Business applications
At the heart of enterprise software strategy are the key business applications upon which every organisation relies. From enterprise resource planning (ERP) to customer relationship management (CRM), financial and accounts software to business intelligence (BI), such applications demand high investments and can deliver high returns. We analyse the latest product developments and the news from major suppliers such as Oracle, Microsoft and SAP.
-
E-Zine
09 Nov 2023
Heineken lets the data flow
In this month’s CW EMEA ezine, we find out about Heineken’s mission to make the most out of the data it holds through an enterprise-wide data ecosystem. We also look at how the UK has turned its back on the German government-funded Gaia-X data platform, why cyber experts are urging the EU to rethink vulnerability disclosure plans, and how the IT industry is responding to the software developer skills shortfall. Read the issue now. Continue Reading
-
E-Zine
13 Oct 2023
CW EMEA: Prepare for AI explosion
In this month’s CW EMEA, we look at generative artificial intelligence, which Accenture claims is the next big thing in enterprise IT. The IT services giant says GenAI will transform 40% of all working hours – and it is putting its money where its mouth is with plans to invest $3bn in AI and create 40,000 AI-focused roles. Part of the huge investment has already been assigned to the creation of an AI and generative AI lab in Brussels focused on the public sector in Europe. We also look at a Deutsche Telekom-led consortium’s demo of multi-supplier non-real-time RAN optimisation, how last month’s Ryder Cup tested out technology to improve how fans digitally consume the event, and find out how Zurich Insurance has cut the time it takes to complete development of ServiceNow applications. Read the issue now. Continue Reading
-
Photo Story
06 Dec 2010
Photos: The 7 sins of Windows Phone 7
Microsoft launched Windows Phone 7 (WP7) in October this year. Considered as the first serious offering from the company in the mobile operating system (OS) space, WP7 has met some criticism from users and analysts. Continue Reading
By- Jenny Williams, University of Gloucestershire
-
Photo Story
13 Sep 2010
SAP's future of retail research labs
SAP’s Future Retail Centre, near Zurich, Switzerland, houses a range of new technologies that could change the way we shop in years to come. Continue Reading
By- Rebecca Thomson, Computer Weekly
-
Photo Story
06 Aug 2010
Putting a value on social media in business
Companies can use social networking both internally and externally to improve efficiency, save money and connect to customers. Continue Reading
-
News
14 Jul 2010
Government scraps ÂŁ80m Microsoft licensing deal with NHS
The government has scrapped the long-running NHS Connecting for Health (CfH) enterprise agreement (EA) software licensing deal with Microsoft after deciding there was no business case or budget to renew it. Continue Reading
By -
Photo Story
07 Jun 2010
The Computer Weekly guide to Cloud Computing
Cloud computing is changing the way IT departments buy IT. Businesses have a range of paths to the cloud, including infrastructure, platforms and applications that are available from cloud providers as online services. Continue Reading
By -
Photo Story
30 Apr 2010
A guide to ERP for small and large businesses
Bob Tarzey looks at the business case for integrating ERP systems for large and small companies Continue Reading
By -
Photo Story
22 Apr 2010
Visual Studio 2010 first look
Visual Studio 2010 offers an integrated environment of tools and server infrastructure that Microsoft says can be used to simplify the entire application development process. Continue Reading
By -
News
11 Mar 2010
Microsoft loses appeal on Office XML patent dispute with i4i
Microsoft has lost an appeal in its dispute with i4i over XML support in Office 2003/2007, following a decision by the US Court of Appeals for the Federal Circuit. Continue Reading
By- Cliff Saran, Managing Editor
-
Photo Story
05 Mar 2010
Photos: World Cup 2010 gets its own Hand of God
Hundreds of thousands of people will be attending this year’s Football World Cup in South Africa either as spectators or workers. But what no-one will notice, and few probably know, is that software written by Mahindra Satyam will make sure everything off the pitch goes smoothly. Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
Photo Story
11 Nov 2009
Photos: Top ten free Nokia Ovi app downloads
Nokia's Ovi is attempting to take on Apple's AppStore. We take a look at the best free apps currently available. Continue Reading
By- Faisal Alani, UK at eBay
-
News
21 Oct 2009
Israel carves a niche in IT security
IT security, risk, governance, continuity and compliance technologies are fast becoming some of Israel's top exports.
Analysing and...
