In Depth
In Depth
IT news in your industry sector
-
Bill Binney, the ‘original’ NSA whistleblower, on Snowden, 9/11 and illegal surveillance
Always a patriot: Computer Weekly talks to Bill Binney, the senior NSA official who blew the whistle before Edward Snowden Continue Reading
-
NHS data security: Lessons to be learned
The NHS does not always provide a trusted repository for patient data, but some trusts are examples of good practice in action Continue Reading
-
Businesses need to equip staff with the tools to do the job
Workforces will become frustrated if they do not have the technology they need to deliver what their organisation wants Continue Reading
-
Wi-Fi in the sky: The good, the bad and the ugly
With in-flight internet options spreading around the world, which services should discerning business travellers try, and which should they avoid? Continue Reading
-
How building information modelling is changing the construction industry
The Cabinet Office says that by 2016, “collaborative 3D building information modelling will be required on all government projects” Continue Reading
-
Cyber crime: What every business needs to know
Computer Weekly gets the low-down on cyber crime from law enforcement officers and investigators Continue Reading
-
What are the options for electronic patient records in the NHS after NPfIT?
Many hospitals lack comprehensive electronic patient record (EPR) systems. What are the options now, in the wake of the NPfIT disaster? Continue Reading
-
A closer look at Google Container Engine
In just 12 months, Docker has transformed from a simple open-source container management project into a powerful platform Continue Reading
-
Quantum key distribution is the future for secure comms
Quantum teleportation is a technology that will ultimately replace encryption as the foundation of communication security Continue Reading
-
How to make applications resilient on AWS
Cloud services are susceptible to network and other outages. There is no silver bullet to boost the resilience of an AWS-hosted application Continue Reading
-
Microservices: How to prepare next-generation cloud applications
A microservice architecture promotes developing and deploying applications composed of autonomous, self-contained units Continue Reading
-
The state of mobile back end as a service
Common mobile application services are increasingly being hosted on central back-end servers – but what does that mean for the enterprise? Continue Reading
-
Networking technologies emerging in the enterprise
We look at the latest networking technologies on offer, and those being adopted in the enterprise Continue Reading
-
The business challenges and benefits of identity and access management
IT leaders gathered at a CW500 Club meeting to hear from peers about the challenges of identity and access management Continue Reading
-
Currency exchange business Travelex cuts HR costs by 25% with cloud IT systems
Travelex's cloud human resources (HR) project survived a budget overrun to cut costs and job recruitment times Continue Reading
-
How the BBC became digital in three-and-a-half years
The BBC has undergone a digital transformation that started 18 months prior to the London 2012 Olympic Games Continue Reading
-
Interview: Ed Vaizey MP talks digital economy and digital skills
Minister for the digital economy Ed Vaizey discusses his new role and the future of digital policy Continue Reading
-
Social media for communication inside the enterprise
Companies have long used social media technology such as Facebook and Twitter to reach more customers – but how are businesses using it internally? Continue Reading
-
Backup and disaster recovery in the age of virtualisation
One of the benefits of using virtual machines is the scope for improved backup. We look at the product offerings from traditional and new suppliers Continue Reading
-
Q&A: MarkLogic CEO Gary Bloom talks strategy
Gary Bloom, CEO of NoSQL database supplier MarkLogic, talks to Computer Weekly about strategy Continue Reading
-
The digital CIO: Why embrace digital innovation?
Having the right digital strategy can make or break an organisation Continue Reading
-
Government's digital strategy could cut red tape
Governments can harness digital technology to make public services more efficient and generate significant cost savings Continue Reading
-
Choice and ease of use: key elements of a good app store
Companies need to focus on individual user requirements and make sure their app store delivers the right tools for the right job Continue Reading
-
Big Apple revolution: How to manage Macs in the enterprise
Apple’s products were once niche devices. Now, following a consumer-led initiative, they are widely used across the enterprise Continue Reading
-
A guide to smart home automation
Unless it is a new build, the challenge in creating a smart home is that technology must work irrespective of the age of the property Continue Reading
-
The pros and cons of iPads in the enterprise
The iPad is often the first platform for which developers produce apps – but it is substantially more expensive than its competitors Continue Reading
-
Principles of compliance in the financial services industry
Compliance in financial services can appear a staggeringly complex web of laws and regulations, but some key principles apply, says Mathieu Gorge of Vigitrust Continue Reading
-
Can the mainframe remain relevant in the cloud and mobile era?
