In Depth
In Depth
IT for manufacturing
-
How the supply chain is handling Covid-19
Cost-cutting habits have left supply chains chasing their tails in the wake of the pandemic. We take a look at how they’re coping Continue Reading
-
Auditing for algorithmic discrimination
Despite the abundance of decision-making algorithms with social impacts, many companies are not conducting specific audits for bias and discrimination that can help mitigate their potentially negative consequences Continue Reading
-
Constructing the future for engineering – finding the right model where one size does not fit all
Design and engineering has rapidly evolved to be all about interconnected devices. We see how one of the leading manufacturing software suppliers is meeting the challenge Continue Reading
-
Top 10 storage deployment stories of 2019
Here are ComputerWeekly’s top 10 storage deployment stories for 2019, which see quite a move away from traditional SAN and NAS to hyper-converged, software-defined storage and object storage Continue Reading
-
Figeac Aero manages growth with DataCore software-defined storage
Global roll-out sees DataCore software-defined storage deployed on Huawei hardware to HQ and 14 worldwide sites as aero parts maker copes with acquisition and expansion Continue Reading
-
How to mitigate IoT security risks to tap business benefits
Security concerns are preventing many businesses from adopting IoT-based technologies, but with a bit of planning, the business benefits can be realised by mitigating the risk Continue Reading
-
Private 5G networks: Are they the right choice for you?
The concept of dedicated private mobile networks for large enterprises is not a new one, but with the advent of ultrafast 5G networks, they are starting to attract more interest Continue Reading
-
What 5G applications will transform your business?
The UK’s mobile network operators have started work on their 5G roll-outs, but what applications are most likely to gain enterprise traction for the new standard? Continue Reading
-
Securing your mobile estate – best practice for CIOs
The prevalence of mobile devices in every part of daily life is shaping how enterprises make choices about software and network infrastructure, but how do businesses go about securing these vast new endpoint estates? Continue Reading
-
How to get the basics of mobile device management right the first time
When adopting mobile device management, there are often fears around implementation and whether or not the strategy is even required Continue Reading
-
Exploring UCaaS: The main benefits for enterprises
Getting unified communications-as-a-service right can mean more agility, higher productivity, and cost control Continue Reading
-
Disaster planning: How to expect the unexpected
Focusing too much on specific disasters rather than considering an organisation’s data protection, network security and process requirements, can lead to unpredicted vulnerabilities Continue Reading
-
AI storage: Machine learning, deep learning and storage needs
Artificial intelligence workloads impact storage, with NVMe flash needed for GPU processing at the highest levels of performance – and there are other choices right through the AI data lifecycle Continue Reading
-
Skills, digital and the manufacturing sector
Manufacturing still accounts for a large amount of the UK economy, and when it comes to the fourth industrial revolution, the UK has aspirations to be a world leader – but does it have the digital know-how to back it up? Continue Reading
-
Debugging bug bounty programmes
Bug bounty programmes have recently become a popular method of vulnerability management, but poor programme management can lead to development teams becoming overwhelmed and bugs being missed Continue Reading
-
Mobile phones and health: is 5G being rolled out too fast?
European countries are rolling out 5G mobile communications at breakneck speed as they seek to gain a competitive edge over the US and Asia. But some scientists have raised questions about the effects of 5G mobile phone radiation on public health ... Continue Reading
-
How botnets pose a threat to the IoT ecosystem
While connected devices are transforming our personal and working lives in a multitude of ways, they are also a growing security risk – attackers are hijacking these devices and turning them into internet of things botnets Continue Reading
-
What are the CDN options for enterprises?
We look at how content delivery networks can give your organisation’s web presence a literal edge Continue Reading
-
The rise of DevSecOps
The increasing complexity of security threats facing enterprises is leading to DevSecOps approaches, which combine operations and development with security, so that all business units are involved in security operations Continue Reading
-
Securing the SD-WAN: The next network challenge
Every time an enterprise weighs up whether or not to try SD-WAN, security is an essential part of the picture Continue Reading
-
Intelligent automation and the WAN: Is SD-WAN moving mainstream?
Take-up of software-defined networking in corporates is slower than expected. Where have we reached on the journey to software-controlled networks – and SD-WAN in particular – becoming the norm? Continue Reading
-
What are the current SD-WAN options for enterprises?