Continue ReadingBy- Warwick Ashford, Senior analyst
-
News
31 Jul 2009
Gary McKinnon loses case to avoid extradition, could face 60 years in jail
Hacker Gary McKinnon has failed in his last attempt to avoid extradition to the United States where he could face 60 years in prison. Continue Reading
By- Rebecca Thomson, Computer Weekly
-
News
17 Jul 2009
Apollo 11: 40 years on, where is software engineering today?
The Apollo 11 lunar landing would have been impossible had it not been for software engineering. Continue Reading
By- Cliff Saran, Managing Editor
-
Photo Story
13 Jul 2009
Photos: Apollo 11 pictures that amazed us
Here's our pick of the best Apollo 11 moon landing pics from the web with detailed descriptions of what was happening. Continue Reading
By- Faisal Alani, UK at eBay
-
Photo Story
23 Jun 2009
Photos: Google Street View watches kid fall over
The Google Street View car passes a kid that buckles and falls off his bike at the worst possible moment. Continue Reading
By- Faisal Alani, UK at eBay
-
News
15 Jun 2009
Final cockpit moments with blocked pitot sensors
Two fatal crashes of passenger aircraft show that it is dangerous for pilots to have conflicting information and warnings in the cockpit.
The recovered...
Continue ReadingBy -
News
12 Jun 2009
Crash One: Birgenair Flight 301
This is the extraordinary story of an aircraft which was in good flying order except for a blocked pitot tube which caused multiple problems. Continue Reading
By -
Photo Story
08 Jun 2009
Photos: Top Ten Google Android Apps
Google's Android OS is taking over with over eighteen new devices de out by the end of the year. We look at the best apps currently available for download. Continue Reading
By- Faisal Alani, UK at eBay
-
Photo Story
02 Jun 2009
Photos: How to install Windows 7 on a netbook
It is possible to install Windows 7 Release Candidate 1 on a NetBook like the Lenovo S10, without burning a DVD and using a USB DVD drive. These instructions will show you how. Continue Reading
By- Cliff Saran, Managing Editor
-
Photo Story
19 May 2009
Photos: Software supports Red Cross operations
The British Red Cross is using software IT service management software from Hornbill to help it support IT users across the globe. The company was attracted by the software’s compatibility with Blackberry devices as well as its ease of use. The British Red Cross supports thousands of workers in remote locations. Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
Photo Story
14 May 2009
Photos: Reebok launch 'Your Reebok' iPhone app
Your Reebok app allows you to customize your next pair of trainers on your iPhone on the go. Continue Reading
By- Faisal Alani, UK at eBay
-
Photo Story
07 Apr 2009
Photos: Top ten CGI films to keep the kids quiet over easter
Want some DVDs to keep the kids occupied over easter? Have a look at our photo story identifying the best CGI has to offer. Continue Reading
By- Faisal Alani, UK at eBay
-
News
10 Feb 2009
Added critical data protection for SMBs
New technology aiming to solve small and medium size businesses’ perennial problems with protecting business critical data Continue Reading
By- Joe O’Halloran, Computer Weekly
-
Photo Story
05 Feb 2009
Photos: Google Earth - explore Mars and the ocean
Google 5.0 brings a host of new tools to its users, including the ability to explore the surface of Mars and the bottom of the ocean. Continue Reading
By- Rebecca Thomson, Computer Weekly
-
Feature
22 Dec 2008
The cloud computing revolution
Hewlett-Packard has become the latest supplier of many to sound the death knell on the IT department. Continue Reading
-
Photo Story
15 Dec 2008
Photos: How IT helps relocate refugees
GPS and Google Earth software are helping to find suitable locations for refugees and displaced people to settle. Aid agency CARE International explains how. Continue Reading
By- Rebecca Thomson, Computer Weekly
-
News
21 Aug 2008
Microsoft and Novell expand Windows/Linux integration deal
Microsoft and Novell are extending their interoperability agreement to tie Windows closer to Novell's SUSE Linux in the enterprise. Continue Reading
-
Feature
16 Jul 2008
Facing up to security perils of outbound traffic
What about the threat from within and, more specifically, the security issues that arise from outbound traffic risks? Continue Reading
By -
Feature
28 May 2008
Chinook helicopter disaster - computer software failure or pilot error?
