Opinion
Opinion
-
When the going gets tough, it sometimes makes sense to spend
Sometimes it makes sense for IT departments to increase their spending when economic conditions are tough Continue Reading
-
Why the internet is forcing retailers to rethink their supply chains
The growth of internet shopping is causing retailers to radically rethink the way they manage their supply chains Continue Reading
-
Byte Night 2013: Why bigger is better
Byte Night, the UK’s largest charity sleep-out event, will be bigger than ever before, with the aim of raising £1m in a single night Continue Reading
-
The digital silver lining for technology inclusivity
Mainstream devices are becoming increasingly user-friendly for disabled people as design becomes more inclusive for all of us Continue Reading
-
Security Think Tank: Prism fallout could be worse than security risks
Does the data collected by Prism put the US Government at risk from other state or non-state sponsored activists? Continue Reading
-
Cut big data down to size
Big data value comes from interactive discovery not possible with standard business intelligence implementations, says HCL EAS Continue Reading
-
Security Think Tank: Prism is dangerous for everyone
Does the data collected by Prism put the US Government at risk from other state or non-state sponsored activists? Continue Reading
-
Storage virtualisation: An old idea being revived?
When storage virtualisation first emerged, some did their best to ensure it didn’t succeed. Now the EMC appears to be reviving it. What’s going on with ViPR? Continue Reading
-
BBC's DMI project failure is a warning to all organisations
The decision to cancel the BBC’s Digital Media Initiative (DMI) with nothing to show for the almost £100m spent on it should be a warning to other organisations about the risks involved in large-scale IT projects Continue Reading
-
Security Think Tank: Make security and compliance part of workflow to achieve balance
What is the best way to balance business need for network and application access with security and regulatory requirements? Continue Reading
-
The challenges of information governance in our increasingly litigious age
Formulating the right enterprise-wide information governance policies is essential in heading off potential legal and compliance costs Continue Reading
-
Why companies are turning to application virtualisation
More people are ‘getting’ the idea that you can virtualise selectively Continue Reading
-
IT needs soldiers
The government has recognised that its returning troops can bring value to Britain. Unfortunately it has backed the wrong profession. Continue Reading
-
Cloud security for SMEs: Seven key steps
Seven steps which SMEs should follow when considering a cloud service, selecting a cloud provider and managing a cloud contract Continue Reading
-
Security Think Tank: Checklists are dead, long live risk-driven security
What is the best way to balance business need for network and application access with security and regulatory requirements? Continue Reading
-
Ordnance Survey: Insurance industry can harness big data analytics
Harnessing the power of big data presents insurers with a business opportunity. But is this industry ready for it? Continue Reading
-
How to build a website security programme
Follow this step-by-step strategy for building a website security programme that yields results Continue Reading
-
Security Think Tank: Avoid disruption and build on the context
What is the best way to balance business need for network and application access with security and regulatory requirements? Continue Reading
-
Giving UK SMEs the digital tools they need
It is vital that organisations use the digital tools at their disposal to ensure they are able to take advantage of growth opportunities. Continue Reading
-
Security Think Tank: Understanding risk key to security balance
What is the best way to balance business need for network and application access with security and regulatory requirements? Continue Reading
-
Security Think Tank: Four ways to balance access and security
What is the best way to balance business need for network and application access with security and regulatory requirements? Continue Reading
-
Information security: From “bored” to “board”
As the threat landscape is changing, the real question lies in what information security professionals can do to get board-level backing Continue Reading
-
Managing costs on your journey to cloud
Procuring cloud services can be relatively easy, but integrating them into existing IT environments can be complicated Continue Reading
-
Impressions of the latest BlackBerry 10 devices
Freeform Dynamics analyst Dale Vile shares his experience of using the BlackBerry Z10 and Q10 smartphones for business Continue Reading
-
Reclaiming the role of the CIO
It has become fashionable to question the value of the role of CIO, but much of this discourse is both self-serving and without foundation Continue Reading
-
Overcoming communication barriers to successful IT implementation
There are many hurdles to success in an IT project that are principally issues of communication Continue Reading
-
Forrester: CIOs need to support the workplace of the future now
Increasing workplace diversity requires new thinking about how and where staff do their work. Forrester offers tips for CIOs Continue Reading
-
How to manage big data and reap the benefits
IT security group Isaca examines the benefits of managing big data and offers seven tips for staying in control Continue Reading
-
Byte Night 2013: Rain will not stop play
Byte Night, the annual IT industry fundraiser, is aiming to raise £1m from this year's charity sleep-out Continue Reading
