Opinion
Opinion
-
Tips for carve-outs: How to improve your IT competitiveness
How can businesses make their IT more efficient and still cut their technology costs? Amit Laud offers some essential tips Continue Reading
-
Open source is just a weapon
If open source is rapidly growing and dominating many industries, should the answer to every IT question be "open source"? Continue Reading
-
Developing the modern datacentre into a services hub
More businesses are choosing private cloud over public cloud. Analyst Andrew Buss explains why Continue Reading
-
How non-relational database technologies free up data to create value
Instead of having to force structures onto their data, organisations can choose NoSQL database architectures, combining these with conventional relational databases to drive new value. Continue Reading
-
Tips for better governance and compliance
What is the relationship between regulation, governance and IT, and how can they contribute in ways that support the business? Continue Reading
-
Security Think Tank: Infosec and the business – the symbiotic relationship
How can information security make business sense? Continue Reading
-
Seven Easy Wins for the IT Project Manager
Alan Garvey offers 7 tips to help IT project managers make an impact. Continue Reading
-
How to estimate IT project timescales
Bob Hughes offers essential tips to accurately estimate the effort and time required for IT projects. Continue Reading
-
Rackspace CTO predictions for 2013
Rackspace chief technology officer John Engates gives his IT predictions for 2013 Continue Reading
-
Security Think Tank: Basic engagement principles can boost IT security’s profile
How can information security make business sense? Continue Reading
-
Security Think Tank: Evaluate IT security investments
How can information security make business sense? Continue Reading
-
Security Think Tank: Four steps to show value of IT security
How can information security make business sense? Continue Reading
-
Security Think Tank: Infosec professionals need to communicate value to business
How can information security make business sense? Continue Reading
-
Security Think Tank: A risk-based approach to security is key to business alignment
How can information security make business sense? Continue Reading
-
Security Think Tank: Information security is not optional
How can information security make business sense? Continue Reading
-
Security Think Tank: People and risk key to aligning security and business
How can information security make business sense? Continue Reading
-
Five steps to climbing the IT security ladder
Five steps to help stay ahead of the pack in IT security Continue Reading
-
Mind the digital gap - a strategy for accessibility
There still exists a digital gap and it is vital to understand the ways in which digital exclusion might be remedied in the future Continue Reading
-
Technology is helping the fight against corruption
All over the world citizens are using new technology to shine a light on fraud and bribery, and to blow the whistle on corrupt practices Continue Reading
-
Forrester: The impact of cloud on outsourcing contracts
Although still in its early stages, the transition of outsourcing engagements toward cloud-based models has begun Continue Reading
-
Getting to grips with managing supply and demand
The way that companies connect with each other to do business can have a big effect on overall performance Continue Reading
-
The DNA of the CIO
CIOs need to stop ignoring the inevitable and start changing before they are forced to Continue Reading
-
Don’t get spiked by a spear phisher
How to avoid the latest hacking techniques: the telltale signs that a spear phishing attack is in action; how to deflect it; and how to contain damage Continue Reading
-
Security Think Tank: Ask the right data security questions in M&As
What role do IT security professionals play in mergers and acquisitions? Continue Reading
-
Outsourcing reference data management
Andy Efstathiou assesses the case for outsourcing reference data management Continue Reading
-
Why we need vocational training
Charlie Mayes argues the case for vocational learning Continue Reading
-
Did your last presentation make a difference?
How to avoid death by PowerPoint. Martin Sykes explains the secret of a successful presentation. Continue Reading
-
BYOD: Bring your own device – or demise?
Nitin Bhas from Juniper research discusses the impact bring your own device (BYOD) polices are making on the enterprise Continue Reading
-
Security Think Tank: In M&As, watch the exits
What is the role of IT security professionals in mergers and acquisitions? Continue Reading
-
4G auction is an opportunity to invest in innovation
The UK will soon begin to auction the 4G mobile spectrum, raising as much as £4bn. How that money is spent will be a test of what the UK really values Continue Reading
-
Security Think Tank: Added burden for information systems professionals in M&As
What role do IT security professionals play in mergers and acquisitions? Continue Reading
-
European Commission should keep its hands out of the cloud
Would you be surprised that the European Commission believes the way to promote the growth of cloud computing is to regulate it? Continue Reading
-
Trusted computing for industrial control systems and infrastructure
The Trusted Computing Group’s open standards now include specifications for securing industrial control systems and infrastructure Continue Reading
-
Security Think Tank: Infosec needs to be part of all M&A processes
What is the role of IT security professionals in mergers and acquisitions? Continue Reading
-
Security Think Tank: Use M&As to reinvigorate security policy
What role do IT security professionals play in mergers and acquisitions? Continue Reading
-
Security Think Tank: Security often overlooked in M&As
What role do IT security professionals play in mergers and acquisitions? Continue Reading
-
Get serious about people risk to reduce cyber crime
Organisations can become blinded by compliance to the point where they have a false sense of assurance about managing people-related risk. Continue Reading
-
Lack of understanding inhibits big data adoption
Most organisations have no clear understanding of the advanced data analytics technologies now hitting the markets Continue Reading
-
Why Atos is eliminating email
At best, email is a distraction – while at worst it can lead to a drop in performance and employee disengagement, writes Lee Timmins Continue Reading
-
Security Zone: Do you need a CISO?
