Opinion
Opinion
-
Managing IT projects: when things go wrong
No matter how thoroughly you plan, unexpected events can disrupt IT projects. Find out some expert survival tips Continue Reading
-
Security: the oft-forgotten dimension
Companies are investing in sophisticated devices to protect the security of their computer systems but they are forgetting about one critical element - the employee. Continue Reading
-
Buyer beware: second-hand user licences mired in uncertainty
Despite a recent European Court of Justice ruling on the sale of used software, second user licensing remains a contentious subject Continue Reading
-
The business case for big data
Should you build a business case to invest time and effort into understanding what big data can do for your company? Continue Reading
-
Information security as a business enabler
It is good to see industry recognising that a shift has taken place in information security, understanding that it has become a vital enabler within any business Continue Reading
-
How government and the IT industry need to work together better
The recent OFT study has given government and industry the requirement to work together to improve the procurement and use of IT across the public sector Continue Reading
-
Making the case for network modernisation
It's time to break out of reactive investment mode, says Dale Vile, research director at analyst group Freeform Dynamics Continue Reading
-
Can London bridge skills gap to make talk of tech capital status a reality?
Richard Nott, director of IT jobs specialist CWJobs.co.uk, warns of the emerging skills shortage and its potential impact on London's status as a global technology hub Continue Reading
-
Tackling the IT skills shortage through diversity of employment
We all have to do our part in tackling the IT skills shortage in the UK to ensure the industry continues to grow Continue Reading
-
Security Think Tank: Do not trust the network to ensure secure collaboration
What is the best approach to increasing collaboration without reducing security in an enterprise? Continue Reading
-
Security Think Tank: How to share data securely
What is the best approach to increasing collaboration without reducing security in an enterprise? Continue Reading
-
The digital CIO: The CIO is dead. Long live the CIO
There is a new breed of CIOs who are defining what it means to be a digital leader Continue Reading
-
Security Think Tank: Secure collaboration not just about technology
What is the best approach to increasing collaboration without reducing security in an enterprise? Continue Reading
-
Security Think Tank: Secure and seamless collaboration key for business
What is the best approach to increasing collaboration without reducing security in an enterprise? Continue Reading
-
Security Think Tank: Enable collaboration by putting data at the heart of security
What is the best approach to increasing collaboration without reducing security in an enterprise? Continue Reading
-
The digital CIO: Regaining the technology high ground – one blog post at a time
IT leaders should use blogging and social media to raise their profile and build influence in their organisations Continue Reading
-
Skills, technology and confidence at the heart of the UK’s information economy
From electronics and 5G mobile to the exploitation of data, the UK has a rich ecosystem of technology companies - but more needs to be done Continue Reading
-
Is enterprise IT falling behind as business strategy turns outside-in?
Successful firms need to harness the skills, capabilities and passions of the external marketplace by becoming more 'outside-in' Continue Reading
-
CSI IT: Forensic security skills for IT professionals
TV shows such as CSI have popularised digital forensics, piquing the interest of a generation of graduates and career-movers Continue Reading
-
Byte Night 2014: The link between tech and fighting homelessness
Tiffany Williams, member of the Byte Night London board and senior enterprise relationship manager at LinkedIn, discusses the importance of sleeping rough for charity Continue Reading
-
Cloud storage: A threat to entry-level/mid-range storage arrays?
There are some big obstacles to cloud storage adoption at the moment, but these are likely to diminish over time. Will that spell the end for low- and mid-range array suppliers? Continue Reading
-
Is Windows-everywhere a serious option for the modern business?
