Opinion
Opinion
-
Preparing your teams for software defined networking
Software defined networking may offer a more reliable and automated network, but administrators need to be prepared before they introduce it to their environment Continue Reading
-
Why IT leaders should adopt a venture capitalist approach
When it comes to risky ventures, CIOs should take inspiration from their high-flying cousins in the world of venture capitalism Continue Reading
-
In an age of subscription services, ERP is dead
It’s hard to believe now but there was a time when ERP was hot Continue Reading
-
Security Think Tank: Six questions to ask about security and virtualisation
How should information security professionals get started with securing virtual environments? Continue Reading
-
440 million reasons to learn three IT risk lessons
Companies can change their game to better prevent incidents, enable faster value creation, and avoid wasted time and money when managing risk Continue Reading
-
Security Think Tank: Virtualisation raises three main security issues
How should information security professionals get started with securing virtual environments? Continue Reading
-
How cloud vendors can sell to the banks
Martin Maisey, CTO Consulting Division at BJSS explains how cloud vendors can sell to the banks. Continue Reading
-
Security Think Tank: Configuration is key to virtual security
How should information security professionals get started with securing virtual environments? Continue Reading
-
Security Think Tank: Virtual security more than just technology
How should information security professionals get started with securing virtual environments? Continue Reading
-
Security Think Tank: Security in the virtual world still not 100%
How should information security professionals get started with securing virtual environments? Continue Reading
-
Security Think Tank: Security in virtual world requires special considerations
How should information security professionals get stated with securing virtual environments? Continue Reading
-
RBS and the high cost of failures to business reputation
Andrew Sinclair, Head of Risk Management, Onyx Group discusses the cost of reputation damage following RBS computer problems. Continue Reading
-
Security Think Tank: Hypervisor is key to securing virtual servers
How should information security professionals get started with securing virtual environments? Continue Reading
-
Has going public lost its appeal?
Charlie Mayes, managing director of DAV Management, discusses how the public is starting to lose interest in company IPOs. Continue Reading
-
Why are we making 'lose-lose' technologies?
With access to the lowest interest rates in history, corporates are undertaking a massive capital-intensive restructuring where technology is quietly replacing human jobs Continue Reading
-
Addressing the IT gender imbalance with courage and collaboration
Mortimer Spinks's managing director discusses the results of the Women in Technology survey 2012 Continue Reading
-
To be open or not to be – that is the question
We are heading to a world where being open, or exploiting open, isn't optional, and for many it will become a question of “to be open or not to be”. Continue Reading
-
Forrester: How to build a security change plan
When the risk associated with a serious breach becomes overwhelming, organisations must invest to improve the skills, processes and controls Continue Reading
-
Are you up to speed with business relationship management?
Over the course of the last 12 months there has been an increased amount of discussion around the process of business relationship management (BRM). Continue Reading
-
Forrester: Networking predictions for 2013
Senior Forrester analyst Andre Kindness reveals his predictions for the networking industry in 2013 Continue Reading
-
The importance of trialling before buying
Caught between the twin storms of fluctuating budgets and rapidly changing technology, IT professionals have very difficult decisions to make. Continue Reading
-
EU court legalises second-hand software
In a landmark decision, the European Union Court of Justice ruled that the reselling of used software licences is legal. Continue Reading
-
Getting the most from public sector data
There were plenty of nodding heads within KPMG’s IT Advisory team following a new report by Policy Exchange entitled Big Data Opportunity. The report recognises that the information underpinning public services is an essential asset in the battle... Continue Reading
-
BYOD: Businesses must be clear on data privacy
Businesses looking to implement a bring-your-own-device (BYOD) program must be aware that the parameters of what they can and cannot do with a mobile device management (MDM) platform are governed by local data privacy legislation, which ... Continue Reading
-
Project management: People make projects
The Major Project Leadership Academy (MLPA), launched in partnership with Oxford University’s Said Business School, will open in October 2012 and aims to double major project success rates. Its newly trained senior project managers and senior ... Continue Reading
-
The history of the next-generation firewall
Security expert Rik Ferguson explains how next-generation firewalls were developed and what protection they provide businesses. Continue Reading
-
Security Think Tank: Flame shows why risk management is a business essential
What can enterprise learn from initial analysis of Flame malware? Continue Reading
-
Security Think Tank: Flame – proceed with caution
