In Depth
In Depth
-
Time for government to get tough
In an extract from his bestselling book, security expert Bruce Schneier calls for legal reform to curb the activities of hackers... Continue Reading
-
House of Lords ruling increases confusion over IT patents
A ruling in the House of Lords on patents will create more confusion about when companies can enforce patents on technology they... Continue Reading
-
Table helps bosses rate IT courses
The best known universities in the UK are not necessarily the best for training future IT professionals, according to an... Continue Reading
-
The ultimate cost of Borland's latest buy
Ovum analyst Bola Rotibi looks behind Borland's intention to acquires tools supplier TogetherSoft Continue Reading
-
Ballmer bullish on future, bearish on Linux
Microsoft chief executive Steve Ballmer touted his company's vision for a bright future, while casting doubt on alternatives to... Continue Reading
-
Enterprise single sign-on tools are comprehensive but costly
Managing multiple user identities and passwords is difficult for companies and users. ESSO can alleviate the symptoms but adds... Continue Reading
-
Electronics outsourcing industry forecast, October
The electronics outsourcing industry, which includes both electronics manufacturing services(EMS) companies and original design... Continue Reading
-
Vonage’s virtual UK numbers confirm industry trend
Vonage will let UK callers call North American customers at local rates. Expect more such services, though regulatory and other... Continue Reading
-
PalmOne enhances Treo smartphone but challenges remain
PalmOne has improved the ergonomics and usability of its smartphone in the Treo 650. To realise strong enterprise sales, however,... Continue Reading
-
Despite EC decision, PeopleSoft’s future remains uncertain
The European Commission (EC) has removed the final antitrust obstacle to Oracle’s takeover offer for PeopleSoft. But the... Continue Reading
-
Many medicines but no cure for online ID theft
Banks and online retailers are struggling to protect their customers from criminals who covet their personal financial... Continue Reading
-
RFID poised to move beyond supply chain
Innovative uses of RFID technology promise benefits beyond improving efficiency in retail supply chains, providing issues of... Continue Reading
-
Security and integration burden AS400 managers
Single sign-on, security, heavy workload and constantly changing technical and business requirements are among the issues that... Continue Reading
-
In control of IT
The proportion of smaller businesses with an in-house IT manager is becoming smaller. The IT function is often now run by the... Continue Reading
-
Job market recovery blossoms
Figures for the third quarter prove that the recession in ITis definitely over and IT professionals looking for their next job... Continue Reading
-
More people use Tcl than know about it
If Tcl tickles your fancy, go for it - it is widely used for GUIs and integration Continue Reading
-
Understand how IT is perceived to get in synch with business needs
Get a better idea of what users expect Continue Reading
-
From manager to chief information officer
Moving into a company's top IT post requires a shift in focus, both organisationally and personally, from technology management... Continue Reading
-
Combined biometric ID card plan
The Home Office has abandoned plans to combine biometric national identity cards with passports and driving licences following... Continue Reading
-
Chinese authorities close 18,000 internet cafes
A high-profile government crackdown on internet cafes in China resulted in the temporary closure of 18,000 internet cafes between... Continue Reading
-
Outsourcing review will force firms to rethink risk
Many financial firms could struggle to meet international regulator's proposed guidelines Continue Reading
-
Use a carrot, not a stick on suppliers, says Yard
Former Inland Revenue IT director says incentives, not penalties, are key to success Continue Reading
-
A balanced workforce is a productive one
Women in IT The number of women working in IT is falling, but some organisations are recognising how to redress the balance by... Continue Reading
-
Companies seeks outsider’s opinion
Increasing data security threats are plain to see for most firms, and an increasing number are turning to penetration testing,... Continue Reading
-
Boost performance with a five-step plan
IT managers have become adept at cost-cutting during economic downturns, but initiatives for corporate expansion require a very... Continue Reading
-
Barbara Rembiesa, IAITAM president, talks about IT asset management
Barbara Rembiesa is president of the International Association of Information Technology Asset Managers (IAITAM), a for-profit... Continue Reading
-
Windows vs. Linux: Which has the better security tools?