Chinook helicopter crash: was it computer software failure or a cause we'll never know? This article gives the background to the Chinook helicopter disaster with links to all the relevant articles published by ComputerWeekly and other useful web links. Continue Reading
By -
News
07 Jan 2008
Fire IT project two years late and ÂŁ70m overbudget
A government IT project aiming to centralise fire control rooms is two years behind schedule and more than 50% overbudget, according to a report from the Communities and Local Government Committee. Continue Reading
By- Rebecca Thomson, Computer Weekly
-
News
07 Dec 2007
EC to use mobile phones to track carbon footprints
New application allows users to see how their daily choices impact climate change in terms of the major greenhouse gases Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
06 Nov 2007
Users leaving Fibre Channel for iSCSI Sans find pros, cons
Users who recently updated aging Fibre Channel equipment with new iSCSI San products have found ease of use can be a double-edged sword. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
06 Nov 2007
Adaptec reports losses
Adaptec's revenue was down year over year, as well as sequentially; DataDirect says the InfiniBand business is booming. Continue Reading
By- SearchStorage.com Staff
-
News
06 Nov 2007
CommVault revenues spike after update of Simpana backup app
CommVault attributes a spike in sales to the integration of features such as archiving, replication and search into its backup products. Continue Reading
By -
Feature
06 Nov 2007
How data deduplication works
Chapter one of our data deduplication handbook takes you under the hood to show how data deduplication works so you can maximise the efficiency of this data reduction technology. Continue Reading
-
Feature
31 Oct 2007
Vanderbilt hospital fights archive growth with grid
Vanderbilt University Medical Centre simplifies document management using Bycast's archiving grid system. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
21 Oct 2007
DreamWorks draws on storage for animation
DreamWorks' senior technologist says it takes a lot of emerging storage technologies to make an animation movie. Continue Reading
By -
News
21 Oct 2007
VoIP certification credentials
Many certifications touch on voice over IP topics tangentially, but numerous credentials now focus a fairly substantial portion of their coverage on this subject matter. In this certification survey, we take a look at available certifications, distinguishing between those credentials for which VoIP is a primary topic and those for which it is secondary. Continue Reading
By -
News
14 Oct 2007
SNW Preview: Data protection makes a stand
Led by EMC's integration of data deduplication and CDP into its backup software, data protection products are prominent at Storage Networking World. Continue Reading
By- Dave Raffo, News Director; Beth Pariseau, News Writer
-
News
14 Oct 2007
VMware takes on data migration
VMware supports migrating data between disc arrays with Storage VMotion, changing the equation between server and storage virtualisation devices. Continue Reading
By- Beth Pariseau, Senior News Writer
-
Feature
10 Oct 2007
Checklist for purchasing hardware-based encryption
Encryption appliances sit inline on a network and use specially designed electronics to encrypt data at line speeds, essentially eliminating the performance penalty imposed by encryption software running on a general server. While software-based encryption is typically handled as a specific event or process (e.g., encrypting data during a backup process), appliance-based encryption normally can handle any quantity of data in flight. Continue Reading
-
News
10 Oct 2007
Unified communications new priority for HP
Unified communications is a confusing area with a number of vendors in the mix. HP has launched new services to help ease companies into unified communications and help them determine which integrated tools will best fit their business goals. Continue Reading
By- Andrew R. Hickey, News Editor
-
Feature
09 Oct 2007
CRM strategies for SMBs
Keeping your customers happy is job number one. With CRM software, luckily, that job becomes a lot easier. Here we present our top five CRM tips for SMBs. Continue Reading
-
Feature
09 Oct 2007
Open source strategies for SMBs
One way to make the most of a tight budget is to invest in open source technologies. Not only are they generally more secure than most off-the-shelf proprietary products, they're usually free too. Here we present our top five open source tips for SMBs. Continue Reading
-
News
07 Oct 2007
IP telephony adoption rising, quality sagging
IP telephony adoption continues to grow, but service quality is lagging behind, according to a user survey from Psytechnics. Continue Reading
By- Andrew R. Hickey, News Editor
-
Feature
07 Oct 2007
IP PBX eases VoIP transition for gas company
An IP PBX with Sip helped one gas company upgrade to a new phone system while also jumping into VoIP. Continue Reading
By- Andrew R. Hickey, News Editor
-
News
