In Depth
In Depth
IT management
-
Online Safety Bill puts user protection onus on platform providers
The Online Safety Bill will place new duties and responsibilities on online platforms accessible from the UK, but as it currently stands, it contains several grey areas Continue Reading
-
Five ways the hyper-converged infrastructure market is changing
We look at changes in the hyper-converged infrastructure market as suppliers go cool, go soft, disaggregate HCI nodes, provide as-a-service options and look to containers Continue Reading
-
Back on the office network: What are the risks for mobile users?
Many people are returning to offices and bringing their mobile devices with them. What are the cyber security implications of this? Continue Reading
-
Hybrid cloud: Five key questions in 2021
We look at key need-to-knows about hybrid cloud in 2021, including how it is defined, key use cases, the main pitfalls and where it’s heading Continue Reading
-
Developing an integrated customer and employee experience strategy
We explore what customer experience and employee experience have in common – and the benefits of combining them Continue Reading
-
A post-pandemic recipe for developing customer experience
Covid-19 has led to many people reassessing their priorities so customer experience needs to adapt to meet new expectations Continue Reading
-
Could Iceland be the best place in the world for high-performance computing?
Most of Iceland’s cheap, sustainable energy is currently used by aluminium smelters, but recognising the need to diversify, the Landsvirkjun power company now promotes other uses Continue Reading
-
NVMe-over-fabrics: Five need-to-knows
We look at five need-to-knows about NVMe-over-fabrics, such as its implementations – RDMA, Fibre Channel and TCP – use cases, hardware and operating system support Continue Reading
-
Ultimate questions require ultimate understanding in the quantum era
In The Hitchhiker’s Guide to the Galaxy, Deep Thought calculates the answer to the ultimate question of life, the universe and everything as ‘42’. But what of quantum computing? Continue Reading
-
How Estonia’s country-as-a-service scheme has attracted tens of thousands of foreign entrepreneurs
Estonia has created a country-as-a-service offering which is attracting entrepreneurs and businesses from across the world Continue Reading
-
Climate change and datacentres: Weighing up water use
Given that a mid-sized datacentre uses as much water as three average-sized hospitals, green IT needs to start considering water usage Continue Reading
-
Is the tech sector facing an IT skills exodus?
Three out of five of tech professionals say they are looking to move jobs over the next year. Why is this, and how big a skills problem is the tech industry facing? Continue Reading
-
Five things you need to know about cloud file services
We look at cloud file services, which provide a file system-like architecture that gives users access to file data wherever they are, just as if it were a local NAS filer Continue Reading
-
How do SOAR and SIEM services fare in a rapidly changing cyber threat landscape?
Given that cyber risks are rapidly growing in sophistication and number, we look at whether SIEM and SOAR security tools are still effective Continue Reading
-
Five key questions to ask about storage-as-a-service and consumption models
We look at important questions to ask providers of consumption-based storage procurement services, such as base costs and burst, usage measurement and upgrade paths Continue Reading
-
Making the enterprise composable
We speak to industry experts about how to develop composable IT that can quickly adapt to business change Continue Reading
-
Cloud disaster recovery: The devil is in the detail
We look at cloud disaster recovery and the potential complexities that can result from partial outages and restores as well as challenges around re-configuring network and security Continue Reading
-
Boots leading drive for ‘professionalisation of IT’ in retail
Boots becomes member of the BCS, the Chartered Institute for IT, as CIO Rich Corbridge accelerates drive for the ‘professionalisation of IT’ Continue Reading
-
Considerations when deciding on a new SIEM or SOAR tool
A successful deployment of any security tool very much depends on the maturity of security processes in the organisation Continue Reading
-
APAC buyer’s guide to robotic process automation
In this buyer’s guide on RPA, we look at where the technology fits into the broader automation landscape, and other purchase and implementation considerations Continue Reading
-
When is SIEM the right choice over SOAR?
