Archive
Browse the full archive of Computer Weekly online content - see our most recent articles listed below, or browse by year of publication.
2011 Stories
-
May 03, 2011
03May2011
Podcast
Cloud compliance: What it is and how to achieve it
Cloud compliance is an issue for anyone using cloud storage or backup services. What do you need to know about your data, and how do you ensure it is compliant when in the cloud? Continue Reading
-
May 01, 2011
01May2011
E-Zine
Wired and wireless: Can you achieve an integrated network?
This European edition of Network Evolution E-Zine discusses the myths surrounding integrated wired and wireless LANs, security considerations, and wireless and mobile technology trends the UK should be on the lookout for. Continue Reading
-
April 29, 2011
29Apr2011
News
Store dealing with dishonest employees uses internal theft prevention software
A London-based sushi chain expects to save almost £1 million this year with the help of new fraud-detection software. Continue Reading
-
April 28, 2011
28Apr2011
News
IT professionals willing to sacrifice cash for more time off
IT professionals are increasingly attracted to the prospect of a shorter working week and are prepared to sacrifice thousands of pounds to get it. Continue Reading
-
April 28, 2011
28Apr2011
Tutorial
Wireless LAN authorisation guide: Controlling users and their devices
As wireless LANs become core access technology, it is crucial to implement WLAN access control that manages both corporate and personal devices, as well as Wi-Fi embedded clients. Continue Reading
-
April 27, 2011
27Apr2011
News
Millions apply for Olympic tickets despite site crash
Around 20 million last-minute ticket applications were made for the London 2012 Olympics despite a surge in demand causing the website to crash. Continue Reading
-
April 27, 2011
27Apr2011
News
MoD spends £6.6m on mobile phones
The Ministry of Defence spent £6.6m on mobile phones and contract charges for ministers, members of the armed forces and civil servants last year. Continue Reading
-
April 27, 2011
27Apr2011
News
HSBC Insurance works with IBM to solve Solvency II
HSBC Insurance in the UK is using IBM Global Services to support its European Solvency... Continue Reading
-
April 26, 2011
26Apr2011
News
Technology boosts savings at WHSmith
Retailer WHSmith says it has delivered savings thanks to IT improvements and tight cost management. Continue Reading
-
April 26, 2011
26Apr2011
News
Global cloud market to reach $240bn by 2020
The global cloud market is set to explode in the next 10 years, growing from $40.7bn in 2011 to more than $241bn in 2020, according to Forrester Research. Continue Reading
-
April 26, 2011
26Apr2011
Tip
Implement job rotation for team motivation, productivity
Indian CXOs are increasingly experimenting with job rotation for team motivation and productivity. Find out why job rotation helps, and how M&M practices it. Continue Reading
-
April 26, 2011
26Apr2011
News
Hybrid cloud model saves university money on a data centre upgrade
Loughborough University implemented a hybrid cloud model and saved money on upgrading its data centre infrastructure, networks and collaborative applications. Continue Reading
-
April 25, 2011
25Apr2011
In Depth
Making your PC fleet green
Planning for your computer fleet to satisfy the increasing need for environmental friendliness isn't as tough as it sounds. Here are five things CIOs can do. Continue Reading
-
April 25, 2011
25Apr2011
Answer
Synchronous vs asynchronous replication: Order of events during data writes
Learn about the order of events during data writes in synchronous vs asynchronous replication. Continue Reading
-
April 24, 2011
24Apr2011
News
How Google runs its storage and more from the storage blogs
Google has posted a paper that outlines its storage architecture, and that’s the choicest morsel in a month when the usual blogosphere protagonists have gone easy on each other. Continue Reading
-
April 21, 2011
21Apr2011
News
National Archives scoops Queen’s Award for Enterprise
The National Archives has been awarded the Queen's Award for Enterprise - the first public sector body to receive the gong in more than ten years. Continue Reading
-
April 21, 2011
21Apr2011
Tip
5 non-monetary rewards for your IT teams
Non-monetary rewards are an effective way to motivate employees. Learn five non-monetary rewards that CIOs can make use of to motivate their teams. Continue Reading
-
April 21, 2011
21Apr2011
News
Volkswagen creates common data services in pursuit of car industry pole position
Volkswagen’s common data services approach is crucial to the IT-enabled transformation of its five businesses. Continue Reading
-
April 21, 2011
21Apr2011
Tip
Data champion: Decoding role and responsibilities
Data champion is the new buzz word. As companies invest in BI and DW, a data champion is becoming important to ensure returns on these investments. Continue Reading
-
April 20, 2011
20Apr2011
News
UK IT staff increasingly seeking work abroad
The majority of UK IT professionals would consider migrating abroad to pursue higher quality work and salaries, a recruitment firm warns. Continue Reading
-
April 20, 2011
20Apr2011
News
Infosec 2011: APT attacks a real threat to business, says security panel
Advanced Persistent Threats are a reality and cannot be dismissed as a myth or media hype, according to a panel of experts debating the top threats at Infosecurity Europe 2011 in London. Continue Reading
-
April 20, 2011
20Apr2011
News
Infosec 2011: Policy is only way to deal with social media, say security professionals
The best and only way organisations can deal with the use of social media is through robust policies and user aware campaigns Continue Reading
-
April 20, 2011
20Apr2011
News
Shutting down a botnet, US Government disables Coreflood
Coreflood, a botnet almost ten years old, has been taken down by the FBI and US Department of Justice by obtaining permission to hijack the command and control servers and send a 'stop' command to infected PCs. Is this overstepping the privacy line? Continue Reading
-
April 20, 2011
20Apr2011
In Depth
SMB storage: What can you outsource to cloud storage and backup services?
