In Depth
In Depth
-
Finding the NAC of effective network IT security
In today’s highly business world, the need for quick and smooth and above all secure access to information is vital. Media firm OMD turned to network access control (NAC) technology to address these issues. Continue Reading
-
Fujitsu exec says SAS may take years to hit your array
Fujitsu's product development VP talks about the development of SAS, why Fujitsu won't be competing with Hitachi's 1 TB drive and the Star-Trek-like future of disks. Continue Reading
-
VoIP security monitoring gets proactive
VoIP security and traffic monitoring have become imperatives, but it can still be tricky on a converged VoIP and data network. Continue Reading
-
Quiz: Defending mobile devices from viruses, spyware and malware
A five-question multiple-choice quiz to test your understanding of the content presented in Defending mobile devices from viruses and malware lesson of SearchSecurity.com's Messaging Security School. Continue Reading
-
U-turn cuts risks of ID card scheme
Plans for population database and iris scans dropped, deadline pushed back, but security and confidentiality demands will be met, says Passport Service chief Continue Reading
-
E-crime policing now part of everyday police work
Changing of the e-crime guard: Following the closure of the National High-Tech Crime Unit, policing e-crime is set to become part and parcel of everyday police work, with the focus on prevention Continue Reading
-
University offers a lesson in the cost and service benefits of IP telephony
The higher education sector has never been more competitive. In the past two decades, participation in higher education has tripled, state funding has halved, and every university and college is under intense pressure to attract the brightest and ... Continue Reading
-
Trading systems battle for dominance
As trading on stock exchanges becomes increasingly automated and trading volumes skyrocket, technology is becoming a key battleground for the world’s stock exchanges. Read all the latest on stock exchanges and their technologies here. Continue Reading
-
Datacentre power technologies rise to the challenge of the blade servers
Uninterruptible power supplies are crucial for the blade age Continue Reading
-
Vendors: Cut the hype, truth is what sells
Storage virtualisation technologies have been purchased and implemented successfully for years. The rest of the IT infrastructure must try to catch up and, ultimately, the only thing not virtualised within the datacentre will be the last guy ... Continue Reading
-
Mainframe clones ready for take-off
PSI's partitioning architecture allows users to combine IBM z/OS and Linux workloads on one machine. IBM has reached for its writs, but potential users are keen Continue Reading
-
TJX breach: There's no excuse to skip data encryption
Companies complain that database encryption products are too expensive and difficult to manage, but customer loss and breach notification costs outweigh encryption expenses. Continue Reading
-
TJX gets little sympathy from blogosphere
TJX is taken to task by security bloggers for waiting until after a massive data breach to take steps to bolster its security. Continue Reading
-
Newham Council targets a starring role at the Olympics with dark fibre
Smart projects: London council prepares for 2012 by building spare network capacity Continue Reading
-
Should I take business or IT qualifications?
Expert advice for reader's career problems Continue Reading
-
EqualLogic CEO says IPO on the way
EqualLogic's CEO talks about the company's plans to go public, its intent to add 10 GigE to its products and why he thinks not all iSCSI products are created equal. Continue Reading
-
Swansea halts outsourcing extension as savings shrink
Swansea City Council has pulled out of the second phase of an outsourcing programme with Capgemini after revised projections for the first tranche of work suggested it would not make anywhere near the original forecast savings. Continue Reading
-
PatchLink offers solid flaw management
PatchLink Update 6.3 is a solid solution to the enterprise patch management problem and demonstrates its true power in a Windows environment. Continue Reading
-
SonicWALL's SSL VPN appliance
SonicWALL SSL-VPN 4000 is an affordable and capable appliance for mid-sized enterprises says our expert Continue Reading
-
WatchGuard's UTM product under the spotlight
Despite minor flaws, the Firebox X series is an excellent UTM deal Continue Reading
-
VoIP flows over optimised pipes
To ensure the quality of its VoIP traffic, Gold Line, a phone card company, used WAN optimisation techniques to prioritise voice traffic. Continue Reading
-
Anti-malware system goes in goal at Derby after Trojans land in net
Derby County Football Club has replaced its anti-virus systems with advanced anti-malware technology, following an attempted hacking attack on its networks. Continue Reading
-
Has e-mail become more of a hindrance than a help in your business?