Better instrumentation leads to better IT security but monitoring can quickly overload IT teams. Automation can help, but it may not always be needed Continue Reading
-
Modern ERP breaks the chains
Modern ERP systems mean user organisations need no longer be stuck with hefty upgrades at times convenient to suppliers Continue Reading
-
Disaster recovery for SMEs: Five key areas to consider
We look at key disaster recovery considerations for SMEs, including why backup is not enough, how to create a disaster recovery plan, best-practice DR testing and DR as a service Continue Reading
-
Use ERP modernisation to drive efficiency and sustainability
Evidence of global warming is everywhere, and as organisations update legacy ERP, there is a golden opportunity to build in sustainability KPIs Continue Reading
-
How digital operations drive ERP modernisation
When it comes to modernising enterprise resource planning, IT decision-makers have a multitude of options. We look at what to consider when planning a modernisation project Continue Reading
-
Five ways to ensure remote working security and compliance
A mix of on-site and remote working has become a fact of life for many organisations. We look at five key things you should consider to ensure compliance and security Continue Reading
-
Storage-as-a-service: Consumption models from the big six
We look at the big six storage makers’ consumption model offers, which allow customers to pay for on-prem hardware and cloud storage capacity on a pay-per-use basis, within limits Continue Reading
-
Windows 11: A first look at the first preview
Microsoft recently unveiled its plans for the next version of the Windows operating system. We give it a test drive Continue Reading
-
Tips to minimise vulnerabilities in web and mobile apps
Agile software development can sometimes be at odds with secure by design principles. We look at how organisations are balancing security with coding Continue Reading
-
Tech and new experiences tackling trouble at t’mall
UK shopping centres are under pressure, but new concepts, tech-infused spaces, and fresh approaches to consumer engagement are revitalising the sector Continue Reading
-
How software developers can create mobile apps securely and quickly
The mobile app market is booming, but to achieve success, organisations must develop mobile apps securely and rapidly Continue Reading
-
The beneficial (and frightening) implications of virtualising reality
The mingling of virtual and physical worlds promises many beneficial and entertaining applications, but there are also some truly worrisome implications of augmented reality Continue Reading
-
Lakehouse concept aims to merge data lake and data warehouse
Data lakes are big, amorphous and difficult to access, while data warehouses are costly and aimed at structured data. The data lakehouse aims at analytics in an age of unstructured data Continue Reading
-
Why data and the pandemic are ripping up paper processes
We explore how the Covid-19 pandemic has forced businesses to rip out traditional paper processes and replace them with end-to-end digitisation Continue Reading
-
Best practices for secure printing
The reality of a paperless office remains some way off, so printers are here to stay for a while. But their increasingly connected status means securing them should be a priority Continue Reading
-
Europe’s proposed AI regulation falls short on protecting rights
The European Commission’s proposal for artificial intelligence regulation focuses on creating a risk-based, market-led approach replete with self-assessments, transparency procedures and technical standards, but critics warn it falls short of being ... Continue Reading
-
How the pandemic changed backup
The Covid-19 pandemic forced big changes in how people work – we look at impacts on backup, including increased reliance on the cloud, plus security and compliance vulnerabilities and ransomware Continue Reading
-
The drive towards computational storage
The explosion in data is driving demand for faster computing and storage remains a bottleneck – but things are about to change Continue Reading
-
What the Telecommunications (Security) Bill means for UK industry
The Telecommunications (Security) Bill is intended to reinforce the security of the UK telecommunications infrastructure, but what are the implications for industry? Continue Reading
-
Buying a VPN? Here’s what you need to know
VPNs are an effective cyber security tool for businesses and remote workers, but there are many things to consider before purchasing and implementing one. We explore some of these Continue Reading
-
Gartner: How to turn old datacentres into critical IT assets