-
Security Think Tank: Cloud, BYOD and security – lock your doors
With BYOD and the growth of the personal cloud being used at work, what security measures can IT take to ensure security of enterprise data and does MDM really have a role in security? Continue Reading
-
Security Think Tank: Management is key to secure BYOD
With BYOD and the growth of the personal cloud being used at work, what security measures can IT take to ensure security of enterprise data and does MDM really have a role in security? Continue Reading
-
Enterprise architects: Please leave your framework at the door
Enterprise architects should use architecture frameworks for inspiration, rather than trying to apply the entire structure to their organisation Continue Reading
-
Security Think Tank: MDM just one way to lower the risk of BYOD
With BYOD and the growth of the personal cloud being used at work, what security measures can IT take to ensure security of enterprise data and does MDM really have a role in security? Continue Reading
-
Security Think Tank: BYOD – a challenge and an opportunity
With the growth of BYOD, what security measures can IT take to ensure security of enterprise data – and does MDM have a role? Continue Reading
-
Security Think Tank: BYOD means the map is no longer the territory
With the growth of BYOD and personal cloud at work, how can IT ensure the security of corporate data and does MDM have a role? Continue Reading
-
Making sense of SAP HANA and in-memory computing – a user view
For SAP users, in-memory computing tools such as SAP HANA promise to deliver a step change when it comes to data processing and analysis Continue Reading
-
Security Think Tank: BYOD – key tenets and best practices
With BYOD and the growth of the personal cloud being used at work, what security measures can IT take to ensure security of enterprise data and does MDM really have a role in security? Continue Reading
-
Will proposed changes to European data protection law prove unworkable?
Data protection law in Europe is set to change, but it remains unclear if all proposals are workable Continue Reading
-
The future of application development
As cloud adoption continues to increase , most organisations are making important decisions in executing their cloud strategies Continue Reading
-
Is antivirus worth the investment?
Antivirus is at best a sticking plaster – we need a better approach to dealing with malware. Continue Reading
-
What IT managers need to know about risky file-sharing
Business professionals must share files regularly to be collaborative, but there are issues that IT managers should be aware of. Continue Reading
-
Security Think Tank: MDM is no BYOD silver bullet
With BYOD and personal cloud at work, what measures can IT take to ensure security of enterprise data and does MDM really have a role? Continue Reading
-
Hot hiring areas in the IT jobs market
The overall picture in the jobs market over the past year has been mixed, but demand is extremely strong in some areas Continue Reading
-
Security Think Tank: BYOD security: policy, control, containment, and management
With the growth of BYOD, what security measures can IT take to ensure security of enterprise data – and does MDM have a role? Continue Reading
-
Why IT education is failing
There are a plethora of UK IT educational projects and initiatives but no focus or urgency to channel the energy of teachers, says entrepreneur, Rick Chandler. Continue Reading
-
Security Think Tank: Embrace BYOD, but be wary of the risks
With BYOD and the growth of the personal cloud being used at work, what security measures can IT take to ensure security of enterprise data and does MDM really have a role in security? Continue Reading
-
The Great Deverticalisation – part 5: Mind the GaaP
Politicians and government have the opportunity, through the power of open platforms, to take the lead in creating modern public services Continue Reading
-
Empowering users: It is not all about BYOD
The real benefits of bring your own device (BYOD) only arise when the right culture and mindset are developed Continue Reading
-
Forrester: The secrets of digital disruption
Companies can exploit digital disruption to unleash the next wave of innovation, says Forrester Research Continue Reading
-
Why IT contracts are bound to fail
Traditional IT contracts are ill-suited for today’s dynamic and consumer-driven business environment Continue Reading
-
First BYOD, now BYON poses security challenge
Like BYOD before it, the march of BYON is happening silently, stealthily and almost completely outside of management control Continue Reading
-
Why the cloud is not a security nightmare
A well-governed cloud initiative can deliver significant value to an enterprise, writes News International CISO Amar Singh Continue Reading
-
How to negotiate and assure cloud services
This guide provides the top tips to negotiating and assuring cloud services Continue Reading
-
Putting the 'I' back into IT with data strategies big and small
The "next big thing" is information itself. Whether big data, unstructured data or open data, the emphasis is shifting to the 'I' in IT Continue Reading
-
Going digital: No simple solutions for information security professionals
Technology evolution is proving itself to be something of a double-edged sword Continue Reading
-
Industry's moral obligation to young people
More than half of large IT-dependent organisations and most small non-technical, IT-dependent businesses across the UK are stuck in a growth and profits limbo due to shortages of skilled IT staff Continue Reading
-
Is the pace of innovation slowing down?
