In Depth
In Depth
IT management
-
Ransomware and backup: Overcoming the challenges
Ransomware attacks that exfiltrate data don’t nullify the value of backups to restore from, but the challenges – such as not restoring corrupted data – require careful planning Continue Reading
-
Retailers choose from menu of mobile apps to help reduce food waste
Supermarkets, convenience stores and coffee shops are among the retailers connecting with mobile apps and tech firms to drive down the wastage of food Continue Reading
-
Cyber insurance: Tips for keeping the right level of cover
Transferring risk to an insurer doesn’t mean you are risk-free – so what is not included in your cyber insurance cover? Continue Reading
-
Accountability in algorithmic injustice
Computer Weekly looks at the growing number of injustices involving algorithms and automated decision-making, and what can be done to hold governments and companies accountable for the failures of computer systems they deploy Continue Reading
-
Cyber insurance: What does a CISO need to know?
We look at how the market for cyber insurance is evolving and how IT security chiefs can avoid buying the wrong level of cover Continue Reading
-
File, block and object: Storage fundamentals in the cloud era
We look at the three basic ways that storage accesses data – via file, block and object – as well as the ways in which the rise of the cloud and distributed systems have brought changes to them Continue Reading
-
Tech sector efforts to root out forced labour are failing
Digitally mapping supply chains to identify forced labour and slavery is no longer a technology problem for the IT sector, but a lack of government enforcement and corporate inaction are major barriers to effective change Continue Reading
-
Backup maintenance: Five key points to consider
Effective backups need to ensure all data is protected, and to track media and software changes. We look at five key things to consider Continue Reading
-
CEA-Leti and the Silicon Valleys of Grenoble, France
At the intersection of three valleys in the French Alps lies the city of Grenoble, a hotbed of microelectronics, where much of the innovation is fuelled by CEA-Leti Continue Reading
-
The cyber security impact of Operation Russia by Anonymous
The campaign against the Russian government by Anonymous surprised many with the depth and scale of the cyber attacks. What can we learn from this online war? Continue Reading
-
Secure everything, not just the weakest link
The rise in cyber attacks on supply chains has expanded the role of IT security chiefs and the complexity of keeping organisations secure Continue Reading
-
Global file systems: Hybrid cloud and follow-the-sun access
We look at global distributed file systems that put enterprise data under a single file access namespace so that enterprises and branch offices can get to data from anywhere Continue Reading
-
What the world can learn from Saudi Arabia’s fight against industrial control system attacks
Iran learned from attacks on its infrastructure and unleashed similar malware on Saudi Arabia. The world has now gained valuable lessons from the Saudi response Continue Reading
-
Challenges of securing a software supply chain
The US president has issued an executive order to improve cyber security, which has ramifications across the software development supply chain Continue Reading
-
Data gravity: What is it and how to manage it
Data gravity can attract increasing amounts of data, and brings with it onerous management overheads. We look at how to mitigate data gravity in datacentre and cloud Continue Reading
-
What the EU’s content-filtering rules could mean for UK tech
EU proposals to clamp down on child sexual abuse material will have a material impact on the UK’s technology sector Continue Reading
-
Cloud-to-cloud backup: When native cloud protection is not enough
There is a certain amount of protection built into cloud services, but it has its limits and full data protection requires that cloud data is secured with cloud-to-cloud backup Continue Reading
-
Swedish entrepreneurs capture the world’s attention with eye-tracking technology
A growing number of killer apps are driving the uptake of eye-tracking systems – and Sweden is positioned to play a leading role Continue Reading
-
IT departments need holistic circular economies to fight climate change
With sustainability moving up the boardroom agenda, IT managers should revamp procurement strategies to align with the principles of the circular economy, but what does this mean for managing the IT lifecycle? Continue Reading
-
Attack of the clones: the rise of identity theft on social media
The proliferation of social media has resulted in the rise of identity theft on these platforms, with accounts copied for fraudulent or malicious purposes. What can be done to mitigate it? Continue Reading
-
Macs in the enterprise – what you need to know
A guide to managing Apple Mac hardware and operating systems in the enterprise Continue Reading
-
Tech companies join UK four-day work week trial