Windows security expert Jonathan Hassell compares Windows and Linux security offerings in his first SearchWindowsSecurity.com column. While he says Windows is the easier operating system for him to use, he chooses Linux to keep his Web hosting ... Continue Reading
-
Network management by remote control
Managing dispersed networks and attached devices can be costly if you have to send staff out to make changes. So what can... Continue Reading
-
Microsoft focuses on apps modelling
Microsoft is looking to extend visual modelling of applications in its Visual Studio 2005 platform, with an early release of... Continue Reading
-
The right connections
Companies are turning to the web to run applications in the drive for greater flexibility and reduced costs, but many are unsure... Continue Reading
-
Microsoft stance on multicore licensing will help customers
Microsoft has decided not to charge additional license fees for multicore processor technology. This preemptive move will save... Continue Reading
-
New p5 high-end servers keep IBM ahead of the competition
IBM’s p5 590 and p5 595 complete the update of the POWER pSeries and iSeries to 64-way servers. Performance and pricing will make... Continue Reading
-
EMC targets SMB market with Dantz development
By acquiring Dantz, EMC aims to keep Veritas, Computer Associates and a raft of low-end backup vendors out of its growing... Continue Reading
-
RFID implants need better privacy protection
The US Federal Drug Administration (FDA) has approved a radio frequency identification (RFID) device for use in humans. But... Continue Reading
-
Cisco/Microsoft security pact promising but short on details
Customers need to request a clear road map detailing how Cisco Systems and Microsoft plan to implement their new security... Continue Reading
-
Charity IT leaders ramp up information sharing
IT governance, voice over IP, shared benchmarking and leadership were among the topics discussed at the Charities Consortium IT... Continue Reading
-
Four techniques that will become essential for securing growing IP-enabled networks
IP devices are creating a network architecture that demands better security Continue Reading
-
IT4C sets IT volunteer challenge
IT4Communities is looking to boost the number of registered IT volunteers from 2,200 to 2,500 by the organisation's second... Continue Reading
-
User groups challenge the era of IT consultants
A new age of self help among corporate IT users could end their reliance on external IT consultants, according to Michael Gough,... Continue Reading
-
Getting the green light from the board
In an extract from his book, Common Approach, Uncommon Results, Ian Gotts discusses managers' information overload and how to get... Continue Reading
-
Hot skills: Speed and flexibility of scripting languages suits web operations
Languages such as PHP are quick to learn and easy to use Continue Reading
-
Next move: Should I take admin role in the interim
I worked for two years as a software engineer writing C on Unix, but 18 months ago I was made redundant. While job hunting I have... Continue Reading
-
The threat from within: in-house security is business' Achilles' heel
Modern working practices can expose companies to attack Continue Reading
-
Shifting business demands place burden on IT
Dealing with shifting business demands will be the biggest challenge for UK IT directors over the next 12 months, according to a... Continue Reading
-
Concern grows over IT's ability to meet Freedom of Information Act data requests
With less than 10 weeks to go before the deadline for the Act, some IT departments are realising that neither they nor their... Continue Reading
-
Time to double up?
