Outsourcing round up 03 December 2009
If you have been injured in an accident use your iPhone
The other Two Cultures
Sony Reader Pocket Edition
Dummy's guide to running really exciting meetings
Spare a $$$$ billion
Post Office bankers bullied in The City
Busking made easy
ATA: Who are your favourite social media bloggers?
Outsourcing suppliers are taking on supplier management responsibilities
Least surprising story of the day: 50 top web entrepreneurs, one woman
Just how do you store all the UK's comms data?
17 days of Christmas book give-away
Virgin Speeds up Mobile Broadband
Do you use these jargon words and phrases?
Patient records not properly shredded
When provided a choice, do people choose?
Puzzled or paranoid: Can you trust pop-ups on a "trusted" site?
Is this a scam - how would I know?
Take a break from the IT department with IT Manager III
Does my tum look big on this?
Home Tweet Home
Mobile love gets husband into hot water
Swiss stay on fence
You have been unfriended
Code of Best Practices for Women and ICT
Top 5 causes of IT project failures - an insurer's view
UK software development gets a boost
Social web helps wrest power from suppliers
The decline of empire
Minister attacks IT used to risk-assess criminals
Claim of censorship over Cerner system
Do Women Really Need To Help Out Other Women?
The challenges for a new government IT strategy
Women will continue to lose until the business world changes
Everything you wanted to know about Data Protection
Satyam's fraud bigger than thought, what does this mean?
Government plans for US-style IT openness - by 2020
Merlin Mann's Time & Attention talk
Are we about to get an new government-wide IT strategy?
iPhone - Every Little Helps
Feed me Alan, make me strong!
More on "The Identity Commissioner speaks - and drops the Home Office in it"
Video: Creative Zii EGG Android
Will the London Stock Exchange end its system problems with MillenniumIT?
Video: Dell Mini 3i - comes in porn palette colours!
London Stock Exchange system up again
Human factors in information security
ComputerWeekly's Blog awards celebrates its winnners
Inside outsourcing on inside out sourcing
Maggie Berry from womenintechnology.co.uk joins WITsend
The role of dopamine in social media
Which is the best security blog?
Proof there should not be an iPhone app for everything
Websurfing no longer deadly for teenagers in China
Why on earth won't tech be mentioned at Copenhagen?
Dawn in your Bedroom
RIPA tears up the right to remain silent
DH "truth" over NPfIT costs
NPfIT Lorenzo pioneers at NHS Bury - grappling with issues
Why can't victims and witnesses go on the DNA database?
Is tendering right for social software projects?
Cyber Security Mega Trends
The Identity Commissioner speaks - and drops the Home Office in it
Bruce Schneier gets dolled up
Will tech companies ever learn?
Dirty Den to return from Emmerdale and Coronation Street.
Do you trust China to run the Internet any better than the USA?
CoTweet: Twitter tools get collaborative
Computers don't smoke
Computer Geekly Weekly TV... get your regular fix of weekly tech news
What Cost An Enterprise Firewall?
Video: Computer Geekly's Weekly roundup!
The road to Windows 7
In pictures: the business case for women in tech
Joining the Social Enterprise
Download Magic Mouse drivers for Windows
An Ending, and a Beginning
Decrease Your Technology Dependence
The McWilliam rules for Internet Security
Where to find innovation in security
You won't make a dent in it
Data Integrity - The Final Frontier
The fight for Cybersecurity alias Cyberwarfare Budgets
Choose your route to cloud computing
Four IT project certainties - whatever the government
ChromeOS: The Operating System for Gadgets?
Mini MIDI: Korg's Nano Controller range
Chrome OS - is this the first OS for cloud computing?
White paper service goes live on ComputerWeekly.com
Men and Multi-tasking
Kindle for PC, Available Now
The new art of war
Small companies are the key to security innovation
A Database too Far: NICE but NASTY
Oman sets the bar on security awareness
Common Customer Requirements for the Desktop of the Future
An implosion of trust and confidence?
Texting killed the reindeer star
Lotteries pose business continuity risk