if you are not failing every now and again, it’s a sign you are not doing anything very innovative Continue Reading
-
Agile government: What the UK can learn from the US
The UK has a unique window of opportunity to learn from the US approach to agile project management Continue Reading
-
Interflora versus M&S: taking advantage of the internet
The long-standing dispute on the trademark infringement of the Interflora brand by M&S in keyword advertising will be decided by the High Court in mid-April 2013 Continue Reading
-
The Great Deverticalisation - part 4: The role of the private sector
Why do we persist in running vertically integrated organisations when standardising many of these processes would free us up to do things so much better, and more cheaply? Continue Reading
-
Visualisation and big data: new tools, same rules
A new breed of data visualisation tools can work with big data. But they need governance to avoid Excel on steroids, and require greater agility of IT Continue Reading
-
The I/O blender means enterprise flash is here to stay
451 Group analyst Simon Robinson explains why enterprise flash is worthy of its hype and will consign HDDs to the background Continue Reading
-
Stop service providers becoming data security Achilles heel
Minimising cyber security risks through third-party suppliers is a challenge facing many organisations. Continue Reading
-
Securing the hypervisor: expert tips
There are many potential security issues with the various components of a virtualised infrastructure, and nowhere is this more of a concern than with the hypervisor platforms that host virtual systems and application instances Continue Reading
-
Can open innovation offer an alternative to patent disputes?
2012 saw a string of patent wars between technology innovators with Apple and Samsung squaring up to protect their intellectual property (IP) Continue Reading
-
How to create business value from social intelligence
Social media gives access to huge amounts of data about markets, customers and competitors. The challenge is to turn this into intelligence Continue Reading
-
Security Think Tank: Context-aware security saves time
How should businesses approach context-aware security technologies and what will be the business benefit? Continue Reading
-
How to ensure information security is at the heart of the business
If infosec professionals want to be accepted as crucial around the decision-making table, they must embrace change and review their approach Continue Reading
-
The Great Deverticalisation - part 3: New skills and structures in the public sector
Why do we persist in running vertically integrated organisations when standardising many of these processes would free us up to do things so much better, and more cheaply? Continue Reading
-
Turning retail space into a digital environment
Robin Young, COO of Mitchells and Butlers, on turning its pubs and restaurants into digital environments to attract new customers Continue Reading
-
Embrace BYOD and manage the risks
BYOD might sound like an invitation (bring), but it is actually more of a rebellion (I’m bringing). Firms must get ready Continue Reading
-
High Growth Segment market boosts UK technology companies
High Growth Segment – a market just launched by the London Stock Exchange – allows access to capital for investors and fast-growing firms Continue Reading
-
Security Think Tank: High levels of control require detailed security intelligence
How should business approach context-aware security technologies and what will be the business benefit? Continue Reading
-
Software-defined storage: The reality beneath the hype
The rise of storage software and APIs on commodity hardware means there is something in the idea of software-defined storage. Continue Reading
-
Security Think Tank: Context-aware tech does not eliminate human touch
How should business approach context-aware security technologies and what will be the business benefit? Continue Reading
-
Ordnance Survey gets to grips with geospatial big data
Ordnance Survey has pulled 17 databases into one Oracle geospatial database management platform Continue Reading
-
Security Think Tank: Context, the 5 Ws and H of security
How should business approach context-aware security technologies and what will be the business benefit? Continue Reading
-
Selling online? A guide to complying with the PCI
PCI-DSS compliance can leave retailers confused about how best to approach this daunting task. What is it they actually need to do? Continue Reading
