In Depth
In Depth
IT management
-
How to make applications resilient on AWS
Cloud services are susceptible to network and other outages. There is no silver bullet to boost the resilience of an AWS-hosted application Continue Reading
-
Microservices: How to prepare next-generation cloud applications
A microservice architecture promotes developing and deploying applications composed of autonomous, self-contained units Continue Reading
-
The state of mobile back end as a service
Common mobile application services are increasingly being hosted on central back-end servers – but what does that mean for the enterprise? Continue Reading
-
How the development of standards will affect the internet of things
As the internet of things (IoT) grows, so will the number of applications developed to control internet-connected devices and objects Continue Reading
-
The business challenges and benefits of identity and access management
IT leaders gathered at a CW500 Club meeting to hear from peers about the challenges of identity and access management Continue Reading
-
Currency exchange business Travelex cuts HR costs by 25% with cloud IT systems
Travelex's cloud human resources (HR) project survived a budget overrun to cut costs and job recruitment times Continue Reading
-
How the BBC became digital in three-and-a-half years
The BBC has undergone a digital transformation that started 18 months prior to the London 2012 Olympic Games Continue Reading
-
Interview: Ed Vaizey MP talks digital economy and digital skills
Minister for the digital economy Ed Vaizey discusses his new role and the future of digital policy Continue Reading
-
Cloud, frozen pizza model and the immutable infrastructure
The architecture pattern for immutable infrastructure is based on the made-to-order pizza model Continue Reading
-
The digital CIO: Why embrace digital innovation?
Having the right digital strategy can make or break an organisation Continue Reading
-
Demystifying Kubernetes: the tool to manage Google-scale workloads in the cloud
We are witnessing a new technology wave in the form of immutable infrastructure and micro-services Continue Reading
-
Government's digital strategy could cut red tape
Governments can harness digital technology to make public services more efficient and generate significant cost savings Continue Reading
-
Choice and ease of use: key elements of a good app store
Companies need to focus on individual user requirements and make sure their app store delivers the right tools for the right job Continue Reading
-
The internet of things is coming: Is your datacentre ready?
Gartner estimates the IoT will see 26 billion units installed by 2020 – channelling huge volumes of data traffic into datacentres Continue Reading
-
What ingredients go into the successful app store?
An enterprise app store should provide the controlled availability of apps for employees.We look at what is available for organisations to use Continue Reading
-
Big Apple revolution: How to manage Macs in the enterprise
Apple’s products were once niche devices. Now, following a consumer-led initiative, they are widely used across the enterprise Continue Reading
-
A guide to smart home automation
Unless it is a new build, the challenge in creating a smart home is that technology must work irrespective of the age of the property Continue Reading
-
The pros and cons of iPads in the enterprise
The iPad is often the first platform for which developers produce apps – but it is substantially more expensive than its competitors Continue Reading
-
Micro-datacentre: What IT problems it solves and what workload systems suit it
A micro-datacentre is a smaller containerised datacentre system designed to solve different problems or to handle different workloads Continue Reading
-
Will silicon photonics replace copper cabling in mainstream datacentres?
Silicon photonics can increase bandwidth in servers, improve data transfer speeds and reduce complexity. But are datacentres ready for it? Continue Reading
-
Future of in-house datacentres in the cloud era
It is predicted that companies will spend three times more on the cloud by 2017. But as cloud goes mainstream, are in-house datacentres really dying? Continue Reading
-
Erasure coding vs Raid as a data protection method
Erasure coding is mooted as a potential successor to Raid and backup software Continue Reading
-
How to manage the tension between agility and discipline in IT
Agility requires a new level of discipline that is redefining IT project management Continue Reading
-
Can the mainframe remain relevant in the cloud and mobile era?
IBM mainframes run more than 1.1m transactions per second, yet the mainframe has remained largely unfashionable. We investigate Continue Reading
-
Understanding the real value of IT and proving it to the business
At a time when costs are being continually squeezed, there is more pressure than ever to demonstrate the business value of technology Continue Reading
-
The digital CIO: How digital technology will change the way organisations work
If you are an IT leader, digital technology is likely to be a pivotal factor in your career over the next five years Continue Reading
-
Hacktivism: good or evil?
