Opinion: Plugging the gaps in the government's broadband strategy
Stopping the cloud taking your IT career away
Why data analytics must change
Women could fast track the alternative IT needs
Refining the language of risk
Security Zone: Cloud computing puts the spotlight on security architecture
Freedom of action: preventing paralysis from risk
Career structures for IT professionals: HR toys or levers for change?
Ten trends you cannot ignore
Which IT suppliers will win in next 18 months?
The new EU cookie rule – so, we need to get consent then?
Will a UK technology hub really rival Silicon Valley?
How to collaborate: Six lessons from BT Expedite
Beyond PCI DSS: Protecting more than just card data
Clearer visibility of product roadmaps improves IT planning
LTE: Will high speed mobile internet mean higher speed business?
Forrester: Harnessing mobile UC to transform the business
Hacking work: the businessman's Trojan
Security Zone: Mobile device management - chore or chance?
Spending Review: Prepare for the insider threat as staff are squeezed
Apps will make the smart grid worthwhile
Exploiting knowledge for project value
Time for the UK to act on cybercrime
Vote in the Computer Weekly IT Blog Awards 2010
The only way is tough – the future of data protection law
Tightening the reins – getting a grip on mobile device management
Mac vs PC: Which should I buy?
Why banks are wary of public clouds
How to avoid getting caught out by Oracle Unlimited Licence Agreements
Security Zone: Faking IT support
Make mobility standard business practice
The hidden costs of a private cloud
How the changing nature of IT sourcing will redefine CIO roles
What you need to know about the Equality Act 2010
360°IT: CIO vs CIO - the evolution of the species
IT alignment – it’s not rocket science, it just takes passion
Security Zone: An open source approach to web application security
360IT: Smart IT needs heroes
Six reasons why the NHS National Programme For IT failed
The problem with patents
Uncovering the hidden costs of fragmented data
Security think tank: Value added cloud security services
Wikileaks highlights need for better data access control
The growing security threat from mobile phone apps
Don’t just rely on technology to cut emissions, green IT is about people too
Gartner: What matters is risk-appropriate authentication
ISF: Federated identity services may be the way forward
ISACA: more complexity delivers security, but not without cost
ISSA: Strike a balance between security and co-operation
ISC2: The more complex the technology, the greater risk users will bypass it
The Corporate IT Forum: Users are human and part of the risk matrix
IT contracts: standard terms & conditions explained
Private sector IT can give cost-cutting lessons: an open letter to Francis Maude
Patent ruling re-opens door to do business in the US
Why in-sourcing ERP support makes good business sense
Byte Night: Your chance to make a difference
Security zone: Cultivating the secure mindset for systems development
Death in cyberspace: Why you should leave your passwords in your will
Confessions of an unexpected CIO
Demonstrating innovation in local government IT
Cost control is in bringing offshore contracts back in-house
Think tank: What is the ideal standpoint for security decisions?
How to fine tune your ERP system and maximise value
UK unlikely to follow German approach to wireless networks
Getting value from the CISO
Security Zone: ITIL to integrate security management processes
Rethinking contracting frameworks for effective multi-sourcing
What the budget means for the IT sector
Delivering more for less will force government to simplify processes
IT Headaches for Continental and United Airlines
How to achieve ERP success: part 3 - support and development
How to stop cookies stealing your personal information
Think Tank: Are businesses ready to meet the requirements of e-discovery regulations?
Federated SOA – seven steps to success
Security Zone: An incident response function is essential for business
Review: iPhone 4 - FaceTime, iMovie, iBooks and a gyroscope
How complex event processing could help stop hooliganism at the World Cup
Private data: balancing customer privacy against the need for useful data
Opinion: What Facebook should do next
The impact of technological change on risk management
Security Zone: Setting security boundaries for de-mergers
Government spending cuts: can outsourcing save public sector IT jobs?
Microsoft Q&A: What the new government could mean for IT staff
Apply commercial nous to government IT, say IT leaders
Is the future of enterprise Wi-Fi on the edge?
Are businesses ready for the MySpace generation?
Whitehall focus on long-term IT cuts deflects focus from short-term savings
BI: How to make intelligent use of data
Software patents – what the European Patent Office ruling means
New breed of project managers drive the recovery
Lowering IT costs through hosting
Opinion: Is IT a utility function?
Election to bring more flux for banking
A tale of two universes - how the Milky Way provides more milk for some than others
Security zone: Application security spans IT and information security
Collaboration is key to ensuring digital data security
Ensuring online traffic doesn’t hit a dead end
What’s in a name? Apple fights for rights to iPad name
Living with Windows 7, six months on