In Depth
In Depth
Network software
-
APAC organisations warm to cloud networking
Organisations in Asia-Pacific are getting up to speed with cloud networking services, even as they grapple with the challenges of managing a hybrid cloud environment Continue Reading
-
The state of Australia’s national broadband network
Australia’s national broadband network promises to improve broadband connectivity across the country but has been plagued by pricing issues. Here’s a look at where it is today and what lies ahead Continue Reading
-
How SASE is set to determine the future
We take a look at the SASE environment and what challenges and benefits lie ahead in the adoption of secure access service edge Continue Reading
-
Buying a VPN? Here’s what you need to know
VPNs are an effective cyber security tool for businesses and remote workers, but there are many things to consider before purchasing and implementing one. We explore some of these Continue Reading
-
Anti-money laundering technology must operate in a collaborative ecosystem
With new technologies making it easier for banks to spot money laundering activity, we look at why the problem persists at scale, finding that ecosystems and collaborative processes need to be built Continue Reading
-
Being the brand: Virgin takes SD-WAN to the next level
Companies are increasingly turning to software-defined wide-area networks to address the needs of remote workforces Continue Reading
-
Three network technologies driven by cloud-native computing
Networking technologies are being driven heavily by digitisation and cloud computing. Gartner picks three networking trends to watch Continue Reading
-
The new reality of 5G
5G’s development has been driven by a variety of use cases leading to a multi-service capability – a network of networks. But what is the reality of this, and how is it expected to change as we move forward? Continue Reading
-
Ericsson reveals plans for 5G, IoT – and self-driving buses
World’s third biggest maker of telecommunication equipment reveals its plans for new technologies including 5G, the internet of things and automation Continue Reading
-
Norway’s autonomous ships point to new horizons
Norway is a pioneer in the autonomisation of shipping, which conveys environmental benefits as well as efficiency gains – but human mariners are likely to stay on board for a while yet Continue Reading
-
What are the CDN options for enterprises?
We look at how content delivery networks can give your organisation’s web presence a literal edge Continue Reading
-
What are the SD-WAN requirements for a multicloud environment?
SD-WAN is becoming an important option for businesses migrating branch and other edge communications to the cloud. But what makes a successful deployment? Continue Reading
-
The pitfalls of multicloud network management
Migrating to and managing a multicloud network introduces new complexities into the network. We look at how to avoid the potential pitfalls Continue Reading
-
What are the current SD-WAN options for enterprises?
Software-defined wide area networking is well on its way to being a multi-billion dollar market. We assess the current state of the market and look at some of the options for enterprise CIOs and network managers Continue Reading
-
Software-defined networking: gathering momentum in the enterprise?
Suppliers are pushing the benefits of software-defined networking harder than ever, and enterprises are starting to take the plunge rather than remaining on the sidelines Continue Reading
-
How Turkish mobile operators are helping the vast Syrian refugee population to help themselves
Turkish mobile network operators are designing services that will help Syrian refugees make their lives in the country Continue Reading
-
ASEAN enterprises readying networks for the cloud era
Enterprise networks are being strained by greater use of cloud computing, leading more ASEAN organisations to turn to SD-WAN to reduce network costs and complexity Continue Reading
-
Net gain? Why networks matter when it comes to hyper-convergence
The rise of hyper-convergence is radically changing how enterprises manage their IT estates, but its effect on the network has yet to be fully realised Continue Reading
-
UK sale of surveillance equipment to Macedonia raises questions over export licence policy
The UK approved an export licence for the sale of surveillance equipment to Macedonia – while the country was engaged in an illegal surveillance programme against its citizens. A senior minister was consulted on the decision Continue Reading
-
Formula 1: Mercedes team turns to big data in quest for victory in Grand Prix
Data analytics could help Mercedes-AMG Petronas Motorsport team gain an edge on rival Ferrari during the 2017 and 2018 Grand Prix season. Its head of IT, Matt Harris, reveals the team’s plans Continue Reading
-
CIO Interview: Graeme Hackland, Williams Martini Racing