Does an organisation really need a chief information security officer or chief information officer? Continue Reading
-
Security Think Tank: Make IP theft personal
IP theft: who should be tackling it and how? Continue Reading
-
How IT is supporting the next generation of artists and designers at Birmingham City University
Birmingham City University’s new campus buildings are part of a £180m investment in new facilities with IT at its core Continue Reading
-
Security Think Tank: Blocking IP theft takes technology and trust
IP theft: who should be tackling it and how? Continue Reading
-
Security Think Tank: SABSA will go a long way in preventing IP theft
IP theft: who should be tackling it and how? Continue Reading
-
Security Think Tank: IP theft: Have you got all the bases covered?
IP theft: who should be tackling it and how? Continue Reading
-
Security Think Tank: You can’t protect what you don’t know you’ve got
IP theft: who should be tackling it and how? Continue Reading
-
The socially intelligent project manager
IQ alone is not enough to determine project success. Good project managers also require social intelligence Continue Reading
-
Security Think Tank: Least privilege is key to blocking IP theft
Intellectual property (IP) theft: Who should be tackling it and how? Continue Reading
-
Forrester: Five important guidelines for business technology governance
Forrester believes that "good" IT governance is business technology governance – a conscious process by senior executives to establish strategies, structures, processes, and measurements for the management of technology to boost business results Continue Reading
-
Byte Night 2012: Bigger, better, wetter
It may have been one of the wettest Byte Nights ever, but it was also the largest Byte Night ever and the most profitable Byte Night ever Continue Reading
-
How to make IT contracts agile
Agile software methodologies have been around for years, yet many in the legal profession still feel they are entering unchartered waters Continue Reading
-
Security Think Tank: Block IP theft with policy, process and controls
IP theft affects almost all buinesses, observes no national boundaries and costs economies billions - so who should be tackling it and how? Continue Reading
-
Consumer capital: The new reality of 21st century data exchange
Consumers are beginning a counter-offensive against the monopoly that industry has enjoyed over the spoils of big data Continue Reading
-
Security Zone: Passwords: Help users discover what is available!
As company policy requires passwords to be stronger than ever, here are some tips to help employees cope Continue Reading
-
A new age of sentimental data
Sentiment-analysis is nothing new - we just have new ways of capturing multiple digital sources and making better sense of the data Continue Reading
-
How history of security shows we have not learnt our lesson
There is no security control more effective than a diligent system administrator Continue Reading
-
How IT security can drive business and enable innovation
The most critical IT security challenge is to be able to see the whole picture, understand the business needs and find solutions Continue Reading
-
Customer relationship management vs business relationship management
Business relationship management (BRM) and customer relationship management (CRM) are different, yet must work hand-in-hand Continue Reading
-
Does the EC's cloud strategy go far enough?
The European Commission (EC) launched its cloud strategy last week. Legal experts put it under the spotlight to see if it goes far enough Continue Reading
-
Where does the ICO's new cloud guidance take you?
It is not possible to follow the ICO's advice on cloud computing and still have a “cloud” solution Continue Reading
-
IT support at the heart of Byte Night’s success
The IT industry charity sleep-out, Byte Night, takes place on 5 October, and this promises to be a record-breaking year Continue Reading
-
Changing lives through technology innovation
Technology such as open source can radically change the way an organisation operates and for users it has the ability to change their lives Continue Reading
-
Where is your Data Migration DMZ?
Johny Morris, author of Practical Data Migration, looks at how changes to procurement practices have created a trap for the unwary to fall into Continue Reading
-
Moving on from a culture of collaboration by email
The time has come to think seriously about enterprise social networking (ESN) and consider its role within wider enterprise collaboration strategy. Continue Reading
-
Windows 8 – Beauty and the Beast?
