In Depth
In Depth
-
The best Microsoft security content online
This list features the best pieces of Microsoft Windows content on the internet. Continue Reading
-
A guide to Fibre Channel technology
This chapter offers an overview of Fibre Channel specifications and devices including HBAs and switches. Readers will also learn about the pros and cons of FC SANs in the storage enterprise. Continue Reading
-
CIO spotlight: David Lister
David Lister, CIO at Reuters, tells us about the pivotal moment in his career Continue Reading
-
CIO spotlight: Maggie Miller
CIO of the Warner Music Group, Maggie Miller talks of her rise to the top Continue Reading
-
CIO spotlight: Peter Dew
Linde Group CIO Peter Dew discusses his rise to the top Continue Reading
-
A guide to iSCSI and Fibre Channel
This handbook offers overviews of Fibre Channel and iSCSI, gives tips on how to enhance iSCSI performance, and outlines how to achieve high availability and reliability in a San. Continue Reading
-
How to select the right IP PBX
Selecting the right IP PBX system for your company can be complicated. Here are some important things to consider when purchasing an IP PBX. Continue Reading
-
How to enhance iSCSI performance
This chapter examines means of improving iSCSI performance with high-performance Ethernet switches and TOE adapter cards. This chapter also offers tips/guidelines for iSCSI deployment. Continue Reading
-
San availability and reliability
This chapter outlines some of the techniques and tactics used to achieve high availability and redundancy in a San (FC or iSCSI). These can include port aggregation, trunking, and failover. Continue Reading
-
Videocast: data deduplication and protection
Where is the future of backup heading? How viable are technologies such as data deduplication and continuous data protection? In this videocast, W. Curtis Preston covers the basics and the benefits of some emerging backup technologies Continue Reading
-
Tape encryption purchase considerations
Storage administrators who use tape-based won't slow up their backups and will have peace of mind knowing that the tape content is secure. However, LTO-4 tape drives have specific encryption issues. Continue Reading
-
The future of on-demand applications
Although corporate adoption of online software delivery models is still relatively low, it is not only the fastest growing sector of the industry, it is also expanding its remit rapidly. Continue Reading
-
Chief Information Officers (CIOs): What it takes to be a good CIO
CIOs: What is the role of the Chief Information Officer and what makes a good CIO? Continue Reading
-
Storage session downloads: architecture track
Data classification is at the core of nearly all modern storage management techniques and tools. Featured in this track is the popular tiered storage school sessions, along with other sessions that can help any manager set up or administer this new ... Continue Reading
-
Storage session downloads: infrastructure track
This track looks at San and Nas issues, virtualization, distance demands, remote offices and how to build out systems. Continue Reading
-
Storage session downloads: disaster recovery track
This track explores how users can coordinate a range of data protection technologies to create more recoverable infrastructures. Restructuring your recovery methods can also help you recover the right data at the right time and in the right manner. Continue Reading
-
Storage session downloads: executive track
Our "executive track" sessions give you an idea of where your storage should be and ideas on where it's headed. Sessions also key on ways to integrate new technologies, processes and ideas without going over budget. Continue Reading
-
Microsoft patch management policy
In the Microsoft Patch Management tutorial, learn about Windows patch management policy, patch maintenance and post-patch security as well as what tools you can use for patch management in Windows networks. Continue Reading
-
Holographic data storage: the next big thing?