Williams Martini Racing CIO Graeme Hackland discusses network infrastructure, data analytics and the future for wearable tech and augmented reality in Formula 1 motor racing Continue Reading
-
Networking technologies emerging in the enterprise
We look at the latest networking technologies on offer, and those being adopted in the enterprise Continue Reading
-
No more email? Why companies are turning to collaboration technology
Collaboration technologies are helping companies improve their employees' work-life balance Continue Reading
-
A guide to WebRTC
Real-time communications standards aim to help more users speak with ease over the internet. Computer Weekly looks at how the systems work Continue Reading
-
VPNs: The past, present and future
We give you a rundown of all you need to know about virtual private networks and how the cloud is changing their future Continue Reading
-
The history of OpenFlow
Computer Weekly takes a look back at the beginnings of the software-defined networking protocol and the technology behind it Continue Reading
-
Buyer's Guide: How to prepare your organisation for IPv6
The switch to IPv6 – on 6 June – shows just how imminent the transition from IPv4 to IPv6 is. Is your organisation ready? Continue Reading
-
Secure your SCADA architecture by separating networks
Many critical national infrastructure systems include supervisory control and data acquisition (SCADA) functionality. These systems can be viewed as the set of software, computers and networks that provide remote co-ordination of controls systems ... Continue Reading
-
Securing your network without firewalls
It all seemed so simple. Continue Reading
-
Securing applications on the network
When it comes to securing applications on a network, limiting privileges is the golden rule. Vulnerabilities that expose web applications start with the... Continue Reading
-
Network access control learning guide
From PDAs to insecure wireless modems, users have myriad options for connecting to -- and infecting -- the network. Created in partnership with our sister site SearchSecurity.com, this guide offers tips and expert advice on network access control. ... Continue Reading
-
Case studies: Public transport project management
Developing and implementing IT systems for a transport network is a challenging undertaking. Continue Reading
-
Penetration tests measure firms’ security
Penetration testers make it their business to overcome your defences and infiltrate the network. And your security measures may not be as robust as you think Continue Reading
-
Top client security tips of 2006
A network user without the proper know-how is a ticking time bomb when it comes to security. Check out our top five client hardening tips of 2006 to get a head start on protecting yourself from potentially dangerous users. Continue Reading
-
Top network security tips of 2006
The top Windows networking security tips of 2006 cover a range of topics, including network isolation, open source Windows security tools, VPN security and more. Continue Reading
-
Storage Decisions Session Downloads: Engineering Track (LV 2006)
Managers need to engineer the most flexible and complete storage network. This track looks at SAN and NAS issues, distance demands, remote offices and how to build out systems. Continue Reading
-
Review: Arbor Networks' Peakflow X 3.6
Hot Pick: Peakflow isn't cheap and requires an intimate understanding of data flows, applications and network infrastructure. But the investment will pay dividends. Continue Reading
-
Review: Network Intelligence's enVision
enVision offers excellent value and is highly configurable, though typically that means you have to put a lot into it to get the most out of it. Continue Reading
-
Thwarting IM management challenges
Product review: Information Security magazine's Sandra Kay Miller says Symantec's IM Manager 8.0 has limited public network features, but offers excellent reporting Continue Reading
-
Do we really need to have IPv6 when Nat conserves address space and aids security?
Internet: Love it or hate it, Network Address Translation will not be going away soon. Continue Reading
-
Cisco adds intelligence to network to boost application performance
Cisco has developed products to improve the performance of applications on corporate networks by giving the network switches and routers the ability to process application protocols. Continue Reading
-
Bombardier Transportation
Orange M2M Connect provides best network coverage for Bombardier Continue Reading
-
Ebookers uses IP for international call routing
Online travel agency Ebookers has implemented an IP network across 31 sites in 13 countries in just eight weeks. Continue Reading
-
Survey finds IT leaders spend too much time restoring connections
Senior IT executives are spending one or more days each week managing aspects of their wide area network they would traditionally... Continue Reading
-
Winning the cyber arms race in the classroom
In the struggle for cybersecurity, Lenny Zeltser's most important weapons are the classroom and the pen.