Quocirca analyst, Clive Longbottom, looks at whether corporates should consider deploying Windows 8. Continue Reading
-
How to ensure you are getting the right cloud service
How can an organisation use an indirect governance to assure trust in cloud services? Continue Reading
-
Intel Developer Forum 2012 focuses on wireless
Andrew Buss reviews the technology on show at Intel's 2012 Developer Forum in San Francisco. Continue Reading
-
How to make effective use of social media in your job search
Useful advice on using various social media platforms such as Twitter and LinkedIn to land your next IT job Continue Reading
-
IT's growth / austerity paradox
As the political world argues about economics, one of the intriguing things about IT is its ability to drive both growth and austerity Continue Reading
-
Review: Windows tablets in the enterprise
Tony Lock has been using a Windows tablet for a year and finds that it has a lot to offer businesses Continue Reading
-
Why Tesco chose open-source software
Jane Williams, head of e-learning at Tesco, explains the challenges of delivering an open-source system at the retailer Continue Reading
-
Security Think Tank: Several factors feed SQLi attacks
Why does SQL injection remain a successful way of attacking web applications? Continue Reading
-
Security Zone: Scada exploit fans the Flame of data risk
Analysis of the sophisticated and evidently well-resourced code behind the Flame malware exploit raises the stakes of data security exponentially Continue Reading
-
Byte Night 2012 - a record-breaking year already
A record number of people have registered for Byte Night, the IT industry's annual fundraising event in aid of youth homelessness Continue Reading
-
Building trust and transparency into business culture
As controversy over the Libor fixing rate continues, ethics and transparency are highlighted as priorities for company executives Continue Reading
-
Security Think Tank: Best practice to target SQLi
Why does SQL injection remain a successful way of attacking web applications? Continue Reading
-
How to secure a SharePoint environment
Five lines of defence you need to secure your Microsoft SharePoint environment Continue Reading
-
Security Think Tank: No quick fix to SQLi attacks
Why does SQL injection remain a successful way of attacking web applications? Continue Reading
-
Managing shadow IT
Shadow IT is the use of IT systems within an organisation without the approval, or even the knowledge, of corporate IT. What should you do in response? Continue Reading
-
Security Think Tank: SQLi is basically a process problem
Why does SQL injection remain a successful way of attacking web applications? Continue Reading
-
Security Think Tank: SQLi attacks fly under security testing radar
Why is SQL injection still a successful way of attacking web applications and what should you do to eliminate this common vulnerability? Continue Reading
-
Storage arrays face two-pronged flash/cloud attack
The storage array as we know it could soon be a thing of the past, as hot data heads to flash and cold data goes to the cloud, leaving a slimmer array for bulk data on HDDs. Continue Reading
-
Security Think Tank: Quick time to market to blame for many SQLi attacks
Why does SQL injection remain a successful way of attacking web applications? Continue Reading
-
Security Think Tank: Development and testing key to reducing SQLi attacks
Why does SQL injection remain a successful way of attacking web applications? Continue Reading
-
Negotiating BPO contract termination in local government
Advice on negotiating contract termination clauses in business process outsourcing arrangements Continue Reading
-
Protecting your business from copyright infringement
The implications of the Digital Economy Act for businesses and employees Continue Reading
-
Forrester: Five key trends for your cloud journey
Cloud computing is going to go through big changes in 2012, Forrester analysts predict Continue Reading
-
Reducing your online risk exposure to cyber attacks
Key steps for reducing your organisation’s exposure to risk and making it a less attractive target for hackers Continue Reading
-
How to survive a data breach
Six practical tips on how to prepare for and survive a data breach Continue Reading
-
Hacking open data on development aid
Using open data to analyse information about international aid shows the benefits - and the limitations - of the ICT for development field Continue Reading
-
Technology innovators are critical for growth
The government needs to improve its appetite for technology innovation and apply it to the toughest challenges this country faces Continue Reading
-
Does Microsoft need to change its policy on Windows upgrade pricing ?
Microsoft will needs to reduce the cost of Windows upgrades if it is to conquer the tablets market, writes Andrew Buss. Continue Reading
-
BYOD V.2 and spotting the next big trend
An analytical look into how the BYOD trend began may help IT leaders to be more prepared to spot the next big trend Continue Reading
-
Business consulting – the next battleground in IT services
Buying habits are shifting, with profound implications for the IT services and management consulting industries Continue Reading
-
Business intelligence and analytics: how to develop a complementary strategy
Instead of replacing traditional BI and data warehousing with predictive analytics, organisations should pursue a complementary strategy. BI needs big data analytics, which needs BI. Continue Reading
-
Preparing your teams for software defined networking
Software defined networking may offer a more reliable and automated network, but administrators need to be prepared before they introduce it to their environment Continue Reading
-
Why IT leaders should adopt a venture capitalist approach
When it comes to risky ventures, CIOs should take inspiration from their high-flying cousins in the world of venture capitalism Continue Reading
-
In an age of subscription services, ERP is dead
It’s hard to believe now but there was a time when ERP was hot Continue Reading
-
Security Think Tank: Six questions to ask about security and virtualisation
How should information security professionals get started with securing virtual environments? Continue Reading
-
440 million reasons to learn three IT risk lessons
Companies can change their game to better prevent incidents, enable faster value creation, and avoid wasted time and money when managing risk Continue Reading