In Depth
In Depth
IT management
-
Need to know: Five key things about backup testing
We look at five key things to consider when it comes to backup testing – what to test, how often, making sure backups work, whether recovery is effective and ensuring processes are consistent Continue Reading
-
How to build an effective vulnerability management programme
As cyber criminals increasingly look to exploit vulnerabilities in software and hardware, businesses must build and implement an effective vulnerability management programme to counter this growing threat Continue Reading
-
How AI is helping to drive business process optimisation
Automating an inefficient process simply leads to a faster inefficient process. Artificial intelligence needs to be deployed to ensure business processes are optimal Continue Reading
-
DDoS mitigation strategies needed to maintain availability during pandemic
The growing prevalence of DDoS attacks combined with the increased reliance on internet connectivity during the pandemic means enterprises can no longer afford to ignore the threat of DDoS attacks. Computer Weekly explores organisations’ perceptions... Continue Reading
-
Credential stuffing: When DDoS isn’t DDoS
Ten years ago, credential stuffing attacks posed a comparatively minor threat, but with an escalating number of data breaches, the threat posed has now increased. What are the solutions to this very human problem? Continue Reading
-
How crowd simulation modelling enables organisations to develop social distancing strategies
Crowd simulation modelling has a role to play in maximising the Covid security of offices and other buildings by facilitating social distancing to help get people back to workplaces Continue Reading
-
Tackling multicloud deployments with intelligent cloud management
Organisations are moving to hybrid and multicloud deployments, which complicates software assets tracking and workload management Continue Reading
-
Forrester: Why tagging should be used to manage hybrid assets
With complex hybrid environments, there is a need to apply IT asset management best practices across cloud and on-premise systems Continue Reading
-
Unified file and object storage: The best of both worlds?
Unified file and object storage tackles growing volumes of unstructured data in a way that’s compatible with traditional and cloud-era applications, and friendlier to analytics Continue Reading
-
Why securing the DNS layer is crucial to fight cyber crime
Domain name system security is often overlooked by organisations, but focusing on this layer could actually improve the effectiveness of cyber security strategies. We explore the latest DNS trends and best practice Continue Reading
-
Baking adaptability into the supply chain
The coronavirus crisis has highlighted the importance of data and automation in supporting an agile supply chain. Continue Reading
-
How can CIOs prepare for 12 months of uncertainty ahead?
Just 12 months ago, nobody could have predicted where we are now. So how can CIOs prepare for the future amid such uncertainty? We asked five IT leaders for their expert advice Continue Reading
-
GPT3 could revolutionise how business can use AI
OpenAI’s language prediction model that produced an essay could be used to deploy cloud resources and improve the quality of chatbots, among other business use cases Continue Reading
-
How the supply chain is handling Covid-19
Cost-cutting habits have left supply chains chasing their tails in the wake of the pandemic. We take a look at how they’re coping Continue Reading
-
Business process automation expansion could founder on IT drift from business focus
Business process automation might find new territory to expand into as businesses have become bloated with excess processes since the 2008 crash. But has IT drifted out of business alignment again? Continue Reading
-
Digital safeguarding of physical workspaces can help employees return to 'normal'
Employees across all sectors are putting their trust in data – not just devices – upon their imminent return to physical workspaces Continue Reading
-
Top five ways backup can protect against ransomware
Ransomware threatens to put your data beyond reach, so the best way to prepare is to have good-quality data you can restore from backup. We look at the key things to consider Continue Reading
-
Supporting mobile workers everywhere