This article examines the technology, highlights the anticipated deployment and considers the potentially rocky road ahead for this high-capacity optical storage scheme. Continue Reading
-
Open communications vs. closed communications
Open communications are key to making the inevitable multimodal, multi-supplier communication environment work, so why aren't more suppliers providing open-source systems? Continue Reading
-
CIO Video: What headhunters are looking for in CIOs
See our latest video to find out what headhunter Cathy Holley, partner at global executive search firm Boyden, believes are the key skills and attributes required by firms looking for CIOs today. Continue Reading
-
Microsoft network endpoint security tips and tactics
Securing network endpoints is imperative when protecting sensitive data. Learn how to secure your network endpoints in this section of our network access learning guide. Continue Reading
-
Hybrid VoIP/TDM system improves patient care
Hybrid VoIP and unified communications improve an aging TDM system for one medical centre that focuses on quality patient care. Continue Reading
-
Microsoft Vista tutorial on security
In our ultimate Microsoft Vista security tutorial, take a deeper look into Vista security. Check out examples of Vista security tips, podcasts, webcasts and excerpts from popular Vista texts to learn all about the features of Vista, like User ... Continue Reading
-
Analyst paper: IT business alignment
Latest research paper from Cutter Consortium's senior consultant Steve Andriole on IT business alignment Continue Reading
-
Video:CISO security special part two
In the second part of our security special video, ComputerWeekly.com blogger and security expert David Lacey interviews Standard Chartered Bank's John Meakin. Meakin is group head of information security at Standard Chartered and agreed to be ... Continue Reading
-
Risk management: an IT director's guide
Risk management has traditionally been considered the concern of the finance department, but regulatory requirements and an increasing number of risk-based standards are pushing IT directors to consider the issue as well. Continue Reading
-
SSL/Computer Weekly IT salary survey: finance boom drives IT job growth
The second quarter of 2007 was the best for IT job-seekers for several years, with double-digit growth in the full-time and freelance jobs markets. The number of permanent advertised jobs was up 13% on the same period in 2006, and there were 18% ... Continue Reading
-
Analyst paper - Leading up: guiding your Leaders to effectively support your team's efforts
In this report, Cutter Consortium analysts Pollyanna Pixton and Jenni Dow explain how IT professionals can better negotiate their relationships with management Continue Reading
-
SMBs demand attention from business apps vendors -- and get it
Competition is at a fever pitch in the SMB ERP market, and as a result, vendors are scoring with products specifically for SMBs. Continue Reading
-
Surviving e-discovery
It's been eight months since the Federal Rules of Civil Procedure were amended, and e-discovery rulings are all over the map, creating chaos for companies that must comply. Continue Reading
-
MANSION houses its business on outsourced datacentre
The online gaming industry continues to grow rapidly and competition is fierce to secure customer loyalty. Reliable IT and network capabilities will remain at the forefront. Continue Reading
-
Video: CISO security special
In the first part of our security special video, ComputerWeekly.com blogger David Lacey interviews Betfair's Sandra Barton-Nicol Continue Reading
-
Understanding VoWLAN
Like VoIP, VoWLAN contributes to cost efficiency. Because calls can be routed over the data network internally or over the Internet externally, mobile telephony costs can be eliminated or decreased significantly. In the long term, VoWLAN deployment ... Continue Reading
-
Business intelligence drives compliance for M&S
BI tools enable financial services company to achieve Basel II legislative compliance and create an environment for assuring the quality of data Continue Reading
-
BI brings Speedy returns
Business intelligence allows firm to more effectively make decisions that have a positive impact on business Continue Reading
-
Vendor report: PCI; Is your Business up to the Standard?
Far too many businesses are still struggling to meet conditions that specify how merchants safeguard customer account information using encryption, firewalls, vulnerability assessments, and other means Continue Reading
-
Vendor report: Service Management; Making the Grade
The majority of companies are making changes within their IT organisations in an effort to align IT initiatives with corporate goals. Underlying this objective is the construction of an integrated portfolio of services Continue Reading
-
Vendor report: IT Goes Green to Keep Companies Growing
Enterprise customers can dramatically reduce their cost base by using products designed to improve the energy efficiency of their datacentre environments Continue Reading
-
IT troubles leave UK farmers £17m out of pocket
Public Accounts Committee identifies the failure to test computer systems as one of the key reasons for delays in farm payments under the EU's Single Payment Scheme. Continue Reading
-
Improving Performance, Resilience, and Achieving Compliance with Corporate and Regulatory Mandates
Success in IT governance and risk management requires a company take a comprehensive approach that addresses the enterprise as a whole Continue Reading
-
Applying scrum and other agile development techniques
Although some problems are inevitable, there are ways to be more productive in your software development if you are prepared to take a risk and try some new methods. Continue Reading
-
Video: CIO strategy forum
In our latest video, ComputerWeekly.com interviews senior figures in the IT industry about the most pressing challenges facing Chief Information Officers (CIO) and IT leaders in today's complex business environment. Continue Reading
-
eCourier runs with guaranteed resilience
eCourier was only founded three years ago but has very quickly become one of the UK’s leading express courier company. Continue Reading
-
The profitable alternatives to building your own datacentre
Mergermarket is an independent Mergers and Acquisitions (M&A) service that provides the global advisory and corporate communities with intelligence and analysis, leading to real revenues for clients. Continue Reading
-
Business success from consolidation