-
Security Think Tank: context-aware security is business-aware security
How should business approach context-aware security technologies and what will be the business benefit? Continue Reading
-
Cyber security – the best weapon remains good information security hygiene
By understanding the threats they face, organisations can mobilise IT systems and staff to defeat all but the most expert and determined adversary Continue Reading
-
Security Think Tank: New tech trends fuel need for context-based security
How should firms approach context-aware security technologies and what will be the business benefit? Continue Reading
-
Security Think Tank: Begin switch to context-aware security now, says Gartner
How should business approach context-aware security technologies and what will be the business benefit? Continue Reading
-
Tips for master data management best practice
Master data management (MDM) projects must be business-owned, joined up, and proven step-by-step Continue Reading
-
Students set the IT agenda through BYOD schemes
Kevin Papworth, UK Director at education IT supplier Ellucian describes how BYOD is changing the use of IT within higher education Continue Reading
-
Security Think Tank: Context-aware security is about more than buying technology
How should business approach context-aware security technologies and what will be the business benefit? Continue Reading
-
Improving the odds of succeeding with IT investments
How IT departments can increase the effect of IT projects on the business Continue Reading
-
SMEs open to public cloud – provided it is easy with local sales and support
It is no surprise that small and medium-sized businesses are the most inclined to adopt and use public cloud to deliver the majority of their IT, but there are significant barriers to overcome Continue Reading
-
The Great Deverticalisation - part 2: The power of open
The public sector has the opportunity, through the power of 'open', to take the lead in creating organisations for the future success of UK plc Continue Reading
-
Integrated business services address enterprise MDM, analytics
Accenture contends that integrated business services joined to master data management (MDM) can create an enterprise-wide master data, reporting and analytics capability Continue Reading
-
Windows 8 - the challenge of moving to a new operating system
Microsoft launched its Windows 8 operating system (OS) in 2012, promising manifold benefits - but what are the challenges of moving OS? Continue Reading
-
Security Think Tank: Three key security questions on web-based apps
What are the security pitfalls of web-based applications and how are they best avoided? Continue Reading
-
Security Think Tank: Web-based app security needs data-centric, risk-based approach
What are the security pitfalls of web-based applications and how are they best avoided? Continue Reading
-
Security Zone: A three-dimensional approach to BYOD (part 2)
Employees are the first line of defence and crucial to BYOD success, but process and technology are equally important Continue Reading
-
2013: a year of software-defined storage, convergence and cloud
Simon Robinson of 451 Research says storage optimisation is the watchword of 2013, with software-defined storage, convergence and cloud also key trends Continue Reading
-
Getting the right processes in place to benefit from big data
Most executives recognise that the vast amounts of data coming into their organisation can be used to make the business better, but few are taking full advantage Continue Reading
-
Forrester: Tips for software contract negotiation
Forrester's Mark Bartrick offers four essential tips on negotiating successful IT contracts Continue Reading
-
The great deverticalisation – part 1: the street
Why do we persist in running vertically integrated organisations when standardising many of these processes would free us up to do things so much better, and more cheaply? Continue Reading
-
Unleash the value of consumer data
Companies' ability to capture, mine and analyse consumer information has the potential to deliver economic value Continue Reading
-
Tips for reducing security risks in 2013
What security threats will your business face in 2013? Continue Reading
-
Security Zone: A three-dimensional approach to BYOD
Minimise the security threat of BYOD by taking a three-dimensional approach involving people, process and technology Continue Reading