With VPNs struggling to serve the unprecedented number of remote workers, we look at other ways of providing reliable remote networking Continue Reading
-
Top five ways to benefit from tape today
We look at the benefits that tape can bring, including in backup and recovery, long-term and ‘warm’ archiving, compliance and WORM use cases and ‘air gapping’ to protect data Continue Reading
-
Double extortion ransomware attacks and how to stop them
As ransomware attacks increase, hackers are diversifying their tactics to get victims to hand over larger sums of money. We investigate the rise of double extortion attacks Continue Reading
-
Getting physical with datacentre security
Whether it is natural disasters, terrorism or break-ins, datacentres will be vulnerable to a range of risks unless they are physically secured. Here’s how you can improve the physical security of your datacentre Continue Reading
-
Coding within company constraints
We find out how containerised microservices and automated testing, combined with effective collaboration and communication, can drive innovation Continue Reading
-
APAC buyer’s guide to BI and analytics
In this buyer’s guide, we look at the state of adoption of business intelligence and analytics tools, common use cases and other technology and business considerations Continue Reading
-
Cloud storage costs: How to get cloud storage bills under control
Many organisations look to the cloud to cut storage budgets, but the potential costs are many and varied. So what are the key ways to cut cloud storage costs? Continue Reading
-
Portrait of the software developer as an artist
Many programmers see themselves as artists – of a sort. Computer Weekly investigates what it means to be a modern software developer Continue Reading
-
How to achieve resilience – the modern uptime trinity
IT leaders can take responsibility for ensuring their organisations are resilient during times of crisis. There are no quick fixes, but if you think it is expensive to ensure resilience in your IT systems, try frequent failure instead Continue Reading
-
Five on-premise and cloud options for network-attached storage
We look at five options for file access storage, from ‘traditional’ NAS in a standalone appliance to distributed hybrid cloud file storage and NAS cloud gateways Continue Reading
-
Intelligent ways to tackle cyber attack
Artificial intelligence-powered security tools should enable IT security teams to achieve more with less Continue Reading
-
Storage pros and cons: Block vs file vs object storage
Despite the many changes in storage, there are still some fundamentals that hold true. We look at the key defining characteristics and use cases of block, file and object storage Continue Reading
-
Automating IT security
IT security’s battle with the hacking community has always been a game of cat and mouse, but it’s becoming increasingly automated Continue Reading
-
APAC hybrid cloud adoption still cloudy
Although there are clear benefits of hybrid cloud, enterprises in Asia-Pacific aren’t making the most of them due to a lack of holistic understanding, strategic frameworks and skillsets Continue Reading
-
Drive to improve flash reliability
Due to its limited write cycles, flash-based storage can corrupt data. Computer Weekly looks at how flash reliability is being addressed Continue Reading
-
Decision points in storage for artificial intelligence, machine learning and big data
Artificial intelligence and machine learning storage is not one-size-fits-all. Analytics work differs, and has varied storage requirements for capacity, latency, throughput and IOPS. We look at key decision points Continue Reading
-
Auditing for algorithmic discrimination
Despite the abundance of decision-making algorithms with social impacts, many companies are not conducting specific audits for bias and discrimination that can help mitigate their potentially negative consequences Continue Reading
-
Black Lives Matter, but do bots know that?
The volume of content generated each day necessitates automated moderation to curate everything as it is published, ensuring offensive and objectionable material is blocked. But this only works if systems are adequately configured and reviewed Continue Reading
-
How Malaysia’s industries are tapping IoT
Computer Weekly speaks to four industries that claim to have benefited from various IoT deployments and how it has changed their businesses Continue Reading
-
Will the Covid-19 crisis accelerate a shift in tech talent out of London?