IT infrastructure and operations leaders are increasingly focusing on new ideas and technologies alongside ways to deliver business value Continue Reading
-
How computational storage delivers datacentre benefits
Computational storage is an emerging field of IT that features compute processing power closely coupled with storage. We look at what it can be used for Continue Reading
-
Where to run containers? Bare metal vs virtual machines
We look at the key differences between running containers in virtualised environments and on bare metal servers and focus in on the main trade-offs and decision points Continue Reading
-
How Bureau Veritas migrated 85% of its applications to the AWS cloud
In six years, France-based services giant BV has migrated 115 applications to the AWS cloud, mostly using in-house expertise. We talk to the company’s IT director Continue Reading
-
What digital transformation means for data storage
We survey the key planks of digital transformation and look at the storage technologies emerging to support it, such as NVMe and QLC flash, hyper-converged infrastructure and cloud storage Continue Reading
-
The National Security and Investment Act: What datacentre operators and investors need to know
The incoming National Security and Investment Act will give the UK government enhanced powers to pre-screen and intervene on datacentre M&A deals, prompting concerns it could dampen the sector's soaraway growth rates Continue Reading
-
Container-native storage: A definition, and what to ask suppliers
We look at container-native storage – aka cloud-native storage – what defines it, and its benefits as a way of bringing persistent Kubernetes storage to containerised applications Continue Reading
-
The right tech choices for hybrid workers
Various studies give a mixed reaction to businesses returning to office work, but what is apparent is that support for remote working will continue Continue Reading
-
APAC career guide on cloud computing
Besides having engineering chops and certifications, aspiring cloud professionals should have curiosity and soft skills to succeed in the evolving cloud computing landscape Continue Reading
-
How do I get my users to pay attention to security training?
As cyber security risks grow daily, businesses must educate staff about these through cyber awareness training. But how can they ensure this is taken seriously by employees? Continue Reading
-
How GCHQ proposes to implement and use ethical AI
The rise of cyber crime and the escalating threat vectors facing the UK have led GCHQ to invest in automated threat detection and response systems to meet this challenge, as well as liaising with the private sector for the first time Continue Reading
-
Deploying productivity monitoring software ethically
While software that tracks the activities of staff can be helpful to companies with a remote workforce, managers must consider employees’ concerns and privacy Continue Reading
-
Navigating the sticky issue of monitoring employee productivity
With employees having shifted en masse to remote working during the pandemic, we explore how enterprises have maintained the productivity of their dispersed workforce Continue Reading
-
How AI and automation drive better customer service
Forrester analysts explore the benefits of combining artificial intelligence with automation Continue Reading
-
Five reasons to look at hyper-converged infrastructure
HCI promises easy setup, purchasing flexibility, low procurement and operation costs, reliability and all in one box – but there are challenges too Continue Reading
-
A bottom-up and top-down look at intelligent automation
We look at robotic process automation at a coding level and an organisational level, and see how artificial intelligence fits Continue Reading
-
APAC buyer’s guide to HRM software
In this buyer’s guide, we look at the key considerations when choosing human resource management software to enable workforce resilience, flexibility and agility in the post-pandemic world Continue Reading
-
Why some jobseekers have turned to cyber crime during the pandemic
Research shows that many people have been seeking cyber crime-related work on the dark web, but why? Continue Reading
-
Where now for storage? Hitachi, IBM and Pure Storage
Part II: Storage supplier strategy in the cloud era: Hitachi, IBM and Pure Storage. We snapshot the big six hardware makers, as they take things to the cloud and as-a-service models Continue Reading
-
Where now for storage? Dell EMC, NetApp and HPE
Part I: Storage supplier strategy in the cloud era: Dell EMC, NetApp and HPE. We snapshot the big six hardware makers, as they take things to the cloud and as-a-service models Continue Reading
-
Data warehouse storage: Has cloud made on-premise obsolete?
