In Depth
In Depth
Enterprise software
-
Windows XP end of support: What to do next
CIOs may not wish to carry on running a 12-year-old desktop OS, but thousands of incompatible applications leave many with no choice Continue Reading
-
The history of OpenFlow
Computer Weekly takes a look back at the beginnings of the software-defined networking protocol and the technology behind it Continue Reading
-
Process big data at speed
Low-cost solid state memory is powering high-speed analytics of big data streaming from social network feeds and the industrial internet. Continue Reading
-
How 3D printing impacts manufacturing
With the ability to create on-demand specialist tools, any initial investment in 3D printing technology could quickly pay for itself. Continue Reading
-
Online gambling sector bets on business intelligence
Online gambling and gaming industries crave structured business data. Volumes can be huge and they need to react to customer behaviour Continue Reading
-
GE uses big data to power machine services business
GE, one of the UK's largest manufacturers, is using big data analytics with data generated from machine sensors to predict maintenance needs Continue Reading
-
The limitations of traditional SaaS integration approaches
Time and budget constraints are forcing many organisations to rethink their integration strategy and find a well-aligned solution Continue Reading
-
How to integrate SaaS with your local business systems
As software as a service matures, CIOs need to look at how well cloud-based products integrate with existing on-premise systems Continue Reading
-
Amazon: Gold standard of the cloud?
Amazon Web Services is the benchmark for cloud in the enterprise but can it handle the challenge of federated cloud services? Continue Reading
-
How to secure Macs in the enterprise
Apple computers are becoming increasingly used in the enterprise - we look at how to securely introduce Macs in the corporate network Continue Reading
-
How to gather BI dashboard user requirements to nail business strategy alignment
Many analytical systems -- data warehouses, business intelligence systems -- fail because user requirements are not collected properly Continue Reading
-
Software-defined datacentres demystified
As datacentre managers increasingly rely on software and automation, what can a software-defined datacentre bring to the enterprise? Continue Reading
-
CW500: Managing the mobile workforce (part 1)
Mobile working has transformed Colt Telecommunications beyond recognition over the past three years Continue Reading
-
How to manage unstructured data for business benefit
The cloud offers some progress in the resource-sapping management of unstructured data, but it is critical to work back from the business case. Continue Reading
-
Gathering retail intelligence
Learning their customers’ habits through business intelligence is vital for bricks-and-mortar retailers to stay competitive Continue Reading
-
Outsourcing IT services: goals and negotiations
Tactical and strategic negotiations are important to businesses of all sizes, from SMEs to the largest enterprises Continue Reading
-
How to make sense of the big data universe
Analysing big data can be a daunting prospect, so find out what you need, where it is and how to deal with it Continue Reading
-
Data virtualisation on rise as ETL alternative for data integration
The Phone House and Novartis have turned to data virtualisation from Denodo and Composite to gain a single logical view of disparate data sources. Continue Reading
-
How technology is changing BPO
Karl Flinders discovers how IT has become central to the provision of outsourced business processes Continue Reading
-
Making money from data: Financial business intelligence at work
Finance professionals are heavy users of BI and predictive analytics software. Find out how a variety of European finance functionaries are analysing trends, cutting costs and finding new business. Continue Reading
-
Blade servers: How to decide on Unix or Linux
If you’re contemplating Unix or Linux for your blade server, or a migration from one to the other, in this guide you will find everything you need to make up your mind. Useful Unix and Linux command lines also included. Continue Reading
-
When X.509 security certificates fail, servers break
Why are X.509 certificates causing computers to stop dead? Continue Reading
-
Interview: From Apollo Mission to agility manifesto
One of the 17 original authors of the agile manifesto was Jim Highsmith who, after a previous tenure at NASA, now works as an executive consultant at ThoughtWorks. Continue Reading
-
Case study: Nokia rethinks HR with web portal
Mobile phone manufacturer Nokia has reduced its HR costs by between 20% to 30% after rolling out a web-based HR portal for its 60,000 employees. Continue Reading
-
CIO interview: Tony Prestedge, COO, Nationwide
Tony Prestedge took over as COO at Nationwide in 2010, mid-way through a five-year transformation project. He tells Karl Flinders how the company is transforming its business through a £1bn investment in technology, how the IT department changed ... Continue Reading
-
CIO interview: Martin Davies, head of technology at Bet365
The success story of £5.4bn-per-year online gambling company Bet365 is nothing to do with luck and everything to do with technology. Continue Reading
-
RightNow: Oracle and next-generation CRM
In his opening keynote presentation at the RightNow Summit 2011 in Newport, Greg Gianforte, RightNow founder and chief executive officer, presented his view of device-aware CRM. Continue Reading
-
How the financial services sector uses big data analytics to predict client behaviour
The financial services sector has gone through unprecedented change in the last few years. Customers are expecting a more personalised service from their banks. Regulators have reacted to the credit crunch with significant changes to regulation with... Continue Reading
-
What is big data and how can it be used to gain competitive advantage?
