In Depth
In Depth
IT risk management
-
Would I lie to you?
Duping prospective employers with a CV that doesn't tell the truth is a dangerous game. Continue Reading
-
Storage: when NAS met SAN
Two enterprise storage technologies that were fighting each other for customers have now taken off the gloves and committed to... Continue Reading
-
UK dotcoms - advice to newbies
A year into Britain's e-commerce revolution, the pioneers who learned on the job offer some key advice to new entrants Continue Reading
-
Minimising merger pains
When GrandMet and Guinness merged in 1997 to form Diageo, they had similar IT systems and processes. The challenge lay in... Continue Reading
-
Online dating is it love at first site?
More and more love seekers are clicking on to online dating agencies to find true romance. Isabel Choat gets to the heart of the... Continue Reading
-
Ultra160 SCSI: the next generation
The new Ultra160 SCSI interface provides better bandwidth while maintaining full compatibility with previous standards Continue Reading
-
Recruitment freeze ends salary boom - for now
The second half of 1999 saw IT salaries stagnate during the Y2K freeze. Nicholas Enticknap reports Continue Reading
-
Contracts must reflect a contractor's status
Tina MiltonContracts need to reflect the work a contractor is doing onsite, and there will need to be a significant review of current working...
Continue Reading -
In this life, one thing counts
Money, or the lack of it, is what makes budget proposals a gruelling ordeal for IT directors. Mark Lewis explains how best to... Continue Reading
-
Gateway to the West Country
Local authority information rests easily alongside travel and tourism features at this dynamic West Country Web site Continue Reading
-
US seeks EU deal on data privacy
The European Union and the US want to resolve their dispute on data privacy by the end of March because the US is worried that a delay may disadvantage its... Continue Reading
-
The Immigration Service: anatomy of an IT disaster
The Public Accounts Committee has exposed IT blunders at the Immigration Service. Mike Simons reports Continue Reading
-
Ten steps to e-commerce heaven
Is your company planning to get online? Here's the eBusiness review 10-point guide to a successful roll-out. It's the least you... Continue Reading
-
Stake your claim in the knowledge management game
With Microsoft and Lotus revving up their knowledge management offerings, a question hangs over the role IT departments will play in the drive to share knowledge more effectively Continue Reading
-
Investigating cyberspace
Internet and computer-related crime is stretching the UK's law enforcement agencies to breaking point. Cybercrime expert Peter... Continue Reading
-
NATS stakes its reputation on meeting operational deadline
Experts are impressed with the systems and air traffic management are confident that it can be done, but could Government... Continue Reading
-
Think like the hacker
Is your computer network secure? Undoubtedly not. Nothing is ever 100% secure. However, there are things you can do to make the... Continue Reading
-
Thin clients enter the space age
From versatile desktop terminals to the next generation of mobile phones, today’s thin client technology promises improved... Continue Reading
-
How to prevent a staff exodus
To avoid a stampede of qualified staff to greener pastures, try rewarding individual skills rather than branding everyone with... Continue Reading
-
Disaster area?
Government ITprojects need not fail so dramaticallyIt is time to clarify the debate on government IT "disasters". High-profile projects, such...
Continue Reading -
Strategy Clinic: Dealing with conflicts of interest
I have discovered that the manager I gave the job of organising our e-commerce drive has strong links with the consultants we... Continue Reading
-
Switch to thin client cuts support costs for council
Facing tighter budgets and the need to be more responsive to public requirements, local and city councils are finding it... Continue Reading
-
Contractors experience millennium hangover
Tina MiltonMany contractors are feeling the downside of the millennium bug. For those who were earning up to £120,000 per annum on Y2K...
Continue Reading -
Empowering the silver surfer
With 170,000 members in 60 countries, the Internet is now a key tool for one pension fund administrator Continue Reading
-
Government must learn lessons of IT failure
The Government has some lessons to learn if its IT roll-outs are to have more success, writes Mike Simon Continue Reading
-
Millennium bug raises profile of IT department
When justifying the spend post-Y2K a number of benefits emerge, writes Julia Vowler Continue Reading
-
Was Y2K a costly non-event?
Many expected catastrophe. In reality, the industry coped well and is now in good shape for the future, writes Bill Goodwin Continue Reading
-
Overseas demand for HTML and XML
I have got pretty good XML and HTML skills and I fancy working overseas for a while. What demand exists and in which countries? Continue Reading
-
Front runner Ann Edwards
Ann Edwards is an IT project manager who advises governments and negotiates with the World Bank. When vital systems in East Africa survive the great date...