The Big Question is an initiative between Computer Weekly and recruitment consultancy PSD. Each week we put the Big Question to top IT professionals to get their take on a current talking point. Continue Reading
-
Networking equipment award finalists
Find out the finalists for networking equipment in our storage products of the year Continue Reading
-
Disk and disk subsystems award finalists
Find out who the finalists are for disk and disk subsystems Continue Reading
-
DPM's diary: 16 January 2007
Weekly round up of events at Bodcaster City Council Continue Reading
-
Downtime: Funny money
Downtime still doesn't know what to make of the trend towards banking services being offered inside virtual reality worlds. Continue Reading
-
MobileOne is making the job easier for Homeserve
Emergency services firm Homeserve is improving customer response times and cutting back on paperwork as it moves into the second phase of a Windows Mobile 5.0 application roll-out to fully automate job scheduling for engineers in the field. Continue Reading
-
The right ideas for a bright future as a CIO
The move from manager to leader is the key to success in the business-oriented approach to IT that is on the rise. Strengthening your influence among the movers and shakers demands a wider portfolio of skills Continue Reading
-
Storage predictions for 2007
The year 2007 will be a year of fruition in the storage world. Let me explain what I mean by that. Continue Reading
-
How to create harmony between the iPod generation and older managers
Strategy clinic: Our panel of experts offer advice on IT management dilemmas Continue Reading
-
Rotherham Council and local health trust plan move to a single network
smart projects Patient and client information pooling system takes next logical step Continue Reading
-
Next move: How do I move on from a small IT company?
Careers advice for IT professionals. Continue Reading
-
Web application security vulnerabilities by the numbers
A new WhiteHat Security report identifies and ranks Web application security vulnerabilities of custom Web applications. The most prevalent vulnerability -- cross-site scripting. Continue Reading
-
WiMax clearing path to mainstream
A number of industry moves have made WiMax almost ready for the mainstream. But there's good news and bad news to consider before making the move. Continue Reading
-
Federal government pushes full-disk encryption
Businesses need to follow the federal government's lead in reducing data breaches by holding employees responsible and examining full-disk encryption (FDE) products. Continue Reading
-
Southampton puts web control in the net
Southampton Football Club has rolled out a sophisticated web filtering system to actively manage internet access for different user communities at the club, including its well-known youth training academy. Continue Reading
-
Inside MSRC: Microsoft updates WSUSSCAN issue
Christopher Budd of the Microsoft Security Response Center is urging customers to deploy the latest versions of the Systems Management Server Inventory Tool for Microsoft Updates or Microsoft Baseline Security Analyzer to receive all the current ... Continue Reading
-
Green is cash in the bank
There has been plenty of talk recently about the need to appreciate the environmental impact of what we do in our day to day lives. Continue Reading
-
Mobile Salesforce taps into beer sales
Mobile Salesforce on BlackBerrys has helped Karl Strauss Brewing Company sell more beer and save money . Continue Reading
-
Speaking of VoIP - the key issues
Russ Shaw, technology journalist, author and blogger extraordinaire, speaks his mind about VoIP. Continue Reading
-
Enterprise licensing stranglehold set to loosen in 2007, says Forrester
For IT directors, 2007 may be the year that they are able to escape inflexible terms and conditions on their enterprise software usage, according to Forrester Research. Continue Reading
-
Environmental issues climb the IT agenda
With processing requirements and energy costs on the rise, environmental issues are beginning to climb the IT agenda. Continue Reading
-
Software licensing: How to stay ahead
Software licensing issues are growing increasingly complex. On a day-to-day basis, there are issues around software asset management and patching strategies to consider. At the same time, big-picture issues include the advantages or otherwise of ... Continue Reading
-
Why don't we have clustered FC block storage?
