessons for datacentre providers and operators Continue Reading