Software-defined wide area networking is well on its way to being a multi-billion dollar market. We assess the current state of the market and look at some of the options for enterprise CIOs and network managers Continue Reading
-
Employers turn to wearable technology to help staff manage work-life balance
Companies are realising that there are sound business reasons for ensuring their employees get enough sleep and exercise, so they are turning to wearable technology to help their staff stay healthy, despite the pressures of work Continue Reading
-
Servitisation: What it is and how it can transform companies
The idea that every product-based company needs to put service first is a radical shift in how businesses organise themselves. Is it more than rhetoric? Continue Reading
-
Matching disaster recovery to cyber threats
While it is important to take steps to prevent cyber attacks, they can still happen. That is why disaster recovery practices are equally critical Continue Reading
-
Cyber crime: why business should report it as soon as possible
Cyber crime is affecting a growing number of businesses, yet few are reporting it. Computer Weekly lifts the veil on cyber crime reporting, looking at the who, what, when, where, how and why Continue Reading
-
Manufacturers, technology and the fourth industrial revolution
A look at some of the innovations and technology investment focus areas for today’s manufacturing industry Continue Reading
-
Need for speed: designing a modern campus LAN
Just like datacentres before them, campus LANs are increasingly being defined by virtualisation and software-based controls. Next to this shift, the hardware also continues to improve as network owners look to keep pace with user demand Continue Reading
-
WD-40 oils sales and finance processes in Europe with Epicor
WD-40 has automated its business processes with Epicor ERP, finding the system’s service-oriented architecture good for providing flexibility in the company’s business growth Continue Reading
-
How artificial intelligence is fuelling engine maintenance innovation at Rolls-Royce
The engine maker has established an innovation centre to enable the company to deliver analytics and artificial intelligence-powered services to airlines using Rolls-Royce engines Continue Reading
-
Application and device security under the spotlight
The security of internet-connected devices and associated applications has become a significant concern, prompting suggestions legislation may be required, while the UK government’s recent Secure by Design review suggests several solutions, ... Continue Reading
-
GDPR: An overview of the latest data protection legislation
The forthcoming General Data Protection Regulation (GDPR) will have wide-ranging implications for every organisation that processes personal data. This comprehensive overview tells you what you need to know Continue Reading
-
Software-defined networking: gathering momentum in the enterprise?
Suppliers are pushing the benefits of software-defined networking harder than ever, and enterprises are starting to take the plunge rather than remaining on the sidelines Continue Reading
-
Network security in the digital transformation era
Network security has always been a core focus for CISOs and IT security managers, but in an era of digital transformation, we examine if network security strategies are keeping up with new and emerging cyber threats Continue Reading
-
Network security in the age of the internet of things
Wireless devices and smart technologies are increasingly being brought into the workplace, and pose a growing risk to company data Continue Reading
-
Businesses need to take cryptojacking seriously
Organisations must pay attention to cyber criminals hijacking computing resources to mine cryptocurrencies, because nearly half are affected and the impact is greater than many realise Continue Reading
-
Brexit uncertainty dominates UK’s digital conversation
Uncertainty over the impact of Brexit dominated conversations at TechUK’s second annual Supercharging the Digital Economy event. Can technology really lessen the impact? Continue Reading
-
Digital twins: Revolutionising product businesses
Among the technological drivers in industrial firms are IoT platforms that implement the concept of a digital twin. We explore the benefits Continue Reading
-
Where the device hits the network – a mobile device management update
As business becomes increasingly mobile, we look at the latest trends in mobile device management to give businesses the edge Continue Reading
-
Formula 1: Mercedes team turns to big data in quest for victory in Grand Prix
Data analytics could help Mercedes-AMG Petronas Motorsport team gain an edge on rival Ferrari during the 2017 and 2018 Grand Prix season. Its head of IT, Matt Harris, reveals the team’s plans Continue Reading
-
Can fixed wireless access fix business connectivity problems?
