Top skills for IT managers - Part 1: Establishing a business mindset
How technology can make or break a carve-out
How tablets are transforming how SAP runs SAP
Interview: Askar Sheibani, CEO of Comtek - People need to change their ways on e-waste
Getting to grips with software licencing
10 steps to get Internet Explorer 9 going
High touch is just as important as high tech
Check your software licence agreement for these common flaws
Guide for employers on the abolition of the default retirement age (part 1)
Guide for employers on the abolition of the default retirement age (part 2)
Security zone: Mobile malware is already costing you money
Prepare for the mobile wallet
New assurance standard required for cloud confidence
Lessons from the NAO's report on government IT
Are you a natural risk taker? Take our free personality test to find out
Rising values must drive change on software patentability issue
Software engineering, but not as we know it
Security sceptics should 'just say yes'
The business impact of TMMi
ECJ trade mark ruling lets eBay off the hook
Increase in IT jobs continues into 2011
Opinion: Key role for IT in M&A success
Is it time for IT professionals to return to the City?
Review: WikiLeaks - Inside Julian Assange's war on secrecy
IT governance and mobile technology
How can we find the new recruits that IT needs?
Global sourcing trends in 2011
Justifying your cloud investment: high-performance computing
Software as a service can breed dependency so choose suppliers with care
IT skills require industry engagement
Security Zone: DLP – Did we miss the point?
Cloud predictions for 2011: Gains from early experiences come alive
Think Tank: What are the security implications of putting a smart meter in every UK home?
Security Zone: The ISO/IEC 38500 IT Governance Standard
CES 2011: Security and mobile working
IT leads the charge on project management
Innovation out of recession: what’s ahead in 2011
The seven most common project management mistakes CIOs make
Don’t let techno-babble cloud your judgement
Why FTTC isn’t enough and how the UK might do more
Fibre rates – time to repeal the modern equivalent of the window tax
Saving money through software asset management
Government broadband strategy will fail unless fibre rates are challenged
Security Zone: More effort needed to manage third party connections
The legal considerations of cloud computing
CW Security Think Tank: How to prevent security breaches from personal devices in the workplace
Youngsters driving the cloud to tipping point, says Rangaswami
Opinion: Plugging the gaps in the government's broadband strategy
Stopping the cloud taking your IT career away
Why data analytics must change
Women could fast track the alternative IT needs
Refining the language of risk
Security Zone: Cloud computing puts the spotlight on security architecture
Which IT suppliers will win in next 18 months?
Ten trends you cannot ignore
Freedom of action: preventing paralysis from risk
Career structures for IT professionals: HR toys or levers for change?
The new EU cookie rule – so, we need to get consent then?
Will a UK technology hub really rival Silicon Valley?
How to collaborate: Six lessons from BT Expedite
Beyond PCI DSS: Protecting more than just card data
Clearer visibility of product roadmaps improves IT planning
LTE: Will high speed mobile internet mean higher speed business?
Forrester: Harnessing mobile UC to transform the business
Hacking work: the businessman's Trojan
Security Zone: Mobile device management - chore or chance?
Spending Review: Prepare for the insider threat as staff are squeezed
Apps will make the smart grid worthwhile
Exploiting knowledge for project value
Time for the UK to act on cybercrime
Vote in the Computer Weekly IT Blog Awards 2010
The only way is tough – the future of data protection law
Tightening the reins – getting a grip on mobile device management
Mac vs PC: Which should I buy?
Why banks are wary of public clouds
How to avoid getting caught out by Oracle Unlimited Licence Agreements
Security Zone: Faking IT support
Make mobility standard business practice
The hidden costs of a private cloud
How the changing nature of IT sourcing will redefine CIO roles
What you need to know about the Equality Act 2010
IT alignment – it’s not rocket science, it just takes passion
360°IT: CIO vs CIO - the evolution of the species
Security Zone: An open source approach to web application security
360IT: Smart IT needs heroes
Six reasons why the NHS National Programme For IT failed
The problem with patents
Uncovering the hidden costs of fragmented data
Security think tank: Value added cloud security services
Wikileaks highlights need for better data access control
The growing security threat from mobile phone apps
Don’t just rely on technology to cut emissions, green IT is about people too
Gartner: What matters is risk-appropriate authentication
ISF: Federated identity services may be the way forward
ISACA: more complexity delivers security, but not without cost
ISSA: Strike a balance between security and co-operation
ISC2: The more complex the technology, the greater risk users will bypass it
The Corporate IT Forum: Users are human and part of the risk matrix
IT contracts: standard terms & conditions explained