Let’s get real says Dale Vile, Research Director & CEO, of analyst group Freeform Dynamics. Continue Reading
-
It’s no longer a man’s world: The IT girls of the 21st century
Getting students involved in practical projects is essential in making computing more accessible to girls, says expert from Apps For Good Continue Reading
-
Two years after 'unacceptable' - the state of government IT today
Two years ago, G-Cloud founder Chris Chant called government IT 'unacceptable'. Now outside Whitehall, what does he think has changed? Continue Reading
-
Why NSA spying is breaking UK law
A former White House lawyer confirms Fisa corporations were under secret court orders to spy on their customers outside the US Continue Reading
-
Employee monitoring: How to avoid the legal pitfalls
What is, and what is not acceptable in terms of employee monitoring? Continue Reading
-
Mobility management is coming of age
2014’s Mobile World Congress in Barcelona brought together the mobile telephony infrastructure industry, multiple handset vendors and large numbers of mobile app tools and platforms Continue Reading
-
The anatomy of IT projects – why they are difficult and why they fail
A guide to the complexities of managing successful IT projects, and how to negotiate them Continue Reading
-
Inside jobs – the security risks from the rise in temporary staff
The growth in temporary workers is leaving companies vulnerable to a new kind of identity fraud - executive impersonation Continue Reading
-
BCS, The Chartered Institute for IT: We are investing for the nation's future
Roger Marshall, immediate past president of BCS, explains how the Institute for IT is investing its cash reserves Continue Reading
-
Why 2014 is a good year for IT consultants
In a survey of consulting buyers, almost all said they are planning technology improvements this year, and most are bringing in consultants to help Continue Reading
-
Opinion: Enterprise Networks – Where do IT pros see challenges?
The challenges placed on IT grow more demanding each day Continue Reading
-
Opinion: 2014 – The year of Digital Connectome
We are living through an unprecedented period in human history, one in which the internet has enabled near-instantaneous connections between people and machines at a scale never seen before Continue Reading
-
How does your personality contribute to your success in IT?
Take part in our ground-breaking study to discover the key personality factors that contribute to success in IT Continue Reading
-
Sketch: Don't panic, it's the hitchhiker's guide to the BCS AGM
Kevin Cahill gives his (mostly harmless) take on the struggles facing the Chartered Institute for IT Continue Reading
-
Security Think Tank: Business context still missing from context-aware security
Despite the hype around context-based security, has this technology evolved to the point where it is useful to the enterprise and is having a measurable effect? Continue Reading
-
Security Think Tank: New sandbox tech will help enable context-aware access
Has context-based security evolved to the point where it is useful to the enterprise and is having a measurable effect? Continue Reading
-
Opinion: The Strategic Execution Framework
Innovation. Agility. Performance. Scalability. Are these among the key initiatives for your company this year? Continue Reading
-
Security Think Tank: Cloud, mobile deepen need for context-aware security
Despite the hype around context-based security, has it evolved to the point where it is useful to the enterprise and having a measurable effect? Continue Reading
-
Security Think Tank: Enterprise adoption of context-based security slow
Ignoring the hype around context-based security, has it evolved to the point where it is useful to the enterprise and exerting a measurable effect? Continue Reading
-
BCS faces 'plebeian revolt' over business reforms
The Chartered Institute for IT is haemorrhaging money and losing touch with its members, claims a member of the BCS's governing council Continue Reading
-
Scale-out set to eclipse scale-up for enterprise storage
Analysing the advantages of scale-out storage and why loosely-coupled grids will make scale-up storage architecture a thing of the past Continue Reading
-
Don’t create a mobile enterprise app for the sake of it
Enterprise mobility applications need a clear objective, advises Accenture’s Nisha Sharma Continue Reading
-
Building an international reputation for the UK tech sector
The social and economic impact of UK tech companies can be traced across developed and emerging markets Continue Reading
-
Cloud business intelligence market will be worth $4bn by 2017
Cloud business intelligence (BI) is still a small part of the market but growing at an impressive rate, contends analyst Tom Pringle Continue Reading
-
Security Think Tank: CISOs should be first stop on the way to cloud
Hybrid cloud environments provide the most flexibility, but how can businesses decide when public or private cloud is more appropriate? Continue Reading
-
Hybrid flash hot, all-flash not, in 2014 storage M&As
All-flash arrays are over-ripe for acquisition while hybrid flash makers are still ready for plucking. Continue Reading
-
Five tips for managing project change requests
Change is an inevitable part of a project, so working out in advance how best to handle change requests will make the whole process much easier Continue Reading
-
Security Think Tank: UK firms still not entirely comfortable with cloud
Hybrid cloud environments provide the most flexibility, but how can businesses decide when public or private cloud is more appropriate? Continue Reading
-
Security Think Tank: Choose public or private cloud with a clear head
Hybrid cloud environments provide the most flexibility, but how can businesses decide when public or private cloud is more appropriate? Continue Reading
-
Searching for the signal of open standards amid the growing noise of agile
For all its undeniable strengths, the use of agile in government is in danger of becoming a fetish Continue Reading
-
Should you allow a bring your own device policy?