Cliff Saran discovers how big data can deliver big business benefits without excessive IT investment Continue Reading
-
Case study: How a small business can benefit from SaaS
Professional beauty products distributor SweetSquared considers using Microsoft Office 365 alongside browser-based SaaS. Continue Reading
-
Clarion Events Extends the Life of its System i and JD Edwards environment with Magic Software
Clarion Events is one of the UK's leading exhibition and event organisers. For over 30 years Clarion Events has been creating and developing stimulating and effective exhibitions, conferences and seated events in the UK, EMEA, Asia and America. ... Continue Reading
-
Case study: Bell Canada rings up big revenues with Infor CRM
Bell Mobility, a division of Bell Canada Enterprises, implemented an Infor customer relationship management solution, Interaction Advisor, and worked with Infor to transform Bell Mobility’s two call centers - with a combined 550 customer service ... Continue Reading
-
The cloud computing revolution
Hewlett-Packard has become the latest supplier of many to sound the death knell on the IT department. Continue Reading
-
The CERN laboratory and the Big Bang theory – Essential Guide
We answer 10 frequently asked questions about the CERN laboratory and Big Bang theory Continue Reading
-
Facing up to security perils of outbound traffic
What about the threat from within and, more specifically, the security issues that arise from outbound traffic risks? Continue Reading
-
Chinook helicopter disaster - computer software failure or pilot error?
Chinook helicopter crash: was it computer software failure or a cause we'll never know? This article gives the background to the Chinook helicopter disaster with links to all the relevant articles published by ComputerWeekly and other useful web ... Continue Reading
-
How to select a storage capacity planning tool
To select a storage management and capacity planning tool, first calculate how much storage is available and how much of your total storage capacity is actually being used. Continue Reading
-
How data deduplication works
Chapter one of our data deduplication handbook takes you under the hood to show how data deduplication works so you can maximise the efficiency of this data reduction technology. Continue Reading
-
Vanderbilt hospital fights archive growth with grid
Vanderbilt University Medical Centre simplifies document management using Bycast's archiving grid system. Continue Reading
-
Checklist for purchasing hardware-based encryption
Encryption appliances sit inline on a network and use specially designed electronics to encrypt data at line speeds, essentially eliminating the performance penalty imposed by encryption software running on a general server. While software-based ... Continue Reading
-
CRM strategies for SMBs
Keeping your customers happy is job number one. With CRM software, luckily, that job becomes a lot easier. Here we present our top five CRM tips for SMBs. Continue Reading
-
Open source strategies for SMBs
One way to make the most of a tight budget is to invest in open source technologies. Not only are they generally more secure than most off-the-shelf proprietary products, they're usually free too. Here we present our top five open source tips for ... Continue Reading
-
IP PBX eases VoIP transition for gas company
An IP PBX with Sip helped one gas company upgrade to a new phone system while also jumping into VoIP. Continue Reading
-
How to select the right IP PBX
Selecting the right IP PBX system for your company can be complicated. Here are some important things to consider when purchasing an IP PBX. Continue Reading
-
Storage session downloads: infrastructure track
This track looks at San and Nas issues, virtualization, distance demands, remote offices and how to build out systems. Continue Reading
-
Open communications vs. closed communications
Open communications are key to making the inevitable multimodal, multi-supplier communication environment work, so why aren't more suppliers providing open-source systems? Continue Reading
-
Understanding VoWLAN
Like VoIP, VoWLAN contributes to cost efficiency. Because calls can be routed over the data network internally or over the Internet externally, mobile telephony costs can be eliminated or decreased significantly. In the long term, VoWLAN deployment ... Continue Reading
-
SaaS apps being deployed by business units, not IT
When it comes to deploying applications via SaaS, IT is still behind the curve. What's preventing IT from getting control over the programs business units want? Continue Reading
-
Experts: IDS is here to stay
IDS technology has survived predictions that it would be replaced by IPS. One expert says it will remain a separate product while IPS is folded into firewalls. Continue Reading
-
Backup reporting expands to add capacity planning
Aptare adds capacity planning for primary data storage to its product line, joining Symantec in recent attempts to broaden the appeal of reporting software. Continue Reading
-
Firewall deployment options increase for enterprises
With a growing number firewall configuration options, companies need to spend more time and put more effort into determining how to design and deploy firewalls. Continue Reading
-
VoIP models and services: Complete guide
With clear, concise explanations of existing VoIP business models and deployment methodologies, this guide will enable you to weigh the pros and cons of each based on your needs. Continue Reading
-
How to cheat at VoIP Security
Securing a VoIP infrastructure requires planning, analysis, and detailed knowledge about the specifics of the implementation you choose to use. Continue Reading
-
Does compliance make encryption always necessary?
