In Depth
In Depth
-
VMware disaster recovery using VMware onboard features
Find out how to prepare for VMware disaster recovery using features such as Site Recovery Manager, vSphere Replication, VMware High Availability and VMware Data Recovery. Continue Reading
-
Using IT to capitalise on austerity
FM Conway IT chief Ed Lynott talks about how the civil engineering firm uses IT to deal with public sector cuts Continue Reading
-
Data virtualisation on rise as ETL alternative for data integration
The Phone House and Novartis have turned to data virtualisation from Denodo and Composite to gain a single logical view of disparate data sources. Continue Reading
-
GPU Computing in High-Performance Computing: A Status Check
While GPU computing in HPC clusters is not new, it has become popular in recent times. We explain GPC computing and show you how to get the most out of it. Continue Reading
-
High-performance computing drives high-performance F1 cars to success
Jennifer Scott investigates how Formula 1 team Marussia uses a supercomputer to design and test its cars on a budget Continue Reading
-
Virtual solution to consumerisation
Archana Venkatraman looks at how the virtual desktop can help businesses with employees using their own devices Continue Reading
-
Network security assessments: India Inc. is going beyond routine
As network security assessments become essential hygiene, security experts at Indian enterprises are honing in to specifics. Some tips, insights and advice. Continue Reading
-
Royal Holloway 2012: A framework for preventing cross-site scripting
Based on his Royal Holloway thesis, Joseph Bugeja proposes a new framework for preventing cross-site scripting attacks. Continue Reading
-
Royal Holloway 2012: Designing a secure contactless payment system
In his Royal Holloway thesis, Albert Attard proposes a contactless payment system to make card-not-present credit card transactions more secure. Continue Reading
-
Royal Holloway 2012: An incident response process for armoured malware
An incident response process may be futile when dealing with today’s armoured malware, as explained in this Royal Holloway article. Continue Reading
-
Options in small-business storage for server virtualisation
SMBs moving to virtualised servers need shared storage to support a new, dynamic environment. We survey the key file- and block-level options in small-business storage. Continue Reading
-
Royal Holloway 2012: Risks of multi-tenancy cloud computing
In his Royal Holloway 2012 thesis, Jacobo Ros examines the risks of multi-tenancy cloud computing. Continue Reading
-
Royal Holloway 2012: An analysis of cloud security certifications
In his Royal Holloway 2012 thesis, Robert Farrugia analyses cloud security certifications and suggests ways organisations can reduce cloud risks. Continue Reading
-
Royal Holloway 2012: PCI compliance, cloud computing are a costly pair
It is possible to achieve PCI DSS compliance in a cloud environment, but it may not be cost-effective, as explained in this Royal Holloway article. Continue Reading
-
HTML5: The end of native apps?
Will the platform-agnostic common language HTML5 force apps from the device to the web? Continue Reading
-
How technology is changing BPO
Karl Flinders discovers how IT has become central to the provision of outsourced business processes Continue Reading
-
Forrester: Desktop virtualisation demands detailed request for proposals
Forrester's Clarence Villanueva and Chris Andrews provide tips on how to build a successful RFP for desktop virtualisation Continue Reading
-
Forrester: Derive maximum value from storage
Forrester analysts Andrew Reichman and Vanessa Alvarex identify the top trends in the storage market Continue Reading
-
Mandatory carbon reporting: Indirect emissions guidelines for IT managers
As the UK government announces mandatory carbon reporting for listed companies, how are IT managers to interpret guidelines on indirect emissions? Continue Reading
-
Storage capacity planning tools: Why virtual machines change everything
Because virtual servers are easy to create, delete and move and their storage needs grow rapidly and unexpectedly, you need to be on top of storage capacity planning. Continue Reading
-
'Big data' MDM processes key to finding business value in new info
Big data MDM projects encounter a green field in the form of social media. And all big data is enterprise data, by definition. Business leaders will look to IT to derive serious business value. Continue Reading
-
VMware data protection: An overview of how it works
There is a variety of tools that improve VMware data protection, with advantages in the areas of VM backup, replication and snapshots, compared with a traditional server environment. Continue Reading
-
iSCSI security: Networking and security options available
iSCSI security options include physical and virtual IP/Ethernet networking methods as well as built-in storage and switch device security features. Read about them here. Continue Reading
-
Could G-Cloud become the pride of public sector IT?