As the coronavirus pandemic has forced firms to work more flexibly, threatening traditional large office spaces in London, will tech talent make a long-term shift away from the capital? Continue Reading
-
APT groups’ mobile momentum finally faces resistance
State-backed APT groups are increasingly targeting mobile devices as Covid-19 puts the spotlight on remote working infrastructure security. We explore how the industry is fighting back Continue Reading
-
How to apply zero-trust models to container security
Containers have become a common fixture in software development, but they have resulted in new concerns for security teams. Is zero-trust the answer to tackling them? Continue Reading
-
Cloud flash storage: SSD options from AWS, Azure and GCP
We look at the flash storage options available from the big three cloud providers – Amazon Web Services, Microsoft Azure and Google Cloud Platform – that can help narrow the gap between on-site and cloud workloads Continue Reading
-
Dealing in data
Lessons learned from pandemic data reporting will help forge new analytics techniques to improve data quality Continue Reading
-
Cloud storage on-site hardware: AWS, Azure, Google Cloud
We look at the big three cloud vendors’ on-site offerings: AWS’s Outposts, Gateway and Snow hardware, Azure’s Stack and Arc appliances, and Google Cloud’s software-defined Anthos Continue Reading
-
Coronavirus: How to go back to the office safely and securely
Security teams should be used to supporting remote workers effectively by now, but what’s going to happen when people start returning to their offices? We look at the risks and how to address them. Continue Reading
-
Accurate data in, better insights out
The coronavirus pandemic has propelled data into the headlines, but it has also shown the challenges of dealing with incomplete datasets Continue Reading
-
The datacentre chill-factor: Finding the right conditions
Computer Weekly explores a variety of cost-effective, energy-efficient services currently using innovative methods to keep datacentres cool Continue Reading
-
Cloud storage 101: File, block and object storage in the cloud
We run the rule over file, block and object storage from the big three public cloud providers: AWS, Azure and GCP. We look at what’s on offer and the use cases they are aimed at Continue Reading
-
Constructing the future for engineering – finding the right model where one size does not fit all
Design and engineering has rapidly evolved to be all about interconnected devices. We see how one of the leading manufacturing software suppliers is meeting the challenge Continue Reading
-
GDPR at two: How far we’ve come, how far we still have to go
Marking two years of the General Data Protection Regulation, industry voices weigh in on the state of data protection and privacy, consider what has changed, and what still needs to change Continue Reading
-
Mainframe storage: Three players in a market that’s here to stay
Far from disappearing, the mainframe market and the storage it needs is here to stay for some time. The three key array makers compete with high-end flash-equipped products Continue Reading
-
Surveillance capitalism in the age of Covid-19
Could the Covid-19 coronavirus pandemic further consolidate surveillance capitalist practices and enterprises? Author Shoshana Zuboff warns Computer Weekly it is possible Continue Reading
-
What are the security priorities for the post-coronavirus world?
The Covid-19 pandemic is forcing massive change across the business world and things may never go back to normal. What does security look like in this new world, and what will buyers be prioritising? Continue Reading
-
Five pillars of public sector IT
Finding better ways for people to collaborate and share information digitally is the challenge government needs to embrace. We look at ways in which this can be achieved Continue Reading
-
How Blackwell's is responding to the coronavirus pandemic
Traditional bookshop chain Blackwell’s talked about adaptations to its business model, trends and IT operation during the coronavirus crisis Continue Reading
-
Storage 101: Crash-consistent vs application-consistent snapshots
We look at crash-consistent and application-consistent snapshots and backup, how they are defined, the pros and cons of each and the benefits and limits of Windows VSS Continue Reading
-
Coronavirus: How to cope with the digital skills divide
Since the Covid-19 pandemic started, employers need tech and digital talent more than ever. But how can organisations recruit and train the skills they need during a lockdown? Continue Reading
-
Snapshots 101: Array vs backup software
We run the rule over snapshots in storage arrays and backup software and find a range of capabilities that go from mere support to fully snapshot-centric approaches Continue Reading
-
Public sector IT: The road to digital
Progress to digital transformation is patchy in the public sector, but some CIOs are embracing the strategy Continue Reading
-
A carrot-and-stick approach to fixing cyber security complacency
With a majority of IT decision-makers holding the opinion that their employers are complacent when it comes to data protection, we look at what needs to be fixed, and how to fix it Continue Reading
-
How to overcome application modernisation barriers
Most businesses are not lucky enough to be able to build a new cloud native architecture. We look at how to take legacy applications forward Continue Reading
-
Australian firms soldier on amid Covid-19 outbreak
From the largest financial institutions to small companies, Aussie firms have been dialling up their use of technology tools to keep their businesses humming during the coronavirus pandemic Continue Reading
-
How APAC firms are coping with the Covid-19 outbreak
The air of change looms large in companies operating in the Asia-Pacific region, with some doing better than others in keeping the lights on amid the coronavirus pandemic Continue Reading
-
Applications: Combining the old with the new
We look at how organisations can integrate legacy applications with newer digital platforms Continue Reading
-
NAS backup: Which suppliers have gone post-NDMP?