There once was no alternative to building a data warehouse on-premise, but with cloud providers targeting analytics, building data warehouses on-site is looking obsolete Continue Reading
-
Ecolabels and data sanitisation key to recycling and reusing IT assets
Ecolabels on hardware and data sanitisation of devices are key to recycling and reusing old IT equipment respectively, helping enterprises avoid unnecessary asset destruction and contributing to increasingly high levels of electronic waste globally Continue Reading
-
Preparing for enterprise-class containerisation
As more workloads are deployed in containers, IT teams will need to assess how to manage container sprawl, reduce cloud bills and support databases Continue Reading
-
Backup appliances the hot topic for Pas-de-Calais fire brigade
With requirements for strict, long-duration backup and archiving, French fire brigade set out to replace optical media with a StorageCraft appliance and disaster-proof storage Continue Reading
-
The 3-2-1 backup rule: Has cloud made it obsolete?
The 3-2-1 backup rule was made for small-scale use in the pre-cloud era when tape still ruled. Is it relevant in the 2020s, or can we repurpose its fundamental principles? Continue Reading
-
How to choose the right email security service for your organisation
With email security threats growing rapidly, businesses can quickly identify and block these by using a top email security service. Here’s how to select the right provider Continue Reading
-
Anti-money laundering technology must operate in a collaborative ecosystem
With new technologies making it easier for banks to spot money laundering activity, we look at why the problem persists at scale, finding that ecosystems and collaborative processes need to be built Continue Reading
-
Containers for a post-pandemic IT architecture
One of the positive effects of Covid-19 is that it has put IT at the top of the business agenda – and containerisation is part of that strategy Continue Reading
-
Ski firm dumps ‘motley’ storage for DataCore software-defined
Eurogroup cuts power usage by 70% and rackspace from 84U to 7U as it consolidates multiple physical servers and storage protocols onto SANsymphony software-defined storage Continue Reading
-
Does email security need a human solution or a tech solution?
People spend a lot of time using email systems, but many do not realise that this makes them attractive targets for cyber criminals. With education and technology, businesses can tackle this problem head-on Continue Reading
-
With connectivity on the rise, Africa is a hotspot for datacentre investments
We look at opportunities for datacentre operators in setting up or partnering with local firms in Africa Continue Reading
-
Dealing with the challenge of beg bounties
The rise of so-called beg bounties is becoming a challenge for security teams, and can be a drain on time and resources. But what is a beg bounty, and how does it differ from a bug bounty? Continue Reading
-
Five ways that disaster recovery changes in a pandemic
Covid-19 has changed IT. Previously, working remotely was a business continuity measure, but now it is the norm. That means disaster recovery has to adapt to new risks and new ways to respond Continue Reading
-
The driving force behind the EU colocation market’s climate-neutral push
Colocation and hyperscale datacentre providers across Europe are under pressure from governments, regulators and the user community to curb carbon emissions Continue Reading
-
How colocation fits alongside a cloud-native architecture
IT departments are on a cloud-native roadmap to become more agile, but they are constrained by the risks involved in migrating core systems and data Continue Reading
-
Data lake storage: Cloud vs on-premise data lakes
The data lake is a fundamental concept of data management. But what type of storage do you need to build a data lake on and what are the pros and cons of on-premise vs the cloud? Continue Reading
-
Coronavirus: Managing software development during lockdown
The Computer Weekly Developer Network examines the impact of Covid-19 on the software application development community Continue Reading
-
Is it time to ban ransomware insurance payments?
The former head of the NCSC recently called for a dialogue over whether or not it is time to ban insurers from covering ransomware payments. Is he on the right track? Continue Reading
-
Five key points about unstructured data storage on-prem and cloud
We look at unstructured data, the myriad forms of data it comprises and the key storage options available, which include NAS and object storage on-prem and in the cloud Continue Reading
-
Three approaches to remote collaboration for home workers
The coronavirus has led to working from home being the ‘new norm’. We look at how collaboration technologies could work in the long term Continue Reading
-
Five key questions about Kubernetes backup answered
We look at when to back up containers, what to protect, the main methods of backup for Kubernetes and the main Kubernetes backup products available in the market Continue Reading
-
APAC career guide: How to become a DevOps engineer
A DevOps career can be highly rewarding, as long as you are open to learning new things and collaborating with team mates to solve problems in software development Continue Reading
-
How can healthcare organisations fight increased cyber crime in 2021?