What can enterprise learn from initial analysis of Flame? Continue Reading
-
Tackling the challenges of the next-generation firewall
Security expert Brian Honan shares top tips on installing and maintaining a next-generation firewall Continue Reading
-
Tech companies facing mounting IP challenges
The recent flurry of patent buying and selling activity in the global tech sector illustrates dramatic changes in the way some of the biggest technology companies are approaching their intellectual property (IP) Continue Reading
-
Ovum view: The future of software development
Agile programming is clearly part of the future, IT professionals at Computer Weekly's 500 Club heard last month, though there was tacit agreement among the speakers that agile the verb was key here, and not agile the noun Continue Reading
-
Security Think Tank: Security reviews are in order post Flame
What can enterprise learn from initial analysis of Flame? Continue Reading
-
As cheap as chips: turning the 'internet of things' into business benefits
To benefit from the internet of things, organisations should develop offerings responsive to the flow of data from chips embedded in products. Continue Reading
-
Security Think Tank: Are companies too confident about targeted attacks?
What can enterprise learn from initial analysis of Flame? Continue Reading
-
Security Think Tank: Flame a good reason to keep up with emerging threat analysis
What can the enterprise learn from the initial analyses of the Flame malware? Continue Reading
-
Security Think Tank: Flame is an opportunity for businesses to reassess defences
What can enterprise learn from initial analysis of Flame? Continue Reading
-
Security Think Tank: Flame – business must prepare for the unpredictable
What can enterprise learn from initial analysis of Flame? Continue Reading
-
How a flash array could have limited RBS damage
The RBS banking system failure shows that its customer account database should be in a flash array to ensure there’s no major bottleneck in the way of rapid recovery. Continue Reading
-
Why IT contractor salaries are rising
Overall contract rates in London have increased 3.4% year-on-year, which is indicative of where employers’ priorities lie at the moment, with many looking to bring in IT specialists capable of making key improvements on a project basis, according to... Continue Reading
-
Enterprise log managers: An unsexy but vital tool
In today’s enterprise, you would be culling through millions of events if you were not relying on enterprise log managers to correlate that data Continue Reading
-
Can Nokia's 'next billion' strategy save the company ?
Nokia is at a cross roads as it pins its recovery hopes on cornering emerging markets. But it will need to work hard to restore market confidence if ts 'next billion' strategy is to succeed. Continue Reading
-
Delivering social change through crowdsourcing
Free and open source tools now mean that anyone can quickly create an online map to visualise the issue they most care about and use it to build a compelling case for action. Continue Reading
-
Security Think Tank: The only sustainable approach to security is intelligence-led
What should organisations be doing to benefit from the move to intelligence-led security? Continue Reading
-
Security Think Tank: Intelligence-led security demands planning ALREADY USED
What should organisations be doing to benefit from the move to intelligence-led security? Continue Reading
-
Why the Data Communications Bill is proportionate, measured and necessary
Data-sharing Czar Sir Bonar Neville-Kingdom defends Her Majesty's Government's internet monitoring plans in the face of "self-righteous conspiracy theorists". Continue Reading
-
Security Think Tank: Intelligence-led security could give IT pros the edge
What should organisations be doing to benefit from intelligence-led security? Continue Reading
-
Security Think Tank: Proof of intelligence-led security is in the metrics
What should organisations do to fully exploit intelligence-led security? Continue Reading
-
Security Think Tank: Using big data for intelligence-led security
How can organisations use big data to yield hidden information of benefit to intelligence-led security? Continue Reading
-
Security Zone: IT and protective services convergence
IT professionals can gain a practical understanding of how to prevent criminal attacks from the people-savvy protective services Continue Reading
-
Security Think Tank: RASP – a must-have security technology
What should organisations be doing to benefit from the move to intelligence-led security? Continue Reading
-
Security Think Tank: Intelligence-led security is about risk management
What should organisations be doing to benefit from move to intelligence-led security? Continue Reading
-
Security Think Tank: Intelligence-led security is more efficient and effective
What should organisations be doing to benefit from move to intelligence-led security? Continue Reading
-
Growing out of the socially awkward phase: how marketing and IT can work better together
IT’s relationship with marketing has often been more strained than with other major parts of the business - what can be done? Continue Reading
-
Security Think Tank: Security intelligence needs a plan
What should organisations be doing to benefit from the move towards intelligence-led security? Continue Reading
-
Six steps to plan and prioritise IT investments
IT service management can play an important part in identifying the right IT investments to make. Continue Reading
-
Has EMC missed out on the hybrid flash array?
