In Depth
In Depth
IT operations management and IT support
-
Credential stuffing: When DDoS isn’t DDoS
Ten years ago, credential stuffing attacks posed a comparatively minor threat, but with an escalating number of data breaches, the threat posed has now increased. What are the solutions to this very human problem? Continue Reading
-
Tackling multicloud deployments with intelligent cloud management
Organisations are moving to hybrid and multicloud deployments, which complicates software assets tracking and workload management Continue Reading
-
Forrester: Why tagging should be used to manage hybrid assets
With complex hybrid environments, there is a need to apply IT asset management best practices across cloud and on-premise systems Continue Reading
-
Why securing the DNS layer is crucial to fight cyber crime
Domain name system security is often overlooked by organisations, but focusing on this layer could actually improve the effectiveness of cyber security strategies. We explore the latest DNS trends and best practice Continue Reading
-
Baking adaptability into the supply chain
The coronavirus crisis has highlighted the importance of data and automation in supporting an agile supply chain. Continue Reading
-
Digital safeguarding of physical workspaces can help employees return to 'normal'
Employees across all sectors are putting their trust in data – not just devices – upon their imminent return to physical workspaces Continue Reading
-
Double extortion ransomware attacks and how to stop them
As ransomware attacks increase, hackers are diversifying their tactics to get victims to hand over larger sums of money. We investigate the rise of double extortion attacks Continue Reading
-
Getting physical with datacentre security
Whether it is natural disasters, terrorism or break-ins, datacentres will be vulnerable to a range of risks unless they are physically secured. Here’s how you can improve the physical security of your datacentre Continue Reading
-
How to achieve resilience – the modern uptime trinity
IT leaders can take responsibility for ensuring their organisations are resilient during times of crisis. There are no quick fixes, but if you think it is expensive to ensure resilience in your IT systems, try frequent failure instead Continue Reading
-
APT groups’ mobile momentum finally faces resistance
State-backed APT groups are increasingly targeting mobile devices as Covid-19 puts the spotlight on remote working infrastructure security. We explore how the industry is fighting back Continue Reading
-
How to apply zero-trust models to container security
Containers have become a common fixture in software development, but they have resulted in new concerns for security teams. Is zero-trust the answer to tackling them? Continue Reading
-
Coronavirus: How to go back to the office safely and securely
Security teams should be used to supporting remote workers effectively by now, but what’s going to happen when people start returning to their offices? We look at the risks and how to address them. Continue Reading
-
Accurate data in, better insights out
The coronavirus pandemic has propelled data into the headlines, but it has also shown the challenges of dealing with incomplete datasets Continue Reading
-
Constructing the future for engineering – finding the right model where one size does not fit all
Design and engineering has rapidly evolved to be all about interconnected devices. We see how one of the leading manufacturing software suppliers is meeting the challenge Continue Reading
-
What are the security priorities for the post-coronavirus world?
The Covid-19 pandemic is forcing massive change across the business world and things may never go back to normal. What does security look like in this new world, and what will buyers be prioritising? Continue Reading
-
Storage 101: Crash-consistent vs application-consistent snapshots
We look at crash-consistent and application-consistent snapshots and backup, how they are defined, the pros and cons of each and the benefits and limits of Windows VSS Continue Reading
-
Coronavirus: How to cope with the digital skills divide
Since the Covid-19 pandemic started, employers need tech and digital talent more than ever. But how can organisations recruit and train the skills they need during a lockdown? Continue Reading
-
Snapshots 101: Array vs backup software
We run the rule over snapshots in storage arrays and backup software and find a range of capabilities that go from mere support to fully snapshot-centric approaches Continue Reading
-
Malaysia’s business continuity planning readiness a mixed bag
Larger Malaysian enterprises have BCP in place, but SMEs lag behind and will find it harder to weather the Covid-19 storm Continue Reading
-
Coronavirus: Can the networks take the strain?
It was predicted that the mass roll-out of computer networks would mean at some point that there was no difference between work and home as a working location. These assumptions are about to be tested to the full Continue Reading
-
Whisper it… but could a cyber attack be good for your career?