IBM mainframes run more than 1.1m transactions per second, yet the mainframe has remained largely unfashionable. We investigate Continue Reading
-
Using NoSQL databases to gain competitive advantage
NoSQL is attracting growing interest from businesses - we examine three case studies: Amadeus, i2O and Temetra Continue Reading
-
Target data breach: Why UK business needs to pay attention
Late last year, US retailer Target was hit by one of the biggest data breaches in the industry's history. So what happened and why is it relevant to UK businesses? Continue Reading
-
The digital CIO: How digital technology will change the way organisations work
If you are an IT leader, digital technology is likely to be a pivotal factor in your career over the next five years Continue Reading
-
Hacktivism: good or evil?
IT lawyer Dai Davis looks at the rise of hacktivism and its impact on business and international politics Continue Reading
-
No more email? Why companies are turning to collaboration technology
Collaboration technologies are helping companies improve their employees' work-life balance Continue Reading
-
A guide to APM for the network manager
Has application performance management become a much needed discipline for the network manager? We examine the issues for IT departments Continue Reading
-
Troubleshooting datacentre management issues
Gaining better control of the datacentre has to be a high priority to ensure high levels of performance and availability Continue Reading
-
Create a mobile policy employees can trust
With Gartner predicting a fifth of all enterprise BYOD projects would fail by 2016, we look at how businesses can embrace mobility successfully Continue Reading
-
The future of the tablet computer in the enterprise
Tablets come in all manner of profiles and on a variety of platforms – but which will shape up as the workplace favourite of the future? Continue Reading
-
Big banks' legacy IT systems could kill them
A banking T-Rex is dying and nimble competitors will pick at its carcass. Is it too late for the retail bank giants to overhaul their IT and survive? Continue Reading
-
Next generation hotspots: The future of Wi-Fi?
A new solution for connecting to wireless hotspots could change the user experience forever. But as Steve Evans points out, there will need to be more collaboration in the telecoms and networking industries before we start to reap the benefits. Continue Reading
-
Realising the benefits of a totally connected world
The internet of things will transform everyday life, from managing airports’ passenger flow to heating buildings and caring for the elderly. Continue Reading
-
Optimising performance and security of web-based software
On-demand applications are often talked about in terms of how suppliers should be adapting the way their software is provisioned to customers. Continue Reading
-
Future Gazing: The Future of IT in 2020
The next six years will see the influence of technology accelerate, and that will mean radical changes for the role of the IT department and the CIO Continue Reading
-
Why agile development races ahead of traditional testing
Traditional testing practices optimise large, centralised testing but struggle to support the rapid delivery of agile development. Continue Reading
-
Financing IT purchases
There are a number of ways a new IT platform can be acquired but choosing the right method for your business is key. Continue Reading
-
High street stores embrace digital to entice customers
Customers are using technology in favour of the high street, but some stores are fighting fire with fire. Continue Reading
-
How Capgemini keeps its Merlin datacentre green and energy-efficient
Capgemini's Swindon-based Merlin datacentre is one of the most energy-efficient in the world. But what makes it green? Continue Reading
-
A guide to WebRTC
Real-time communications standards aim to help more users speak with ease over the internet. Computer Weekly looks at how the systems work Continue Reading
-
Top 10 Android security tips
As Android becomes more prevalent in the enterprise, Computer Weekly gives you 10 top tips for keeping your devices secure Continue Reading
-
VPNs: The past, present and future
We give you a rundown of all you need to know about virtual private networks and how the cloud is changing their future Continue Reading
-
A business case for games play at work
How businesses can use computer games techniques to motivate staff at work Continue Reading
-
Big data journalism exposes offshore tax dodgers
How journalists harnessed big data to challenge offshore financial secrecy Continue Reading
-
An introduction to cyber liability insurance cover
Cyber liability insurance cover has been around for 10 years, but most security professionals seem to have not heard of it or know that it exists Continue Reading
-
How to monitor and improve the health of your datacentre
Any datacentre manager looking to support the business should take an end-to-end systems management approach to keep the datacentre in shape Continue Reading
-
From chess to ping pong: How Pegasystems is capturing the Fortune 500
Pegasystems is winning business from the world's leading companies as business process management technology enters the mainstream Continue Reading
-
Tools for talent management
An increasing number of human resources management systems are coming to market.. What are the benefits? Continue Reading
-
Manage identity and access to improve business processes
Streamlining identity and access management is essential to exploiting your organisation’s assets and employees’ productivity. Continue Reading
-
Wireless charging: The story so far...