Fixed wireless access is being touted as a panacea for poor network connectivity, but is it a viable solution, and what are the benefits for businesses? Continue Reading
-
How to use threat intelligence in your business
Threat intelligence can be very handy, but just how useful and appropriate it will be depends largely on the security maturity of an organisation Continue Reading
-
GDPR: One year to compliance and opportunity
With a year to go before all companies dealing with European Union citizens’ data have to comply with new EU data protection rules, the focus for many is on compliance, but some believe business should be the top priority Continue Reading
-
Cloud, AI and security driving network monitoring industry
We explore the latest developments and trends in enterprise network monitoring and management Continue Reading
-
How to implement a low-power WAN to support the IoT
We explore the options and the implementation process for an LPWAN to support internet of things projects in the enterprise Continue Reading
-
Enterprise wireless: trends and developments in 2017
What will be the main developments in wireless this year and what challenges will this bring to enterprises? Continue Reading
-
Blockchain starts to prove its value outside of finance
Technology behind bitcoin is being adopted in supply chains, power networks and even to support independent musicians Continue Reading
-
At IBM’s Watson lab, customers marry the power of AI with the IoT
IBM formally inaugurated its Watson Internet of Things headquarters in Munich, Germany in February, and Computer Weekly went to meet the customers and partners who are using Watson AI to deliver on the promise of the IoT Continue Reading
-
Cloud contracts are still a minefield
Cloud computing is maturing in the enterprise space, but the contracts that underpin cloud services have not evolved at the same pace Continue Reading
-
Saab CIO Mats Hultin says be open, flexible and agile – or die
Saab CIO Mats Hultin is directing the Swedish defence company’s IT function globally to be streamlined and standardised, but open and flexible for a future that includes the internet of things Continue Reading
-
Self-driving cars could be steered towards business use cases
The real value of autonomous vehicles could lie in industrial applications. We take a test drive around Milton Keynes to find out Continue Reading
-
Cutting the cable: why industry is turning to wireless
Wireless networking technology is heading out of the office and the living room, and on to the factory floor. We explore the trend Continue Reading
-
European law enforcement seeking smart ways to fight cyber crime
Cyber crime continues to increase in volume and sophistication, but European law enforcement is fighting back, using collaboration and industry partnerships to compensate for a lack of resources Continue Reading
-
CW@50: A history of IT outsourcing
Computer Weekly looks at where and when IT outsourcing was invented and considers the changes the sector has gone through since Continue Reading
-
Europe fires starting gun for dash to GDPR compliance
A last dash for compliance with the general data protection regulation (GDPR) has begun across Europe and, despite the two-year warning, some organisations will fall short and for UK firms Brexit is no excuse Continue Reading
-
Growing possibilities for 3D printing
As 3D printing disrupts business and technology mandates, CIOs can gain new relevance as business enablers Continue Reading
-
How 3D printing will disrupt industry worldwide
The technology is helping startups model prototypes and inventory suppliers lop millions from supply chain costs Continue Reading
-
Interview: How John Deere uses connectivity to make farms more efficient
After pioneering the use of automated vehicle technology 15 years ago, farm equipment supplier John Deere is now going further, with its sights set on efficiency and sustainability, says sales VP Christoph Wigger Continue Reading
-
UK immigration rules fly in the face of cyber security skills shortage
Despite the UK’s shortage of cyber security skills, recent changes to immigration rules make it no less difficult to hire skilled workers from outside the European Union Continue Reading
-
How CIOs can raise their 'IT clock speed' as pressure to innovate grows
CIOs are facing pressure from the board to roll out IT projects increasingly quickly. How can they do that without running unacceptable risks? This article, based on cutting-edge research among leading businesses, offers some answers Continue Reading
-
CW500: Are you human or are you machine?
As more things become internet-connected, systems designed to authenticate people now need to deal with machine-to-machine authentication Continue Reading
-
Case study: Philips takes agile approach to building bridges between business and IT
Dutch technology giant talks up the success of its attempts to embrace agile IT delivery methods, and how it's shaping future customer engagements Continue Reading
-
Why Pegasystems' CEO, Alan Trefler, has learned to think smaller
Pegasystems has made its name supplying CRM, analytics and case management software to the world's largest companies. Now CEO Alan Trefler plans to use cloud computing to broaden Pega's appeal Continue Reading
-
Waste and traffic management apps come from internet of things
For years, the fridge has been the poster boy for the internet of things, but lack of commercial availability raises questions about the future Continue Reading
-
How building information modelling is changing the construction industry
The Cabinet Office says that by 2016, “collaborative 3D building information modelling will be required on all government projects” Continue Reading
-
Virtual reality comes of age in manufacturing
Will there be virtual reality headsets in the living room by the end of 2015? Perhaps not, but Ford and BAE Sytems are putting virtual reality to work Continue Reading
-
Economy, jobs and technology trends on CIOs' minds in 2015
CIOs gathered at the first CW500 meeting of 2015 to discuss the economy, the technologies driving business and good IT leadership Continue Reading
-
Two resolutions every IT leader should make in 2015
Rather than waiting for somebody to take over IT, why not aim to do something different that gets you noticed Continue Reading
-
A guide to smart home automation
Unless it is a new build, the challenge in creating a smart home is that technology must work irrespective of the age of the property Continue Reading
-
The digital CIO: Making the business case for digital technology
When trying to win backing for digital technology, IT leaders would be wise to focus on benefits, not costs Continue Reading
-
Supplier profile: Workday
Computer Weekly analyses the strengths and weaknesses of the rapidly growing cloud HR and finance software company, Workday Continue Reading
-
Essential tips for your first 100 days as an IT leader
IT leadership coach and martial arts teacher James Knight offers six tips on the critical first 100 days in an IT leadership role Continue Reading
-
Target data breach: Why UK business needs to pay attention
Late last year, US retailer Target was hit by one of the biggest data breaches in the industry's history. So what happened and why is it relevant to UK businesses? Continue Reading
-
Where next for the new EU data protection regulation?
