In Depth
In Depth
IT operations management and IT support
-
Data Dynamics aims at single view of unstructured data
Data volume is ballooning, and storage is becoming more disparate, which makes the need for a single platform to manage storage and compliance a key requirement for organisations Continue Reading
-
The nation state threat to business
The SolarWinds hack shows the widespread damage possible from a nation state cyber attack. What is the threat to business and how can it be mitigated? Continue Reading
-
Security Long Reads: Cyber insiders reveal what’s to come in 2021
In this long read, we gather together the thoughts of cyber security insiders from across the industry to get their take on what will happen in 2021 Continue Reading
-
Patching: Balancing technical requirements with business considerations
With an increasing reliance on subscription models alongside the regular patching of software, updates have become an essential part of modern business practices. However, care needs to be taken to ensure the optimum patching process is implemented Continue Reading
-
Post-pandemic approaches to IAM for cloud security
Cloud technology may have saved businesses from catastrophe during the pandemic, but it has also introduced additional challenges around identity and access management. Here’s why IAM policies are crucial in the new normal Continue Reading
-
This Christmas, Covid-19 heightens retail security risks for everyone
Do you think it’s only retailers and consumers who need to consider cyber security when shopping online during the holidays? You’re dead wrong. This year, the Covid-19 pandemic and the shift to remote working has thrown a spanner in the works Continue Reading
-
Fix bottlenecks before tackling business process automation
Business processes evolve over time, and intelligent automation requires a thorough assessment of what is not working optimally Continue Reading
-
Need to know: Five key things about backup testing
We look at five key things to consider when it comes to backup testing – what to test, how often, making sure backups work, whether recovery is effective and ensuring processes are consistent Continue Reading
-
How to build an effective vulnerability management programme
As cyber criminals increasingly look to exploit vulnerabilities in software and hardware, businesses must build and implement an effective vulnerability management programme to counter this growing threat Continue Reading
-
How AI is helping to drive business process optimisation
Automating an inefficient process simply leads to a faster inefficient process. Artificial intelligence needs to be deployed to ensure business processes are optimal Continue Reading
-
Credential stuffing: When DDoS isn’t DDoS
Ten years ago, credential stuffing attacks posed a comparatively minor threat, but with an escalating number of data breaches, the threat posed has now increased. What are the solutions to this very human problem? Continue Reading
-
Tackling multicloud deployments with intelligent cloud management
Organisations are moving to hybrid and multicloud deployments, which complicates software assets tracking and workload management Continue Reading
-
Forrester: Why tagging should be used to manage hybrid assets
With complex hybrid environments, there is a need to apply IT asset management best practices across cloud and on-premise systems Continue Reading
-
Why securing the DNS layer is crucial to fight cyber crime
Domain name system security is often overlooked by organisations, but focusing on this layer could actually improve the effectiveness of cyber security strategies. We explore the latest DNS trends and best practice Continue Reading
-
Baking adaptability into the supply chain
The coronavirus crisis has highlighted the importance of data and automation in supporting an agile supply chain. Continue Reading
-
Digital safeguarding of physical workspaces can help employees return to 'normal'
Employees across all sectors are putting their trust in data – not just devices – upon their imminent return to physical workspaces Continue Reading
-
Double extortion ransomware attacks and how to stop them
As ransomware attacks increase, hackers are diversifying their tactics to get victims to hand over larger sums of money. We investigate the rise of double extortion attacks Continue Reading
-
Getting physical with datacentre security
Whether it is natural disasters, terrorism or break-ins, datacentres will be vulnerable to a range of risks unless they are physically secured. Here’s how you can improve the physical security of your datacentre Continue Reading
-
How to achieve resilience – the modern uptime trinity
IT leaders can take responsibility for ensuring their organisations are resilient during times of crisis. There are no quick fixes, but if you think it is expensive to ensure resilience in your IT systems, try frequent failure instead Continue Reading
-
APT groups’ mobile momentum finally faces resistance
State-backed APT groups are increasingly targeting mobile devices as Covid-19 puts the spotlight on remote working infrastructure security. We explore how the industry is fighting back Continue Reading
-
How to apply zero-trust models to container security
Containers have become a common fixture in software development, but they have resulted in new concerns for security teams. Is zero-trust the answer to tackling them? Continue Reading
-
Coronavirus: How to go back to the office safely and securely
Security teams should be used to supporting remote workers effectively by now, but what’s going to happen when people start returning to their offices? We look at the risks and how to address them. Continue Reading
-
Accurate data in, better insights out
The coronavirus pandemic has propelled data into the headlines, but it has also shown the challenges of dealing with incomplete datasets Continue Reading
-
Constructing the future for engineering – finding the right model where one size does not fit all
Design and engineering has rapidly evolved to be all about interconnected devices. We see how one of the leading manufacturing software suppliers is meeting the challenge Continue Reading
-
What are the security priorities for the post-coronavirus world?