Rupert Goodwins looks into the technology behind wireless charging and whether it is good enough yet for wider adoption Continue Reading
-
Workplace IT services in flux: wherever, whenever, whatever
Enterprise computing is in upheaval as the emphasis shifts towards automation and user-device provision. Continue Reading
-
CW500: 4G to underpin ubiquitous mobile services
The catalyst for debate at April’s CW500 Club meeting was the arrival of the 4G mobile network in the UK Continue Reading
-
The internet of things is set to change security priorities
IT leaders must protect against the security risks introduced by the growing interaction between technology and the physical world. Continue Reading
-
How to create a good information security policy
Information security policies provide vital support to security professionals, yet few organisations take the time to create decent policies Continue Reading
-
Windows XP end of support: What to do next
CIOs may not wish to carry on running a 12-year-old desktop OS, but thousands of incompatible applications leave many with no choice Continue Reading
-
100Gbps Ethernet – is it time to move?
Do you need 100Gbps Ethernet in your datacentre, or is the technology just going through a hype cycle? Computer Weekly investigates. Continue Reading
-
The history of OpenFlow
Computer Weekly takes a look back at the beginnings of the software-defined networking protocol and the technology behind it Continue Reading
-
Wired vs wireless in the enterprise
What are the pros and cons of wired and wireless connectivity, and what does the future hold for the corporate environment? Continue Reading
-
How to tackle big data from a security point of view
Before leaping into big data, companies must be clear what they are trying to achieve, otherwise their investment will be wasted Continue Reading
-
Top technologies that can make your datacentre green
Energy-efficient technologies that can reduce running costs in the datacentre and across the business Continue Reading
-
How to find the most vulnerable systems on your internal network
Most corporate networks share common vulnerabilities, but many could be mitigated with education in “hacker thinking” for technical staff Continue Reading
-
Social media: A security challenge and opportunity
Generation Y workers are posing increasing security challenges to their employers as they share data unreservedly Continue Reading
-
Process big data at speed
Low-cost solid state memory is powering high-speed analytics of big data streaming from social network feeds and the industrial internet. Continue Reading
-
How 3D printing impacts manufacturing
With the ability to create on-demand specialist tools, any initial investment in 3D printing technology could quickly pay for itself. Continue Reading
-
GE uses big data to power machine services business
GE, one of the UK's largest manufacturers, is using big data analytics with data generated from machine sensors to predict maintenance needs Continue Reading
-
The limitations of traditional SaaS integration approaches
Time and budget constraints are forcing many organisations to rethink their integration strategy and find a well-aligned solution Continue Reading
-
How to integrate SaaS with your local business systems
As software as a service matures, CIOs need to look at how well cloud-based products integrate with existing on-premise systems Continue Reading
-
Business priorities: what to protect, monitor and test
How information security professionals can prioritise what to protect, monitor and test in the light of current budget and resource constraints Continue Reading
-
Amazon: Gold standard of the cloud?
