In Depth
In Depth
IT for consulting and business services
-
Top five ways backup can protect against ransomware
Ransomware threatens to put your data beyond reach, so the best way to prepare is to have good-quality data you can restore from backup. We look at the key things to consider Continue Reading
-
Auditing for algorithmic discrimination
Despite the abundance of decision-making algorithms with social impacts, many companies are not conducting specific audits for bias and discrimination that can help mitigate their potentially negative consequences Continue Reading
-
How Oxeva delivered budget analytics with Pure Storage flash NAS
Web hosting provider Oxeva thought the consultants were mistaken and that what suited the web giants for analytics/big data wasn’t necessarily what was needed for enterprise customers Continue Reading
-
Top 10 storage deployment stories of 2019
Here are ComputerWeekly’s top 10 storage deployment stories for 2019, which see quite a move away from traditional SAN and NAS to hyper-converged, software-defined storage and object storage Continue Reading
-
Cutting the cord: Negotiating cloud contracts with problematic customers
How accountable should cloud firms be for the actions of the customers that use their platforms, and how much thought should they give to aligning themselves with problematic brands before hosting them? Continue Reading
-
What 5G applications will transform your business?
The UK’s mobile network operators have started work on their 5G roll-outs, but what applications are most likely to gain enterprise traction for the new standard? Continue Reading
-
Securing your mobile estate – best practice for CIOs
The prevalence of mobile devices in every part of daily life is shaping how enterprises make choices about software and network infrastructure, but how do businesses go about securing these vast new endpoint estates? Continue Reading
-
How to get the basics of mobile device management right the first time
When adopting mobile device management, there are often fears around implementation and whether or not the strategy is even required Continue Reading
-
Exploring UCaaS: The main benefits for enterprises
Getting unified communications-as-a-service right can mean more agility, higher productivity, and cost control Continue Reading
-
Mobile phones and health: is 5G being rolled out too fast?
European countries are rolling out 5G mobile communications at breakneck speed as they seek to gain a competitive edge over the US and Asia. But some scientists have raised questions about the effects of 5G mobile phone radiation on public health ... Continue Reading
-
What are the CDN options for enterprises?
We look at how content delivery networks can give your organisation’s web presence a literal edge Continue Reading
-
Securing the SD-WAN: The next network challenge
Every time an enterprise weighs up whether or not to try SD-WAN, security is an essential part of the picture Continue Reading
-
Intelligent automation and the WAN: Is SD-WAN moving mainstream?
Take-up of software-defined networking in corporates is slower than expected. Where have we reached on the journey to software-controlled networks – and SD-WAN in particular – becoming the norm? Continue Reading
-
What are the current SD-WAN options for enterprises?
Software-defined wide area networking is well on its way to being a multi-billion dollar market. We assess the current state of the market and look at some of the options for enterprise CIOs and network managers Continue Reading
-
Employers turn to wearable technology to help staff manage work-life balance
Companies are realising that there are sound business reasons for ensuring their employees get enough sleep and exercise, so they are turning to wearable technology to help their staff stay healthy, despite the pressures of work Continue Reading
-
Need for speed: designing a modern campus LAN
Just like datacentres before them, campus LANs are increasingly being defined by virtualisation and software-based controls. Next to this shift, the hardware also continues to improve as network owners look to keep pace with user demand Continue Reading
-
GDPR: An overview of the latest data protection legislation
The forthcoming General Data Protection Regulation (GDPR) will have wide-ranging implications for every organisation that processes personal data. This comprehensive overview tells you what you need to know Continue Reading
-
Software-defined networking: gathering momentum in the enterprise?
Suppliers are pushing the benefits of software-defined networking harder than ever, and enterprises are starting to take the plunge rather than remaining on the sidelines Continue Reading
-
How AI will underpin cyber security in the next few years
Cyber security risks are growing in complexity and volume, but artificial intelligence techniques can help businesses track and fight them in real time Continue Reading
-
Hard work, big prize: Bristol is shaping what it means to be a smart city
Two-and-a-half years after the ambitious Bristol is Open smart city project launched, we return to the West Country to explore how things are progressing, and find out what has been learned Continue Reading
-
Brexit uncertainty dominates UK’s digital conversation
Uncertainty over the impact of Brexit dominated conversations at TechUK’s second annual Supercharging the Digital Economy event. Can technology really lessen the impact? Continue Reading
-
Where the device hits the network – a mobile device management update
As business becomes increasingly mobile, we look at the latest trends in mobile device management to give businesses the edge Continue Reading
-
Can fixed wireless access fix business connectivity problems?
