• Lost in Translation - a handbook for information systems in the 21st century
  • IT enables SME business
  • What came first: the technology or the process?
  • Managing IT in a downturn: beyond cost cutting
  • The IT Professional's Survival Guide
  • Microsoft licensing programme promises bigger software discounts
  • Real time threats demand real time security
  • How do we tackle political cyber-crime?
  • Five tips on contract negotiations
  • Tackling Computer Vision Syndrome
  • How to prepare for job interviews
  • Talented people: how to find them, how to keep them
  • Data loss: how to minimise risk, liability and reputational damage
  • When mobile phones become mainstream clients
  • Will ID cards ever be in demand?
  • Expert opinion: e-tailers should copy online fraudsters' tactics
  • How big a problem is state-sponsored hacking?
  • Why the ultimate customer experience need not cost the earth
  • The danger within
  • The benefit of thin client computing
  • IT-enabled change: the knowledge
  • Take a structured IT approach for successful mergers and acquisitions
  • Another data loss, another lax response
  • Focus on the quality of software projects
  • Network security: get a complete view of your network
  • DPM's diary: 19 August 2008
  • Older generation could scupper £4.4bn National Identity Scheme
  • Will cheap broadband drive video conferencing?
  • IT outsourcing in a global economic downturn
  • Internet crime? Global justice?
  • Top 10 information security tips for C-level executives
  • ERP to grow in utilities, says Deloitte
  • Interest in hosted services will increase
  • Use summer slowdown to build the brand of me
  • Onus is on mobile operators to maintain security
  • Free cost per transaction calculator
  • Technology in tough times: preparing for economic downturn
  • Plain speaking on outsourcing
  • Hijacking blog strikes
  • Financial markets: How low can 'low latency' go?
  • Modern leadership techniques hinder crisis management
  • Changes to Computer Misuse Act will turn security professionals into criminals
  • Is it farewell to legacy systems?
  • Maximising the value of IT to business
  • How to minimise risk of customer data loss and fraud
  • Technology to weather the storm
  • When soft becomes hard for IT experts
  • tom rogerson
  • The credit crunch: who dares, wins
  • Macs and Malware
  • Improving the relationship between development teams and their customers
  • Plug your zero-day vulnerability gap
  • IT project management blogs: ComputerWeekly.com IT Blog Awards 08
  • IT lifestyle blogs: ComputerWeekly.com IT Blog Awards 08
  • IT security blogs: ComputerWeekly.com IT Blog Awards 08
  • CIO and IT director blogs: ComputerWeekly.com IT Blog Awards 08
  • Programming and development blogs: ComputerWeekly.com IT Blog Awards 08
  • Company blogs: ComputerWeekly.com IT Blog Awards 08
  • Wireless and mobile blogs: ComputerWeekly.com IT Blog Awards 08
  • Web 2.0 and business blogs: ComputerWeekly.com IT Blog Awards 08
  • Public sector IT blogs: ComputerWeekly.com IT Blog Awards 08
  • What has Bill Gates ever done for us? Readers have their say
  • Computer Weekly: beating the IT drum
  • Banks should collaborate with customers to fight fraud
  • BCS council seeks nominees
  • Bill Gates: looking back on the road ahead
  • Computer science departments must reinvent themselves to avoid a business school takeover
  • Faulty software can lead to astronomic costs
  • Everyday superheroes
  • The economics of Software Testing
  • Consultant roles demand communication skills
  • Hardware reputation and the online fraud arms race
  • Customer relationship management: happy customers = profitable customers
  • IT will be critical factor in airline survival
  • PCI: a matter of timing
  • Government services online are a real benefit
  • Legal uniformity needed to tackle data breaches
  • Blogosphere denial can hurt your business
  • Security forecast: mobile devices
  • Is data the CIO's responsibility?
  • Opinion: HP’s acquisition of EDS leaves questions unanswered
  • Web 2.0 blows a hole in business
  • Gartner: Control devices and encrypt data
  • Tif: Boundaries are blurring
  • Transforming NHS services requires flexible evolution, BCS delegates say
  • Outsourcing: cost reduction in an economic slowdown
  • NCC: It's all about layers
  • ISACA: Constantly mutating challenge
  • ISSA: Traditional controls inadequate
  • ISF: Extend the security perimeter
  • BCS: Audit and educate
  • If film directors can insure against failure, why not project managers?
  • Sustainability and the CIO
  • ComputerWeekly.com IT blog awards 08
  • IT law and governance blogs: Computer Weekly IT Blog Awards
  • Electronic information sharing is key to effective government
  • Security Zone: managing your organisation’s social network footprint
  • Infosecurity 2008 - Developing infosecurity career paths
  • Infosecurity 2008 - New defence strategy in battle against e-crime
  • Infosecurity 2008 - Complying with security regulations is not enough
  • More