05 Oct 2007
Podcast: the true cost of IT security
In this interview, Cliff Saran speaks to Martin Sadler, director of HP's Trusted Systems Lab, about how much should we be expected to spend and how much security is enough. Hackers are getting smarter and Martin believes newly trained IT professionals are ill-equipped to deal with the sophisticated nature of modern attacks due to limitations in the current way IT security is taught. Continue Reading
By- Cliff Saran, Managing Editor
-
News
04 Oct 2007
Pillar announces support for 1 TB SATA drives
Pillar is one of the earliest to announce 1 TB SATA drives in an enterprise array. IBM's SVC becomes the first storage virtualization product certified with VMware. Continue Reading
By- SearchStorage.com Staff
-
News
02 Oct 2007
Web 2.0 strategies for SMBs
Web 2.0 technologies are catching on at companies of all sizes. Find out how to make them work for your SMB with SearchSMB.com's top five Web 2.0 tips. Continue Reading
-
Feature
01 Oct 2007
How to select the right IP PBX
Selecting the right IP PBX system for your company can be complicated. Here are some important things to consider when purchasing an IP PBX. Continue Reading
By -
News
26 Sep 2007
Microsoft releases Windows Server 2008 RC0
Windows Server 2008 Release Candidate 0 (RC0) is now available for customer review. Continue Reading
-
News
25 Sep 2007
How to purchase a data encryption product
Data security is now a critical problem for every company, regardless of size. This buying guide explores the factors involved in purchasing data encryption hardware and software products. Continue Reading
-
News
24 Sep 2007
PCI council adds Pin security to remit
The PCI Security Standards Council has added Pin Entry Device (PED) security technology to its payments industry testing portfolio to streamline standardisation. Continue Reading
-
Feature
23 Sep 2007
Storage session downloads: infrastructure track
This track looks at San and Nas issues, virtualization, distance demands, remote offices and how to build out systems. Continue Reading
-
Feature
19 Sep 2007
Open communications vs. closed communications
Open communications are key to making the inevitable multimodal, multi-supplier communication environment work, so why aren't more suppliers providing open-source systems? Continue Reading
By- Paul Holliday, global market analyst, Siemens Enterprise Communications
-
News
16 Sep 2007
3PAR adds tiered storage management tool
The new version of the System Reporter management tool for 3PAR's high-end arrays now includes monitoring for tiered storage environments. Continue Reading
By- SearchStorage.com Staff
-
News
09 Sep 2007
Virtual appliance lets users convert DAS to iSCSI San
LeftHand Networks has released an edition of its SaniQ iSCSI San software that will convert locally attached disc to networked storage. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
07 Sep 2007
Microsoft update to patch critical Windows flaw
Microsoft plans to patch a critical flaw in Windows and plug holes in MSN Messenger, Visual Studio, and Windows services for Unix. Continue Reading
By- SearchSecurity.com Staff
-
News
07 Sep 2007
Government warns of dangerous QuickBooks Online flaw
Attackers could exploit two flaws in the popular Intuit QuickBooks Online Edition to cause buffer overflows and download or upload files in arbitrary locations, US-CERT warned. Continue Reading
By -
News
07 Sep 2007
Cybercriminals employ toolkits in rising numbers to steal data
The market is increasing for crimeware toolkits that help cybercriminals avoid detection and exploit flaws, according to new research from security vendor, Finjan. Continue Reading
By- Robert Westervelt, TechTarget
-
Feature
06 Sep 2007
Understanding VoWLAN
Like VoIP, VoWLAN contributes to cost efficiency. Because calls can be routed over the data network internally or over the Internet externally, mobile telephony costs can be eliminated or decreased significantly. In the long term, VoWLAN deployment is a significant step toward interoperability and seamless mobile connectivity between private WLANs and public wireless and cellular networks. Continue Reading
-
News
05 Sep 2007
NAC switches, appliances help track users, malware
Some vendors are offering switches and appliances to monitor traffic for malware and unauthorized access, as the NAC market including Cisco NAC and Microsoft NAP sorts itself out. Continue Reading
By- Neil Roiter, TechTarget
-
News
05 Sep 2007
Firefox security issues persist despite update
Despite Mozilla's recent Firefox security update, researchers say there's another way attackers could exploit the browser for malicious purposes. Continue Reading
By -
News
05 Sep 2007
Critical flaw discovered in IBM DB2
IBM's DB2 database management system contains a flaw that could be exploited remotely by an attacker to take control of a system. Continue Reading
By- SearchSecurity.com Staff
-
News
30 Aug 2007
Flaw found in MSN Messenger
Attackers could exploit a flaw in MSN Messenger to run malicious code on targeted machines, according to Danish vulnerability clearinghouse Secunia. Continue Reading