What are the fundamentals of 64-bit computing that your company needs to be aware of? Why should you consider moving away from... Continue Reading
-
Lighten up
Consolidation strategies can let you take best advantage from your servers. Antony Adshead explores how next generation servers... Continue Reading
-
Hit the highway
How will next-generation server technology evolve in order to support the new generation of mobile professionals? David Bicknell... Continue Reading
-
Counting the costs
Server technology is offering better price/performance ratios than previously. But what is the true cost of ownership of a next... Continue Reading
-
All systems go
The effectiveness of next generation servers is dependent on their operating systems. What are their strengths and weaknesses?... Continue Reading
-
Airbus UK
Airbus UK, an aircraft manufacturer, has reduced its costs by using an Intel Itanium-based high performance technical computing... Continue Reading
-
Your shout! On the increasing problem of spam
Have your say at computerweekly.com Continue Reading
-
Harrow installs central database to help make housing services more accessible
The London Borough of Harrow has installed a central database to help improve the way it runs council housing services. Continue Reading
-
Portsmouth shows bus times in real time
Portsmouth's Online Real Time Traveller Portal project, designed to encourage the use of public transport by displaying in real... Continue Reading
-
Intel prepares for next 20 years of chip making
Intel plans to continue making transistors smaller, faster, and less power-hungry using exotic materials such as carbon nanotubes... Continue Reading
-
Fine tune BPM to optimise business aims
enterprise software Business process optimisation can increase BPM's effectiveness, but only if you address the technology and... Continue Reading
-
Linux speared by trio of security holes
A series of security holes in three common Linux components has led open-source vendors to rush out several updates in just one... Continue Reading
-
Users get more choice on virtual servers
As more alternatives emerge for server virtualisation, firms should choose virtual machine technology based on compatibility with... Continue Reading
-
Systinet CEO: Three phases for web services
Thomas Erickson recently took over as president and CEO of Systinet, one of a growing number of companies focused on the web... Continue Reading
-
Speed is of the essence
The ‘age of broadband’ has arrived. Broadband is gaining critical mass among the SME community and it’s not difficult to see why... Continue Reading
-
Flexible approach will pay long-term dividends
IP and IP networks, and the applications they support, can transform your company. The end result is that your business will... Continue Reading
-
Rising above disaster
You may believe that business continuity is a practice appropriate only for larger corporations. You would be mistaken. Catherine... Continue Reading
-
Looking after the bottom line
For many firms like yours, there is a perceptible lack of understanding of the on-going total cost of ownership of IP technology.... Continue Reading
-
The painless way to secure your firm
David Bicknell delves into the vital area of the security of IP networks. He finds that there are a number of methodologies and... Continue Reading
-
Buyer be aware
If you decide to embark upon the IP route, from whom will you be buying the essential technology? What knowledge does the average... Continue Reading
-
IP everything, essentially
What are the fundamental deliverables of IP networks? How can you use IP networks to gain financial benefits in addition to... Continue Reading
-
The basis of profitability
Not so long ago, you didn't have much choice - your IT and communications requirements were acquired, implemented and maintained... Continue Reading
-
GM CTO predicts cars will run on 100 million lines of code
The relationship between General Motors (GM) and the software industry is set for some major changes over the next few years as... Continue Reading
-
Messaging threat affects firms of all sizes
SMEs and City firms alike have caught staff divulging sensitive data through instant messaging systems. As use of the technology... Continue Reading
-
Don't allow uncertainty to breed rumours and mistrust among staff
Swansea strike shows importance of staff consultation Continue Reading
-
Microsoft searches for the data holy grail
Microsoft has taken its innovative, data-centric WinFS file system out of Longhorn just a year after including it. Has the... Continue Reading
-
The steps to tackle the female brain-drain
A new Women In IT Award aims to reward companies that foster enhanced opportunities for women and encourage more women to step... Continue Reading
-
Security holes increase Windows client TCO
Security holes and the ways to take advantage of them have caused companies to spend money regularly patching their Windows PCs.... Continue Reading
-
Xansa’s deal with UK health service needs strong support
A joint venture between Xansa and the Department of Health will offer accounting services to UK healthcare organisations. But... Continue Reading
-
WS-Management’s success depends on wide, deep vendor support
Microsoft is pushing a new version of its Web Services for Management Extension (WMX) standard. But more work and industry... Continue Reading
-
Microsoft skips NTW4 support in latest security patches
Microsoft is keeping its promise not to release security patches for NT Workstation 4 (NTW4) publicly unless a vulnerability is... Continue Reading
-
IBM WebSphere 6.0 adds J2EE 1.4, but users risk “lock-in”
IBM’s new release improves performance and implements the latest version of Java 2 Platform, Enterprise Edition (J2EE). But... Continue Reading
-
No need to panic about PeopleSoft buyout
With antitrust objections defeated and a new CEO in place at PeopleSoft, Oracle's takeover bid is on course, but users need not... Continue Reading
-
Negotiate recycling costs with suppliers
Suppliers will be handling the disposal of old equipment under EU recycling laws in 2006, but IT managers should prepare now by... Continue Reading
-
Strategy Clinic: Have I failed if I am not a board member?