For the past few years he has taught part-time at the SANS Institute, creating a course on how to analyze malicious software... Continue Reading
-
Embrace the future
As we saw in our previous supplement (see www.computerweekly.com/btsme), the power of IP can be harnessed in networks that... Continue Reading
-
UMTS boosts 3G skills demand
UMTS is the chosen technology for most 3G networks Continue Reading
-
Four techniques that will become essential for securing growing IP-enabled networks
IP devices are creating a network architecture that demands better security Continue Reading
-
'Throttle' highly connected users and reduce instant messaging worms
A few users connected to popular instant messaging networks can spread worms - and restricting communications from "highly... Continue Reading
-
Can you make network users pay to play?
Tired of users gobbling network bandwidth? Charging for usage of the network can save costs, but IT directors should be aware... Continue Reading
-
A faster, stronger, redundant Olympic network
A steady stream of taxis grinds up the hill to the headquarters of the Athens Olympic Committee on the northern edge of the city.... Continue Reading
-
Bichard criticisms spur Home Office move on national police intelligence network
Police forces in England and Wales lag behind Scottish data management model Continue Reading
-
Arup dumps 80 devices for a 32Tbyte San
Engineering consultancy Arup has migrated from direct-attached storage to a storage area network using a centralised storage... Continue Reading
-
Cisco pushes network security
Cisco has introduced a range of routing products and software that support its Network Admission Control, (Nac) technology, which... Continue Reading
-
Cisco's converged network vision has bandwidth for next 20 years
Cisco's Carrier Routing System (CRS-1) is the company's attempt at building a network infrastructure that will allow voice, data... Continue Reading
-
Efficiency must be balanced with security
Networks will be bigger and faster in future but they may not be safer Continue Reading
-
Cisco's security management on networks too 'high maintenance'
A report published by IT research and advisory firm Burton Group has found that management of security on Cisco-based networks is... Continue Reading
-
Thought for the day: Peer-to-peer pressure
Phishers are now exploiting peer-to-peer networks, warns Simon Moores. Continue Reading
-
Top 10 issues for network managers in 2004
With the networking architecture poised to change once again, network managers must examine the top issues in networks this year... Continue Reading
-
Low-cost VPN eases remote Lan access
Linux firewall supplier Smoothwall has introduced a new version of its Smoothtunnel virtual private network module to support... Continue Reading
-
Coca-Cola and SAP collaborate on managing supply chain networks
Coca-Cola is working with SAP to develop software to improve efficiency in the drinks firm's supply chain. Technology produced by... Continue Reading
-
Getting the best out of demand-driven supply networks
Boost supply chain performance, cut costs and improve customer service. Continue Reading
-
Policies cut unnecessary spending
It is better to put in place an effective security policy than simply investing in network security equipment, users have been... Continue Reading
-
Thought for the day: Turning back the tide
One new year's resolution we all should make is to ensure that our networks, PCs and software are protected from e-criminals,... Continue Reading
-
The key to trading on insecure channels
Bob Walder, director of network security specialist the NSS Group, explains how public and private key encryption works to secure... Continue Reading
-
Company firewalls may be replaced with local security to protect key networks
The Royal Mail has led several FTSE 100 companies in calling for a new security standard so that firms can trade with their... Continue Reading
-
Network chiefs perform security balancing act
Network managers are facing the challenge of opening up their networks to enable new business applications while simultaneously... Continue Reading
-
Demand-driven supply network requires optimisation across products, customers and operations
To improve profitability, consumer packaged goods (CPG) and Life Science manufacturers must align the areas of the business:... Continue Reading
-
Cisco flaw highlights internet's Achilles' heel
The flaw in Cisco's Internetwork Operating System, which came to light recently, almost crashed the internet and the networks of... Continue Reading
-
Monitoring the health of your network
As the need for network testing tools grows, be sure you pick the right ones. Continue Reading
-
Firms let hackers in through their VPNs
Almost a third of companies tested in a recent survey had left their networks open to attack by installing virtual private... Continue Reading
-
Police chase high-speed connectivity for voice and data traffic across the Midlands
West Midlands Police moves to a broadband wide area network. Continue Reading
-
The key to trusting all your employees
Bob Walder, director of independent network security testing specialist the NSS Group explains what you need to set up public key... Continue Reading
-
US Congress asks, is peer-to-peer an enemy?
