In Depth
In Depth
IT suppliers
-
Hunters: a rare but essential breed of enterprise cyber defenders
They wait, they watch, they search the outer reaches of networks and the darkest corners of the web, setting traps, crafting tools, collecting evidence and going in pursuit: they are the hunters Continue Reading
-
Microsoft’s underwater datacentre: The pros and cons of running subsea facilities
Underwater datacentres can help providers save on land costs and cooling, but at what cost to the environment? Continue Reading
-
Interview: James Bamford on surveillance, Snowden and technology companies
Investigative journalist and documentary maker James Bamford was among the first to uncover the secrets of the US National Security Agency and its global surveillance Continue Reading
-
The next stage in quantum key distribution
Authentication schemes based on quantum physics are emerging to address the growing number of ways to compromise data traffic Continue Reading
-
Avoiding security issues when recycling hardware
What are the options for the environmentally and ethically responsible recycling of end-of-life hardware, without compromising data security? Continue Reading
-
How CIOs can raise their 'IT clock speed' as pressure to innovate grows
CIOs are facing pressure from the board to roll out IT projects increasingly quickly. How can they do that without running unacceptable risks? This article, based on cutting-edge research among leading businesses, offers some answers Continue Reading
-
EU Data Protection Regulation: What the EC legislation means for cloud providers
With the European Commission's data protection rules set to drop before 2016, take a look at what the changes mean for the cloud and datacentre community Continue Reading
-
Risky and untested: What went wrong with the ESN procurement?
In his first major interview since walking away from the Emergency Services Network procurement, Airwave COO John Lewis reveals why his company could take no further part in the process, and discusses the future of emergency services communications Continue Reading
-
Why Pegasystems' CEO, Alan Trefler, has learned to think smaller
Pegasystems has made its name supplying CRM, analytics and case management software to the world's largest companies. Now CEO Alan Trefler plans to use cloud computing to broaden Pega's appeal Continue Reading
-
SaaS criteria to track for business outcomes
Organisations should evolve their SaaS selection criteria to focus on newer metrics that are better indicators of supplier performance Continue Reading
-
Better user acceptance testing through log management
Application log management provides insight into application behaviour, which can be used to build better software and gain a better hold of user acceptance testing Continue Reading
-
Marseille: Europe’s networking gateway to Africa
The city of Marseille in southern France is fast becoming a hub for datacentre and network operators who want low latency connections to Africa. Continue Reading
-
Digital customer experience: Beyond the website
Organisations are faced with the challenge of delivering their customers with an online experience that goes far beyond just a website Continue Reading
-
Benchmarking social business and collaboration tools
A complete social business strategy requires more than publishing social media guidelines for employees. CIOs need to rethink the enterprise as a social ecosystem Continue Reading
-
Businesses need to equip staff with the tools to do the job
Workforces will become frustrated if they do not have the technology they need to deliver what their organisation wants Continue Reading
-
A closer look at Google Container Engine
In just 12 months, Docker has transformed from a simple open-source container management project into a powerful platform Continue Reading
-
Quantum key distribution is the future for secure comms
Quantum teleportation is a technology that will ultimately replace encryption as the foundation of communication security Continue Reading
-
How to make applications resilient on AWS
Cloud services are susceptible to network and other outages. There is no silver bullet to boost the resilience of an AWS-hosted application Continue Reading
-
Microservices: How to prepare next-generation cloud applications
A microservice architecture promotes developing and deploying applications composed of autonomous, self-contained units Continue Reading
-
The state of mobile back end as a service
Common mobile application services are increasingly being hosted on central back-end servers – but what does that mean for the enterprise? Continue Reading
-
Networking technologies emerging in the enterprise
We look at the latest networking technologies on offer, and those being adopted in the enterprise Continue Reading
-
Social media for communication inside the enterprise
Companies have long used social media technology such as Facebook and Twitter to reach more customers – but how are businesses using it internally? Continue Reading
-
Backup and disaster recovery in the age of virtualisation
One of the benefits of using virtual machines is the scope for improved backup. We look at the product offerings from traditional and new suppliers Continue Reading
-
The digital CIO: Why embrace digital innovation?
Having the right digital strategy can make or break an organisation Continue Reading
-
Choice and ease of use: key elements of a good app store
Companies need to focus on individual user requirements and make sure their app store delivers the right tools for the right job Continue Reading
-
Big Apple revolution: How to manage Macs in the enterprise
Apple’s products were once niche devices. Now, following a consumer-led initiative, they are widely used across the enterprise Continue Reading
-
The pros and cons of iPads in the enterprise
The iPad is often the first platform for which developers produce apps – but it is substantially more expensive than its competitors Continue Reading
-
Can the mainframe remain relevant in the cloud and mobile era?
IBM mainframes run more than 1.1m transactions per second, yet the mainframe has remained largely unfashionable. We investigate Continue Reading
-
Target data breach: Why UK business needs to pay attention
Late last year, US retailer Target was hit by one of the biggest data breaches in the industry's history. So what happened and why is it relevant to UK businesses? Continue Reading
-
The digital CIO: How digital technology will change the way organisations work
If you are an IT leader, digital technology is likely to be a pivotal factor in your career over the next five years Continue Reading
-
Hacktivism: good or evil?