Is it odd that the industry has made such serious strides toward incorporating clustering concepts in both file-based storage and IP -based storage, but not Fibre Channel storage? Continue Reading
-
How to make money by going green
HSBC CIO Ken Harvey is committed to greening the bank. As well as helping to protect the environment, it makes sound business sense, he believes Continue Reading
-
Salary and benefits survey shows what motivates staff
Money is not the prime key in attracting and motivating staff. Rewarding work and career progression are the biggest incentives, as the Computer Weekly/Computer People Salary and Benefits Survey makes clear Continue Reading
-
Adobe Reader flaws spook security experts
Security experts sound the alarm over Adobe Reader flaws that could be exploited for cross-site scripting attacks and other mayhem. Continue Reading
-
Top Web security tips of 2006
Check out the top five Web security tips of 2006 to get advice on securing Internet Explorer, ISA Server and Radius and a set of tools designed to secure the Web browsing experience. Continue Reading
-
Mobile computing in 2006 -- A look back
Craig Mathias looks at last year's key developments in mobile computing and wireless communications. Continue Reading
-
Storage Outlook '07: In search of better data management
Brian Peterson, storage architect for a Midwest-based Fortune 100 company, says better data management and business processes will be the main goal in 2007. Continue Reading
-
Security pros glean insight from '06
Corporate acquisitions, an abundance of spam, and the White House's take on cybersecurity mark 2006. Continue Reading
-
Storage Outlook '07: Seeking better backups and archives
Tom Becchetti, senior infrastructure engineer for a major national financial services company, says compliance, backup and archiving will be top priorities in 2007. Continue Reading
-
Top 10 mobile tips of 2006
Review of the popular mobile technical tips of 2006 from our stable of mobile experts; Lisa Phifer, Craig Mathias, Daniel Taylor, Kevin Beaver and Robbie Harrell. Continue Reading
-
Top Windows server hardening tips of 2006
Check out the top Windows server hardening tips of 2006 for helpful advice on domain controller penetration testing, security tips for the Windows Server 2003 OS and more. Continue Reading
-
Don't leave it all to your firewall
The battery of anti-hacking measures built into an application firewall can offer a level of protection, but hands-on management is still the key to security Continue Reading
-
Preventing spam over IP telephony
Spam, that scourge of the inbox, should by now be pretty much under control. Continue Reading
-
Private sector expertise in demand in booming public sector IT market
The government’s love affair with IT – and the efficiencies it can bring – continues to create unprecedented career opportunities in the public sector, with billions of pounds earmarked for IT projects in the coming years. Continue Reading
-
How do I restart my high-level career?
Expert advice for readers' career problems Continue Reading
-
President sets out challenges for IT in 50th anniversary year of the BCS
As the BCS begins its 50th anniversary year, members have been told that new approaches will be required from the IT community to meet a range of global and national challenges. Continue Reading
-
Lincolnshire councils start sharing services to cut back-office expenses
Councils cut costs by standardising on content management system Continue Reading
-
Award set up for best entrepreneurial business team
This month sees the launch of an initiative to promote entrepreneurial teamwork in UK businesses. Continue Reading
-
Information security predictions for 2007
Security guru Kevin Beaver presents his two cents worth on what he sees happening in the information security world of networks and business operations during the new year. Continue Reading
-
A look back at the malware tips and news of 2006
A trek back to January 2006 recaps the worm epidemic. Then we dredge up news about the growing threat of rootkits and recall our most popular tips from the past 12 months. Continue Reading
-
Disk-based backup continues gaining steam
Many who work in the field of data protection will attest that 2006 was one of the better years that they have seen in a long time. Continue Reading
-
Top client security tips of 2006
A network user without the proper know-how is a ticking time bomb when it comes to security. Check out our top five client hardening tips of 2006 to get a head start on protecting yourself from potentially dangerous users. Continue Reading
-
Cleversafe envisions a new world of storage
An organisation led by the inventor of the wireless thin client aims to combine storage and the Internet, and change how we think of both storage and computing. Continue Reading
-
All-in-One Guide: SAN final exam
Are you up to date on SAN technologies? Take our test and evaluate your knowledge of the SAN. Continue Reading
-
Vitrualization, SaaS, alignment and VoIP big in 2007
Virtualization, VoIP, SaaS and redefining alignment will be big in 2007, predicts Paul Gillin, TechTarget's former editor-in-chief. Find out what else he thinks will rise to the top of IT. Continue Reading
-
Sony rolls out middleware to handle scramble for PS3
Sony has prepared for next spring's launch of its most important product in six years by standardising on a single middleware platform across Europe to meet retailers' orders. Continue Reading
-
Scottish Power aims for a first with new business continuity standard
Scottish Power is aiming to tighten its response to business interruptions by applying for accreditation under a new British Standard for business continuity. Continue Reading
-
Top network security tips of 2006
The top Windows networking security tips of 2006 cover a range of topics, including network isolation, open source Windows security tools, VPN security and more. Continue Reading