Many organisations look to encryption to protect sensitive data. Yet hundreds of millions of people who use the Internet also use encryption, yet most of them don't even know it. Continue Reading
-
ISO 27001 could bridge the regulatory divide, expert says
Karen Worstell, former CISO at Microsoft and AT&T Wireless, now on the advisory board of Neupart A/S, explains how ISO 27001 can be used to help companies comply with a variety of regulations and standards Continue Reading
-
Inside MSRC: Microsoft Server flaw should be given high priority
An Active Directory flaw in Windows 2000 server and Windows Server 2003 should be given high priority, according to Christopher Budd of the Microsoft Security Response Center (MSRC). Continue Reading
-
Data migration product specifications
Part of the Tiered Storage Buying guide focusing on product specifications for data migration tools. Continue Reading
-
State agency tiers records storage with Compellent
The South Carolina attorney general's office estimates it will save thousands by storing millions of paper records in digital format using Compellent's automated tiered storage. Continue Reading
-
IBM chief engineer talks green storage
IBM engineer Clod Barrera discusses the growing energy crisis in storage, the need for better power efficiency metrics and the future for "green" products. Continue Reading
-
Storage Decisions Downloads: Executives' storage guide
Ideas of where firms' storage should be and where it's headed. Also key ways to integrate new technologies, processes and ideas without going over budget. Continue Reading
-
Prevent network hacks with secure Web browsing
Hackers can penetrate your network in almost unlimited ways these days, and that includes through your Web browser. Learn how to improve Web browser security and keep these hackers out of your network. Continue Reading
-
Big Microsoft Vista concerns for Big Pharma
The second installment of an ongoing series examining the challenges of deploying Windows Vista and the considerations that go into the decision to roll out the new OS. Continue Reading
-
Is a merger or acquisition in Sourcefire's future?
Sourcefire founder and Chief Technology Officer Martin Roesch, talks about how Sourcefire fits into Security 3.0 theme and how the firm may be involved in a future merger or acquisition. Continue Reading
-
Why hacking contests, 'month-of' projects don't help
Ivan Arce, chief technology officer of Core Security Technologies explains why he thinks hacking contests and public vulnerability disclosure projects do little to improve IT security. Continue Reading
-
Web applications tangle security researchers, attract attackers
Web application security researchers are finding that some of their work could land them on the wrong side of the law. As a result, Web applications are more vulnerable to attack. Continue Reading
-
The Art of Software Security Testing
Identifying software security flaws including the proper methods for examining file formats. Continue Reading
-
Data retrieval strategies: Document management software overview
The role of document management software in data storage and how it can mitigate risk for the enterprise. Continue Reading
-
Deploying VoIP: Five things every CIO should know
Navigating the complexity of a VoIP deployment can be overwhelming and it may seem like you need a technical degree to understand it. Here are five tips to help steer through the fog of a VoIP migration. Continue Reading
-
When Microsoft Vista and VPNs don't mix
Papa Gino's is ahead of many companies in deploying Windows Vista, thanks to its involvement in the Microsoft TAP program. But VPN compatibility has been a sticking point. Continue Reading
-
Admins run into trouble with Microsoft updates
A DNS service failure and an ongoing WSUS glitch are among this month's frustrations as IT administrators try to deploy the latest security patches from Microsoft. Continue Reading
-
Network access control learning guide
From PDAs to insecure wireless modems, users have myriad options for connecting to -- and infecting -- the network. Created in partnership with our sister site SearchSecurity.com, this guide offers tips and expert advice on network access control. ... Continue Reading
-
Microsoft should scrap Patch Tuesday
Instead of leaving flaws unpatched for weeks between cycles, Microsoft should use its resources to produce high-quality patches shortly after vulnerabilities are discovered. Continue Reading
-
ISCSI TCP/IP TOE card specifications
Key specifications for a cross-section of popular iSCSI TOE cards. Continue Reading
-
4 Gbit Fibre Channel switch purchase considerations
As SANs scale up, data centres often upgrade and expand the SAN switch infrastructure. Here's what to look for when scaling Continue Reading
-
The trouble with Google hacking techniques
Some IT security professionals say the threat posed by Google hacking techniques is overblown and that companies can easily avoid it with a layered security program. One skeptical expert is Ira Winkler, founder of the Internet Security Advisors ... Continue Reading
-
IP storage switch and router specifications
Key specifications for a cross section of popular IP storage switch and router products. Continue Reading
-
Storage consolidation: WAN acceleration and WAFS technology overview
One important avenue of storage consolidation is the consolidation of remote office storage; this is where WAN acceleration and WAFS technology comes into play. Continue Reading
-
Storage consolidation: SRM tools overview
SRM tools are an important part of storage consolidation. They allow admins to monitor the storage environment, allocate and organise available storage, and offer insights into future trends. Continue Reading
-
IP storage switch and router purchase considerations
The choice of an IP switch or router demands careful consideration of issues including port speed, segmentation, interoperability and security Continue Reading
-
Inside MSRC: Windows Vista security update explained
Microsoft's Christopher Budd details the first Windows Vista security updates. Continue Reading
-
When disaster recovery and data classification collide
Attendees at a disaster recovery seminar discussed the complex application dependencies when disaster recovery and data classification combine. Continue Reading
-
Will data breach be the end of TJX?