All too often it’s the CISO who carries the can for an enterprise security failure, but this might not be a bad thing. There’s lots of evidence to suggest that falling victim to a cyber attack may actually enhance your CV Continue Reading
-
Five ways that backup has changed since the days of tape
Back in the day, all this was tape, but times have changed, with cloud-to-cloud backup, cloud storage, virtual and physical backup appliances and myriad endpoint hardware Continue Reading
-
Top 10 storage deployment stories of 2019
Here are ComputerWeekly’s top 10 storage deployment stories for 2019, which see quite a move away from traditional SAN and NAS to hyper-converged, software-defined storage and object storage Continue Reading
-
Changes in the CI/CD pipeline
Continuous integration/continuous delivery is responsible for pushing out a set of “isolated changes” to an existing application. We look at how big these changes can be Continue Reading
-
Low-code maturity boosts efficiency and helps user acceptance
Low-code development is finding new maturity in enterprise application development, and organisations of all kinds are taking advantage of the trends Continue Reading
-
Making the case for integrated risk management
Security experts discuss how an integrated approach to risk and governance can be effectively managed Continue Reading
-
How Sporting Group tackles the Rugby World Cup
Sporting Group has readied its system monitoring to ensure the technology is able to cope with the huge demand for bets during the Rugby World Cup final Continue Reading
-
Data storage: The top five storage deployment pitfalls
Key pitfalls in data storage include silos, under-utilisation, backup and disaster recovery, plus neglect of skills and application requirements. We ask analysts how to avoid them Continue Reading
-
Cambridge Cognition CTO on applying server monitoring principles to suicide prevention
Cambridge Cognition CTO, Ricky Dolphin, discusses why it pays to think outside the box when trying to find technological answers to business and customer problems Continue Reading
-
Interview: Rackspace EMEA CTO on why it pays to put people at the heart of IT transformation
Rackspace EMEA CTO Lee James opens up about how taking a people-first approach to digital transformation raises staff morale and engagement levels while helping the managed cloud provider win new business Continue Reading
-
Microsoft’s modern desktop management
How cloud services make the critical business of keeping Windows 10 patched and up to date easier for administrators Continue Reading
-
Serving up managed desktops
Microsoft is dropping its table d’hôte-like Windows 7 menu in favour of a more tapas-style offering, in the form of Windows 10. This will mean big changes for sysadmins Continue Reading
-
Winning ways with Windows 10 updates
We look at how IT leaders can effectively manage the major changes Windows 10 imposes on businesses Continue Reading
-
How to avoid a hyper-convergence minefield
How firms can implement hyper-converged infrastructure to make cost and performance savings Continue Reading
-
Layer your approach to web security
Combining unified threat management with other security systems and a strategic CISO is essential to defend against threats Continue Reading
-
Choosing the right kind of hybrid cloud management
We look at the various factors businesses should consider when looking to solve their cloud management problems Continue Reading
-
Counting the costs of IaaS and SaaS
Cost management is a priority for organisations seeking to use infrastructure and software as a service Continue Reading
-
Steering a safe course through hybrid cloud
We look at why hybrid cloud can create a tricky infrastructure to manage Continue Reading
-
How to create a great strategy in the digital age
What are the best ways for technology leaders to create a strategy that is fit for the digital age? Computer Weekly asks the experts Continue Reading
-
How ASEAN firms can tap storage analytics to improve operations
With storage systems becoming more heterogeneous and siloed, some organisations in ASEAN are turning to storage analytics to reduce costs and address storage issues before they occur Continue Reading
-
How Australia is keeping pace with microservices
Adoption of microservices remains patchy in Australia, although some sectors pursuing digital transformation are catching up rapidly Continue Reading
-
DevOps and containers: How to get connected
We look at how to apply a DevOps approach to a container-based microservices architecture Continue Reading
-
Streamline infrastructure management through robotic automation
Robotic automation is changing the infrastructure management game, helping IT departments make fewer mistakes and boost their productivity Continue Reading
-
Enhance efficiency by automating IT services
We look at the role of artificial intelligence and chatbots in IT service management Continue Reading
-
Let automation take away the tedium
Computer Weekly looks at how far the suppliers of systems management tools and associated products have progressed with automation Continue Reading
-
IPsoft’s digital worker is part of a shift in human productivity