I keep reading about how IT directors should be seeking a place on the board. I am not unambitious and I value having influence,... Continue Reading
-
Management strategy clinic: Check priorities then sell them to the board
Following an 18-month freeze the board is considering increasing the IT budget. It wants a list of priorities with cost and... Continue Reading
-
Microsoft offers preview of SQL Server 2005
Microsoft is offering a peek at its much-delayed next-generation SQL Server 2005 database with an interim version of the product. Continue Reading
-
'Trustworthiness' still a goal for Microsoft
Saturday 15 January 2005 will almost certainly pass quietly on Microsoft's campus. But for those in the field of IT security, the... Continue Reading
-
Don’t pay SCO without a refund guarantee
Software company SCO is suing IBM for billions of dollars and threatening users of Linux with legal action, claiming that IBM has... Continue Reading
-
Can Sun's JSC bridge Java complexity gap?
Enterprise Java development remains challenging but will Sun's new kid on the block JSC build support to challenge the might of... Continue Reading
-
PeopleSoft Conference round up
After the departure of chief executive Craig Conway, users and analysts doubt that PeopleSoft will be able to resist Oracle's... Continue Reading
-
Trade show highlights changing telecoms industry
US carriers and infrastructure providers are gathering this week at the Telecom '04 trade show in Las Vegas amid rapid changes in... Continue Reading
-
Oracle spells out licensing approach for multicore servers
The recent introduction of multicore servers - where two or more processors are embedded on a single chip - has raised concerns... Continue Reading
-
Follow basic principles to take the guesswork out of supplier choice
Selecting the right software product has always been a difficult task. This summer Newham Borough Council attracted international... Continue Reading
-
Increase your chances with the perfect CV
You may think you have honed your CV skills to perfection, but with fierce competition for the best IT roles, are you confident... Continue Reading
-
Migrating from Exchange will not be cheap but new applications can boost efficiency
As Microsoft ends support for Exchange 5.5, users have opportunity to modernise Continue Reading
-
Ballmer promises better security and value
Microsoft chief executive Steve Ballmer showed himself ready to face up to user concerns about security and licensing when he... Continue Reading
-
Microsoft’s open-source Wiki tools target developers
Microsoft’s new open-source wiki collaboration tool, FlexWiki, is not yet ready for strategic implementations. Continue Reading
-
IBM’s ThinkPad fingerprint scanner is worth a look
IBM’s fingerprint scanner for its ThinkPad laptop line combines biometric identification with industry-standard security... Continue Reading
-
CEO exit and DOJ decision continue PeopleSoft uncertainty
CEO Craig Conway’s departure leaves PeopleSoft little time to formulate new positions or product direction. Assess your tolerance... Continue Reading
-
IT departments turn to gateways to manage instant messaging
Media General has been encouraging employees in its interactive division to use America Online's AIM public instant-messaging... Continue Reading
-
Avaya will buy Tenovis to strengthen European presence
Avaya’s push into Europe will benefit Tenovis customers looking for a stronger migration path to IP telephony. Continue Reading
-
Seize the time
IT directors should take the initiative throughout the tendering, contract and support stages of their supplier relationship if... Continue Reading
-
On hiring a virus writer
I have to admit that I'm happy that a previously unknown firewall company hired the author of the Sasser and Netsky worms. While many people are outraged, as they should be, there are a few things that have been brought to the forefront that ... Continue Reading
-
Reading a sealed letter - making anti-virus measures and encryption work together
Many users want encypted mail, but it can harbour viruses and dubious content Continue Reading