The risks of social networking
Context and CCTV
Thin Client Solutions to Laptop Theft
Libra project – lessons learned from its bounce-back
Can Agile development be secure? Yes it can!
A last chance to save UK science from scholasticism
Keeping your bank details secure - how hard can it be?
Let me please introduce myself
What's this blog about? Maybe you can tell me.
Windows Server 2008: worth the upgrade?
The next broadband minister after Baroness Shriti Vadera
Carry on broadband
The real European identity
Missing Laptops - Is there an acceptable rate of loss?
Virgin Media says Government should relax
New UK broadband minister, but are we better off?
21st century GUI
Courts £447m IT project is 16 years late – now heading for success?
IT workers almost as unhappy as HR personnel
Detecting Insider Threats – Easy in theory, hard in practice
Whiskey in the Jar Bill, yes it is about Lotusphere
Janet & John Security
Coder or cannibal? Friday is fear-day...
Notes from Sutton high street
Political donors take note
Who will stay the course in the ID card bidding race?
Jerome Kerviel: lost billions and lost friends...
The power of the blogger
Ginger : the new Netvibes
Trouble working with Cisco Gold partners?
Security Metrics - Are we secure?
Clarkson column a bit soft, but said to be accurate
Suspected Intrusions - To Block or Not to Block?
Dead from Cisco Networkers 2008 - day 2 part 3
One conference, four keynotes, two legs
Facebook in hot water with UK information commissioner
Live from Cisco Networkers 2008 - day 2 part 2
Live from Cisco Networkers 2008 - day 2 part 1
Pirate’s fishy dealings land him in jail with crabs
Wikipedia: the true successor to the original web 1.0 vision
Six million appointments via NPfIT Choose and Book system - potentially good news
Its a box Jim, but not as we know it
Live from Cisco Networkers 2008 - day 1 part 3
Hungary dogs prepare to give voice to their desires
Significant risk of Fujitsu quitting NHS IT programme - trust board report
IBA Health's CEO comments on Lorenzo and the NPfIT
The fount of good Data Protection wisdom
Government Data Loss
Live from Cisco Networkers 2008 - day 1 part 2
Live from Cisco Networkers 2008 - day 1 part 1
Why pirate when there's so much free stuff out there
Computer Weekly requests and Lotus delivers!
The Dark Visitor
Paxman's pants leak - does the BBC need to up its IT security training budget?
Computer Weekly bloggers go global
Bebo's best - but what's the test?
Bupa proves IT staff to be better at lying than dieting
Ten Practical Steps to Prevent Laptop Theft
Lotus, your numbers are up
Going round in circles
Online security - a new approach needed
The inflation-beating cost of data protection snake-oil
If Fusion was the glue that welded together Oracle's acquisitions where does BEA fit?
Bill Gates celebrity-studded retirement plans spoof video
Let's go green
Egg on my face?
Arriving on a Jet Plane
Consumerisation is Coming Your Way
Alan Johnson may oversee major NPfIT changes in 2008
Some NPfIT “major issues” - did the PM get a full briefing in 2007?
MacNotes - its not an iTune for bagpipes
Two weeks to influence UK Science & Innovation Policy
ICO plea to business
Why is Sun buying MySQL?
The MacBook Air is here
Bad Broadband - a reader's complaint
The moving finger writes but smart fingers dial
New blog on ComputerWeekly.com
God Given v. State Dictated Information Governance
Ready or Not, Convergence is the Future
Office 2007 victim
Action on Police Central E-Crime Unit in Top 500
Health IT - a success story
CSC's £5m in penalties: will it now fine the NHS?
I want to go back to skool
What CIOs should be doing about security in 2008
Chinese Hackers - are we under attack?
Exploding laptops ring in the new year
Physician Heal Thyself
Six billion dollar IT man(ager)
ex-Ofcom chief becomes spin doctor
Broadband gets political
Second life to become as popular as email in five years
Queen warms to Will’s Wii
How to deal with bad news – and a case study on mismanaging it
Life without Richard Granger
Hacker safe? No it isn't.
I bet you missed these