Amazon Web Services is the benchmark for cloud in the enterprise but can it handle the challenge of federated cloud services? Continue Reading
-
Shore up your organisation’s fleet with the right MDM
There are many mobile device management products, but approaches vary. We outline how to choose the right one for your business Continue Reading
-
How to preserve forensic evidence in the golden hour after a breach
There is a golden hour at the outset where a clear head and good planning can make or break any subsequent forensic investigation Continue Reading
-
How to secure Macs in the enterprise
Apple computers are becoming increasingly used in the enterprise - we look at how to securely introduce Macs in the corporate network Continue Reading
-
Software-defined datacentres demystified
As datacentre managers increasingly rely on software and automation, what can a software-defined datacentre bring to the enterprise? Continue Reading
-
How to manage your assets and control business costs
Asset lifecycle management allows the IT department to improve governance, mitigate risk and improve service quality and efficiency Continue Reading
-
CW500: Managing the mobile workforce (part 1)
Mobile working has transformed Colt Telecommunications beyond recognition over the past three years Continue Reading
-
Tune Raid performance to get the most from your HDDs
Tune Raid performance at the storage controller to match application I/O demands to optimal hard drive (HDD) performance Continue Reading
-
Gathering retail intelligence
Learning their customers’ habits through business intelligence is vital for bricks-and-mortar retailers to stay competitive Continue Reading
-
Setting up a botnet is easier than you think
Acquiring, installing, configuring and using a powerful data-stealing banking Trojan toolkit is not as difficult as it sounds Continue Reading
-
Outsourcing IT services: goals and negotiations
Tactical and strategic negotiations are important to businesses of all sizes, from SMEs to the largest enterprises Continue Reading
-
How to make sense of the big data universe
Analysing big data can be a daunting prospect, so find out what you need, where it is and how to deal with it Continue Reading
-
Best practice in outsourcing security
The issues CIOs must consider in balancing security needs and budgetary constraints Continue Reading
-
High-performance computing drives high-performance F1 cars to success
Jennifer Scott investigates how Formula 1 team Marussia uses a supercomputer to design and test its cars on a budget Continue Reading
-
How technology is changing BPO
Karl Flinders discovers how IT has become central to the provision of outsourced business processes Continue Reading
-
How to make your network green
Make sure your network and datacentre run efficiently as part of a green networking strategy Continue Reading
-
Buyer's Guide: How to upgrade to IPv6
IPv6 is an increasingly hot topic in the networking industry. We examine the issues for older hardware support. Continue Reading
-
Buyer's Guide: How to prepare your organisation for IPv6
The switch to IPv6 – on 6 June – shows just how imminent the transition from IPv4 to IPv6 is. Is your organisation ready? Continue Reading
-
When X.509 security certificates fail, servers break
Why are X.509 certificates causing computers to stop dead? Continue Reading
-
Interview: From Apollo Mission to agility manifesto
One of the 17 original authors of the agile manifesto was Jim Highsmith who, after a previous tenure at NASA, now works as an executive consultant at ThoughtWorks. Continue Reading
-
UKtech50: Meet the 50 most influential people in UK IT
Computer Weekly has announced the final listing for the second annual UKtech50, the definitive list of the real movers and shakers in UK IT. Continue Reading
-
What are the outsourcing options for the SME?
The pace of change of technology can cause the small and medium enterprise (SME) critical issues which outsourcing can only address with carefully researched decisions. Continue Reading
-
Case study: Nokia rethinks HR with web portal
Mobile phone manufacturer Nokia has reduced its HR costs by between 20% to 30% after rolling out a web-based HR portal for its 60,000 employees. Continue Reading
-
UKtech50: Honouring the most influential people in UK IT
Computer Weekly has announced the final listing for the second annual UKtech50, the definitive list of the real movers and shakers in UK IT - the CIOs, industry executives, public servants and business leaders driving the creation of a high-tech ... Continue Reading
-
UKtech50 2011: Vote now!
Voting has begun to find out who is the most influential person in the UK IT community. Continue Reading