Continue Reading -
Y2K: beat the bug backlash
IT professionals are the heroes of Y2K but, as usual, they are unsung Continue Reading
-
First footers - be prepared
Expect something more challenging from your first-footer than the traditional gifts, writes Julia Vowler Continue Reading
-
The mythology of Internet security
Although Internet security has grown up over the last 10 years, there are several myths that prevent real progress. NTA Monitor... Continue Reading
-
Unified messaging takes on new significance
Nokia predicts over a billion mobile phones by 2001. With so much business conducted on Internet time, a transparent and unified... Continue Reading
-
ASPs - removing the support burden
Application Service Providers promise a lower cost-licensing model, reduced support overhead and a future proof upgrade path -... Continue Reading
-
Protection on the move
How secure is the information in your laptop and what can you do to protect company secrets once they are taken out of the... Continue Reading
-
Increase the stickiness of your website
Four out of five users never revisit the average website, so how do you ensure yours is the one in five they do come back to? Continue Reading
-
Put your money where your mouse is
Most computer users use a mouse or pointing devices. How do you find the one that’s right for you? Continue Reading
-
White Paper: An analysis of the differences in hypertextual and linear discourse
“Hypertext” can be defined as the use of the computer to transcend the linear qualities of traditional text, and there are many... Continue Reading
-
Case Study: Winterm 2315SE Windows-based terminals
Upgrading multiple systems is expensive for any business. For FedEx, thin clients were the answer Continue Reading
-
White Paper: S3TC compression technology
Various types of texture compression techniques have been employed over the years to increase performance. Now, a new technology... Continue Reading
-
White Paper: Software solutions for effective network power management
Uncertain power conditions can wreak havoc on small businesses, however, there are ways to limit the risk of computer data loss Continue Reading
-
White Paper: Negotiating the network rapids
Any small and medium-sized enterprise looking to set up a network is faced with a myriad of choices for implementation Continue Reading
-
Case Study: GoldMine 4.0
Essex Chambers of Commerce used GoldMine contact management software to automate its membership records and link up its four... Continue Reading
-
Case Study: Reducing costs with AML/2 and ImagePlus
Most companies realise that they need a disaster recovery system, but how can they actually implement such a strategy? Continue Reading
-
White Paper: LIMDOW recording on magneto-optical disk
Light Intensity Modulation Direct Overwrite (LIMDOW) reduces the number of passes required to write on optical disks. What are... Continue Reading
-
White Paper: Guardian of the network
Although the Internet can increase a company’s profits, it can make it more vulnerable to intruders. One way to prevent this is... Continue Reading
-
Automating common administration tasks
With a little ingenuity and some of the right software, you can automate those hated administration tasks Continue Reading
-
Case Study: Hardwall protects school computers from teenage tampering
PCs in the classroom are often a hard won asset for schools, but how do you protect them from over enthusiastic and untrained... Continue Reading
-
White Paper: DVD-RAM: Is it a reliable technology?
DVD-RAM is a high capacity storage technology that could become the true successor to the older CD-R and CD-RW formats. In... Continue Reading
-
Securing e-business: get your share
According to a new survey by West Coast Publishing, many companies underestimate the challenges involved in securing e-business Continue Reading
-
Case Study: Hewlett-Packard Information Storage
The data generated by a Formula One design team creates its own storage problems. It needs to be backed up securely and swiftly,... Continue Reading
-
Case Study: 64-bit processors
From the year 2000 onwards, 64-bit servers will be standard, but will companies be able to utilise the power that this new... Continue Reading
-
Case Study: Document management systems
Scanners have many different applications. When used as part of a document management system, they can save time and money Continue Reading
-
Case Study: Windows NT Terminal Server
Texaco is a global enterprise with employees located all over the world. Some of these locations present considerable... Continue Reading
-
Case Study: Pentec’s GoldMine
Sales force co-ordination relies on effective communication. This is how one major security firm used GoldMine information... Continue Reading
-
Preventing repetitive strain injury
RSI can bring agony to computer workers. However, it can be prevented by a combination of ergonomic products and common sense Continue Reading
-
Case Study: How Philips Medical Systems use Powerware Corporation’s UPS
In any medical centre, an Uninterruptable Power Supply (UPS) is essential in the event of a mains power failure Continue Reading
-
White Paper: Why intranets make your business work harder
The company intranet can be used as a centralised point of information that can equip your employees, save time and boost... Continue Reading
-
Case Study: Actinic Catalog 3
E-commerce branding: working together and not competing – a new business model Continue Reading
-
Personnel policies for an electronic workforce
Employees can often waste time emailing colleagues and surfing the net. What’s more, they could be damaging your business with... Continue Reading
-
White Paper: Ultra3 SCSI: The next industry standard
Ultra3 SCSI promises data throughput of up to 160Mb/s along with full backward compatibility Continue Reading
-
White Paper: Making contact with your customers
Customer loyalty relies on your business remaining at the forefront of their mind. Contact management software helps you build... Continue Reading
-
White Paper: Putting organisation into the Corporation
For many businesses, success can come down to a simple act of communication. This is why more companies are turning to contact... Continue Reading
-
White Paper: Combatting the hidden dangers of global networking
As e-commerce takes over, the next five years will see dramatic changes in the way that business is carried out. But there are... Continue Reading
-
White Paper: Network management - who needs it?