Despite the gloomy financial climate, the government has stated that G-Cloud remains a priority. Clive Longbottom looks at the impact. Continue Reading
-
Automate testing for agile quality
As agile methodology piles pressure on quality assurance, automation could ease resources. Continue Reading
-
HDFC Bank’s BS 25999 certification journey: An exploration
With BS 25999 certification hot these days, we take a look behind the scenes at HDFC Bank. The BFSI player just completed its first year of certification. Continue Reading
-
Delivering value from desktop virtualisation
IT leaders met at a recent Computer Weekly roundtable event to discuss the implications of desktop virtualisation on their technology infrastructure. Continue Reading
-
MDM technology still affords chance to make poor software choices
The MDM market is not so mature that bad choices are difficult to make. Beware the hype of multi domain, and don't expect technology to solve governance problems, in isolation. Continue Reading
-
10 GbE: iSCSI bandwidth increase improves protocol’s position against FC
With a boost to iSCSI bandwidth with 10 Gigabit Ethernet, products that support the protocol offer features to rival Fibre Channel SANs, including scalability and hypervisor integration. Continue Reading
-
How transforming a datacentre can transform your business
IT leaders from Domino's Pizza and TheTrainline.com reveal how transforming their datacentres transformed their businesses. Continue Reading
-
How will storage infrastructure change with VDI deployments?
The benefits of virtual desktop infrastructure (VDI) are well-documented but firms implementing VDI may have to re-appraise their storage options Continue Reading
-
VMware backup and the VMware snapshot
The VMware snapshot is a critical component of VMware backup. In this guide to the basics of VMware backup, we walk you through the key processes and suggest some best practices. Continue Reading
-
CEH certification gains credence in IT security domain
CEH certification is much sought after in the IT security domain today. Here’s how you can obtain CEH certification and why you should attempt do so. Continue Reading
-
What IT leaders say about big data
IT leaders met at a recent Computer Weekly roundtable event, in association with Oracle, to discuss the possibilities and challenges of big data. Continue Reading
-
HyperCITY’s retail store management system: Profit with promotions
HyperCITY services a million customers selling them about 40,000 products. Know how one of India’s largest hypermarket chains accomplishes this. Continue Reading
-
Server SSD guide to form factors and implementations
Server SSD offers immense gains in IOPS and throughput. We look at how it works, form factors available and its advantages and pitfalls, and we survey key vendors in the market. Continue Reading
-
Cloud backup options: Pure cloud vs hybrid cloud backup
Cloud backup is increasingly being seen as a flexible and cost-effective option by many organisations, but what are the pros and cons of pure cloud backup and hybrid cloud backup? Continue Reading
-
Using open data in local government
Developers are using open data from local government to create new, innovate public services. Cliff Saran reports. Continue Reading
-
CW500: The business case for social media
BT, the Met Office and the Department of Work and Pensions reveal how they are using social media to interact with staff and customers Continue Reading
-
Essar’s WAN encryption strategy to secure data in motion: In focus
Indian conglomerate Essar puts WAN encryption in place using Cisco’s GET VPN to protect data flows between remote locations. A closer look. Continue Reading
-
Making money from data: Financial business intelligence at work
Finance professionals are heavy users of BI and predictive analytics software. Find out how a variety of European finance functionaries are analysing trends, cutting costs and finding new business. Continue Reading
-
'Big data' applications bring new database choices, challenges
The dormitory world of databases has been roused from slumber by “big data” and associated technologies: MapReduce, Hadoop, MPP, NoSQL. Andy Hayler details big data’s impact and the issues it raises. Continue Reading
-
Big vendors tail startups in primary storage deduplication
Primary storage deduplication can slash disk utilisation rates, but it has yet to gain widespread mainstream product implementation. It’s coming though, and startups lead the way. Continue Reading
-
CW500: Transforming IT at HMRC, with CIO Phil Pavitt
Phil Pavitt, HM Revenue & Customs CIO, revealed the secrets behind running the UK's largest IT estate to CW500 Club members. Continue Reading
-
HPC storage requirements: Massive IOPS and parallel file systems
We survey the key vendors in HPC storage, where huge amounts of IOPS, clustering, parallel file systems and custom silicon provide storage for massive number crunching operations. Continue Reading
-
Object-based File Systems come of age for HPC
With HPC raring to enter the exaflop realm, object-based file systems can ensure better I/O performance. We take a look at the leading options. Continue Reading
-
Vodafone India’s PCI DSS compliance journey: A dissection
With Vodafone India’s PCI DSS compliance journey in its third iteration, we share practical PCI DSS tips and ground realities from the telecom major. Continue Reading
-
Do not delay, EU data protection changes on the way
Three or four years is plenty of time to get ready for the new data protection framework in Europe, but the clock is ticking Continue Reading
-
Blade servers: How to decide on Unix or Linux
If you’re contemplating Unix or Linux for your blade server, or a migration from one to the other, in this guide you will find everything you need to make up your mind. Useful Unix and Linux command lines also included. Continue Reading
-
Cisco everywoman in Technology Awards: The winners’ stories
The winners of the everywoman in Technology Awards 2012 have been announced. Find out why they won Continue Reading
-
F5: The last vendor standing in file virtualisation?
