IT architecture
IT architecture sets the ground rules and framework for a successful IT strategy, and IT and enterprise architects have become increasingly important contributors to the IT management function. We examine the best practices and open standards required to develop and manage an effective IT architecture.
-
News
29 Apr 2025
VeeamON shows Veeam on Linux, RAG from backup, and cloud features
Veeam showed a new Linux appliance, features in Veeam Backup & Replication that will see it run corporate backups as RAG data, and new cloud features that include Entra ID backup Continue Reading
By- Yann Serra, LeMagIT
-
News
25 Apr 2025
UK MoJ crime prediction algorithms raise serious concerns
The Ministry of Justice is using one algorithm to predict people’s risk of reoffending and another to predict who will commit murder, but critics say the profiling in these systems raises ‘serious concerns’ over racism, classism and data inaccuracies Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
E-Zine
01 Nov 2011
Adopting an application-centric architecture
Enterprise networking has shifted from focusing on infrastructure to concentrating on the delivery of the applications that help users do their jobs. Uncover how networking professionals view applications and how their jobs have changed as a result of a network-centric view. Continue Reading
-
News
14 Oct 2011
CIO interview: Gerry Pennell, CIO, London 2012 Olympics
With less than 10 months to go, London 2012 CIO Gerry Pennell is fully focused on the task of delivering a project that simply cannot miss its deadline. Continue Reading
By- Bryan Glick, Editor in chief
-
E-Zine
01 Aug 2011
Virtual infrastructure: Don't skip the small stuff
As more European companies turn to virtualisation to enhance their environments, it is important for them to generate a solid IT roadmap and focus on key areas such as architectural governance, technical design, and how virtualisation fits in with current and future business processes. Most important, they must anticipate disasters and avoid unwanted roadblocks such as vendor lock-in and dried-up funds. Continue Reading
-
News
20 Apr 2011
Infosec 2011: Policy is only way to deal with social media, say security professionals
The best and only way organisations can deal with the use of social media is through robust policies and user aware campaigns Continue Reading
By- Warwick Ashford, Senior analyst
-
Tip
01 Apr 2011
5 data mining techniques for optimal results
Faulty data mining makes seeking of decisive information akin to finding a needle in a haystack. Here are some tips to tweak your data mining exercises. Continue Reading
By- Sunil Dutt Jha
-
News
08 Mar 2011
Exclusive: Free software guru Richard Stallman on government IT and why he hates the cloud
The founding father of the free software movement tells Computer Weekly why government just doesn't "get it" Continue Reading
By -
Blog Post
19 Jan 2011
Indemnities in IT Contracts - What is the "standard" position?
Imagine the scene in one of the deals I was doing recently. It was a long negotiation on an IT deal which was nearing its conclusion and I was acting for the IT customer. One of the last issues to ... Continue Reading
By -
Feature
07 Jan 2011
Collaboration in the Cloud: everything to everyone, or too good to be true?
IT decision-makers are already looking to the cloud to support new IT delivery models - such as software-as-a-service (SaaS), platform-as-a-service (PaaS) and infrastructure-as-a-service (IaaS). Continue Reading
-
News
25 Jul 2007
SaaS: Tricks and traps of uploading data in bulk
The dark side of SaaS is losing control over your data. Learn how to stay in control while uploading data in bulk in this new report from Info-Tech Research. Continue Reading
-
News
24 May 2007
Data retrieval strategies: Retrieving email and database archives overview
This overview focuses on the considerations involved in email and database archives with an emphasis on retention and search to meet legal discovery requirements. Continue Reading
-
Feature
25 Apr 2005
Lead from the top
The starting line for effective data security is at board level, writes John Kavanagh in this review of current thinking and... Continue Reading
-
Opinion
25 Apr 2005
Seeing the big picture
Information security is about securely bringing together the organisation's two most important assets - information and people. Continue Reading
By- Lewis Gee
-
Feature
14 Mar 2005
Healthcare system designer explains HIPAA pitfalls
Kate Borten is president of The Marblehead Group Inc., has more than 20 years of experience designing, implementing and integrating healthcare information systems and is author of HIPAA Security Made Simple. This Q&A focuses on how she believes hospitals are meeting HIPAA's security guidelines.
Continue ReadingBy