No one can doubt the importance of networks, but it is important to remember that they need to be managed – especially with the... Continue Reading
-
Case Study: Magneto optical drives
For many graphics companies, basic hard drive storage is not sufficient. They require portable media that can store huge data... Continue Reading
-
Case Study: Using hardware and software firewalls to provide protection against hackers
Cheltenham Ladies College’s hardware and software firewalls provide protection against hackers while reducing the chance of... Continue Reading
-
Case Study: Eyretel E1000 digital voice recorder
South Africa's Medical Rescue International is using Eyretel E1000 digital voice recorders to change the way it manages large... Continue Reading
-
Case Study: Arriva plc moved to Windows NT client/server and immediately increased its productivity
Arriva plc, one of the leaders in total transport solutions, found that moving to a complete Windows NT client/server solution... Continue Reading
-
Hardware anti-aliasing
Traditional methods of hardware anti-aliasing are memory and processor intensive. However, a new algorithm might offer a solution Continue Reading
-
Email Management Systems that work
E-commerce sites have been so successful that the infrastructure supporting them has not kept pace with the growing demand Continue Reading
-
Access is denied
Combined with careful key management and data backup procedures, file encryption provides a very strong measure of protection... Continue Reading
-
White Paper: Building VPN links with firewall technology
IBM’s white paper outlines the case for using firewall technology to build secure inter-business connections Continue Reading
-
White Paper: The Achilles heel of VPNs: the man-in-the-middle-attack
Authenticating identity is the most crucial security question for virtual private networks Continue Reading
-
Making e-commerce secure
E-commerce may be the way ahead, but it needs to be seen to be secure so customers will buy with confidence Continue Reading
-
Case Study: QES Investment Ltd use a 3Com and ACT! communication solution
In the ever-mobile world of business, it is essential to have access to notes, contact details and diary schedules when away from... Continue Reading
-
Case Study: Hewlett-Packard’s SureStore DAT drives
One of the leading teams in the Formula One motor racing have opted for the HP SureStore range of DAT drives - a complete... Continue Reading
-
Electronic commerce with microtransactions
From baked beans to Bermudan holidays, digital banking hopes to change the way we live.But will virtual money work in the real... Continue Reading
-
White Paper: An insight into Business Intelligence
Business Intelligence is one of the hot topics at the moment, promising customers ways to make better use of all that important... Continue Reading
-
Case Study: Netobjects Authoring Server Suite
Setting up an intranet for your firm can boost morale and effectiveness Continue Reading
-
White Paper: Lies, damned spies and computer crime statistics
Attempts to pin point the extent of computer crime is hampered by firms’ inability to reveal all Continue Reading
-
White Paper on remote networking alternatives for the enterprise
Ascend Communications is a respected authority on remote networking solutions. Its recent white paper on remote networking... Continue Reading
-
The little book of palm
Desktop management doesn’t end in the office. This white paper details efforts to make Palmtops Desktop Management Interface... Continue Reading
-
Making sense of website planning
The web represents unlimited potential in terms of creativity and information transfer. But it takes planning to make it work for... Continue Reading
-
Keeping contacts
Contact management devices are increasingly important for anyone concerned with maintaining external contacts and not simply for... Continue Reading
-
White Paper: Routers/WAN access devices white paper
Combining elements of routers, hubs and switching in one device can reduce LAN complexity and cut costs Continue Reading
-
White Paper: Multimedia delivery using corporate intranets
Today's technology allows multimedia applications to be run over a “traditional” data network infrastructure. This white paper... Continue Reading
-
White Paper: Email security
If used as part of computer security planning system, encryption software can ensure that email messages will not be overheard,... Continue Reading
-
White Paper: How to protect your NT system from viruses
The Windows NT system has many features that both protect it from and make it susceptible to virus attack Continue Reading
-
Year 2000 contingency planning
With the approach of the Year 2000 and a potential computer catastrophe, many companies and organisations should consider... Continue Reading
-
Case Study: Lotus Domino
By providing essential information on offenders, the Public Protection Register - a Lotus Domino based software application -... Continue Reading