Computer Weekly speaks with tech companies taking part in the UK’s upcoming four-day work week trial, which will measure the impact of shorter working weeks on productivity, wellbeing and the environment Continue Reading
-
The limits and risks of backup as ransomware protection
Backups can provide a sound means of recovery from ransomware infection, but they are not 100% certain to foil attackers. We look at the limits and risks of depending on backups Continue Reading
-
How to retain cyber talent in the Great Resignation
The cyber security industry is experiencing alarming rates of resignations, leaving organisations vulnerable to cyber attacks. How can we better retain cyber talent? Continue Reading
-
Disaster recovery is an essential service for EDF with Phenix-IT
EDF has built disaster recovery tracking, planning and testing software on a six-month upgrade cycle based on governance, risk and compliance functionality in Mega’s Hopex platform Continue Reading
-
Next generation of collaboration and communication services
Future comms systems may look and feel rather different from what exists today – we look at the journey for communications services Continue Reading
-
Electric vehicle transition comes with uneven costs
Governments, car makers and tech companies are promoting electric vehicles, but are they considering the uneven social and environmental costs from extracting the critical minerals needed to make batteries? Continue Reading
-
Interview: LF Energy on using open source to ready energy systems for phasing out fossil fuels
With the climate crisis putting increasing pressure on countries to decarbonise their economies, the founder of open source championing LF Energy talks about digitising power networks to be ready for renewables Continue Reading
-
Snapshots vs backup: Use both for optimum RPOs
We look at snapshots and backup, the key difference, their pros and cons and how best to use the two approaches in an integrated data protection strategy for optimal RPO Continue Reading
-
Positive benefits in the new experience economy
While creating a positive employee experience (EX) has been on the agenda of companies for years, the concept – and that of the experience economy in general – has come of age in the Covid-defined working arena Continue Reading
-
Refugee support group works with tech startup on reporting system
Computer Weekly speaks to a refugee support group about its ongoing collaboration with an academic tech startup to develop a digital human rights reporting system for refugees Continue Reading
-
How algorithmic automation could manage workers ethically
Managing workers by algorithm and automated process has generated ethical problems aplenty. Can such means be pressed into the service for a more ethical mode of worker management? We find out Continue Reading
-
Enterprises shore up supply chain resilience with data
Using data to gain better visibility over their supply chains and forge closer connections between disparate links is helping organisations respond to disruptions faster Continue Reading
-
The role of infrastructure as code in edge datacentre computing
As datacentre computing is pushed to the edge of the organisation’s network, IT has to address the overheads associated with remote server management Continue Reading
-
Storage requirements for AI, ML and analytics in 2022
We look at what is needed for artificial intelligence and machine learning, and the pros and cons of block, file and object storage to store and access very large amounts of often unstructured data Continue Reading
-
Snapshots best practice: Five key things you need to know
We look at snapshots best practice, including the way they work, why they are not the same as backups, how to avoid heavy processing overheads and key user permissions tweaks Continue Reading
-
Boots accelerates its digital accessibility journey
Boots is working with website accessibility software provider Recite Me to make its website more user-friendly and improve the customer experience Continue Reading
-
Recruitment risks: Avoiding the dangers of fraudulent candidates
Tech companies are seeing an increase in fraudulent job applications, with associated impacts on risk and cyber security. So how can organisations protect themselves from fraudulent applicants while ensuring they recruit the best talent? Continue Reading
-
Why you need soft skills to excel in your tech career
With deliberate practice you can hone your soft skills, increase the impact of your work and grow your influence in an organisation Continue Reading
-
Cloud ERP: Rise of the industry cloud
There is a new variable in the build or buy debate, and it’s all about the way cloud-based services connect internal and external business processes Continue Reading
-
Storage suppliers put Kubernetes platforms centre stage
How to orchestrate the orchestrator? Storage suppliers’ Kubernetes management platforms aim to meet storage and data protection challenge in containerised application environments Continue Reading
-
How can I avoid an exodus of cyber talent linked to stress and burnout?