By- SearchSecurity.com Staff
-
News
30 Aug 2007
Critical flaw found in Oracle developer tool
A popular tool used by Oracle developers contains a critical flaw that could be used by an attacker to compromise a system. Continue Reading
By- SearchSecurity.com Staff
-
News
29 Aug 2007
Rootkit found in older Sony USB device
F-Secure says it discovered rootkit technology in Sony's Micro Vault USM-F fingerprint reader software. The find comes two years after controversy over Sony's DRM technology. Continue Reading
By -
Feature
29 Aug 2007
SaaS apps being deployed by business units, not IT
When it comes to deploying applications via SaaS, IT is still behind the curve. What's preventing IT from getting control over the programs business units want? Continue Reading
By- Shamus McGillicuddy, Enterprise Management Associates
-
News
28 Aug 2007
Data archives overview
When a file is lost due to user error, or data is corrupted because of system problems, the affected data can be restored from a backup. An archive is different from a backup because the data may not be used for months, even years, but must be accessed quickly when needed. There is simply no time to search through burgeoning volumes of tape or optical media to locate important files. Traditional backup platforms are poorly suited for archival data storage, and users are relying on disk storage systems for a mix of performance and reliability. Files can be archived to any disk storage system, but content-addressed storage (CAS) technology has appeared to support archiving efforts. Continue Reading
By- Stephen J. Bigelow, Senior Technology Editor
-
News
28 Aug 2007
SANS: Attackers may be attempting Trend Micro exploits
The SANS Internet Storm Center (ISC) warns that attackers may be attempting to exploit flaws in Trend Micro products to hijack computer systems. Continue Reading
By -
News
26 Aug 2007
IBM back in iSCSI SAN fray
IBM is looking to take on HP's MSA and EMC's AX150, as well as EqualLogic and LeftHand, with a new iSCSI SAN product OEMed from LSI. Continue Reading
By- Beth Pariseau, Senior News Writer
-
Feature
23 Aug 2007
Experts: IDS is here to stay
IDS technology has survived predictions that it would be replaced by IPS. One expert says it will remain a separate product while IPS is folded into firewalls. Continue Reading
By -
News
22 Aug 2007
Trend Micro fixes flaws in ServerProtect, PC-cillin
Attackers could tamper with servers and run malicious code by exploiting flaws in Trend Micro's ServerProtect, Anti-Spyware and PC-cillin products. But fixes are available. Continue Reading
By -
News
22 Aug 2007
Microsoft adds CA vets to anti-malware team
Microsoft has hired Jakub Kaminski, one of CA's more talented and well-regarded antivirus researchers, and three of his colleagues from CA's Australian lab. Continue Reading
-
News
22 Aug 2007
Attackers target two Microsoft security flaws
Symantec warned customers about attacks targeting two Microsoft security flaws -- an unpatched DirectX Media vulnerability and the XML Core Services flaw patched in MS07-042. Continue Reading
By -
Feature
21 Aug 2007
Backup reporting expands to add capacity planning
Aptare adds capacity planning for primary data storage to its product line, joining Symantec in recent attempts to broaden the appeal of reporting software. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
20 Aug 2007
Sourcefire acquires open source ClamAV
Sourcefire, maker of the popular Snort open source IDS tool, has acquired ClamAV, an open source email gateway scanning tool. Continue Reading
By -
News
20 Aug 2007
VMware acquires HIPS provider Determina
VMware, the leader in virtualization software, has acquired Determina, a provider of host IPS technology. Continue Reading
-
News
19 Aug 2007
College campuses prepare for Microsoft Vista challenges
With new Vista machines coming to campus, the IT shops of academia have no choice but to embrace the latest Windows OS and its security implications. Continue Reading
By -
News
17 Aug 2007
Wal-Mart deploys new data security system
Wal-Mart Stores has deployed a data security and encryption system to secure data going over its global network. Continue Reading
-
News
17 Aug 2007
HDS, HP simplify high-end disk array pricing
Users of the new USP-V disk array from HDS and the XP24000 disk array from HP will now pay less for attaching external storage, as well as capacity. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
16 Aug 2007
TJX profit takes hit over data breach
TJX says it has spent $256 million responding to the massive data breach that exposed 45 million customers to identity fraud, and the bottom line has suffered as a result. Continue Reading
By- SearchSecurity.com Staff
-
Feature
16 Aug 2007
Firewall deployment options increase for enterprises
With a growing number firewall configuration options, companies need to spend more time and put more effort into determining how to design and deploy firewalls. Continue Reading
-
News
15 Aug 2007