Since 2005 file virtualisation has gone from emerging technology to a field with one active vendor. What has caused the demise of file virtualisation and why does F5 persist with it? Continue Reading
-
India Inc guns for SIEM tools as maturity, viability drive growth
SIEM tool adoption in India is rising, spurred by growth in maturity of both SIEMs and organizations. We take a broad status check of the Indian SIEM space. Continue Reading
-
Enterprise flash: Three implementation options for virtualisation
Enterprise flash now comes in a variety of form factors aimed at speeding I/O beyond what’s possible with spinning disk in server and desktop virtualisation scenarios. Continue Reading
-
Bringing back the romance of engineering: Technician Council unveils framework
The Technician Council has unveiled a framework for employers which aims to recreate the romance that once surrounded engineering Continue Reading
-
IT service assurance in a hybrid cloud environment
CIOs need to ensure they can continue to provide the same levels of service in a mixed environment of cloud and legacy IT Continue Reading
-
Buyer's Guide: Disclosing security breaches in SMEs
Protecting regulated data is a big enough headache for many small businesses – now they also need to think about disclosure Continue Reading
-
Infosecurity: The changing landscape
The role of the chief information security officer (CISO) must adapt as businesses rethink IT security Continue Reading
-
CIOs sold on flexible working benefits – so what is holding it up?
Flexible working offers business benefits and allows employees to improve their work/life balance – but will managers accept it? Continue Reading
-
What businesses should learn from Web 2.0
Today’s Web 2.0 leaders – Google, Amazon, Salesforce.com et al – are the best place to look for important new IT management activities and practices. Continue Reading
-
CW500: Everything you need to know about big data in 15 minutes
Harvey Lewis, research director for Deloitte Analytics, discusses the big trends in big data. Continue Reading
-
Buyer's Guide: How to get private cloud right
There are a lot of misperceptions about what it takes to get your private cloud investments right and drive adoption by your developers Continue Reading
-
Bank of India’s 2FA with mutual authentication goes beyond OTPs
Indian BFSI major Bank of India chose mutual authentication when it required a two factor authentication (2FA) solution. There’s been no looking back. Continue Reading
-
Unified storage goes mainstream
Unified storage has gone mainstream, with full protocol support from the top five vendors. We survey the options available, including single platforms and NAS gateways. Continue Reading
-
SMB backup products embrace virtual/physical and cloud environments
Product survey: Midrange and SMB backup products bring enterprise features with ease of use and embrace virtualised environments, cloud as a target and improved deduplication. Continue Reading
-
How to make your network green
Make sure your network and datacentre run efficiently as part of a green networking strategy Continue Reading
-
Can a private cloud drive energy efficiency in datacentres?
As more and more companies virtualise datacentres, we ask if stepping into a private cloud would really mean greater energy efficiency. Continue Reading
-
The issues organisations must consider in migrating to private cloud
Companies that attempt to move to cloud without sufficient planning will fare badly and could endanger their data and reputation Continue Reading
-
Hero MotoCorp’s IT spending methodology examined
IT spending is a process requiring tremendous planning at Hero MotoCorp. Learn how India’s largest 2-wheeler manufacturer spends its IT budget from its CIO. Continue Reading
-
Interview: Oke Okaro, general manager and global head of mobile at Bloomberg
Bloomberg's mobile chief talks to Computer Weekly about the challenges of mobile apps development and the prospects for Windows 8. Continue Reading
-
Cloud data quality, integration open new vistas for managing data
Find out what opportunities the cloud could open up for data quality and integration. Advantages: scalability, reduced admin and costs. ETL, as a data quality sweet spot, lends itself to the cloud. Continue Reading
-
Virtual machine storage optimisation methods explained
Virtual machine storage for virtual desktops and servers has to deal with heavy and random I/O patterns. We survey the key methods of optimising storage for virtual machines. Continue Reading
-
Buyer's Guide: How to upgrade to IPv6