Cyber security professionals have played a crucial role during the pandemic, yet many feel like their employers aren’t providing adequate mental health support and have considered quitting their jobs as a result. What can employers do to help them? Continue Reading
-
Ratcheting down the tension in the hybrid world
Employers who reject the trend towards adopting more flexible, hybrid ways of working may struggle with staff retention - and CIOs have more to win or lose than most in a hybrid world Continue Reading
-
Cloud-era disaster recovery planning: Maintenance and continuous improvement
In the final article in this four-part guide to disaster recovery planning, we look at how and when to update, maintain, audit, review and continually improve the DR plan Continue Reading
-
Why post-pandemic reskilling must focus on mainframes
A major contributing factor to UK-wide skills shortages is the significant number of people who have left the workforce since the start of the Covid-19 pandemic Continue Reading
-
Swedish researcher cuts through the hype around autonomous vehicles
Linköping University’s Michael Felsberg makes realistic predictions about when self-driving cars will become available Continue Reading
-
English Channel surveillance used ‘to deter and punish migrants’
Instead of opening safe and legal routes to the UK, the country’s border control ecosystem is deploying surveillance technologies in the English Channel to deter migrant crossings, it is claimed Continue Reading
-
Software firm saves storage array costs with Nutanix hyper-converged
Banking SaaS provider Vialink needed more IOPS when its NetApp arrays slowed up, but Nutanix hyper-converged proved a better package than Pure Storage and Dell EMC, too Continue Reading
-
A plan for technical and security training
An array of options is available to help IT leaders refresh security skills or update tech skills. We look at how to decide what is best Continue Reading
-
Cloud storage cost challenges and how to tackle them
We look at cloud capacity procurement pitfalls, forecasting challenges, the danger of over-buying, supplier lock-in, deciphering billing and resizing capacity when projects finish Continue Reading
-
Define RPO and RTO tiers for storage and data protection strategy
We look at RPO and RTO in defining data protection and disaster recovery strategies and how to specify tiers that reflect the importance of different systems in your organisation Continue Reading
-
How to beat the heat: What can datacentre operators do to meet emissions targets?
With new mandates around sustainability proliferating, datacentres must find ways to meet their environmental goals while remaining competitive and meeting customer service-level expectations Continue Reading
-
Storage and 5G: Big impacts likely as wide-area topologies evolve
Enterprise 5G will boost the need for storage generally. It will also push capacity needs closer to the edge and create new locations for processing and storage Continue Reading
-
It takes a village: Protecting kids online is everyone’s responsibility
The rapid uptake of smartphones among children has contributed to the increasing number of cases of cyber bullying and online grooming. Is this an educational issue or a cultural problem, and can modern enterprise help? Continue Reading
-
Evolving a data integration strategy
Linking IT systems together is never going away, but the approach CIOs adopt is key to ensuring relevant data feeds the decision-making process Continue Reading
-
How Dutch hackers are working to make the internet safe
We hear how the personal mission of a Dutch hacker grew into a serious organisation with international ambitions Continue Reading
-
Posix vs object storage: How much longer for Posix?