As the Covid-19 pandemic enters what may be its most dangerous phase, we explore how healthcare organisations can ward off cyber threats while preserving their ability to deliver critical care Continue Reading
-
Cloud DR from the Big Three: Who’s best at what?
We look at cloud disaster recovery from AWS, Microsoft Azure and Google to see which is best for provision of turnkey solutions, breadth of portfolio and modular building blocks Continue Reading
-
Data Dynamics aims at single view of unstructured data
Data volume is ballooning, and storage is becoming more disparate, which makes the need for a single platform to manage storage and compliance a key requirement for organisations Continue Reading
-
Picking the right IAM tools is based on more than today’s needs
With remote working now normal, it is important to take proactive steps in managing credentials across platforms that can be subject to multiple data protection regulations. IAM services can streamline this process, but care must be taken to ensure ... Continue Reading
-
The nation state threat to business
The SolarWinds hack shows the widespread damage possible from a nation state cyber attack. What is the threat to business and how can it be mitigated? Continue Reading
-
Five key points about cloud vs in-house disaster recovery
The cloud is well suited as a disaster recovery failover option. The key questions are about what you should keep on-site and what goes to the cloud. We look at five key points to consider Continue Reading
-
How to monitor remote workers humanely
Monitoring employees who work remotely has taken on a whole extra dimension in the Covid-19 pandemic year of 2020. Financial services firms are among those which suggest ways of doing it humanely and legally Continue Reading
-
Security Long Reads: Cyber insiders reveal what’s to come in 2021
In this long read, we gather together the thoughts of cyber security insiders from across the industry to get their take on what will happen in 2021 Continue Reading
-
Patching: Balancing technical requirements with business considerations
With an increasing reliance on subscription models alongside the regular patching of software, updates have become an essential part of modern business practices. However, care needs to be taken to ensure the optimum patching process is implemented Continue Reading
-
Interview: AWS’s Teresa Carlson talks about new role and cloud adoption during Covid-19
AWS executive talks about her expanded remit beyond public sector to include other industries, and driving a unified agenda to push cloud and data adoption worldwide Continue Reading
-
Interview: Chris Hayman, AWS UK public sector director, on cloud evolution during Covid-19
AWS executive discusses the evolution of cloud technology in government, the need for dynamic procurement, skills, and joining the oligarchy of government tech suppliers Continue Reading
-
A tech reboot of retail
With 2020 having been the toughest year on record for bricks and mortar retailers, we look at some tech innovations that may be heading for the high street Continue Reading
-
Post-pandemic approaches to IAM for cloud security
Cloud technology may have saved businesses from catastrophe during the pandemic, but it has also introduced additional challenges around identity and access management. Here’s why IAM policies are crucial in the new normal Continue Reading
-
A safe bet: How Covid-19 is fuelling investor interest in the datacentre industry
With demand for cloud and colocation capacity soaring on the back of the Covid-19 pandemic, datacentres are looking like an increasingly attractive bet for the investor community. Computer Weekly finds out why Continue Reading
-
This Christmas, Covid-19 heightens retail security risks for everyone
Do you think it’s only retailers and consumers who need to consider cyber security when shopping online during the holidays? You’re dead wrong. This year, the Covid-19 pandemic and the shift to remote working has thrown a spanner in the works Continue Reading
-
Microsoft Windows’ future is all about users
We look at how Microsoft is evolving the Windows desktop operating system platform and providing developer flexibility Continue Reading
-
Fix bottlenecks before tackling business process automation
Business processes evolve over time, and intelligent automation requires a thorough assessment of what is not working optimally Continue Reading
-
Lush’s 25-year journey to digital excellence
Retailers are increasingly focused on using technology to better serve customers, but for high street cosmetic brand Lush, tech has always been part of the picture Continue Reading