Fixed wireless access is being touted as a panacea for poor network connectivity, but is it a viable solution, and what are the benefits for businesses? Continue Reading
-
Cloud, AI and security driving network monitoring industry
We explore the latest developments and trends in enterprise network monitoring and management Continue Reading
-
How to implement a low-power WAN to support the IoT
We explore the options and the implementation process for an LPWAN to support internet of things projects in the enterprise Continue Reading
-
Enterprise wireless: trends and developments in 2017
What will be the main developments in wireless this year and what challenges will this bring to enterprises? Continue Reading
-
AI automation starts to transform legal profession
Artificial intelligence and automation are making inroads into legal work, but are more likely to support than displace lawyers and will draw IT more into legal service delivery Continue Reading
-
At IBM’s Watson lab, customers marry the power of AI with the IoT
IBM formally inaugurated its Watson Internet of Things headquarters in Munich, Germany in February, and Computer Weekly went to meet the customers and partners who are using Watson AI to deliver on the promise of the IoT Continue Reading
-
Cloud contracts are still a minefield
Cloud computing is maturing in the enterprise space, but the contracts that underpin cloud services have not evolved at the same pace Continue Reading
-
CW@50: A history of IT outsourcing
Computer Weekly looks at where and when IT outsourcing was invented and considers the changes the sector has gone through since Continue Reading
-
Overcoming the scale-up challenge of enterprise DevOps adoption
CIOs and IT leaders share their advice on what enterprises can do to accelerate the spread of DevOps within their organisations Continue Reading
-
Europe fires starting gun for dash to GDPR compliance
A last dash for compliance with the general data protection regulation (GDPR) has begun across Europe and, despite the two-year warning, some organisations will fall short and for UK firms Brexit is no excuse Continue Reading
-
What the EU’s new data protection laws mean for UK industry
The General Data Protection Regulation, which will come into force on 25 May 2018, could have a big impact on any company in the world that deals with the personal data of EU citizens Continue Reading
-
How CIOs can raise their 'IT clock speed' as pressure to innovate grows
CIOs are facing pressure from the board to roll out IT projects increasingly quickly. How can they do that without running unacceptable risks? This article, based on cutting-edge research among leading businesses, offers some answers Continue Reading
-
Economy, jobs and technology trends on CIOs' minds in 2015
CIOs gathered at the first CW500 meeting of 2015 to discuss the economy, the technologies driving business and good IT leadership Continue Reading
-
IBM India staff reductions are sign of shift in outsourcing sector
Talk of IBM reducing its India-based workforce by 50,000 is a reflection of the diminishing importance of low-cost operatives Continue Reading
-
The digital CIO: Making the business case for digital technology
When trying to win backing for digital technology, IT leaders would be wise to focus on benefits, not costs Continue Reading
-
Supplier profile: Workday
Computer Weekly analyses the strengths and weaknesses of the rapidly growing cloud HR and finance software company, Workday Continue Reading
-
Essential tips for your first 100 days as an IT leader
IT leadership coach and martial arts teacher James Knight offers six tips on the critical first 100 days in an IT leadership role Continue Reading
-
Target data breach: Why UK business needs to pay attention
Late last year, US retailer Target was hit by one of the biggest data breaches in the industry's history. So what happened and why is it relevant to UK businesses? Continue Reading
-
Where next for the new EU data protection regulation?
For many people in business, the proposed new EU data protection regulation has become obscured by a storm of controversy Continue Reading
-
The digital CIO: How digital technology will change the role of IT leaders
We have now reached the point where corporate IT as we know it will succeed or fail Continue Reading
-
Hacktivism: good or evil?
IT lawyer Dai Davis looks at the rise of hacktivism and its impact on business and international politics Continue Reading
-
Is privacy undermining trade in digital services?
BSA report highlights dangers facing European Union (EU) nations as the European Commission (EC) revises its Data Protection Regulation Continue Reading
-
No IPv6 explosion, but a ticking bomb
IPv6 could be a ticking security time bomb in Belgium if businesses fail to respond to the fact that adoption is gaining momentum fast Continue Reading
-
The perfect storm comes to talent management
It is one of the most important areas of business, but talent management has been largely ignored by the IT industry – until now Continue Reading
-
Collaboration is key in enterprise security puzzle
Collaboration is key to security, cyber security professionals told attendees of Trend Micro’s customer event in London Continue Reading
-
Cyber insurance: Understanding the legal language
CROs worried about cyber risk are increasingly turning to cyber insurance to offset risk. But is the cover as black and white as it first seems? Continue Reading
-
An introduction to cyber liability insurance cover
Cyber liability insurance cover has been around for 10 years, but most security professionals seem to have not heard of it or know that it exists Continue Reading
-
Find out what the customer wants and deliver it effectively
Consumers want to be able to buy something on their smartphones, without having to turn on a PC. If they have a happy and efficient experience, strong loyalty will result – and they might tell others via social media Continue Reading
-
All quiet on the Wi-Fi security front
The last high-profile Wi-Fi data breach was the assault on the TJX retail group in 2007, but that doesn't mean there is no risk Continue Reading
-
‘Owning the datacentre does not make sense for CIOs any more’
Lance Fisher, CIO of SThree, says the datacentre is a commodity and the problem of making it cost-effective, reliable and scalable is for vendors Continue Reading
-
Cloud gold rush: Is it all just supplier noise?