IT lawyer Dai Davis looks at the rise of hacktivism and its impact on business and international politics Continue Reading
-
No more email? Why companies are turning to collaboration technology
Collaboration technologies are helping companies improve their employees' work-life balance Continue Reading
-
Troubleshooting datacentre management issues
Gaining better control of the datacentre has to be a high priority to ensure high levels of performance and availability Continue Reading
-
The future of the tablet computer in the enterprise
Tablets come in all manner of profiles and on a variety of platforms – but which will shape up as the workplace favourite of the future? Continue Reading
-
Big banks' legacy IT systems could kill them
A banking T-Rex is dying and nimble competitors will pick at its carcass. Is it too late for the retail bank giants to overhaul their IT and survive? Continue Reading
-
Future Gazing: The Future of IT in 2020
The next six years will see the influence of technology accelerate, and that will mean radical changes for the role of the IT department and the CIO Continue Reading
-
Financing IT purchases
There are a number of ways a new IT platform can be acquired but choosing the right method for your business is key. Continue Reading
-
Make a high-performance computing and high-availability datacentre
High performance computing and high availability systems are no longer limited to engineers and scientists. But is your datacentre ready? Continue Reading
-
How to plan and manage datacentre redundancy
Provisioning of a datacentre to survive a range of failure scenarios has become critical for many businesses. Here's a datacentre redundancy plan Continue Reading
-
A business case for games play at work
How businesses can use computer games techniques to motivate staff at work Continue Reading
-
Big data journalism exposes offshore tax dodgers
How journalists harnessed big data to challenge offshore financial secrecy Continue Reading
-
An introduction to cyber liability insurance cover
Cyber liability insurance cover has been around for 10 years, but most security professionals seem to have not heard of it or know that it exists Continue Reading
-
How to monitor and improve the health of your datacentre
Any datacentre manager looking to support the business should take an end-to-end systems management approach to keep the datacentre in shape Continue Reading
-
From chess to ping pong: How Pegasystems is capturing the Fortune 500
Pegasystems is winning business from the world's leading companies as business process management technology enters the mainstream Continue Reading
-
Best practices in software asset management for a flexible, resilient IT
Managing software assets is vital in order to maintain a highly flexible and up-to-date IT platform and more importantly remain compliant Continue Reading
-
Tools for talent management
An increasing number of human resources management systems are coming to market.. What are the benefits? Continue Reading
-
Sweating your datacentre’s IT assets - is it a good idea?
Amid economic uncertainties, businesses want to get more from existing IT assets. But does it make sense from an IT point of view? Continue Reading
-
Workplace IT services in flux: wherever, whenever, whatever
Enterprise computing is in upheaval as the emphasis shifts towards automation and user-device provision. Continue Reading
-
The internet of things is set to change security priorities
IT leaders must protect against the security risks introduced by the growing interaction between technology and the physical world. Continue Reading
-
Wired vs wireless in the enterprise
What are the pros and cons of wired and wireless connectivity, and what does the future hold for the corporate environment? Continue Reading
-
Social media: A security challenge and opportunity
Generation Y workers are posing increasing security challenges to their employers as they share data unreservedly Continue Reading
-
GE uses big data to power machine services business
GE, one of the UK's largest manufacturers, is using big data analytics with data generated from machine sensors to predict maintenance needs Continue Reading
-
Five personal branding obstacles CIOs face
Know the common personal branding obstacles faced by the Indian CIOs. Learn to do successful self-branding, step by step. Continue Reading
-
How to manage your assets and control business costs
Asset lifecycle management allows the IT department to improve governance, mitigate risk and improve service quality and efficiency Continue Reading
-
CW500: Managing the mobile workforce (part 1)
Mobile working has transformed Colt Telecommunications beyond recognition over the past three years Continue Reading
-
Outsourcing IT services: goals and negotiations
Tactical and strategic negotiations are important to businesses of all sizes, from SMEs to the largest enterprises Continue Reading
-
HyperCITY’s retail store management system: Profit with promotions
HyperCITY services a million customers selling them about 40,000 products. Know how one of India’s largest hypermarket chains accomplishes this. Continue Reading
-
How to make your network green
Make sure your network and datacentre run efficiently as part of a green networking strategy Continue Reading
-
Buyer's Guide: Tips for small companies on IPv6 migration
There is no rush to switch from IPv4 to IPv6, but there is no harm in being prepared for IPv6. We look at the practical issues for SMEs. Continue Reading
-
Key account management strategy at Tata Motors gets enhanced IT edge
Indian auto major Tata Motors’ key account management strategy relies significantly on IT. We examine its key account management portal project in-depth. Continue Reading
-
UKtech50: Meet the 50 most influential people in UK IT
Computer Weekly has announced the final listing for the second annual UKtech50, the definitive list of the real movers and shakers in UK IT. Continue Reading
-
Case study: Nokia rethinks HR with web portal
Mobile phone manufacturer Nokia has reduced its HR costs by between 20% to 30% after rolling out a web-based HR portal for its 60,000 employees. Continue Reading
-
UKtech50: Honouring the most influential people in UK IT
Computer Weekly has announced the final listing for the second annual UKtech50, the definitive list of the real movers and shakers in UK IT - the CIOs, industry executives, public servants and business leaders driving the creation of a high-tech ... Continue Reading
-
UKtech50 2011: Vote now!