Latest Microsoft flaws affect Windows, IE, Excel
Microsoft released nine security updates Tuesday -- six of them critical -- for flaws in Internet Explorer, Excel and other programs within the Windows OS. Continue Reading
By -
News
14 Aug 2007
Novell to acquire Senforce for endpoint security
Novell is acquiring Senforce, an early network access control supplier, to integrate its endpoint security features and develop an endpoint management suite. Continue Reading
By- Robert Westervelt, TechTarget
-
News
14 Aug 2007
Apple iPhone to provoke complex mobile attacks, expert warns
Mikko Hypponen, director of antivirus research at F-Secure, said he expects mobile malware attacks to escalate thanks to interest in Apple's iPhone. Continue Reading
By -
Feature
12 Aug 2007
VoIP models and services: Complete guide
With clear, concise explanations of existing VoIP business models and deployment methodologies, this guide will enable you to weigh the pros and cons of each based on your needs. Continue Reading
-
News
10 Aug 2007
SMEs’ CRM needs catered for in Sage 200
Accounting software specialist Sage has expanded its business automation software portfolio with the launch of a customer relationship management system, Sage 200. Continue Reading
-
News
09 Aug 2007
Buying Guide for NAS management software
Learn the key evaluation factors for purchasing NAS management software in this Buying Guide. Continue Reading
-
News
09 Aug 2007
NAS appliance purchase considerations
NAS appliances are frequently touted for bringing convenience and simplicity to network storage. Appliances include their own dedicated disks for storage and RAID, and most NAS appliances can be upgraded with more or larger disks for additional storage space. However, NAS appliances do pose some disadvantages. Consequently, the choice of NAS appliance requires careful evaluation. Now that you've reviewed the essential issues involved in any NAS product, this guide focuses on specific considerations for dedicated NAS appliances. You'll also find a series of specifications to help make on-the-spot product comparisons between vendors. Continue Reading
-
News
09 Aug 2007
Sun adds virtual tape library to Thumper
Analysts say the combo of FalconStor's software, Solaris and Thumper is a good sign of integration from Sun after a disorganised year, but it's unclear if users will be convinced. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
09 Aug 2007
VoIP vulnerability threatens data
VoIP vulnerabilities have now reached a level of sophistication that allows hackers to steal, view or delete data. Continue Reading
By- Andrew R. Hickey, News Editor
-
News
09 Aug 2007
Immunity releases new exploit-writing tool
Pen testing company says its Debugger tool offers researchers a new way to write exploits, analyse malware and reverse engineer binary files. Continue Reading
By -
News
08 Aug 2007
NAS appliance specifications
NAS appliances are noted for their convenience, offering dedicated internal storage that is relatively straightforward to identify and manage. The biggest issue for NAS appliances is avoiding network bottlenecks and supporting expansion without having to proliferate additional appliances across the network. The product snapshots in this chapter highlight key specifications for a cross section of major NAS appliance products. Continue Reading
-
News
08 Aug 2007
Cisco warns of critical IOS flaws
Attackers could exploit multiple flaws in Cisco's IOS to cause a denial of service or remotely execute arbitrary code. Continue Reading
By- SearchSecurity.com Staff
-
News
08 Aug 2007
Wi-Fi simplicity edging out Wi-Fi security
Experts say the standards are available to lock down Wi-Fi, but many network and security managers are taking an easier approach. Continue Reading
By- Eric Parizo, Senior Analyst
-
News
07 Aug 2007
Application-aware storage promises intelligence and automation
Storage professionals overbuy both performance and capacity in an effort to forestall potential storage problems. Tiered storage was one way to address this problem -- matching storage resources and costs with the value of data. Today, storage is poised to build on this notion with application-aware storage, using business policies to bring autonomy and intelligence to enterprise storage. Still, there is a great deal of confusion surrounding this technology, its capabilities and its deployment. Continue Reading
-
Feature
07 Aug 2007
How to cheat at VoIP Security
Securing a VoIP infrastructure requires planning, analysis, and detailed knowledge about the specifics of the implementation you choose to use. Continue Reading
-
News
07 Aug 2007
Subpar security compromises compliance
Pressure to keep trading applications available has nudged security to the back of the development line. Continue Reading
-
Feature
06 Aug 2007
Does compliance make encryption always necessary?
Many organisations look to encryption to protect sensitive data. Yet hundreds of millions of people who use the Internet also use encryption, yet most of them don't even know it. Continue Reading