Lease Plan is one of the largest fleet management companies in the world. Historically, the IT infrastructure that supported its European business resided in each individual country. Continue Reading
-
Unified communications offers security, ROI and effectiveness
Unified communications was all the talk at VoiceCon in San Francisco. What exactly is it? What are the technical and strategic issues around UC? Associate Editor Jeff Kelly discovered some helpful advice and opinions on UC at the show. Continue Reading
-
User performs data storage U-turn
U-Store-It, a national self-storage company, decentralized its data centers, migrated data from SAN to DAS and de-clustered Exchange to simplify storage management. Continue Reading
-
SaaS apps being deployed by business units, not IT
When it comes to deploying applications via SaaS, IT is still behind the curve. What's preventing IT from getting control over the programs business units want? Continue Reading
-
Mobile security is end user and IT responsibility
Mobile security is not top-of-mind for many mobile workers, according to recent research by Cisco and the National Cyber Security Alliance. Continue Reading
-
CDP overview
Storage volumes are growing at an alarming pace, and tape-based backups are not always possible within an available backup window. Today's businesses are increasingly focused on tighter RTO and RPO. Faster restorations and more recent recovery ... Continue Reading
-
Boost productivity with lean software development
Experts say implementing lean software development can lead to productivity gains of between 20% and 40%, and that quality and speed of execution can improve markedly within a matter of months Continue Reading
-
Your shout: business skills a necessity for successful CIOs
Readers have their say Continue Reading
-
Experts: IDS is here to stay
IDS technology has survived predictions that it would be replaced by IPS. One expert says it will remain a separate product while IPS is folded into firewalls. Continue Reading
-
VoIP performance management abounds at VoiceCon
VoIP performance management tools were announced at VoiceCon, signaling a shift in focus from infrastructure to end-user experience. Continue Reading
-
Volvo signs up to iPass Wi-Fi service
Swedish car maker Volvo is migrating 17,000 staff in 180 countries to Wi-Fi and dial-up remote connectivity from iPass after signing a three-year deal with the access company. Continue Reading
-
Hosted and managed VoIP fundamentals
Adoption rates of hosted VoIP and managed VoIP are increasing as more companies look to reduce the costs and complexities of deploying VoIP in house. Enterprises are factoring revenue growth, enhanced productivity and communication services into ROI... Continue Reading
-
Backup reporting expands to add capacity planning
Aptare adds capacity planning for primary data storage to its product line, joining Symantec in recent attempts to broaden the appeal of reporting software. Continue Reading
-
Voice over WLAN improves a hospital's communications
A Voice over WLAN (VoWLAN) system was the solution to improving communications and response times for staff at one hospital, while boosting employee satisfaction. Continue Reading
-
Firewall deployment options increase for enterprises
With a growing number firewall configuration options, companies need to spend more time and put more effort into determining how to design and deploy firewalls. Continue Reading
-
Asterisk PBX solves enterprise's growing communication problem
An Asterisk-based PBX proved to be the solution to one enterprise's communications growing pains. Continue Reading
-
Microsoft loses US Office Open XML vote
Microsoft has lost a key vote for its Office Open XML (OOXML) to be accepted as an alternative to the OpenDocument format. Continue Reading
-
Globalisation: IT management strategies
In this first in a series on globalisation, Lindsay Clark looks at how this conceptual shift is changing the way businesses operate and how the IT function is managed and deployed Continue Reading
-
VoIP models and services: Complete guide
With clear, concise explanations of existing VoIP business models and deployment methodologies, this guide will enable you to weigh the pros and cons of each based on your needs. Continue Reading
-
Downtime: IT detective show, Choose and Book and PC tantrums
The lighter side of IT Continue Reading
-
DPM's diary: 14 August 2007
The week's events from Bogcaster Council Continue Reading
-
Video: CIO interview series - The Changing Role of the CIO
In our latest video interview, Jonathan Mitchell, CIO and business process improvement director at Rolls-Royce, talks to ComputerWeekly.com about the changing role of the CIO in today's business environment. Continue Reading
-
Voice over IP: the expert view
Voice over Internet Protocol (VoIP) technology requires the use of hardware and software for users to send their voice as a digital signal over the internet, instead of over traditional PSTN networks provided by telecom providers Continue Reading
-
Microsoft security features for Windows Server 2008
Learn more about the Microsoft security features of Windows Server 2008 (Longhorn) like BitLocker support and Network Access Protection (NAP) and how the delayed release of the new server system will affect security. Continue Reading
-
Analyst paper: the role of information in an SOA
SOA efforts to date have emphasised information processes and have paid little attention to information management. This Cutter Consortium report attempts to rectify this imbalance, examining and elaborating on the role of information architecture ... Continue Reading
-
How to cheat at VoIP Security
Securing a VoIP infrastructure requires planning, analysis, and detailed knowledge about the specifics of the implementation you choose to use. Continue Reading
-
Radio-frequency identification (RFID) technology: the expert view
Latest news stories, features, podcasts, blogs and links on radio-frequency identification (FRID) Continue Reading
-
Disaster recovery and business continuity fundamentals
The importance of disaster recovery and business continuity planning has been underscored in the wake of Hurricane Katrina, the Avian flu and 9/11. As important as maintaining continuous communications in a disaster is staying connected when random,... Continue Reading
-
Disk-based backup overview
Implementing a backup scheme that is fast, safe and cost-effective remains a serious challenge for storage administrators. Here's how to do it Continue Reading
-
Does compliance make encryption always necessary?
