Election 2010: Rural broadband needs urgent attention after 50p tax is axed
Opinion: 50p tax goes – what's next for UK's lagging broadband?
Opinion: BCS CEO's arguments miss the bigger picture
Opinion: Tif sets out IT wish list for new government
Opinion: How government CIOs can buy more from SMEs
BCS CEO David Clarke: Why call for EGM is misguided
Opinion: The impact of Google's trademark victory
Legislation to block websites – a move too far?
A security expert’s checklist for deploying software as a service
Security Zone: Ensuring security in offshoring
Google vs Louis Vuitton: When is a trade mark not a trade mark?
Opinion: Ensuring a happy marriage between IT and the environment
Opinion: Why IT professionals' world view is wrong
Opinion: IT industry prepares manifesto to make Britain great again
Making the mobile internet accessible for all
How SMEs can use social networking to get their message across
How can organisations guard against phishing scams?
Moving beyond the cost benefits of outsourcing
Security Zone: Enterprise architecture is too often a missed opportunity for security
Opinion: Is BCS priority the business or its members?
Finding space and time for continuous data protection
CIO Interview: Esat Sezer of Coca-Cola Enterprises
Balancing efficiency with resilience
Security Zone: a recipe for project success
Take control with software asset management
Try before you BI: budgeting and reducing costs on business intelligence
The Google Nexus One/HTC Desire versus the IT department
Why bank data flow to US came to a SWIFT halt
Opinion: Virgins to the banking sector
Q&A with Microsoft's head of environmental sustainability
Think Tank: What should corporate IT managers do to ensure data protection?
Outsourcing: a level playing field?
Security Zone: Oracle follows Sun in search of hardware
Should suppliers and customers change their ways after BSkyB vs EDS?
Portable data security - ebb and flow
How will the Carbon Reduction Committment affect IT outsourcing?
Information overload: lessons from the Christmas Day terror attack
Social media needs a social security strategy
E-mail management: keeping the business bloodlines flowing
Security Zone: How to complete a security questionnaire
How to achieve ERP success: part 2 - the software
Preparing your IT security for the mobile information boom
Data encryption is simple safeguard against data breaches
Do we need a single cyber-security organisation to secure the internet?
Opinion: IT systems management on a small business budget
Security Zone: why we should be more concerned about password authentication
Extract - Grown-Up Digital: Net Geners in collaboration
Telcos must transform their businesses to stop slide in profits
What is the best thing Santa could bring the IT security manager?
VDU eyecare – clearing the confusion
The beginning of the end for online tracking?
A sorry tale of a CEO and his laptop
Save blushes and blame with firewall policy analysis
PCI DSS: the end is more important than the means
Smart meters demand smart deployment
Review: HTC HD2 - Is it time to close the Windows?
Review: BlackBerry Storm 2 - More like a shower
Cross border VAT and the slow death of offshore financial services outsourcing
Integrating your Green IT strategy into business objectives
HBOS power failure highlights importance of business continuity planning
Careers clinic: The biggest mistake in job interviews
Five reasons to move to the Middle East
Security Zone: can you prevent scraping or data harvesting?
How to save money and reduce environmental impact through efficient printing
Google Chrome OS: A threat to Windows 7?
Careers clinic: marketing your personal product
Revised Google Book search deal 'a massive disappointment'
Knowledge transfer strategies to beat skills shortages
Using mobility in compliance and business performance
Gartner: Users need to use multiple PCs
A wise Oracle follows the Sun
Guardian jobs database attack demonstrates difficulties of database security
Remedies Directive: public sector IT suppliers beware
Vote in the Computer Weekly IT Blog Awards 2009
Online presence: an essential strategy for the public sector
Online back-up or cloud recovery?
Patches encourage lax security processes
Challenges and benefits of physical IT security
IT security crisis management: looking beyond the magic bullet
Think small to avoid public sector IT disasters
Finance's lack of cloud commitment is a surprise
What happens when cloud data is lost?
How to upgrade storage on the cheap
Microsoft Security Essentials raises baseline security in Windows 7
Why processes, not technology, will drive business improvement
Security Zone: Secure by design?
Desktop OS upgrade options greater than ever
Ten golden rules to avoid delays in ERP projects
Passwords and encryption strengthen printer security
Security managers must keep pace with weak points in connected devices
Security Zone: How to apply master data management
Risk assessment enables targeted security management
Will Cloud Computing lead to several own goals?
Responsibility for security of end-point devices must be shared across the business
Interview: How Firefox won its market share
Merger mania, data disaster?
Controls and compliance – maximising value and reducing costs
Security Zone: Checklist for winning IT security funding
Can social media save local government?
Next generation IT: understanding user context