-
National Trust gets rid of the mouse
The National Trust has signed up Management Systems Modelling to modify its website to bring it into line with UK disability discrimination laws. Continue Reading
-
Enterprises are open to Asterisk
Organisations have become so comfortable with VoIP and standards that open-source technologies like Asterisk are being given serious consideration over big iron PBX platforms. Learn all about Asterisk here. Continue Reading
-
Top storage tips 2006
What's on the minds of storage techies. What's hot, what's not, what works, what doesn't work. These expert tips cover the storage issues that take top honours when it comes to disaster recovery, NAS, SAN, backup and storage management. Continue Reading
-
Downtime: You're not impotent to quit smoking in Glasgow
The wacky world of IT Continue Reading
-
Review: Prevx1 not ready for prime time
Prevx1 will require significant improvement in management and detection capabilities before it can be considered a serious contender for enterprise deployments. Continue Reading
-
Review: Reconnex's iGuard needs improvements
Reconnex's iGuard is maturing, though it still needs some usability improvements such as wizards, customisable reports and the ability to drill down on the graphs. Continue Reading
-
Review: Deep Security is a solid IPS
Third Brigade's Deep Security is a well-designed, effective product with strong configuration and policy control capabilities. Continue Reading
-
Working towards a better world
The IT Volunteeer Awards showcase the talents and achievements of volunteers that have made a real difference to their chosen charities. John Riley takes a look at the winners Continue Reading
-
T-Mobile on the virtual line to rapid expansion
T-Mobile Direct is pioneering the use of IBM's virtualisation technology to simplify the management of its IT infrastructure after nearly doubling its retail outlets in a year. Continue Reading
-
VoIP softswitch
Mera Systems' MVTS II (Mera VoIP Transit SoftswitchII) will support sophisticated routing capabilities, including various options for a carrier to send requests to ENUM registries, analyse the responses and use information received to take optimal ... Continue Reading
-
Making business sense of geographic information
The BCS is teaming up with the Association for Geographic Information (AGI) and the Open Geospatial Consortium (OGC) to promote the business case for using open geospatial standards at an event in Nottingham on 25 January. Continue Reading
-
Hot technologies for 2007
"Storage" magazine's editors reviewed technology developments, product introductions and storage standards to come up with this short list of must-have technologies for 2007. Continue Reading
-
Hot technologies for 2007-2
"Storage" magazine's editors reviewed technology developments, product introductions and storage standards to come up with this short list of must-have technologies for 2007. Continue Reading
-
Top midrange arrays, page 3
Sun's Flexline won out on reliability; EqualLogic users overwhelmingly said they'd buy again. Continue Reading
-
Review: Lancope StealthWatch 5.5 offers more than IDS
Hot Pick: StealthWatch goes far beyond traditional intrusion detection, with powerful network-monitoring features. The optional IDentity-1000 is an essential addition. Continue Reading
-
VoIP: The migration dilemma
Looking for a VoIP system on eBay? It's not as crazy as it sounds, and neither are some of these other tips to keep in mind when migrating to VoIP. Continue Reading
-
Can I make the leap into IT management?
Expert advice for readers' career problems Continue Reading
-
Microsoft Vista could improve Internet security
Two new Microsoft Vista features -- Kernel Patch Protection and User Account Control -- could prove especially useful in preventing serious malware infections. Continue Reading
-
CIO Index surveys: What CIOs want
Computer Weekly’s CIO Index surveys the decisions and opinions of leading playing to find out who is doing what – and why. Continue Reading
-
Inside MSRC: Visual Studio flaw, tool extensions explained
Christopher Budd of the Microsoft Security Response Center sheds detail about a flaw in Visual Studio 2005 and explains that support for Software Update Services 1.0 will be extended. Continue Reading
-
Infrastructure security: Remote access DMZ
An excerpt from Chapter 7: Infrastructure security from "How to Cheat at Managing Information Security," by Mark Osborne. Continue Reading
-
Storage IPOs, brilliant or brainless
Just when we thought the fast and loose spending of the dot-com bubble was well behind us, a few recent storage company IPOs remind us that we really haven't gotten a lot smarter. Continue Reading
-
Opening the door to interoperability
Should open source developers feel uneasy about the recent deal struck by Microsoft and Novell to make their operating systems work with each other? Continue Reading
-
Do you run a green machine?
The IT industry has only recently embarked upon the learning curve of green computing. Helen Beckett looks at what suppliers and users are doing to help meet the green challenge Continue Reading
-
BCS Awards: Unlocking security benefits
The 2006 BCS President's Award turns the spotlight on the need for effective investment in information security Continue Reading
-
BCS Awards: Looking forward
Next year's awards will form a central part of the BCS's golden jubilee celebrations Continue Reading
-
BCS Awards: Technology to the rescue
The biggest splash in this year's Technology Awards was made by an application developed to cut the number of lives lost in Britain's dangerous waters Continue Reading
-
Storage Decisions Session Downloads: Smart Shopper Track (LV 2006)
Very few storage managers have carte blanche when it comes to storage spending. Sessions in our "Smart Shopper track" help managers get the most bang for their storage buck. Continue Reading