We look at Posix compliance in storage and why it is being challenged by object storage and the need to scale much further than Posix-oriented storage was ever intended to Continue Reading
-
Cloud-era disaster recovery planning: Staff training, incident and media management
In the third in a series on cloud-era disaster recovery, we set out the key components of DR staff awareness and training programmes, as well as incident management and dealing with the media Continue Reading
-
Four emerging data integration trends to assess
To accelerate their performance in data integration, companies are evaluating and adopting a range of contributing technologies Continue Reading
-
Finland brings cryostats and other cool things to quantum computing
Not only is Finland the clear leader in refrigeration technology for quantum computers, but it also leads in fundamental research into the underlying quantum information theory Continue Reading
-
What neurodivergent people really think of working in cyber security
Many firms are filling cyber security skills gaps by hiring neurodivergent talent – but more support is needed for neurodivergent cyber security professionals, writes autistic tech journalist Nicholas Fearn Continue Reading
-
Maidstone and Tunbridge Wells NHS Trust advances digital-first strategy
Trust is making progress with its 10-year plan, centred around an electronic patient records system Continue Reading
-
Refrigeration firm freezes legacy backup for one Cohesity cluster
France-based Clauger had reached limits of capacity and complexity with multi-supplier legacy backup, so moved to one Cohesity cluster and gained restores that took mere minutes Continue Reading
-
Navigating PIPL: European businesses plot their next steps into China
How does China’s strict new Personal Information Protection Law impact European businesses? Continue Reading
-
Cloud-era disaster recovery planning: Setting strategy and developing plans
In the second in a series on cloud-era disaster recovery, we look at how to formulate a DR strategy and develop detailed DR plans for your organisation, while taking cloud services into account Continue Reading
-
EDSFF brings built-for-NVMe connectivity to the datacentre
Aimed at enterprise use cases, EDSFF offers incredible flash density in shared storage and hyperscale deployments, but storage products that use it are still thin on the ground Continue Reading
-
How Forensic Architecture uses tech to protect human rights
Forensic Architecture speaks to Computer Weekly about how it uses various digital technologies to investigate human rights abuses around the globe, including the pushback of migrants over the Greek border and the killing of Mark Duggan by London ... Continue Reading
-
Hybrid cloud storage: Options for rearchitecting enterprise IT
Hybrid cloud is seen as a way to have the best of both the on-premise and public cloud worlds. We look at the pros and cons of hybrid cloud storage Continue Reading
-
Cloud-era disaster recovery planning: Assessing risk and business impact
In the first in a series on cloud-era disaster recovery, we provide a step-by-step guide to building firm foundations for the disaster recovery plan, with risk assessment and business impact analysis Continue Reading
-
Finland moves to industrialise quantum computing
For the Finnish government, now is the time to start preparing for the day when quantum computers will have practical value Continue Reading
-
Dispelling the top five myths of modern infrastructure
Modern infrastructure is agile, flexible and scalable. It is at the forefront of every CIO’s digital strategy – and it's everywhere. But with the multitude of choices comes complexity Continue Reading
-
A legal minefield called the metaverse
Will the metaverse create a $1tn revenue market? Who knows? How long will it take to reach this lofty potential? Who can tell? Will people invest across this emerging landscape of speculative riches? You bet Continue Reading
-
New supercomputer opens doors for researchers in Sweden
More than twice as powerful as its predecessor, a new supercomputer ushers in new opportunities for researchers who rely on artificial intelligence and machine learning Continue Reading
-
Evolving datacentre chipsets put cooling, power and software management techniques under microscope
New processor designs that could revolutionise approaches to supporting higher power densities at the rack still look years away, it appears Continue Reading
-
Is the IT sector beset by fear-mongering?