NAS backup with NDMP has many drawbacks so some vendors have moved to a data management approach that tracks changes and allows for incremental forever protection Continue Reading
-
Malaysia’s business continuity planning readiness a mixed bag
Larger Malaysian enterprises have BCP in place, but SMEs lag behind and will find it harder to weather the Covid-19 storm Continue Reading
-
Top five compliance concerns for UK business in 2020
We look at the top five legal and regulatory compliance concerns for UK businesses in 2020. It’s a list that includes GDPR, the DPA, PECR, PCI-DSS and the CCPA Continue Reading
-
What are the drivers for application modernisation?
Application modernisation is not something that just happens, nor is it just driven by digitisation and cloud-first strategies Continue Reading
-
Coronavirus: How app developers large and small are working to help fight Covid-19
Computer Weekly looks at how a range of actors are using technology to help mitigate the various impacts caused by the Covid-19 coronavirus outbreak Continue Reading
-
The AWS bucket list: Keep your cloud secure
Misconfigured cloud installations risk billions of records being exposed, damaging organisations’ finances and reputations. Paying attention to securing AWS storage buckets is a simple matter Continue Reading
-
Computational storage: What is it and what are its key use cases?
Computational storage brings the CPU to the storage and so boosts system performance by tackling processing tasks, such as near the edge or in AI/machine learning workloads Continue Reading
-
Coronavirus: How to implement safe and secure remote working
Find out what CIOs and CISOs need to know to enable their end-users to work remotely and stay secure during the Covid-19 coronavirus crisis, and learn how users can help themselves Continue Reading
-
Coronavirus: Can the networks take the strain?
It was predicted that the mass roll-out of computer networks would mean at some point that there was no difference between work and home as a working location. These assumptions are about to be tested to the full Continue Reading
-
Networking gains ‘cool’ status
There is renewed interest in networking, driven by enterprises looking at how public cloud services can co-exist with on-premise IT Continue Reading
-
Malaysia’s digital transformation efforts progress
Malaysian enterprises are taking steps to modernise their infrastructure, but many are still grappling with the lack of niche IT skills in key emerging technologies such as the internet of things Continue Reading
-
Molotov.tv streams 24/7 with Dell EMC and Scality object storage
France-based Molotov.tv has offered streaming TV services on digital platforms since 2016, based on Dell EMC servers with GPU acceleration and Scality Ring object storage Continue Reading
-
Upcoming conflict minerals regulation does not cover major technology companies
A forthcoming regulation designed to stem the flow of conflict minerals is unlikely to change the behaviour of technology companies because loopholes in the new rules mean they are not covered Continue Reading
-
Three network technologies driven by cloud-native computing
Networking technologies are being driven heavily by digitisation and cloud computing. Gartner picks three networking trends to watch Continue Reading
-
Cache vs tier: What’s the difference between cache and storage?
We look at the key distinctions between cache and tiers of storage, and where the line has become blurred with fast flash, 3D Xpoint and storage class memory technologies Continue Reading
-
The future of open source licences is changing
The Open Source Insider blog on Computer Weekly recently asked industry experts for their views on the future of open source licensing Continue Reading
-
How to find the right zero trust strategy
Large tech companies and the US Federal Government have adopted zero trust as their next-generation security model Continue Reading
-
Trusty methods to keep out intruders
Today’s hyper-connected world means trust can no longer be taken for granted to keep networks secure – enter the zero-trust model Continue Reading
-
Is this Netflix-style thriller the future of security training?