SMB storage: Cloud storage and backup offer many cost-saving advantages to SMBs, but drawbacks too, so what exactly can you outsource to the cloud right now? Continue Reading
-
April 19, 2011
19Apr2011
News
Infosec 2011: Cisco announces new tools for securing the mobile enterprise
Cisco has introduced new security products to its Borderless Networks portfolio to help IT departments manage mobile devices, changing workforce habits and the impact of video on the network. Continue Reading
-
April 19, 2011
19Apr2011
Tip
Secure SDLC best practices
While focus on technicalities is a given during the SDLC, this tip explains how to secure the SDLC, from the analysis phase right through to deployment. Continue Reading
-
April 18, 2011
18Apr2011
News
Growth of NFC to drive overhaul of Chip and PIN equipment
The growth of near-field communication (NFC) in the UK will drive the replacement of retailers' Chip and PIN point of sale (PoS) equipment, according to an analyst. Continue Reading
-
April 16, 2011
16Apr2011
In Depth
Case study: Bell Canada rings up big revenues with Infor CRM
Bell Mobility, a division of Bell Canada Enterprises, implemented an Infor customer relationship management solution, Interaction Advisor, and worked with Infor to transform Bell Mobility’s two call centers - with a combined 550 customer service ... Continue Reading
-
April 15, 2011
15Apr2011
Blog Post
The start of an era
The article below is the editorial leader column from the last ever printed issue of Computer Weekly magazine. If you like nostalgia, you may want to treasure the magazine you hold in your hands ... Continue Reading
-
April 15, 2011
15Apr2011
News
Computer Weekly marks the end of an era as a new one begins
The first issue of Computer Weekly magazine in 1966 marked the start of an era in the UK IT industry - the first ever weekly technology publication. This is the story of how it all began. Continue Reading
-
April 14, 2011
14Apr2011
News
Declining PC market threatened by tablet popularity
The PC market has continued to decline after delays in refresh cycles and increased purchases of tablet devices, according to research. Continue Reading
-
April 14, 2011
14Apr2011
News
Forrester Research: Marketing is an IT spending blackhole
Analyst Forrester Research is holding a roundtable meeting to bring together chief marketing officers and chief information officers, in a bid to bridge the divide between IT and marketing departments. Continue Reading
-
April 14, 2011
14Apr2011
In Depth
MS-CLIS at IIIT Allahabad: Evaluation of the post grad course in infosec
With numerous infosec certs to choose from, we look at how the master’s in information security and cyber law (MS-CLIS) at IIIT Allahabad is different Continue Reading
-
April 13, 2011
13Apr2011
News
Building an Olympics network
Preparation is clearly the key to Olympic success, as players on 27 July 2012 will see years of finely honed practice condensed into one gruelling fortnight Continue Reading
-
April 13, 2011
13Apr2011
News
Infosec 2011: Charity sector shows the way to balance budget and security
Tackling security project by project is an effective way of securing data on a limited budget, says Matt Holland, head of information security at children's charity NSPCC. Continue Reading
-
April 13, 2011
13Apr2011
News
Microsoft launches UK mapping service to rival Google Streetview
Starting in London, Microsoft has begun taking photographs of the UK for its street-level mapping service, Streetside. Continue Reading
-
April 13, 2011
13Apr2011
News
Developer renews court battle to claim 50% of Facebook
A New York developer has renewed his court battle in claiming at least a 50% share of Facebook almost a year after his first attempt stalled. Continue Reading
-
April 13, 2011
13Apr2011
In Depth
Clustered NAS vs traditional NAS solutions
Clustered NAS offers file visibility across petabytes of storage and is hugely scalable with the ability to increase throughput, IOPS or disk space by adding extra nodes. Continue Reading
-
April 12, 2011
12Apr2011
News
Tesco uses customer data to stride ahead of competition
Fresh insights from customer data allowed Tesco to meet consumers' needs faster and more accurately, growing Tesco's market capitalisation 10-fold in eight years while its chief competitors' market value fell, the retailer's former CEO Sir Terry ... Continue Reading
-
April 12, 2011
12Apr2011
News
ICO slams Cabinet Office and MoD for slow FOI responses
The Information Commissioner's Office (ICO) has criticised the Cabinet Office and the Ministry of Defence for failing to reduce the time they take to respond to Freedom of Information (FOI) requests. Continue Reading
-
April 12, 2011
12Apr2011
News
Infosec 2011: Compliance the biggest security juggernaut, says security expert
The biggest security compliance juggernaut for businesses is concentrating on achieving compliance rather than changing they way they work, says Des Ward, president of the Cloud Security Alliance UK and Ireland chapter. Continue Reading