IT providers are unveiling cloud services at lightning speed and are launching robust price wars. But are enterprise customers equally gung-ho in adoption? Continue Reading
-
How to create a good information security policy
Information security policies provide vital support to security professionals, yet few organisations take the time to create decent policies Continue Reading
-
How to tackle big data from a security point of view
Before leaping into big data, companies must be clear what they are trying to achieve, otherwise their investment will be wasted Continue Reading
-
How to find the most vulnerable systems on your internal network
Most corporate networks share common vulnerabilities, but many could be mitigated with education in “hacker thinking” for technical staff Continue Reading
-
Social media: A security challenge and opportunity
Generation Y workers are posing increasing security challenges to their employers as they share data unreservedly Continue Reading
-
Consult experts to get the most out of a SaaS roll-out
Businesses often lack in-house expertise and services providers can help them with the project planning, design and up-to-date practices. Continue Reading
-
Business priorities: what to protect, monitor and test
How information security professionals can prioritise what to protect, monitor and test in the light of current budget and resource constraints Continue Reading
-
How to manage the security of cloud implementations
Tips for organisations adopting cloud computing on how to ensure that they secure data in line with the expectations of all stakeholders Continue Reading
-
How to preserve forensic evidence in the golden hour after a breach
There is a golden hour at the outset where a clear head and good planning can make or break any subsequent forensic investigation Continue Reading
-
How to secure Macs in the enterprise
Apple computers are becoming increasingly used in the enterprise - we look at how to securely introduce Macs in the corporate network Continue Reading
-
Tune Raid performance to get the most from your HDDs
Tune Raid performance at the storage controller to match application I/O demands to optimal hard drive (HDD) performance Continue Reading
-
How to make your business Flame-proof
Advanced threats such as Flame can show CIOs what cyber attack tools of the future could look like Continue Reading
-
Is cloud data storage right for your organisation?
Find out if cloud data storage is a serious option for you with this evaluation of its suitability for primary, nearline, backup and archive data Continue Reading
-
Setting up a botnet is easier than you think
Acquiring, installing, configuring and using a powerful data-stealing banking Trojan toolkit is not as difficult as it sounds Continue Reading
-
Compliance, risk and the coming EU data protection framework: a CISO's perspective
Compliance and risk managers in Europe are facing one of the biggest challenges for decades as the region moves to a new data protection framework Continue Reading
-
Mandatory carbon reporting: Indirect emissions guidelines for IT managers
As the UK government announces mandatory carbon reporting for listed companies, how are IT managers to interpret guidelines on indirect emissions? Continue Reading
-
How to formulate an effective smartphone security policy
The mobile revolution offers new ways of working, but what are the challenges and how can they be overcome? Continue Reading
-
Security Think Tank: What is the most important nut for infosec to crack in 2012?
What is the most important nut for infosec to crack in 2012? Continue Reading
-
Security Think Tank: Managing security in the cloud
With cloud computing, as with data breaches, it is a question of “when” not “if”, so what practical steps can information security professionals take to manage security compliance in the cloud? Continue Reading
-
UKtech50: Meet the 50 most influential people in UK IT
Computer Weekly has announced the final listing for the second annual UKtech50, the definitive list of the real movers and shakers in UK IT. Continue Reading
-
Information security superheroes: are we overlooking the obvious?
In these dark days of professional, organised cyber crime and state-sponsored cyber espionage, the world of business is looking for a cyber superhero to save the day. But in the quest for a cyber superhero, business is failing, Lois Lane-like, to ... Continue Reading
-
Case study: Law firm uses RES Automation Manager to migrate users to Windows 7
Law firm Kennedys is using RES Automation Manager to migrate users from Windows XP to Windows 7. The company has over 900 people across the UK and provides specialist legal services for insurance, healthcare, construction, employment, rail, maritime... Continue Reading