Cyber awareness specialists at KnowBe4 reckon that bringing Netflix-style production values to corporate videos heralds a new approach to security training Continue Reading
-
From Pixar to GovTech: The inside story of Singapore’s AI whizz
After nearly a decade at Pixar, GovTech’s Chong Jiayi is leading a team of experts to solve hard problems in robotics and artificial intelligence Continue Reading
-
Zero trust: Taking back control of IT security
Trust on the network is a crucial factor in security risk, and zero trust changes the traditional model of ‘trust but verify’ Continue Reading
-
How IT can back up ESG efforts to do environmental and social good
Organisations’ environmental, social and governance programmes depend on IT leaders for technological backup Continue Reading
-
The big retail tech themes from Retail’s Big Show
The National Retail Federation’s Big Show signals the kick-off of the retail events calendar. We look over the themes promised for retail tech over the next year Continue Reading
-
Caribbean island hospital rebuilds after hurricane with DataCore
Hurricane Irma tore the roof off a server room and flooded IT hardware, but that was an opportunity to rebuild redundant IT using DataCore’s SANsymphony software-defined storage Continue Reading
-
Alan Bates: The ‘details man’ the Post Office paid the price for ignoring
In 2003, subpostmaster Alan Bates had his contract terminated when he refused to comply with Post Office policy. A decade and a half later, against the odds, he took the Post Office to the High Court and won a multimillion-pound legal case Continue Reading
-
Top four compliance considerations for SMEs
We look at the key data compliance regulations that affect smaller companies – such as GDPR, the Data Protection Act, PCI-DSS and PECR – and some key industry-specific frameworks Continue Reading
-
Industrial edge requires a focus on machines
After the office edge and the mobile edge comes the industrial edge. We look at a shift in computing paradigms Continue Reading
-
Do you use cloud storage for these use cases yet?
We look at the use cases most suited to a quick transition to the cloud: backup, archiving, disaster recovery, file storage and cloud bursting – cloud storage’s low-hanging fruit Continue Reading
-
Big storage meets cloud in the datacentre 'as-a-service' revolution
Cloud is mainstream but the datacentre’s here to stay. This has resulted in a trend towards as-a-service in the datacentre where big storage array makers and the cloud giants meet Continue Reading
-
DRaaS decisions: Key choices in disaster recovery as a service
We examine the key decisions when considering DRaaS. Whether to go full self-service, assisted or managed will depend on what you need to protect and your in-house resources Continue Reading
-
Whisper it… but could a cyber attack be good for your career?
All too often it’s the CISO who carries the can for an enterprise security failure, but this might not be a bad thing. There’s lots of evidence to suggest that falling victim to a cyber attack may actually enhance your CV Continue Reading
-
Five ways that backup has changed since the days of tape
Back in the day, all this was tape, but times have changed, with cloud-to-cloud backup, cloud storage, virtual and physical backup appliances and myriad endpoint hardware Continue Reading
-
Life on the edge: A new world for data
Edge computing is regarded as the next frontier for data, with rapid growth expected in the market. We assess the prospects Continue Reading
-
Top 10 storage deployment stories of 2019
Here are ComputerWeekly’s top 10 storage deployment stories for 2019, which see quite a move away from traditional SAN and NAS to hyper-converged, software-defined storage and object storage Continue Reading
-
Human factors are critical to securing digital transformation
Sourcing the latest cyber security technology to support digital transformation projects is all well and good, but it’s meaningless if you fail to address your organisational culture and the people within it Continue Reading
-
Amazon, AWS and antitrust: How tough could US lawmakers be on the tech titan?
How Amazon conducts its business is coming under close scrutiny from US lawmakers, both from an online retail and cloud perspective, and this is why Continue Reading
-
What are the key issues facing healthcare CIOs?
Six healthcare IT leaders give their views on the major challenges for digital transformation across the NHS Continue Reading
-
How diversity spurs creativity in software development
Diversity of all kinds – gender and ethnicity, but also intellectual diversity and neuro-diversity – can boost creativity in software development Continue Reading