US congressmen raised concerns over whether peer-to-peer networks are exposing users' personal information, but witnesses at a... Continue Reading
-
Networld+Interop: Nortel to beef up VPN line
Nortel Networks next week will unveil the latest updates to its secure networking range, including new remote-access management... Continue Reading
-
Spread the risk and renegotiate contracts
What can network managers do to ensure they get the best price/performance? Continue Reading
-
Sony links divisions with web services capabilities
With multiple business units using their own networks and having no easy way to share resources, global electronics and... Continue Reading
-
Security is at children's fingertips
Fingerprint-recognition system helps a London school protect network from abuse, writes Ross Bentley Continue Reading
-
Ufi learns about its learners
The Government's e-learning network is using a reporting tool to improve its service, writes Karl Cushing. Continue Reading
-
Dicing with data laws
The legislature has taken a growing interest in data and network traffic over the past few years. Lindsay Nicolle finds IT... Continue Reading
-
Fixing security on wireless networks
Security problems have become a limiting factor in the deployment of WLAN networks. Graham Titterington describes the problem and... Continue Reading
-
Getting Wired: The wizards of Ogg versus MP3
RealNetworks' Helix project spreads support for the Ogg Vorbis compression standard. Continue Reading
-
Cover for the latest telecoms crisis
Virtual networks could offer a useful risk-reduction strategy in the wake of recent provider bankruptcies. Continue Reading
-
Career Move: Should I pay for software training?
I have worked in IT since the 1970s, installing and supporting mainframes, PCs and networks, generally in a contract position.... Continue Reading
-
Eat football, drink football, live networking
For the last 10 months Doug Gardner has lived, breathed and slept football as managing director of the World Cup project at... Continue Reading
-
FSO not UFO
Laser technology is a fast growing market in last mile communication networks, but many still see it as a space age extravagance.... Continue Reading
-
Enterprise multicast networks - time to switch on?
Emily Giddings, research analyst at Ovum, examines the reasons why multicast Internet technology is not being used and whether it... Continue Reading
-
Be a link in our security group
Today, Computer Weekly launches the Infosecurity User Group - a unique networking, benchmarking and information resource for IT... Continue Reading
-
Citrix to provide portal access to networks from anywhere
Citrix aims to give users access to corporate systems from anywhere in the world with a new family of portals and alliances that... Continue Reading
-
Data networking: Off the straight and narrow
Modern business places heavy demands on data, and requires networks that have the width and capacity to cope. What are the latest... Continue Reading
-
Cisco predicts convergent network future
Cisco's UK operation sees a strong market ahead in networking, despite the economic slowdown Continue Reading
-
Trial run
Get a feel for 3G applications by running them on 2.5G networks. Continue Reading
-
All locked up and no way in?
There's no such thing as a secure network - just ask Microsoft! So if Bill Gates' crew is vulnerable what about the rest of us?... Continue Reading
-
Eye to eye contact
Videoconferencing has long been about to take off. Now it has and the good news for the channel is that it is becoming a network... Continue Reading
-
Network for the future
One2One's goal is to have a closed loop customer relationship model to ensure its products and services are targeted at new,... Continue Reading
-
Lucent promotes new vision for IP
Lucent is set to woo service providers to move beyond Internet access and connectivity with a range of customisable network... Continue Reading
-
Linx offers training to tackle IT skills shortage
Internet service providers (ISPs) are launching a training initiative aimed at tackling the critical shortage of networking... Continue Reading
-
XML skills enter the network market
IT managers may be forced to learn programming techniques as the first range of XML-based network devices is launched. Continue Reading
-
IT upgrade slashes bank clearing delay
UK clearing house Bacs is planning to move to an Internet Protocol (IP)-based network that will end the laborious batch... Continue Reading
-
Switching from brawn to brains
Networking companies will continue to apply brute force to their problems over the next few years. But the smart money is on... Continue Reading