IPv6 is an increasingly hot topic in the networking industry. We examine the issues for older hardware support. Continue Reading
-
Buyer's Guide: Forrester reveals the value of IPv6 to the enterprise
IPv6 can support a new set of customers and offers the opportunity to generate revenue from digital services Continue Reading
-
IT priorities in the downturn
IT leaders talk to Computer Weekly about how their IT priorities have been shaped by the downturn Continue Reading
-
BI reporting tool gives Iffco Tokio a headstart
BI reporting tools are quickly taking over from Excel. Explore how Iffco Tokio, the general insurance major in India, benefited with BI reporting. Continue Reading
-
Nutanix, Tintri pioneer new forms of virtual machine storage
Nutanix and Tintri pioneer new forms of virtual machine storage that aim to deal with large amounts of random I/O with flash, spinning disk and innovative architectures. Continue Reading
-
Arup Chatterjee
SearchSecurity.in CISO Power List 2012 Profile: Arup Chatterjee, CISO, WNS Global Services. Continue Reading
-
Burgess Cooper
SearchSecurity.in CISO Power List 2012 Profile: Burgess Cooper, CISO, Vodafone India. Continue Reading
-
Shobitha Hariharan
SearchSecurity.in CISO Power List 2012 Profile: Shobitha Hariharan, CISO, Shoppers Stop. Continue Reading
-
Faraz Ahmed
SearchSecurity.in CISO Power List 2012 Profile: Faraz Ahmed, CISO, Reliance Life. Continue Reading
-
Agnelo D'Souza
SearchSecurity.in CISO Power List 2012 Profile: Agnelo D‘Souza, CISO, Kotak Mahindra Bank. Continue Reading
-
Sunil Varkey
SearchSeacurity.in CISO Power List 2012 Profile: Sunil Varkey, CISO, Idea Cellular. Continue Reading
-
Sunil Dhaka
SearchSecurity.in CISO Power List 2012, Profile: Sunil Dhaka, CISO, ICICI Bank. Continue Reading
-
Vishal Salvi
SearchSecurity.in CISO Power List 2012, Profile: Vishal Salvi, CISO, HDFC Bank. Continue Reading
-
Subrahmanya Gupta Boda
SearchSecurity.in CISO Power List, 2012: Profile: Subrahmanya Gupta Boda, CISO, GMR Group. Continue Reading
-
Adapa Raja Vijay Kumar
SearchSecurity.in CISO Power List 2012 Profile: Adapa Raja Vijay Kumar, VP & Global Information Security Leader, Genpact. Continue Reading
-
Manish Dave
SearchSecurity.in CISO Power List: Profile: Manish Dave, CISO, Essar Group. Continue Reading
-
Satish Das
SearchSecurity.in CISO Power List: Profile: Satish Das, CSO and VP (ERM – Enterprise Risk Management), Cognizant. Continue Reading
-
Sameer Ratolikar
SearchSecurity.in CISO Power List 2012: Profile for Sameer Ratolikar, CISO, Bank of India. Continue Reading
-
Nabankur Sen
SearchSecurity.in CISO Power List 2012: Profile: Nabankur Sen, CISO, Axis Bank. Continue Reading
-
Pankaj Agrawal
SearchSecurity.in CISO Power List 2012 Profile: Pankaj Agrawal, CISO & Head of Technology Governance, Aircel Continue Reading
-
Buyer's Guide: Tips for small companies on IPv6 migration
There is no rush to switch from IPv4 to IPv6, but there is no harm in being prepared for IPv6. We look at the practical issues for SMEs. Continue Reading
-
Backup appliance product survey: Which one is right for your business?
We look at the backup appliance market, examining products from six vendors and highlighting key features that can help you choose the one for your SMB or branch office. Continue Reading
-
Snapshots from nullcon Tritiya Day 2
A quick look at what happened during nullcon 2012. Continue Reading
-
How to formulate an effective smartphone security policy
The mobile revolution offers new ways of working, but what are the challenges and how can they be overcome? Continue Reading
-
nullcon Tritiya’s infosec conference: Day 1 walkthrough
Join us, as we take a look at the third installment of annual information security conference nullcon 2012. Continue Reading
-
BYOD policy gives London university users network access flexibility
A London university has undergone a network infrastructure upgrade to make way for a BYOD policy, offering staff and students more network access flexibility and capabilities. Continue Reading
-
Buyer's Guide: How to prepare your organisation for IPv6
The switch to IPv6 – on 6 June – shows just how imminent the transition from IPv4 to IPv6 is. Is your organisation ready? Continue Reading
-
How smart is the Smart Metering Implementation Programme?
The Smart Grid will allow people to manage energy consumption with smart meters, but carries all the risks of a large government IT project. Continue Reading
-
SaaS BI technology comes of age
SaaS BI and its benefits explained: it can improve scalability and reduce administration costs; it offers capabilities in data warehousing, ETL and analytics; it can be secured. What’s not to like? Continue Reading