In Depth
In Depth
IT risk management
-
Your shout: Companies can plan for London network disaster
Have your say at computerweekly.com Continue Reading
-
Control in a mobile world
As more workers require mobile access to corporate systems from home or on the road, support costs can spiral. Jessica Twentyman... Continue Reading
-
Your shout: Match IT metrics to organisational goals
Have your say at Computerweekly.com Continue Reading
-
Richness in the mix
What is the relevance of multimedia in a converged network? Cath Everett assesses where rich media can fit in and add value to... Continue Reading
-
Planning for success
Converged networks for voice and data are on the road to dominance. They are not a majority of installations yet, but recent... Continue Reading
-
The essence of convergence
What are the essential elements of a converged network? Ross Bentley presents an overview of what such a network will likely... Continue Reading
-
Keep the bad guys at bay
Security is SMEs' biggest IT worry, according to the Computer Weekly/BT SME ICT Audit. The threat is real, but there are... Continue Reading
-
Government measures
The government sees IT as pivotal to its plans to improve public services, but the Treasury is in desperate need of benchmarks to... Continue Reading
-
Meeting notes: 15 September 2004
In a £2.4bn deal BT sold its property portfolio and transferred 400 staff to the newly independent company, Telereal, early in... Continue Reading
-
Kicking out dead time
A man of many talents, Gary Turner is a professional kick boxer and guest commentator on Eurosport as well as the proprietor of a... Continue Reading
-
Endemol UK backs up
Putting together the UK's most famous reality TV show, Big Brother, is no mean achievement. Endemol UK Productions produces over... Continue Reading
-
Who will reach the top?
With more and more CIOs coming from outside IT, the challenge is to nurture good managers - combining IT skills with commercial... Continue Reading
-
Mapping out a future for the NHS
The controversy over costs makes it easy to lose sight of what the government is aiming to achieve with its IT programme for the... Continue Reading
-
New security standards to strengthen supervisory control and data acquisition systems
The security of critical-infrastructure processes, long festering as a thorny issue in securing everything from food and water to... Continue Reading
-
In search of a better way to look for data
Search engine Google has enjoyed a successful flotation and its recently released desktop search tool is receiving lots of... Continue Reading
-
Don't close your eyes to workplace stress
IT's long-hours, deadline-driven culture makes it a breeding ground for stress. Both employers and staff could pay a high price... Continue Reading
-
Break out of old-school habits to secure Windows
When it comes to security, most Windows administrators follow an old-school programmer's mentality, which keeps them working in crisis management mode. In this column, SearchWindowsSecurity.com reader Al Reust explains how and why administrators ... Continue Reading
-
Highly secure systems work only if they need no input from users
In the second extract from his book, security expert Bruce Schneier argues that no end-user can be trusted to keep systems... Continue Reading
-
Adobe improves collaboration and security features in Acrobat 7
Adobe has improved security, collaboration and integration with enterprise software in the new version of the Acrobat document... Continue Reading
-
Meeting notes: 20 October 2004
Beware imposing Draconian penalties and liabilities on your outsourcer supplier, as they will backfire on you. Continue Reading
-
Appoint a champion to lead IT to changes
Setting a company-wide strategy for standards, technologies and suppliers can deliver a leaner, meaner business, if you put... Continue Reading
-
Protect yourself from meltdown
Invading computer viruses can enslave your PC, destroy your data and ruin your business. Protect yourself from meltdown says... Continue Reading
-
Ease the pain of complying with legislation
There is no way for IT directors to avoid the impact of regulation. Suppliers are of limited help but careful planning can reduce... Continue Reading
-
Get the most from your IP network
Joe O’Halloran sees what you can expect to gain from a single converged network for your voice, video and data requirements Continue Reading
-
IP: The financial benefits
How can you use IP networks to gain financial benefits in addition to taking advantage of sophisticated features? Antony Adshead... Continue Reading
-
Time for government to get tough
In an extract from his bestselling book, security expert Bruce Schneier calls for legal reform to curb the activities of hackers... Continue Reading
-
House of Lords ruling increases confusion over IT patents
A ruling in the House of Lords on patents will create more confusion about when companies can enforce patents on technology they... Continue Reading
-
Many medicines but no cure for online ID theft
Banks and online retailers are struggling to protect their customers from criminals who covet their personal financial... Continue Reading
-
Security and integration burden AS400 managers
Single sign-on, security, heavy workload and constantly changing technical and business requirements are among the issues that... Continue Reading
-
Use a carrot, not a stick on suppliers, says Yard
Former Inland Revenue IT director says incentives, not penalties, are key to success Continue Reading
-
Boost performance with a five-step plan
IT managers have become adept at cost-cutting during economic downturns, but initiatives for corporate expansion require a very... Continue Reading
-
Barbara Rembiesa, IAITAM president, talks about IT asset management
Barbara Rembiesa is president of the International Association of Information Technology Asset Managers (IAITAM), a for-profit... Continue Reading
-
Four techniques that will become essential for securing growing IP-enabled networks