EMC has announced a three-pronged entry into the world of the flash array, but why hasn’t the giant vendor adopted the hybrid flash array pioneered by some innovative startups? Continue Reading
-
Security Zone: Patch me please
The technical reasons for failing to patch are fading into the past Continue Reading
-
Byte Night 2012: 15 years in the making
Byte Night, the annual IT industry fundraising event, celebrates its 15th anniversary on this year's 5 October sleep-out. Continue Reading
-
Cookie consent: Preparing for the compliance crunch
Data privacy specialist Phil Lee from law firm Field Fisher Waterhouse answers some commonly asked questions about the new cookie rules Continue Reading
-
Cloud choices: How to select the right hosted services
Adopting cloud computing can save money, but it is important to choose the right cloud solution for your business needs Continue Reading
-
The problem of legacy humans in technology projects
Humans have an annoying habit of resisting change and refusing to conform to the often rigid requirements of a database ontology or software application. Continue Reading
-
History lesson points way forward on data management projects
Data management projects often suffer from historic amnesia. Projects that co-locate business and IT staff and keep to a manageable scale can achieve remarkable results, says consultant Andy Hayler. Continue Reading
-
Security Think Tank: Outsource only run-of-the-mill security functions
What should and what should not be outsourced in IT security? Continue Reading
-
Security Think Tank: Effective management essential for IT security outsourcing
What should and what should not be outsourced in IT security? Continue Reading
-
Security Think Tank: Three considerations to outsourcing IT security
What should and what should not be outsourced in IT security? Continue Reading
-
Security Think Tank: IT security outsourcing should be informed and risk-managed
Security experts advice on what should and should not be outsourced in IT security Continue Reading
-
Security Think Tank: Effective quality control key to security outsourcing
What should and what should not be outsourced in IT security? Continue Reading
-
Security Think Tank: Business cannot outsource accountability
What should and what should not be outsourced in IT security? Continue Reading
-
IT careers: Why relationships are everything
Former CIO, Dr Robina Chatham, explains why building relationships is the most important IT skill. Continue Reading
-
Security Think Tank: No one-size-fits-all approach to security outsourcing
What should and what should not be outsourced in IT security? Continue Reading
-
Security Think Tank: Start with capability gap when outsourcing security
What should and what should not be outsourced in IT security? Continue Reading
-
Why great companies die - repeatedly - and is Microsoft next?
The Penny Black stamp revolutionised comunications - and taught us lessons that some IT giants today are failing to learn. Continue Reading
-
Professionalising service management will help IT take its seat at the top table
IT service managers should be at the forefront of efforts to take IT into the boardroom. The present dearth of CEOs who come from an IT background in the UK is a major concern. Continue Reading
-
Security Think Tank: Outsourcing of IT security is not for everyone
What should and what should not be outsourced in IT security? Continue Reading
-
Why the public sector is turning to multi-sourcing
Sarah Burnett explains why the public sector is moving from single sourcing to multi-sourcing, in an age of austerity. Continue Reading
-
The carping of naysayers harms the wielding of influence
Government data-sharing Czar Sir Bonar Neville-Kingdom refutes the leaks that question his commitment to open standards. Continue Reading
-
Time to assess the value of the data you hold
Martha Bennett offers strategic advice for managing growing volumes of corporate data. Continue Reading
-
Forrester: Innovation In Outsourcing Relationships
Clients play the most important role in innovation In outsourcing relationships, says Wolfgang Benkel, Principal Analyst, Forrester Research. Continue Reading
-
Leveraging the benefits of ‘Big Data’
-
Emerging markets: The future home of IT spend?