Employers are realising there are challenges presented by BYOD which, if not dealt with, could have a serious impact on the business Continue Reading
-
Universal Credit: Don’t blame the IT
It is easy to blame the IT when things go wrong, but when people are asked to do impossible things, it is not surprising if they do not deliver Continue Reading
-
Security Think Tank: Balancing cloud risk and reward
Hybrid cloud environments provide the most flexibility, but how can businesses decide when public or private cloud is more appropriate? Continue Reading
-
Security Think Tank: Striking the hybrid cloud balance
Hybrid cloud environments provide the most flexibility, but how can businesses decide when public or private cloud is more appropriate? Continue Reading
-
Security Think Tank: Before cloud, engage with asset owners
Hybrid cloud environments provide the most flexibility, but how can businesses decide when public or private cloud is more appropriate? Continue Reading
-
Living with Google Glass – not quite useful enough to overcome the dork-factor
Businesses will use Google Glass first, says Simon Dring after spending a few days living with the technology. Continue Reading
-
Where should a CISO look for cyber security answers – hardware, software or wetware?
While users are often cited as the weakest link in cyber security, they could also be the answer to the problems faced by businesses today Continue Reading
-
Effective information management: Using data as a competitive weapon
In today's global economy, information is becoming a major competitive asset, a weapon to drive business advantage. Continue Reading
-
Is big data changing the fundamental way we think?
Big data is transforming organisations but, to have real impact, it also requires a change in the way business leaders, analysts and IT teams think Continue Reading
-
Not in Kansas any more
PA Consulting's Alastair McAulay looks at the commercial potential of smart watches, Google Glass and the latest smartphones Continue Reading
-
Security Think Tank: A pragmatic and practical guide to secure hybrid clouds
Hybrid cloud environments provide the most flexibility, but how can businesses decide when public or private cloud is more appropriate? Continue Reading
-
Security Think Tank: Cloud is not that different
Hybrid cloud environments provide the most flexibility, but how can businesses decide when public or private cloud is more appropriate? Continue Reading
-
Why mobility matters even if you only focus on desktops
Just because you're the 'desktop guy' doesn't mean mobile technology is not your problem Continue Reading
-
Why collaboration is the only way to combat cyber threats
Cyber threats are the most effective way to attack an organisation and those with malicious intent are finding more sophisticated ways of carrying out their activities Continue Reading
-
The state of the VDI industry in 2014
There were two major technological advancements last year that make virtual desktops much more attractive than in the past Continue Reading
-
UKGovCamp 2014 - discussions on delivering digital government
UKGovCamp is an event with growing importance to the public sector digital scene - this year's event took place last week in London Continue Reading
-
Hybrid cloud storage: What data goes where?