IP devices are creating a network architecture that demands better security Continue Reading
-
Getting the green light from the board
In an extract from his book, Common Approach, Uncommon Results, Ian Gotts discusses managers' information overload and how to get... Continue Reading
-
The threat from within: in-house security is business' Achilles' heel
Modern working practices can expose companies to attack Continue Reading
-
Shifting business demands place burden on IT
Dealing with shifting business demands will be the biggest challenge for UK IT directors over the next 12 months, according to a... Continue Reading
-
Harrow installs central database to help make housing services more accessible
The London Borough of Harrow has installed a central database to help improve the way it runs council housing services. Continue Reading
-
Flexible approach will pay long-term dividends
IP and IP networks, and the applications they support, can transform your company. The end result is that your business will... Continue Reading
-
The painless way to secure your firm
David Bicknell delves into the vital area of the security of IP networks. He finds that there are a number of methodologies and... Continue Reading
-
Buyer be aware
If you decide to embark upon the IP route, from whom will you be buying the essential technology? What knowledge does the average... Continue Reading
-
IP everything, essentially
What are the fundamental deliverables of IP networks? How can you use IP networks to gain financial benefits in addition to... Continue Reading
-
The basis of profitability
Not so long ago, you didn't have much choice - your IT and communications requirements were acquired, implemented and maintained... Continue Reading
-
Messaging threat affects firms of all sizes
SMEs and City firms alike have caught staff divulging sensitive data through instant messaging systems. As use of the technology... Continue Reading
-
Negotiate recycling costs with suppliers
Suppliers will be handling the disposal of old equipment under EU recycling laws in 2006, but IT managers should prepare now by... Continue Reading
-
Can Sun's JSC bridge Java complexity gap?
Enterprise Java development remains challenging but will Sun's new kid on the block JSC build support to challenge the might of... Continue Reading
-
Follow basic principles to take the guesswork out of supplier choice
Selecting the right software product has always been a difficult task. This summer Newham Borough Council attracted international... Continue Reading
-
Ballmer promises better security and value
Microsoft chief executive Steve Ballmer showed himself ready to face up to user concerns about security and licensing when he... Continue Reading
-
Seize the time
IT directors should take the initiative throughout the tendering, contract and support stages of their supplier relationship if... Continue Reading
-
Reading a sealed letter - making anti-virus measures and encryption work together
Many users want encypted mail, but it can harbour viruses and dubious content Continue Reading
-
PeopleSoft's future hard to predict
Oracle's plans for PeopleSoft have never been harder to read than they are now. Continue Reading
-
'Throttle' highly connected users and reduce instant messaging worms
A few users connected to popular instant messaging networks can spread worms - and restricting communications from "highly... Continue Reading
-
Security battle will never end, warns Ballmer
Steve Ballmer, chief executive officer of Microsoft, is taking a realistic view of security, Microsoft's product road map, the... Continue Reading
-
Making more of Moore's Law
Keeping to the rule that processing power will double every 18 months is a tough challenge, but developers have a few tricks up... Continue Reading
-
How can I improve standard documents?
SME strategy special: Expert advice on desktop office productivity applications Continue Reading
-
Can you make network users pay to play?
Tired of users gobbling network bandwidth? Charging for usage of the network can save costs, but IT directors should be aware... Continue Reading
-
Clean data, clean profit
Big cost savings and improved return on investment are just two of the benefits of cleaning up your data and making sure it stays... Continue Reading
-
Arts bodies get template to follow IT best practice
Arts organisations wanting to get their IT up to scratch now have a template to work from, thanks to a new IT management... Continue Reading
-
SSL VPNs make the connection with users
Virtual private networks based on Secure Sockets Layer offer a simpler, more secure way for remote users to connect to corporate... Continue Reading
-
An end to one size fits all
IT and communications suppliers realise that there is value in the SME market and have begun to produce cut-down versions of... Continue Reading
-
Management matters
Cath Everett finds out how you stay on top of networking. What are the management issues related to your telecoms and networks... Continue Reading
-
Laying down the law
What are the legal and regulatory issues that could affect the running of your company? What are their ramifications both in... Continue Reading
-
Making mobiles safe
Need to protect your PDA or lock down your laptop? Danny Bradbury looks at how the IT industry is developing protection to shield... Continue Reading
-
Travelling light
Wireless technology is key to better control of the supply chain. As Candice Goodwin discovered, it all comes down to getting... Continue Reading
-
Wall Street spells out security measures
Senior Wall Street executives have outlined for Congress unprecedented security measures that continue to be revised and improved... Continue Reading
-
A model of efficiency
Business process management can not only help automate everyday tasks, but any change to the infrastructure of the system can be... Continue Reading
-
NHS IT plan: the unanswered questions
Briefing papers from NHS IT directors to their trust boards reflect both a desire to make the national programme succeed and... Continue Reading
-