The Covid-19 pandemic is forcing massive change across the business world and things may never go back to normal. What does security look like in this new world, and what will buyers be prioritising? Continue Reading
-
Storage 101: Crash-consistent vs application-consistent snapshots
We look at crash-consistent and application-consistent snapshots and backup, how they are defined, the pros and cons of each and the benefits and limits of Windows VSS Continue Reading
-
Coronavirus: How to cope with the digital skills divide
Since the Covid-19 pandemic started, employers need tech and digital talent more than ever. But how can organisations recruit and train the skills they need during a lockdown? Continue Reading
-
Snapshots 101: Array vs backup software
We run the rule over snapshots in storage arrays and backup software and find a range of capabilities that go from mere support to fully snapshot-centric approaches Continue Reading
-
Malaysia’s business continuity planning readiness a mixed bag
Larger Malaysian enterprises have BCP in place, but SMEs lag behind and will find it harder to weather the Covid-19 storm Continue Reading
-
Coronavirus: Can the networks take the strain?
It was predicted that the mass roll-out of computer networks would mean at some point that there was no difference between work and home as a working location. These assumptions are about to be tested to the full Continue Reading
-
Whisper it… but could a cyber attack be good for your career?
All too often it’s the CISO who carries the can for an enterprise security failure, but this might not be a bad thing. There’s lots of evidence to suggest that falling victim to a cyber attack may actually enhance your CV Continue Reading
-
Five ways that backup has changed since the days of tape
Back in the day, all this was tape, but times have changed, with cloud-to-cloud backup, cloud storage, virtual and physical backup appliances and myriad endpoint hardware Continue Reading
-
Top 10 storage deployment stories of 2019
Here are ComputerWeekly’s top 10 storage deployment stories for 2019, which see quite a move away from traditional SAN and NAS to hyper-converged, software-defined storage and object storage Continue Reading
-
Changes in the CI/CD pipeline
Continuous integration/continuous delivery is responsible for pushing out a set of “isolated changes” to an existing application. We look at how big these changes can be Continue Reading
-
Low-code maturity boosts efficiency and helps user acceptance
Low-code development is finding new maturity in enterprise application development, and organisations of all kinds are taking advantage of the trends Continue Reading
-
Making the case for integrated risk management
Security experts discuss how an integrated approach to risk and governance can be effectively managed Continue Reading
-
How Sporting Group tackles the Rugby World Cup
Sporting Group has readied its system monitoring to ensure the technology is able to cope with the huge demand for bets during the Rugby World Cup final Continue Reading
-
Data storage: The top five storage deployment pitfalls
Key pitfalls in data storage include silos, under-utilisation, backup and disaster recovery, plus neglect of skills and application requirements. We ask analysts how to avoid them Continue Reading
-
Cambridge Cognition CTO on applying server monitoring principles to suicide prevention
Cambridge Cognition CTO, Ricky Dolphin, discusses why it pays to think outside the box when trying to find technological answers to business and customer problems Continue Reading
-
Interview: Rackspace EMEA CTO on why it pays to put people at the heart of IT transformation
Rackspace EMEA CTO Lee James opens up about how taking a people-first approach to digital transformation raises staff morale and engagement levels while helping the managed cloud provider win new business Continue Reading
-
Microsoft’s modern desktop management
How cloud services make the critical business of keeping Windows 10 patched and up to date easier for administrators Continue Reading
-
Serving up managed desktops
Microsoft is dropping its table d’hôte-like Windows 7 menu in favour of a more tapas-style offering, in the form of Windows 10. This will mean big changes for sysadmins Continue Reading
-
Winning ways with Windows 10 updates
We look at how IT leaders can effectively manage the major changes Windows 10 imposes on businesses Continue Reading
-
How to avoid a hyper-convergence minefield
How firms can implement hyper-converged infrastructure to make cost and performance savings Continue Reading
-
Layer your approach to web security