IT lawyer Dai Davis looks at the rise of hacktivism and its impact on business and international politics Continue Reading
-
No more email? Why companies are turning to collaboration technology
Collaboration technologies are helping companies improve their employees' work-life balance Continue Reading
-
A guide to APM for the network manager
Has application performance management become a much needed discipline for the network manager? We examine the issues for IT departments Continue Reading
-
Troubleshooting datacentre management issues
Gaining better control of the datacentre has to be a high priority to ensure high levels of performance and availability Continue Reading
-
Create a mobile policy employees can trust
With Gartner predicting a fifth of all enterprise BYOD projects would fail by 2016, we look at how businesses can embrace mobility successfully Continue Reading
-
The future of the tablet computer in the enterprise
Tablets come in all manner of profiles and on a variety of platforms – but which will shape up as the workplace favourite of the future? Continue Reading
-
Big banks' legacy IT systems could kill them
A banking T-Rex is dying and nimble competitors will pick at its carcass. Is it too late for the retail bank giants to overhaul their IT and survive? Continue Reading
-
Realising the benefits of a totally connected world
The internet of things will transform everyday life, from managing airports’ passenger flow to heating buildings and caring for the elderly. Continue Reading
-
Optimising performance and security of web-based software
On-demand applications are often talked about in terms of how suppliers should be adapting the way their software is provisioned to customers. Continue Reading
-
Future Gazing: The Future of IT in 2020
The next six years will see the influence of technology accelerate, and that will mean radical changes for the role of the IT department and the CIO Continue Reading
-
Why agile development races ahead of traditional testing
Traditional testing practices optimise large, centralised testing but struggle to support the rapid delivery of agile development. Continue Reading
-
Financing IT purchases
There are a number of ways a new IT platform can be acquired but choosing the right method for your business is key. Continue Reading
-
How Capgemini keeps its Merlin datacentre green and energy-efficient
Capgemini's Swindon-based Merlin datacentre is one of the most energy-efficient in the world. But what makes it green? Continue Reading
-
A guide to WebRTC
Real-time communications standards aim to help more users speak with ease over the internet. Computer Weekly looks at how the systems work Continue Reading
-
VPNs: The past, present and future
We give you a rundown of all you need to know about virtual private networks and how the cloud is changing their future Continue Reading
-
A business case for games play at work
How businesses can use computer games techniques to motivate staff at work Continue Reading
-
An introduction to cyber liability insurance cover
Cyber liability insurance cover has been around for 10 years, but most security professionals seem to have not heard of it or know that it exists Continue Reading
-
How to monitor and improve the health of your datacentre
Any datacentre manager looking to support the business should take an end-to-end systems management approach to keep the datacentre in shape Continue Reading
-
From chess to ping pong: How Pegasystems is capturing the Fortune 500
Pegasystems is winning business from the world's leading companies as business process management technology enters the mainstream Continue Reading
-
Tools for talent management
An increasing number of human resources management systems are coming to market.. What are the benefits? Continue Reading
-
Manage identity and access to improve business processes
Streamlining identity and access management is essential to exploiting your organisation’s assets and employees’ productivity. Continue Reading
-
Wireless charging: The story so far...
Rupert Goodwins looks into the technology behind wireless charging and whether it is good enough yet for wider adoption Continue Reading
-
Workplace IT services in flux: wherever, whenever, whatever
Enterprise computing is in upheaval as the emphasis shifts towards automation and user-device provision. Continue Reading
-
The internet of things is set to change security priorities
IT leaders must protect against the security risks introduced by the growing interaction between technology and the physical world. Continue Reading
-
How to create a good information security policy
Information security policies provide vital support to security professionals, yet few organisations take the time to create decent policies Continue Reading
-
Windows XP end of support: What to do next
CIOs may not wish to carry on running a 12-year-old desktop OS, but thousands of incompatible applications leave many with no choice Continue Reading
-
100Gbps Ethernet – is it time to move?
Do you need 100Gbps Ethernet in your datacentre, or is the technology just going through a hype cycle? Computer Weekly investigates. Continue Reading
-
The history of OpenFlow
Computer Weekly takes a look back at the beginnings of the software-defined networking protocol and the technology behind it Continue Reading
-
Wired vs wireless in the enterprise
What are the pros and cons of wired and wireless connectivity, and what does the future hold for the corporate environment? Continue Reading
-
How to tackle big data from a security point of view
Before leaping into big data, companies must be clear what they are trying to achieve, otherwise their investment will be wasted Continue Reading
-
Top technologies that can make your datacentre green
Energy-efficient technologies that can reduce running costs in the datacentre and across the business Continue Reading
-
How to find the most vulnerable systems on your internal network
Most corporate networks share common vulnerabilities, but many could be mitigated with education in “hacker thinking” for technical staff Continue Reading
-
Social media: A security challenge and opportunity
Generation Y workers are posing increasing security challenges to their employers as they share data unreservedly Continue Reading
-
Process big data at speed
Low-cost solid state memory is powering high-speed analytics of big data streaming from social network feeds and the industrial internet. Continue Reading
-
The limitations of traditional SaaS integration approaches
Time and budget constraints are forcing many organisations to rethink their integration strategy and find a well-aligned solution Continue Reading
-
How to integrate SaaS with your local business systems
As software as a service matures, CIOs need to look at how well cloud-based products integrate with existing on-premise systems Continue Reading
-
Business priorities: what to protect, monitor and test
How information security professionals can prioritise what to protect, monitor and test in the light of current budget and resource constraints Continue Reading
-
Amazon: Gold standard of the cloud?
