- CW500: Managing the mobile workforce (part 1)
- Forrester: Microsoft takes new approach to Windows app development
- Cloud APIs at hand to connect to databases
- How to manage unstructured data for business benefit
- Aster Data founders explain unified approach to data, big and small
- CW500 Security Club: Dealing with attacks inside networks
- Will video conferencing find its business market in 2012?
- Windows 8 looks to reclaim territory in the enterprise
- Using fibre channel for storage networking
- Departmental BI dashboarding needs enterprise view
- How IBM researchers hope to change the world
- Irish dairy exporter plots expansion with data matching
- ITIL to take the pain out of change management
- Tune Raid performance to get the most from your HDDs
- BI dashboards must dish up killer KPIs
- Can tablets handle business?
- How to make your business Flame-proof
- Sandvik tightens supply chain with single supplier e-procurement portal
- Is cloud data storage right for your organisation?
- All-flash array products take aim at virtualisation I/O demands
- Procurement function to squeeze value from supply chain analytics
- Gathering retail intelligence
- Static code analysis tools gain traction in India as SDL models mature
- Tablets: The best tools for the job
- CW500: The boardroom view of IT
- HDFC Bank’s ISO 27004 compliant security metrics a boost toward GRC
- Tablets in the enterprise: Challenges of office mobility
- Setting up a botnet is easier than you think
- Virtual server backup software survey
- Data visualisation success hinges on solid storytelling skills
- SMEs: Do business the smart way
- Build consensus on MDM programme goals to boost chances of success
- Business focus vital for effective master data management strategy
- Business focus vital for effective master data management strategy
- Outsourcing IT services: goals and negotiations
- If the popularity of ICT is on the rise, why are we scrapping the curriculum?
- The implications for storage of EU data protection regulation
- BI dashboards help South Leicestershire College track performance
- SMEs: Optimising IT assets
- Big Data: Utilities rise to the smart meter challenge
- Post A-Level IT apprenticeship options: What if you didn’t get the grades you wanted?
- BYOD: Can enterprise mitigate the risks?
- Big data analytics and the end of sampling as we know it
- Mobile BI sparks recast of business intelligence
- Data's role in customer engagement
- Weighing up the options for software testing
- BI, advanced analytics offer edge for wind turbine, blinds makers
- Goodbye Wi-Fi, hello WiGig
- Hybrid cloud storage product comparison
- Best of VMworld Europe 2012 Awards: Nomination form
- IRM solution helps training provider secure critical assets
- Teradata CTO: 'Big data' technology starting to hit the mainstream
- How to make sense of the big data universe
- The future of electronic healthcare records
- Interview: Angela Tucci, chief strategy officer, Symantec
- Taking the tablets to boost healthcare efficiency
- Key technologies driving healthcare
- Enterprise SAN survey: A feature-rich market with some key differences
- Cloud archive: The most mature of the cloud storage services
- Compliance, risk and the coming EU data protection framework: a CISO's perspective
- Predictive sports analytics put in play for Wimbledon, Formula One
- Best practice in outsourcing security
- Men and women disagree on reasons why IT is less attractive to women
- What is driving desktop virtualisation?
- VMware disaster recovery using VMware onboard features
- Using IT to capitalise on austerity
- Data virtualisation on rise as ETL alternative for data integration
- GPU Computing in High-Performance Computing: A Status Check
- High-performance computing drives high-performance F1 cars to success
- Virtual solution to consumerisation
- Network security assessments: India Inc. is going beyond routine
- Royal Holloway 2012: A framework for preventing cross-site scripting
- Royal Holloway 2012: Designing a secure contactless payment system
- Royal Holloway 2012: An incident response process for armoured malware
- Options in small-business storage for server virtualisation
- Royal Holloway 2012: Risks of multi-tenancy cloud computing
- Royal Holloway 2012: An analysis of cloud security certifications
- Royal Holloway 2012: PCI compliance, cloud computing are a costly pair
- HTML5: The end of native apps?
- How technology is changing BPO
- Forrester: Desktop virtualisation demands detailed request for proposals
- Forrester: Derive maximum value from storage
- Mandatory carbon reporting: Indirect emissions guidelines for IT managers
- Storage capacity planning tools: Why virtual machines change everything
- 'Big data' MDM processes key to finding business value in new info
- VMware data protection: An overview of how it works
- iSCSI security: Networking and security options available
- Could G-Cloud become the pride of public sector IT?
- Automate testing for agile quality
- HDFC Bank’s BS 25999 certification journey: An exploration
- Delivering value from desktop virtualisation
- MDM technology still affords chance to make poor software choices
- 10 GbE: iSCSI bandwidth increase improves protocol’s position against FC
- How transforming a datacentre can transform your business
- How will storage infrastructure change with VDI deployments?
- VMware backup and the VMware snapshot
- CEH certification gains credence in IT security domain
- What IT leaders say about big data
- HyperCITY’s retail store management system: Profit with promotions
- Server SSD guide to form factors and implementations
- More