Combining unified threat management with other security systems and a strategic CISO is essential to defend against threats Continue Reading
-
Choosing the right kind of hybrid cloud management
We look at the various factors businesses should consider when looking to solve their cloud management problems Continue Reading
-
Counting the costs of IaaS and SaaS
Cost management is a priority for organisations seeking to use infrastructure and software as a service Continue Reading
-
Steering a safe course through hybrid cloud
We look at why hybrid cloud can create a tricky infrastructure to manage Continue Reading
-
How to create a great strategy in the digital age
What are the best ways for technology leaders to create a strategy that is fit for the digital age? Computer Weekly asks the experts Continue Reading
-
How ASEAN firms can tap storage analytics to improve operations
With storage systems becoming more heterogeneous and siloed, some organisations in ASEAN are turning to storage analytics to reduce costs and address storage issues before they occur Continue Reading
-
How Australia is keeping pace with microservices
Adoption of microservices remains patchy in Australia, although some sectors pursuing digital transformation are catching up rapidly Continue Reading
-
DevOps and containers: How to get connected
We look at how to apply a DevOps approach to a container-based microservices architecture Continue Reading
-
Streamline infrastructure management through robotic automation
Robotic automation is changing the infrastructure management game, helping IT departments make fewer mistakes and boost their productivity Continue Reading
-
Enhance efficiency by automating IT services
We look at the role of artificial intelligence and chatbots in IT service management Continue Reading
-
Let automation take away the tedium
Computer Weekly looks at how far the suppliers of systems management tools and associated products have progressed with automation Continue Reading
-
IPsoft’s digital worker is part of a shift in human productivity
IPsoft used its annual user summit to allow customers to update themselves on the career of its cognitive digital agent Amelia Continue Reading
-
Inside the distros: A year in Linux development
Linux will turn 30 in three years. We look at how far the major Linux distributions – or distros – have come over the past year and what they might be able to bring in the future Continue Reading
-
Chrome OS: Why it may be time to approach desktop IT in a different way
The managed desktop has been running for nearly 20 years. Surely there must be a better way? We investigate Continue Reading
-
The death of the mainframe is greatly exaggerated, says CA
With mainframe software tools forming a key part of its overall growth strategy, CA Technologies remains proud of its mainframe heritage Continue Reading
-
How innovation in cycling helps Trek-Segafredo create a competitive edge
Cycling team is using technology from design to the track to improve its business and sporting competitiveness Continue Reading
-
What ‘born in the cloud’ means for developers
When it comes to building cloud-native apps, developers must code with an inherent appreciation for where processing, storage and analytics happens Continue Reading
-
Digital twins: Revolutionising product businesses
Among the technological drivers in industrial firms are IoT platforms that implement the concept of a digital twin. We explore the benefits Continue Reading
-
How going cloud native can increase app agility
We look at how cloud-native applications can deliver far more dynamic support to meet an organisation’s needs Continue Reading
-
Barriers to enterprise adoption of DevOps
As enterprises join the continuous delivery movement, we look at some of the challenges to DevOps adoption Continue Reading
-
Tooling up for DevOps
As organisations look to DevOps for continuous development, delivery and integration of business functions, careful control is crucial Continue Reading
-
Pros and cons of CRM software
Computer Weekly reviews the latest research into the leading customer relationship management and customer experience software providers Continue Reading
-
Five ways to cut the risk of Salesforce
Best practices for IT professionals seeking to implement Salesforce’s product portfolio Continue Reading
-
Agile unlocked: Pivotal uses paired programming and PaaS to bolster cloud app development
Digital transformation company Pivotal explains how paired programming, an empathetic work culture and open source PaaS help enterprises achieve their agile software development goals Continue Reading
-
How will the network manager’s role change in the SDN world?
