In Depth
In Depth
IT strategy
-
The CIO agenda for 2010
Many IT leaders will be entering 2010 with bruises on their budgets from the recessionary battering they have taken over the past 18 months. Continue Reading
-
CIO 2010 agenda: Customers and staff
Historically, the single biggest cost for most organisations has been customer... Continue Reading
-
CIO 2010 agenda: The business of leadership
CIOs have rarely had a better opportunity to demonstrate the critical role... Continue Reading
-
Social networks offer a new way of sharing knowledge
The rapid spread of enterprise social networks is still a huge puzzle for most senior managers whose bewilderment at the topic and attempts to make some... Continue Reading
-
Transforming local government IT
Local government IT leaders face an urgent and fundamental challenge. Continue Reading
-
Extract - Grown-Up Digital: youth culture on the internet
Chances are you know a young person aged 11-31. You may be a parent, aunt, teacher, or manager. You've seen these young people multitasking five activities at once. Continue Reading
-
Technology review of 2009
Budgets have been tight, spending has been cut, but the IT industry has not stood still while users tightened their purse strings. Continue Reading
-
Copenhagen summit: How to reduce your IT carbon footprint
The green credentials of IT industry are set to come under scrutiny at the Copenhagen conference. Continue Reading
-
Taking the complexity out of communications costs
Large enterprises are no strangers to the benefits of mobility. Deployments of Blackberry handsets, PDAs or other smartphone devices to management, sales or field staff are almost commonplace. But how do you negotiate the best telco deal? Mia ... Continue Reading
-
Case study: Haysmacintyre mobilises the enterprise
UK chartered accountancy firm Haysmacintyre has a number of years' experience in mobilising its enterprise data, communications and people to provide financial and other business support services predominantly for entrepreneurial businesses,. Continue Reading
-
Harnessing the full value of identity management
Identity management is about more than just access; it’s about delivering the right information to the right people at the right time. Indeed, the power of having an integrated, centralised definition of the roles and data access levels held by each... Continue Reading
-
European Commission review and harmonisation of consumer acquis
Following a review of EU consumer law, the European Commission has published a draft directive entitled the Consumer Rights Directive, which could become law in the UK as early as 2011 Continue Reading
-
ISACA: Users reject Trusted Computing because of privacy and security concerns
Why is corporate adoption of the trusted computing standard still very low when over 70% of new computing devices have built-in trusted platform modules (TPMs)? Continue Reading
-
BCS: Cost of support outweighs the benefits
Why is corporate adoption of the trusted computing standard still very low when over 70% of new computing devices have built-in trusted platform modules (TPMs)? Continue Reading
-
ISSA UK: ‘Treacherous Computing’ can constrain legitimate software
Why is corporate adoption of the trusted computing standard still very low when over 70% of new computing devices have built-in trusted platform modules (TPMs)? Continue Reading