Many organisations look to encryption to protect sensitive data. Yet hundreds of millions of people who use the Internet also use encryption, yet most of them don't even know it. Continue Reading
-
Encryption planning can reap benefits
New regulations require effective encryption . Encryption can be beneficial if you implement it in the right places. Continue Reading
-
Strategy Clinic: your IT management questions answered
Experts from Cranfield School of Management, Dominic Barrow, Ernst & Young, Henley Management College, NCC Group and The Corporate IT Forum offer solutions to IT directors' dilemmas Continue Reading
-
Securing a virtualised environment
Virtualised client server technology is riding high at the moment, with its potential to increase efficiency and reduce costs making it seem an attractive option for many CIOs. But is security in danger of getting left behind in the race to save ... Continue Reading
-
DPM's diary: 7 August 2007
Catch up with events from Bogcaster Council Continue Reading
-
Downtime: terminators, rain and moody computers
The wacky side of IT Continue Reading
-
Strategy clinic: getting a supplier to agree to a global corporate deal
Experts offer advice on IT directors' management dilemmas Continue Reading
-
Analyst paper: provisioning the mobile workforce
In this report, Cutter Consortium analyst Brian Dooley explains the security and access control required to give mobile users the ability to run enterprise applications via their mobile devices Continue Reading
-
Will Windows Server 2008's delay affect your security?
Is your Microsoft Windows Vista system at a disadvantage now that Windows Server 2008 won't be available until February 2008? Find out why one industry guru says no. Continue Reading
-
Nas FAQ guide: the lesser known issues
Advice to the San-centric users who don't have any Nas (network attached storage) to speak about... Continue Reading
-
Justifying VoIP deployment without cost-analysis
VoIP and UC deployment ROI can be measured using non-financial metrics. Learn more about VoIP ROI in this article from Yankee Group's Zeus Kerravala. Continue Reading
-
DPM's diary: 31July 2007
Weekly round-up of events at Bogcaster Council Continue Reading
-
BP points way to integrated security
BP's plans to align physical and IT security to combat emerging threats offer lessons for other firms looking to implement integrated security strategies Continue Reading
-
Nas FAQ guide: Nas virtualisation solutions
The next steps in storage Continue Reading
-
Data Storage Management Survival School: Lesson 3
Learn the best practices, processes and tools necessary to plan for capacity planning, creating and meeting SLAs and mapping future growth Continue Reading
-
Nas FAQ guide: server virtualisation and NAS integration
We're at a point where server virtualisation is really becoming pervasive Continue Reading
-
Business continuity: the expert view
Business continuity is about expecting the unexpected and preparing for a system failure. Continue Reading
-
Nas FAQ guide: Why not do everything with NAS vs. SAN?
Go ahead! As long as the applications support NAS... Continue Reading
-
Nas FAQ guide: what are the trends that impact Nas?
It's the 'iceberg analogy.' Transactional data may be above water and get your attention, but the tremendous amount of unstructured... Continue Reading
-
BlackBerrys' underground reception solution
BlackBerrys and cell phones wouldn't work in a law office until it deployed a multi-carrier system. Continue Reading
-
Data Storage Management Survival School: Lesson 2
Greg Schulz, Senior Analyst of the Evaluator Group, looks at the real nuts and bolts of storage management. Continue Reading
-
Data Storage Management Survival School: Lesson 1
Determining ROI for storage management can be a challenge given the varying types of metrics used. Yankee Group senior analyst Jamie Gruener looks at how to begin your own ROI analysis of storage management tools Continue Reading
-
Data Storage Management Survival School
All of the aspects of managing storage and how to optimise your environments to minimise the data management crunch Continue Reading
-
Nas FAQ guide: integration with different storage protocols
Some vendors do it already but it could be tomorrow's thing Continue Reading
-
Cracking Windows passwords
What good is a tool if you don't know how to use it? In this screencast, follow a step-by-step demonstration by security expert Kevin Beaver as he shows you how to use three different tools to crack passwords to test their strength. Continue Reading
-
Identity management: the expert view
Identity management has become a key issue in information security. Governments and businesses are using identity management systems to provide and control access to places and services such as bank accounts, buildings and computer applications. Continue Reading