We explore how traditional network managers are changing the habits of a lifetime as SDN remakes the enterprise network Continue Reading
-
Flash: it’s not all over yet
We look at the need for new approaches to storage as ever-increasing demands are placed on all-flash arrays Continue Reading
-
Cloud contracts are still a minefield
Cloud computing is maturing in the enterprise space, but the contracts that underpin cloud services have not evolved at the same pace Continue Reading
-
DevOps done right: Creating a collaborative and supportive business culture
Cultivating a supportive and collaborative business culture is considered central to getting DevOps to take hold in an organisation. We take a look at what this entails Continue Reading
-
Meet IoT security challenges head-on
Securing internet-connected devices should be a priority for IT leaders. We pinpoints the key areas that need to be targeted Continue Reading
-
Interview: British Medical Journal’s CDO talks datacentres, DevOps and desktops
BMJ’s chief digital officer explains how the 170-year-old healthcare publication has negotiated several major digital transformation projects since she joined in 2012 Continue Reading
-
Take the initiative on digitisation
We look at what is available to help businesses further digitise their operations to improve service, efficiency and profit Continue Reading
-
Industrial digitalisation
We explore how back-office IT is being applied to industrial machines Continue Reading
-
CW@50: A history of IT outsourcing
Computer Weekly looks at where and when IT outsourcing was invented and considers the changes the sector has gone through since Continue Reading
-
Evolving Glasgow’s Future City
It has been two years since Glasgow was awarded £24m under the Future City demonstrator programme. We find out how it has evolved Continue Reading
-
NoSQL offerings from Microsoft and Oracle
Cloud and big data applications have led to a new wave of NoSQL data stores. We look at what Microsoft and Oracle have to offer Continue Reading
-
Skype for Business: One year on, so what are the results?
It’s now a year since Microsoft transitioned the Lync unified communications suite into Skype for Business, but has the enterprise embraced or shunned it? Continue Reading
-
The Bimodal IT backlash: Should IT departments subscribe to the notion of a two-tier workforce?
Gartner’s Bimodal IT vision has captured the imaginations of some CIOs, but industry watchers have queried how well cultivating a two-tier IT department works in reality Continue Reading
-
How to yield the benefits of converged infrastructure
Bringing together the elements of enterprise IT generates a litany of operational and cost-cutting advantages – but care must be taken in balancing risk and in implementation Continue Reading
-
Co-ordinate outsourced services with Siam
We look at the practical considerations of implementing an effective service integration and management strategy Continue Reading
-
The business processes behind services management
We take a look at the essential steps an organisation must take to multi-source or bring in-house IT services Continue Reading
-
How CIOs can raise their 'IT clock speed' as pressure to innovate grows
CIOs are facing pressure from the board to roll out IT projects increasingly quickly. How can they do that without running unacceptable risks? This article, based on cutting-edge research among leading businesses, offers some answers Continue Reading
-
CW500: Are you human or are you machine?
As more things become internet-connected, systems designed to authenticate people now need to deal with machine-to-machine authentication Continue Reading
-
Evolving ITSM to support agile IT and BYOD
We look at how IT service management is addressing emerging technology today – and the needs of innovation in the future Continue Reading
-
Case study: Philips takes agile approach to building bridges between business and IT
Dutch technology giant talks up the success of its attempts to embrace agile IT delivery methods, and how it's shaping future customer engagements Continue Reading
-
Using SAP Hana as a data warehouse
Enterprises are using SAP Hana for in-memory data marts and SAP Business Warehouse implementations that integrate with other data warehouses Continue Reading
-
CW500: Dealing with disaster - how do companies cope?
At some point businesses will need to invoke a disaster recovery plan, but does it cover everything the modern digital company needs? Continue Reading
-
Tackling compliance issues in software as a service
There remain a number of compliance issues with Saas, none of which have a common, single fix Continue Reading
-
Should businesses upgrade to Windows 10?
Many organisations skipped the PC-unfriendly Windows 8 release. But Windows 10 is far more enterprise-focused Continue Reading
-
Turning machine data into operational intelligence
We look at how companies analyse server and security logs to tackle cybercrime and internal fraud, and optimise the user experience Continue Reading
-
Hotels.com turns to cloud and big data to drive up online holiday bookings
Online hotel booking site explains how the use of public cloud and NoSQL database tech has benefited its business Continue Reading
-
Overcoming the business and technology barriers to DevOps adoption
What steps should the enterprise take in adopting this approach to software development and delivery Continue Reading
-
CW500: Tackling complexity in IT
At a recent Computer Weekly CW500 Club event, CIOs discussed IT complexity and whether it hinders performance or is simply a consequence of complexity in business Continue Reading
-
Local authorities band together to share enterprise software
Local authorities in London and elsewhere in England are banding together to share enterprise software to cut costs, from the bottom up Continue Reading
-
Businesses need to equip staff with the tools to do the job
Workforces will become frustrated if they do not have the technology they need to deliver what their organisation wants Continue Reading
-
What will office desktop computing look like in 2020?
Over the next five years, IT departments will increasingly support a highly heterogeneous computing environment Continue Reading
-
Build in resilience to simplify workloads with hybrid cloud
Hybrid cloud offers benefits of hosted applications and offloading manual tasks but beware latency and outages in mission-critical functions Continue Reading