• CW500: Managing the mobile workforce (part 1)
  • Forrester: Microsoft takes new approach to Windows app development
  • Cloud APIs at hand to connect to databases
  • How to manage unstructured data for business benefit
  • Aster Data founders explain unified approach to data, big and small
  • CW500 Security Club: Dealing with attacks inside networks
  • Will video conferencing find its business market in 2012?
  • Windows 8 looks to reclaim territory in the enterprise
  • Using fibre channel for storage networking
  • Departmental BI dashboarding needs enterprise view
  • How IBM researchers hope to change the world
  • Irish dairy exporter plots expansion with data matching
  • ITIL to take the pain out of change management
  • Tune Raid performance to get the most from your HDDs
  • BI dashboards must dish up killer KPIs
  • Can tablets handle business?
  • How to make your business Flame-proof
  • Sandvik tightens supply chain with single supplier e-procurement portal
  • Is cloud data storage right for your organisation?
  • All-flash array products take aim at virtualisation I/O demands
  • Procurement function to squeeze value from supply chain analytics
  • Gathering retail intelligence
  • Static code analysis tools gain traction in India as SDL models mature
  • Tablets: The best tools for the job
  • CW500: The boardroom view of IT
  • HDFC Bank’s ISO 27004 compliant security metrics a boost toward GRC
  • Tablets in the enterprise: Challenges of office mobility
  • Setting up a botnet is easier than you think
  • Virtual server backup software survey
  • Data visualisation success hinges on solid storytelling skills
  • SMEs: Do business the smart way
  • Build consensus on MDM programme goals to boost chances of success
  • Business focus vital for effective master data management strategy
  • Business focus vital for effective master data management strategy
  • Outsourcing IT services: goals and negotiations
  • If the popularity of ICT is on the rise, why are we scrapping the curriculum?
  • The implications for storage of EU data protection regulation
  • BI dashboards help South Leicestershire College track performance
  • SMEs: Optimising IT assets
  • Big Data: Utilities rise to the smart meter challenge
  • Post A-Level IT apprenticeship options: What if you didn’t get the grades you wanted?
  • BYOD: Can enterprise mitigate the risks?
  • Big data analytics and the end of sampling as we know it
  • Mobile BI sparks recast of business intelligence
  • Data's role in customer engagement
  • Weighing up the options for software testing
  • BI, advanced analytics offer edge for wind turbine, blinds makers
  • Goodbye Wi-Fi, hello WiGig
  • Hybrid cloud storage product comparison
  • Best of VMworld Europe 2012 Awards: Nomination form
  • IRM solution helps training provider secure critical assets
  • Teradata CTO: 'Big data' technology starting to hit the mainstream
  • How to make sense of the big data universe
  • The future of electronic healthcare records
  • Interview: Angela Tucci, chief strategy officer, Symantec
  • Taking the tablets to boost healthcare efficiency
  • Key technologies driving healthcare
  • Enterprise SAN survey: A feature-rich market with some key differences
  • Cloud archive: The most mature of the cloud storage services
  • Compliance, risk and the coming EU data protection framework: a CISO's perspective
  • Predictive sports analytics put in play for Wimbledon, Formula One
  • Best practice in outsourcing security
  • Men and women disagree on reasons why IT is less attractive to women
  • What is driving desktop virtualisation?
  • VMware disaster recovery using VMware onboard features
  • Using IT to capitalise on austerity
  • Data virtualisation on rise as ETL alternative for data integration
  • GPU Computing in High-Performance Computing: A Status Check
  • High-performance computing drives high-performance F1 cars to success
  • Virtual solution to consumerisation
  • Network security assessments: India Inc. is going beyond routine
  • Royal Holloway 2012: A framework for preventing cross-site scripting
  • Royal Holloway 2012: Designing a secure contactless payment system
  • Royal Holloway 2012: An incident response process for armoured malware
  • Options in small-business storage for server virtualisation
  • Royal Holloway 2012: Risks of multi-tenancy cloud computing
  • Royal Holloway 2012: An analysis of cloud security certifications
  • Royal Holloway 2012: PCI compliance, cloud computing are a costly pair
  • HTML5: The end of native apps?
  • How technology is changing BPO
  • Forrester: Desktop virtualisation demands detailed request for proposals
  • Forrester: Derive maximum value from storage
  • Mandatory carbon reporting: Indirect emissions guidelines for IT managers
  • Storage capacity planning tools: Why virtual machines change everything
  • 'Big data' MDM processes key to finding business value in new info
  • VMware data protection: An overview of how it works
  • iSCSI security: Networking and security options available
  • Could G-Cloud become the pride of public sector IT?
  • Automate testing for agile quality
  • HDFC Bank’s BS 25999 certification journey: An exploration
  • Delivering value from desktop virtualisation
  • MDM technology still affords chance to make poor software choices
  • 10 GbE: iSCSI bandwidth increase improves protocol’s position against FC
  • How transforming a datacentre can transform your business
  • How will storage infrastructure change with VDI deployments?
  • VMware backup and the VMware snapshot
  • CEH certification gains credence in IT security domain
  • What IT leaders say about big data
  • HyperCITY’s retail store management system: Profit with promotions
  • Server SSD guide to form factors and implementations
  • More