Voting has begun to find out who is the most influential person in the UK IT community. Continue Reading
-
The consumerisation of IT: it’s a trickle, not a tide, but you still need to be ready
If media headlines and supplier claims are to be believed, organisations today are faced with an unstoppable tide of many different types of personal device connected to the corporate network Continue Reading
-
The top five SME security challenges
Best practice in IT security and compliance for small and medium-sized enterprises (SMEs) is often seen as a "grudge purchase", but SMEs face the same threat as larger organisations - just without their budgets. Continue Reading
-
Application - aware networking emerges but has far to go
Application awareness is emerging on firewalls and WAN optimization devices,but efforts fall short of a network-wide strategy,especially at Layers 2 and 3. Continue Reading
-
Project management process challenges: Lessons from SBI, M&M, & NCDEX
Project management process is usually riddled with challenges. Use these insights from India’s largest enterprises to effectively manage your projects. Continue Reading
-
Self-encrypting drives: SED the best-kept secret in hard drive encryption security
The SED solves many common data loss problems and is easy to use and manage with minimal impact on system performance – yet relatively few businesses and governments use SEDs. Continue Reading
-
IT and marketing: working together for business success
The IT department builds things that scale and last, while marketing wants the next big thing - and needed it yesterday. How can heads of technology work effectively with marketing? Cliff Saran investigates Continue Reading
-
Green IT: How to deliver value to your business
IT leaders are under pressure to make sure IT investments are made in the right places and realising that sometimes-elusive goal of measuring tangible value from IT. Continue Reading
-
IPv6: The security risks to business
IT security professionals say the security holes that will open up in many business organisations as the world moves over to internet protocol version six (IPv6) constitute a substantial security concern Continue Reading
-
What is big data and how can it be used to gain competitive advantage?
Cliff Saran discovers how big data can deliver big business benefits without excessive IT investment Continue Reading
-
Why more businesses are nearshoring in Eastern Europe
Low-cost, highly skilled IT labour and a relatively close proximity to the UK is making Eastern Europe an increasingly attractive destination to UK businesses Continue Reading
-
Case study: How a small business can benefit from SaaS
Professional beauty products distributor SweetSquared considers using Microsoft Office 365 alongside browser-based SaaS. Continue Reading
-
How to combat advanced persistent threats: APT strategies to protect your organisation
Simple defence strategies will go a long way to preparing businesses for APTs Continue Reading
-
Top five IT finance and asset management issues
CIOs and anyone involved in IT procurement should assess the benefits of leasing and alternative financing over making capital purchases for new IT equipment, software and services. Cliff Saran looks at the options. Continue Reading
-
Case study: Nissan Saves €10 million on LEAF Battery Production
In 2010 Nissan launched the world’s first mass produced electric car available from a major manufacturer, the LEAF (Leading, Environmentally friendly, Affordable, Family car). Continue Reading
-
Clarion Events Extends the Life of its System i and JD Edwards environment with Magic Software
Clarion Events is one of the UK's leading exhibition and event organisers. For over 30 years Clarion Events has been creating and developing stimulating and effective exhibitions, conferences and seated events in the UK, EMEA, Asia and America. ... Continue Reading
-
Case study: Examples and Results from the Hotel, Online, Retail, and Consumer Products Industries
A popular lodging company, with several thousand locations around the world, needed to improve the conversion rate for booking rooms on its own Web site vs. on online travel agency sites. Web-savvy customers, searching for the best deals, were ... Continue Reading
-
Making your PC fleet green
Planning for your computer fleet to satisfy the increasing need for environmental friendliness isn't as tough as it sounds. Here are five things CIOs can do. Continue Reading
-
Case study: Bell Canada rings up big revenues with Infor CRM
Bell Mobility, a division of Bell Canada Enterprises, implemented an Infor customer relationship management solution, Interaction Advisor, and worked with Infor to transform Bell Mobility’s two call centers - with a combined 550 customer service ... Continue Reading
-
The power of ICT and its multiplier effect