Oracle switches to monthly patch as hackers target enterprise apps
Single patch with multiple fixes issued for core enterprise productsl Security firms report rise in exploits against enterprise... Continue Reading
-
Bank of Ireland UK invests in reliable system
As a financial services company, Bank of Ireland UK needed a highly scalable and reliable system Continue Reading
-
Seeboard feels power of Computacenter service
Power utility Seeboard needed an IT partner to run its desktop and network servers while still allowing it to control its IT... Continue Reading
-
Computacenter delivers for Tradeteam
Drinks logistics firm Tradeteam is able to deliver a high-quality IT services to its users with the help of Computacenter Continue Reading
-
Open Business Exchange finds host
SiteHost provided the solution for e-invoice delivery service Open Business Exchange Continue Reading
-
Business as usual quest for Dundas & Wilson
Law firm Dundas & Wilson had to build its entire IT infrastructure from scratch and still maintain its service to customers. Continue Reading
-
Setting the standards to make your firm flourish
The knowledge and the implementation of the legislation and standards that impinge on managed services is vital. As Simon Quicke... Continue Reading
-
Balance of power shifts to users in IT disputes
Many IT directors are still unaware of the legal protection they have when IT projects go wrong. This is despite the fact that a... Continue Reading
-
Olympic-size security demands advance planning
By Peter Sayer If there's one thing the Atos Origin SA team understands as lead contractor for the Olympic IT infrastructure,... Continue Reading
-
Undercover operations
Computer crime is on the rise, but collecting admissible evidence is a tricky business. Helen Beckett gets expert advice on what... Continue Reading
-
Undercover operation
Computer crime is on the rise, but collecting evidence is a tricky business. Helen Beckett gets expert advice on what threats IT... Continue Reading
-
Removing the barriers to success
All business relationships have some risk attached. Simon Quicke looks at the risks from managed services and how you can... Continue Reading
-
Web system lets Kent emergency services share crime data and plan use of resources
Kent services share data via website to improve service planning Continue Reading
-
HP spells out adaptive enterprise strategy
In an interview, Todd DeLaughter, vice-president and general manager of the Management Software Organisation at Hewlett-Packard,... Continue Reading
-
Doctors feel left out of NHSIT plans
Support from clinicians for the government's £2.3bn national programme for IT (NPfIT) in the NHS seems to be faltering just as... Continue Reading
-
Stormy weather
Take a leaf from the books of three IT directors who have endured serious management and technology problems and successfully... Continue Reading
-
MPs slam lack of clarity in ID card scheme
Home Affairs Select Committee criticises the government's plans to introduce national ID cards as poorly thought out and lacking... Continue Reading
-
Cash in on invention
IT directors could be in danger of unwittingly breaking patents if a draft EU directive is enacted. But they could also steal a... Continue Reading
-
Nature leads the way
Ant hills are an unlikely source of inspiration, but some large organisations are developing biologically-based techniques in the... Continue Reading
-
Finance giants unwittingly offer 'phishers' a line
Leading financial institutions have adopted a more aggressive attitude toward online identity theft cons known as "phishing... Continue Reading
-
Hack-proof and crash resistant - have you discovered the OS world's best-kept secret?
OpenVMS offers unmatched robustness for business-critical apps Continue Reading
-
Mass Trojan on the loose
Anti-virus and e-mail security companies have issued warnings about a new Trojan horse program that they claim is being... Continue Reading
-
Compliance: Make it work for you
Compliance offers the opportunity for IT directors to overhaul business processes, make major savings and increase efficiency.... Continue Reading
-
Decision not to publish Gateway reviews does not bear scrutiny - and here's why
It is in the public interest to publish reviews of public sector IT projects. Continue Reading
-
MaxDB fitted out with 64-bit support
SAP and partner MySQL are building support for 64-bit computing into SAP's open-source database. Continue Reading
-
I'm mobile, fly me
A field force brandishing PDAs can give a company an instant lift. But cultural, operational and security issues need to be... Continue Reading
-
Standards will determine RFID's success
Many technologies have stumbled over standards. Mark Vernon assesses whether RFID tags have a solid enough grounding for them to... Continue Reading
-
Bichard criticisms spur Home Office move on national police intelligence network
Police forces in England and Wales lag behind Scottish data management model Continue Reading
-
This sporting IT life
International sport can offer the IT professional a unique opportunity to work in a field they feel passionately about. Lindsay... Continue Reading
-
Inland Revenue readies itself for handover
The Inland Revenue is about to transfer its IT systems and staff from EDS to Capgemini, but will its beleaguered tax systems cope... Continue Reading
-
The art of successful offshore outsourcing
Even IT executives who have successfully outsourced parts of their services abroad can tell you the road to profitable relations... Continue Reading
-
Rise in web-based help opens up career path for technical writers
Technical writers reduce pressure on the IT helpdesk Continue Reading
-
Arup dumps 80 devices for a 32Tbyte San
Engineering consultancy Arup has migrated from direct-attached storage to a storage area network using a centralised storage... Continue Reading
-
Half of firms rebuke staff for excessive use of e-mail
Staff abuse of e-mail at work poses a far bigger problem to employers than internet misuse, according to an annual survey by the... Continue Reading