The arms race between hackers and security teams has led to a plethora of new technologies, but it can be hard to differentiate between sensible cyber purchases and those that are promoted by exaggerating risk Continue Reading
-
Scale-up vs scale-out: Horizontal vs vertical scaling for storage
We look at the differences between scale-up and scale-out in storage – or horizontal vs vertical scaling – and the key ways it can be carried out on-prem and in the cloud Continue Reading
-
The emerging role of software in business development
Business leaders generally recognise the importance of software as a business enabler – but some see technology driving business growth Continue Reading
-
Edge storage: Four key points
Edge storage is driven by rapidly emerging edge computing and data gathering use cases. We look at why it makes sense to store data at the edge and the key challenges involved Continue Reading
-
Swedish researchers are patiently developing a useful quantum computer
By 2028, the Wallenberg Centre for Quantum Technology in Sweden expects to have a useful quantum computer Continue Reading
-
How advanced comms can gain an edge in the post-pandemic world
Advanced communications not only connects the real world to the digital world, but also enables a hybrid and more environmentally friendly world of work Continue Reading
-
Cloud storage compliance pitfalls: Post-pandemic and post-Brexit
We look at the key areas of cloud storage compliance that can trip you up, with shared responsibility with cloud providers and data residency among the most important Continue Reading
-
Cloud repatriation: Five reasons to repatriate data from cloud
We look at key drivers of cloud repatriation, including cost, compliance, issues around latency and data gravity, reversing poorly planned moves to the cloud, and supplier failure Continue Reading
-
Social value not yet fully embedded in procurement practices
Social value procurement rules are designed to diversify the public sector’s supplier base while providing society with wider collective benefits, but are yet to be fully introduced Continue Reading
-
APAC expert guide to cloud migration
In this expert guide on cloud migration in Asia-Pacific, we highlight the key considerations and strategies that enterprises can take when moving their workloads to public cloud Continue Reading
-
What Norwegians are learning as they pioneer autonomous ships
Norway is leading the world in developing autonomous ship technology – and the world should pay attention to its latest developments Continue Reading
-
Digital surveillance of remote workers may increase enterprise risk
From productivity tools to security threats, we explore how digital surveillance is forcing remote workers towards shadow IT Continue Reading
-
How to manage endpoint security in a hybrid work environment
The future of the workplace is clearly hybrid, but this has untold implications around endpoint security. How can businesses overcome these? Continue Reading
-
Immutable snapshots aim to neutralise ransomware
Snapshots – usually immutable anyway – get functionality to stop ransomware intruders moving or deleting snapshots, so customers know they have clean copies of data to restore from Continue Reading
-
IT’s role in sustainability for a resilient supply chain
A circular economy is among the long-term measures needed to combat climate change. This requires data transparency across supply chains Continue Reading
-
Online Safety Bill puts user protection onus on platform providers
The Online Safety Bill will place new duties and responsibilities on online platforms accessible from the UK, but as it currently stands, it contains several grey areas Continue Reading
-
Five ways the hyper-converged infrastructure market is changing
We look at changes in the hyper-converged infrastructure market as suppliers go cool, go soft, disaggregate HCI nodes, provide as-a-service options and look to containers Continue Reading
-
Back on the office network: What are the risks for mobile users?
Many people are returning to offices and bringing their mobile devices with them. What are the cyber security implications of this? Continue Reading
-
Hybrid cloud: Five key questions in 2021
We look at key need-to-knows about hybrid cloud in 2021, including how it is defined, key use cases, the main pitfalls and where it’s heading Continue Reading
-
Developing an integrated customer and employee experience strategy
We explore what customer experience and employee experience have in common – and the benefits of combining them Continue Reading
-
A post-pandemic recipe for developing customer experience
Covid-19 has led to many people reassessing their priorities so customer experience needs to adapt to meet new expectations Continue Reading
-
Could Iceland be the best place in the world for high-performance computing?
Most of Iceland’s cheap, sustainable energy is currently used by aluminium smelters, but recognising the need to diversify, the Landsvirkjun power company now promotes other uses Continue Reading
-
NVMe-over-fabrics: Five need-to-knows
We look at five need-to-knows about NVMe-over-fabrics, such as its implementations – RDMA, Fibre Channel and TCP – use cases, hardware and operating system support Continue Reading
-
Ultimate questions require ultimate understanding in the quantum era
In The Hitchhiker’s Guide to the Galaxy, Deep Thought calculates the answer to the ultimate question of life, the universe and everything as ‘42’. But what of quantum computing? Continue Reading
-
How Estonia’s country-as-a-service scheme has attracted tens of thousands of foreign entrepreneurs
Estonia has created a country-as-a-service offering which is attracting entrepreneurs and businesses from across the world Continue Reading
-
Climate change and datacentres: Weighing up water use
Given that a mid-sized datacentre uses as much water as three average-sized hospitals, green IT needs to start considering water usage Continue Reading