Meet Michael Hedley, National Policy Manager for the Australian Information Industry Association (AIIA). Continue Reading
-
Secure your SCADA architecture by separating networks
Many critical national infrastructure systems include supervisory control and data acquisition (SCADA) functionality. These systems can be viewed as the set of software, computers and networks that provide remote co-ordination of controls systems ... Continue Reading
-
Budget for innovation: Case study - standardising Dell
This case study is part of a Computer Weekly roundtable on budget for innovation where IT leaders discussed the balance between spending on maintenance and innovation. Continue Reading
-
EDS report on 'dangerous' Chinook software published for the first time
Computer Weekly is publishing, for the first time, a technical analysis of the software installed on the Chinook Mk2 helicopter, the Chinook model which featured in the RAF's worst peacetime crash. Continue Reading
-
Apollo 11: The computers that put man on the moon
It is hard to appreciate the technical challenges involved in putting a man on the moon, but 1960s computer technology played a fundamental role. Continue Reading
-
Deduce the location of the remaining domino tiles
Go to the homepage >> Try more puzzlers... Continue Reading
-
Web 2.0 profiles
C hris Middleton profiles two very different approaches to so-called " w ikinomics " . One is a small not-for-profit organisation... Continue Reading
-
existing article from PC
In June 2008 tGOOGLE HYPERLINK IS HERE NHS Trust became the first trust to install the London Configuration Release...
Continue Reading -
Facing up to security perils of outbound traffic
What about the threat from within and, more specifically, the security issues that arise from outbound traffic risks? Continue Reading
-
Chinook helicopter disaster - computer software failure or pilot error?
Chinook helicopter crash: was it computer software failure or a cause we'll never know? This article gives the background to the Chinook helicopter disaster with links to all the relevant articles published by ComputerWeekly and other useful web ... Continue Reading
-
Managed VoIP keeps regatta's communications afloat
The world's largest rowing regatta utilises managed VoIP to ease its year-round communications needs -- and for a temporary system during its celebrated two-day event. Continue Reading
-
Vanderbilt hospital fights archive growth with grid
Vanderbilt University Medical Centre simplifies document management using Bycast's archiving grid system. Continue Reading
-
Checklist for purchasing hardware-based encryption
Encryption appliances sit inline on a network and use specially designed electronics to encrypt data at line speeds, essentially eliminating the performance penalty imposed by encryption software running on a general server. While software-based ... Continue Reading
-
CRM strategies for SMBs
Keeping your customers happy is job number one. With CRM software, luckily, that job becomes a lot easier. Here we present our top five CRM tips for SMBs. Continue Reading
-
Open source strategies for SMBs
One way to make the most of a tight budget is to invest in open source technologies. Not only are they generally more secure than most off-the-shelf proprietary products, they're usually free too. Here we present our top five open source tips for ... Continue Reading
-
How to select the right IP PBX
Selecting the right IP PBX system for your company can be complicated. Here are some important things to consider when purchasing an IP PBX. Continue Reading
-
Storage session downloads: infrastructure track
This track looks at San and Nas issues, virtualization, distance demands, remote offices and how to build out systems. Continue Reading
-
Surviving e-discovery
It's been eight months since the Federal Rules of Civil Procedure were amended, and e-discovery rulings are all over the map, creating chaos for companies that must comply. Continue Reading
-
SaaS apps being deployed by business units, not IT
When it comes to deploying applications via SaaS, IT is still behind the curve. What's preventing IT from getting control over the programs business units want? Continue Reading
-
Experts: IDS is here to stay
IDS technology has survived predictions that it would be replaced by IPS. One expert says it will remain a separate product while IPS is folded into firewalls. Continue Reading
-
Backup reporting expands to add capacity planning
Aptare adds capacity planning for primary data storage to its product line, joining Symantec in recent attempts to broaden the appeal of reporting software. Continue Reading
-
Asterisk PBX solves enterprise's growing communication problem
An Asterisk-based PBX proved to be the solution to one enterprise's communications growing pains. Continue Reading