Amazon Web Services is the benchmark for cloud in the enterprise but can it handle the challenge of federated cloud services? Continue Reading
-
Shore up your organisation’s fleet with the right MDM
There are many mobile device management products, but approaches vary. We outline how to choose the right one for your business Continue Reading
-
How to preserve forensic evidence in the golden hour after a breach
There is a golden hour at the outset where a clear head and good planning can make or break any subsequent forensic investigation Continue Reading
-
Software-defined datacentres demystified
As datacentre managers increasingly rely on software and automation, what can a software-defined datacentre bring to the enterprise? Continue Reading
-
How to manage your assets and control business costs
Asset lifecycle management allows the IT department to improve governance, mitigate risk and improve service quality and efficiency Continue Reading
-
CW500: Managing the mobile workforce (part 1)
Mobile working has transformed Colt Telecommunications beyond recognition over the past three years Continue Reading
-
Tune Raid performance to get the most from your HDDs
Tune Raid performance at the storage controller to match application I/O demands to optimal hard drive (HDD) performance Continue Reading
-
Setting up a botnet is easier than you think
Acquiring, installing, configuring and using a powerful data-stealing banking Trojan toolkit is not as difficult as it sounds Continue Reading
-
Outsourcing IT services: goals and negotiations
Tactical and strategic negotiations are important to businesses of all sizes, from SMEs to the largest enterprises Continue Reading
-
How to make sense of the big data universe
Analysing big data can be a daunting prospect, so find out what you need, where it is and how to deal with it Continue Reading
-
Best practice in outsourcing security
The issues CIOs must consider in balancing security needs and budgetary constraints Continue Reading
-
How technology is changing BPO
Karl Flinders discovers how IT has become central to the provision of outsourced business processes Continue Reading
-
How to make your network green
Make sure your network and datacentre run efficiently as part of a green networking strategy Continue Reading
-
Buyer's Guide: How to upgrade to IPv6
IPv6 is an increasingly hot topic in the networking industry. We examine the issues for older hardware support. Continue Reading
-
Buyer's Guide: How to prepare your organisation for IPv6
The switch to IPv6 – on 6 June – shows just how imminent the transition from IPv4 to IPv6 is. Is your organisation ready? Continue Reading
-
When X.509 security certificates fail, servers break
Why are X.509 certificates causing computers to stop dead? Continue Reading
-
Interview: From Apollo Mission to agility manifesto
One of the 17 original authors of the agile manifesto was Jim Highsmith who, after a previous tenure at NASA, now works as an executive consultant at ThoughtWorks. Continue Reading
-
UKtech50: Meet the 50 most influential people in UK IT
Computer Weekly has announced the final listing for the second annual UKtech50, the definitive list of the real movers and shakers in UK IT. Continue Reading
-
Case study: Nokia rethinks HR with web portal
Mobile phone manufacturer Nokia has reduced its HR costs by between 20% to 30% after rolling out a web-based HR portal for its 60,000 employees. Continue Reading
-
UKtech50: Honouring the most influential people in UK IT
Computer Weekly has announced the final listing for the second annual UKtech50, the definitive list of the real movers and shakers in UK IT - the CIOs, industry executives, public servants and business leaders driving the creation of a high-tech ... Continue Reading
-
UKtech50 2011: Vote now!
Voting has begun to find out who is the most influential person in the UK IT community. Continue Reading
-
CIO interview: Martin Davies, head of technology at Bet365
The success story of £5.4bn-per-year online gambling company Bet365 is nothing to do with luck and everything to do with technology. Continue Reading
-
The consumerisation of IT: it’s a trickle, not a tide, but you still need to be ready
If media headlines and supplier claims are to be believed, organisations today are faced with an unstoppable tide of many different types of personal device connected to the corporate network Continue Reading
-
Social Media Awards 2011: Vote now!
Computer Weekly's search for the best use of social media in IT is back for its fourth year, in association with IBM, and we want you vote for the best uses of social media in UK IT. Fill out the form below and submit your vote. Continue Reading
-
The cloud computing revolution
Hewlett-Packard has become the latest supplier of many to sound the death knell on the IT department. Continue Reading
-
Open communications vs. closed communications
Open communications are key to making the inevitable multimodal, multi-supplier communication environment work, so why aren't more suppliers providing open-source systems? Continue Reading