Cognizant group CEO of technology and operations, R. Chandrasekaran, talks about IT spending in emerging markets Continue Reading
-
Bigger drives mean the RAID rebuild must become a thing of the past
With 20 TB drives possible by the end of the decade, RAID rebuilds would be unacceptably long. Subdrive and platter-level protection schemes need to be devised to replace them. Continue Reading
-
Three key considerations to deliver benefits from big data
There is a real commercial advantage to be gained from big data and organisations need to make sure they have the right elements in place to seize that advantage. Continue Reading
-
Government open standards proposal fails the 'so what?' test
The consultation on open standards in government IT is generating a lot of discussion, much of which misses an important point: so what? Continue Reading
-
Open standards are about the business model, not the technology
Software companies, abuzz with lobbyists and patent lawyers over government open standards, are similar to the record industry 10 years ago. Continue Reading
-
Security Zone: Business continuity: putting the plan to work
A strong business continuity model – with performance criteria and supporting management systems – is required to assure a workable roadmap to recovery Continue Reading
-
How tech geeks in Africa are transforming IT education
Zambia, like the UK, is awash with unemployed graduates. But tech geeks in Africa are helping each other to fill the gap left by deficient education. Continue Reading
-
How to get IT right in mergers and acquisitions
Charlie Mayes offers advice on IT-business integration as mergers and acquisitions begin to take off. Continue Reading
-
An insider's view on the government open standards consultation
Andy Hopkirk chaired the first public meeting of the government's open standards consultation. He gives his report on the debate. Continue Reading
-
Security Think Tank: How can business achieve compliance and security? (Part 8)
What can businesses do to make regulatory compliance a priority without losing focus on security basics? Continue Reading
-
BATS software bug hits business strategy
Randy Clark, chief marketing officer at IT automation firm UC4 Software, writes about the withdrawal of a planned IPO at trading exchange BATS Continue Reading
-
The implications of identity assurance for public services
Jerry Fishenden, chairman of the ID Assurance privacy and consumer stakeholder group, says a new approach to identity will transform government IT. Continue Reading
-
Security Think Tank: How can business achieve compliance and security? (Part 7)
What can businesses do to make regulatory compliance a priority without losing focus on security basics? Continue Reading
-
What businesses need to do before the cookie law deadline
Organisations have to get their house in order ahead of the 26 May 2012 deadline for European e-commerce regulations governing the use of cookies. Continue Reading
-
Security Think Tank: How businesses can achieve compliance and security (Part 6)
What can businesses do to make regulatory compliance a priority without losing focus on security basics? Continue Reading
-
What will training look like in the workplace of the future?
Kevin Young (pictured), head of SkillSoft EMEA, explains the impact of technology on education Continue Reading
-
Maintaining our communications data capability
Dictated and sent without sight by Sir Bonar Neville-Kingdom, Data-sharing Czar in Her Majesty's Government. Continue Reading
-
Security Think Tank: How businesses can achieve compliance and security (part 5)
What can businesses do to make regulatory compliance a priority without losing focus on security basics? Continue Reading
-
Security Think Tank: How businesses can achieve compliance and security
What can businesses do to make regulatory compliance a priority without losing focus on security basics? Continue Reading
-
Security Think Tank: How businesses can achieve compliance and security
What can businesses do to make regulatory compliance a priority without losing focus on security basics? Continue Reading
-
The storage startups’ war of the flea against big vendors
Storage startups constantly wage war against the big storage vendors, which face attacks on many different fronts. But it’s all in the game and keeps the storage world turning. Continue Reading