IPsoft used its annual user summit to allow customers to update themselves on the career of its cognitive digital agent Amelia Continue Reading
-
Inside the distros: A year in Linux development
Linux will turn 30 in three years. We look at how far the major Linux distributions – or distros – have come over the past year and what they might be able to bring in the future Continue Reading
-
Chrome OS: Why it may be time to approach desktop IT in a different way
The managed desktop has been running for nearly 20 years. Surely there must be a better way? We investigate Continue Reading
-
The death of the mainframe is greatly exaggerated, says CA
With mainframe software tools forming a key part of its overall growth strategy, CA Technologies remains proud of its mainframe heritage Continue Reading
-
What ‘born in the cloud’ means for developers
When it comes to building cloud-native apps, developers must code with an inherent appreciation for where processing, storage and analytics happens Continue Reading
-
Cloud contracts are still a minefield
Cloud computing is maturing in the enterprise space, but the contracts that underpin cloud services have not evolved at the same pace Continue Reading
-
DevOps done right: Creating a collaborative and supportive business culture
Cultivating a supportive and collaborative business culture is considered central to getting DevOps to take hold in an organisation. We take a look at what this entails Continue Reading
-
CW@50: A history of IT outsourcing
Computer Weekly looks at where and when IT outsourcing was invented and considers the changes the sector has gone through since Continue Reading
-
NoSQL offerings from Microsoft and Oracle
Cloud and big data applications have led to a new wave of NoSQL data stores. We look at what Microsoft and Oracle have to offer Continue Reading
-
Co-ordinate outsourced services with Siam
We look at the practical considerations of implementing an effective service integration and management strategy Continue Reading
-
How CIOs can raise their 'IT clock speed' as pressure to innovate grows
CIOs are facing pressure from the board to roll out IT projects increasingly quickly. How can they do that without running unacceptable risks? This article, based on cutting-edge research among leading businesses, offers some answers Continue Reading
-
Case study: Philips takes agile approach to building bridges between business and IT
Dutch technology giant talks up the success of its attempts to embrace agile IT delivery methods, and how it's shaping future customer engagements Continue Reading
-
Using SAP Hana as a data warehouse
Enterprises are using SAP Hana for in-memory data marts and SAP Business Warehouse implementations that integrate with other data warehouses Continue Reading
-
Businesses need to equip staff with the tools to do the job
Workforces will become frustrated if they do not have the technology they need to deliver what their organisation wants Continue Reading
-
How to make applications resilient on AWS
Cloud services are susceptible to network and other outages. There is no silver bullet to boost the resilience of an AWS-hosted application Continue Reading
-
Microservices: How to prepare next-generation cloud applications
A microservice architecture promotes developing and deploying applications composed of autonomous, self-contained units Continue Reading
-
Choice and ease of use: key elements of a good app store
Companies need to focus on individual user requirements and make sure their app store delivers the right tools for the right job Continue Reading
-
What ingredients go into the successful app store?
An enterprise app store should provide the controlled availability of apps for employees.We look at what is available for organisations to use Continue Reading
-
Big Apple revolution: How to manage Macs in the enterprise
Apple’s products were once niche devices. Now, following a consumer-led initiative, they are widely used across the enterprise Continue Reading
-
Understanding the real value of IT and proving it to the business
At a time when costs are being continually squeezed, there is more pressure than ever to demonstrate the business value of technology Continue Reading
-
Troubleshooting datacentre management issues
Gaining better control of the datacentre has to be a high priority to ensure high levels of performance and availability Continue Reading
-
How to monitor and improve the health of your datacentre
Any datacentre manager looking to support the business should take an end-to-end systems management approach to keep the datacentre in shape Continue Reading
-
Wired vs wireless in the enterprise
What are the pros and cons of wired and wireless connectivity, and what does the future hold for the corporate environment? Continue Reading
-
How to manage your assets and control business costs
Asset lifecycle management allows the IT department to improve governance, mitigate risk and improve service quality and efficiency Continue Reading
-
Hacking for Dummies: Test your firewall rules
Before someone else hacks your firewall, test your firewall rules during the self-hacking process to test your network's security. Continue Reading