This week in Security Blog Log: Industry experts say companies can learn from a data breach and even prosper from it. But is TJX following the right example? Continue Reading
-
IT pros eye Windows Server 2003 SP2 with caution
Despite its security and stability enhancements, IT pros say they are in no rush to deploy Windows Server 2003 SP2 Continue Reading
-
VoiceCon Spring: A transition show for the VoIP industry
VoiceCon Spring was all about unified communications. Zeus Kerravala provides highlights of the more interesting points from the show. Continue Reading
-
Symantec threat report under the microscope
This week in Security Blog Log: Infosec professionals dissect Symantec's latest threat report and express a range of views in the blogosphere. Continue Reading
-
Web 2.0 tools of the trade
As Web 2.0 technologies become more popular, IT professionals are answering questions from business units on how it can be used. Continue Reading
-
Measuring Vista's true security muscle will take time
Researchers are digging through the Windows Vista code right now, and when they find flaws we'll hear about it. But it's the ones we don't hear about that should keep us up at night. Continue Reading
-
Mobile data services development trends in 2007
Darrell Jordan-Smith takes a look at new data services architectures and development tools emerging in 2007 and the ongoing development efforts of the Java Community and others. Continue Reading
-
Is RAID outdated?
I would suggest that perhaps it is time for us to retire RAID in its current form. Continue Reading
-
RFID dispute: Vendors still hostile toward full disclosure
Many vendors still believe that security by obscurity is still the best policy and make it a priority to silence vulnerability researchers. Continue Reading
-
PING with Mark Odiorne
Mark Odiorne, CISO at Scottish Re, provides insights on pen testing procedures, prioritising security for senior management and keeping compliant. Continue Reading
-
Microsoft takes a blogosphere beating over Vista UAC
This week in Security Blog Log: Industry experts take Microsoft to task over a "very severe hole" in the design of Vista's User Account Controls (UAC) feature. Continue Reading
-
Flaws haunt Symantec, IBM, Cisco and IE
Bug Briefs: Security holes plague Symantec Norton products, IBM DB2; Mozilla Firefox; Trend Micro ServerProtect; Cisco IP phones; Google Desktop; IE and Snort. Continue Reading
-
Data breach: If customers don't act, data will remain at risk
To make enterprises take data security seriously, customers must take control of their personally identifiable information and stop handing it out to businesses. Continue Reading
-
Questions fly as EMC Retrospect fades
All signs point to the end of life for EMC's Retrospect backup software for small businesses. Sources say the company cannot support an SMB software channel. Continue Reading
-
Inside MSRC: Microsoft explains security bulletins
Microsoft issued 12 new security bulletins in February. Christopher Budd of the Microsoft Security Response Center provides information about the most important fixes. Continue Reading
-
New security vendors take on sophisticated attackers
IT Security vendors are developing technologies that show promise in preventing unknown attacks and protecting machines with zero-day vulnerabilities. Continue Reading
-
Vendors: Cut the hype, truth is what sells
Storage virtualisation technologies have been purchased and implemented successfully for years. The rest of the IT infrastructure must try to catch up and, ultimately, the only thing not virtualised within the datacentre will be the last guy ... Continue Reading
-
TJX breach: There's no excuse to skip data encryption
Companies complain that database encryption products are too expensive and difficult to manage, but customer loss and breach notification costs outweigh encryption expenses. Continue Reading
-
EqualLogic CEO says IPO on the way
EqualLogic's CEO talks about the company's plans to go public, its intent to add 10 GigE to its products and why he thinks not all iSCSI products are created equal. Continue Reading