For many people in business, the proposed new EU data protection regulation has become obscured by a storm of controversy Continue Reading
-
The digital CIO: How digital technology will change the role of IT leaders
We have now reached the point where corporate IT as we know it will succeed or fail Continue Reading
-
Hacktivism: good or evil?
IT lawyer Dai Davis looks at the rise of hacktivism and its impact on business and international politics Continue Reading
-
Is privacy undermining trade in digital services?
BSA report highlights dangers facing European Union (EU) nations as the European Commission (EC) revises its Data Protection Regulation Continue Reading
-
No IPv6 explosion, but a ticking bomb
IPv6 could be a ticking security time bomb in Belgium if businesses fail to respond to the fact that adoption is gaining momentum fast Continue Reading
-
Collaboration is key in enterprise security puzzle
Collaboration is key to security, cyber security professionals told attendees of Trend Micro’s customer event in London Continue Reading
-
Cyber insurance: Understanding the legal language
CROs worried about cyber risk are increasingly turning to cyber insurance to offset risk. But is the cover as black and white as it first seems? Continue Reading
-
An introduction to cyber liability insurance cover
Cyber liability insurance cover has been around for 10 years, but most security professionals seem to have not heard of it or know that it exists Continue Reading
-
Aston Martin: High-tech design for iconic cars
We visit the Aston Martin factory to find out how the luxury car maker is embracing technology across the business Continue Reading
-
All quiet on the Wi-Fi security front
The last high-profile Wi-Fi data breach was the assault on the TJX retail group in 2007, but that doesn't mean there is no risk Continue Reading
-
How to create a good information security policy
Information security policies provide vital support to security professionals, yet few organisations take the time to create decent policies Continue Reading
-
How to tackle big data from a security point of view
Before leaping into big data, companies must be clear what they are trying to achieve, otherwise their investment will be wasted Continue Reading
-
Standards key to realising the benefits of connectivity
A network of smart appliances could revolutionise energy efficiency but suppliers must agree on common specifications. Continue Reading
-
How to find the most vulnerable systems on your internal network
Most corporate networks share common vulnerabilities, but many could be mitigated with education in “hacker thinking” for technical staff Continue Reading
-
Social media: A security challenge and opportunity
Generation Y workers are posing increasing security challenges to their employers as they share data unreservedly Continue Reading
-
How 3D printing impacts manufacturing
With the ability to create on-demand specialist tools, any initial investment in 3D printing technology could quickly pay for itself. Continue Reading
-
GE uses big data to power machine services business
GE, one of the UK's largest manufacturers, is using big data analytics with data generated from machine sensors to predict maintenance needs Continue Reading
-
Business priorities: what to protect, monitor and test
How information security professionals can prioritise what to protect, monitor and test in the light of current budget and resource constraints Continue Reading
-
How to manage the security of cloud implementations
Tips for organisations adopting cloud computing on how to ensure that they secure data in line with the expectations of all stakeholders Continue Reading
-
CW500 Club in 2012
Computer Weekly's CW500 Club attracts the top IT leaders in the UK to talk to their peers about the topical challenges they face Continue Reading
-
How to preserve forensic evidence in the golden hour after a breach
There is a golden hour at the outset where a clear head and good planning can make or break any subsequent forensic investigation Continue Reading
-
CIOs debate the future of the datacentre
IT leaders met at a roundtable event hosted by Computer Weekly in association with Oracle to discuss the future of the datacentre Continue Reading
-
How to secure Macs in the enterprise
Apple computers are becoming increasingly used in the enterprise - we look at how to securely introduce Macs in the corporate network Continue Reading
-
M2M technology ushers in the age of total connection
Machine-to-machine (M2M) communications is transforming the world into one where everything and everyone is networked. Continue Reading
-
Tune Raid performance to get the most from your HDDs
Tune Raid performance at the storage controller to match application I/O demands to optimal hard drive (HDD) performance Continue Reading
-
How to make your business Flame-proof
Advanced threats such as Flame can show CIOs what cyber attack tools of the future could look like Continue Reading
-
Is cloud data storage right for your organisation?
Find out if cloud data storage is a serious option for you with this evaluation of its suitability for primary, nearline, backup and archive data Continue Reading