Hybrid cloud storage keeps some data on-site while the rest goes to the cloud. But what data should go where in a hybrid cloud setup? Continue Reading
-
Apply lean concepts in IT to make a bridge to the business
Håkan Borglund, CIO at Toyota Material Handling Europe, says applying lean principles to IT deepen its connection to the business Continue Reading
-
Why Europe is wrong to kill Safe Harbour
Suspending the EU-US Safe Harbour agreement on data protection will do nothing to address surveillance, says international policy analyst Continue Reading
-
Hyper-converged products threaten standalone SAN and NAS
Hyper-converged storage/compute, such as IBM’s modular xSeries, poses a threat to standalone SAN/NAS in the datacentre Continue Reading
-
How to create a Local Government Digital Service
Why we need to create a 'Local Government Digital Service' to oversee the standardisation and improvement of all things digital in councils Continue Reading
-
Managing the future of complex business and IT landscapes
IT management and governance must cope with complexity, improve outcomes, and automate processes - but today’s IT delivery model is failing Continue Reading
-
Security Think Tank: Consider security training before high-end technology
How should the Snowden revelations about the NSA and GCHQ be influencing future information security strategies in the UK? Continue Reading
-
Security Think Tank: Snowden leaks highlight a common business vulnerabilty
How should the Snowden revelations about the NSA and GCHQ be influencing future information security strategies in the UK? Continue Reading
-
Security Think Tank: Snowden likely to prompt security reviews
How should Edward Snowden's revelations about the NSA and GCHQ influence future information security strategies in the UK? Continue Reading
-
Security Think Tank: Never mind Snowden, think best practice
How should the Edward Snowden revelations about the NSA and GCHQ be influencing future information security strategies in the UK? Continue Reading
-
European Cloud Computing Strategy to create 2.5 million new jobs
All those involved in cloud computing, whether providers or customers, should follow developments in Europe in 2014 closely Continue Reading
-
Security Think Tank: Snowden proves technology is only part of security
How should Edward Snowden's revelations about the NSA and GCHQ influence future information security strategies in the UK? Continue Reading
-
Flash storage second wave to hit in 2014
2013 saw flash storage hit the mainstream with suppliers racing to get a toe in the water. But, 2014 will see the second wave, with products competing to add advanced features Continue Reading
-
Cloud supplier lock-in – our experience
Always ask before entering into any agreement, “How do I get my data out in the future if I need or want to?" Continue Reading
-
Dark data could halt big data’s path to success
Dark data – data that lacks any control or classification, but is all too prevalent in many organisations – could halt big data's path to success Continue Reading
-
How to prepare the IT workforce for cloud and mobility
CompTIA is working to identify the key skills that staff responsible for cloud and mobility implementations need Continue Reading
-
User acceptance testing needs real training, not just a short course
In spite of its importance, user acceptance testing (UAT) is often chaotic, problematic and ineffective Continue Reading
-
The security education dilemma
Many employees, including executives, do not understand the implications of security. As a result, organisatons can lose focus Continue Reading
-
Security Think Tank: Targeted attacks drive investments in niche areas of security
What are the top security issues businesses need to address going into 2014? Continue Reading
-
Value chain mapping – learning to use IT as a strategic weapon
Mapping, like viewing the board in a game of chess, is essential to any form of gameplay, and that includes IT Continue Reading
-
No apologies – digital government is political
Shadow Cabinet Office minister, Chi Onwurah, answers criticisms over Labour's digtial strategy Continue Reading
-
Security Think Tank: New data sources are 2014 security challenge
What are the top security issues businesses need to address going into 2014? Continue Reading
-
Security Think Tank: Old and new security challenges in 2014
What are the top security issues businesses need to address going into 2014? Continue Reading
-
Don’t politicise digital government - public platforms belong to no-one
The future of digital government is of enormous importance to the UK, and it’s vital to stimulate more public interest and debate in both Labour’s and the Tories’ digital visions Continue Reading
-
Security Think Tank: BYOD requires focus on security risk in 2014
What are the top security issues must businesses address in 2014? Continue Reading
-
Security Think Tank: Lock up personal information in 2014, says ISSA-UK
What are the top security issues businesses must address in 2014? Continue Reading
-
Security Think Tank: KuppingerCole’s security predictions for 2014
What are the top security issues businesses must address in 2014? Continue Reading
-
Big data storage – what went wrong?
Big data storage seemed a prime opportunity for storage suppliers, but most users run DAS, shunning dedicated systems. Is that set to change? Continue Reading
-
Security Think Tank: ISF’s top security threats for 2014
What are the top security issues businesses need to address going into 2014? Continue Reading
-
An internet of things vision
What does a world of connected machines look like? Connecting machines will lead to changed behaviours that then change the applications. Continue Reading
-
Internet of things: Low-cost trade-off
The office at DoES Liverpool has a DoorBot, which works as a kiosk device, showing webcam views of the office and a list of upcoming events. Continue Reading
-
Smart machines raise challenging questions
Smart systems like IBM’s Watson, autonomous vehicles and a growing army of robots are quietly making more and more decisions every day. Continue Reading
-
So when do employees start following security rules?
As security needs are rapidly transformed, when do enterprises feel that they are getting on top of information security? Continue Reading