-
April 12, 2011
12Apr2011
Tip
Tier 3 data center design: The cooling checklist
Our expert gives insights into data center cooling system considerations that will ensure adherence to tier 3 data center standards. Continue Reading
-
April 12, 2011
12Apr2011
News
Teradata data warehouse joins SSD technology to HDDs, virtual storage
At Teradata Universe in Barcelona, the company announced the Active EDW 6680, a data warehouse system that mixes SSD technology, hard disks and storage virtualization software. Continue Reading
-
April 11, 2011
11Apr2011
News
Intel unveils Oak Trail Atom processor chipset for tablet market
Intel is introducing a next generation Atom processors, previously codenamed "Oak Trail", aimed at the tablet market. Continue Reading
-
April 11, 2011
11Apr2011
News
Manageability issues impede adoption of virtualisation
Virtual infrastructure management challenges are hindering the adoption of virtualisation within businesses, according to research. Continue Reading
-
April 11, 2011
11Apr2011
News
Copyright holders formulate ISP piracy website blocking scheme
Copyright holders are urging UK internet service providers to block illegal file-sharing sites. Continue Reading
-
April 11, 2011
11Apr2011
In Depth
Object-based storage promises scalability and flexibility for static, unstructured data needs
Object storage gets rid of traditional file system hierarchies and puts in place a flat access structure that provides a good basis for hugely scalable unstructured data access. Continue Reading
-
April 11, 2011
11Apr2011
Tip
Identity and access management (IAM) program implementation guidelines
The first part of this identity and access management (IAM) program guide details how to optimally structure the implementation’s foundation. Continue Reading
-
April 08, 2011
08Apr2011
News
CIOs need IT governance rethink
CIOs will need to rethink their IT governance policies as employees turn to social media tools to collaborate at work, according to research from analyst group Gartner. Continue Reading
-
April 08, 2011
08Apr2011
News
Motivated, information security policye-aware employees are the best defence
Keeping employees motivated is the best way to ensure you have satisfied customers, and if it is an employee's responsibility to keep the customers happy,...
Continue Reading -
April 08, 2011
08Apr2011
News
Admins face huge April Patch Tuesday security update from Microsoft
Microsoft has announced that it will release 17 security bulletins to address 64 vulnerabilities Continue Reading
-
April 08, 2011
08Apr2011
News
Facebook has launched a project to ‘open source’ its datacentre
In the spirit of open source software, Facebook says it wants to share the innovations in one of its datacentres with the rest of the industry in its Continue Reading
-
April 08, 2011
08Apr2011
Photo Story
Commercial peak
-
April 08, 2011
08Apr2011
Photo Story
Award-winning journalism
-
April 08, 2011
08Apr2011
Photo Story
Investigative journalism
-
April 08, 2011
08Apr2011
Photo Story
Keeping government IT in check
-
April 08, 2011
08Apr2011
Photo Story
Changing acroynms and IT terminology
-
April 08, 2011
08Apr2011
Photo Story
Shared services and remote access in 1966
-
April 08, 2011
08Apr2011
Photo Story
From mainframes to PCs and beyond
-
April 08, 2011
08Apr2011
Photo Story
Voice of the CIO
-
April 08, 2011
08Apr2011
Photo Story
Still selling solutions
-
April 08, 2011
08Apr2011
Photo Story
Supporting users
-
April 08, 2011
08Apr2011
Photo Story
The Y2K bug
-
April 08, 2011
08Apr2011
Photo Story
Recruitment and job ads
-
April 08, 2011
08Apr2011
Photo Story
Training and skills development
-
April 08, 2011
08Apr2011
Photo Story
In 1966 England won the World Cup and Computer Weekly launched the world's first weekly IT newspaper
After 45 years in print, Computer Weekly, the award-winning title for senior IT decision-makers, is to become a 100% online publication. Here is a celebration of 45 years in print. Continue Reading
-
April 08, 2011
08Apr2011
News
After breach at RSA, two-factor authentication options abound
Companies specialising in two-factor authentication hope to boost business following the breach of RSA's SecurID, and many plan to capitalise with new products at Infosecurity Europe. Continue Reading
-
April 07, 2011
07Apr2011
News
Sophisticated cyber thieves behind Epsilon data breach, says parent company
US marketing firm Epsilon was hit by one of the biggest data thefts to date, the work of highly sophisticated cyber thieves, says parent company Alliance... Continue Reading
-
April 07, 2011
07Apr2011
News
Dell set to unveil cloud plans
Dell is due to make a global announcement later today, where it is expected to unveil its plans for cloud computing. Continue Reading
-
April 07, 2011
07Apr2011
News
Copper-based 10 Gigabit Ethernet is arriving, but not on 10GBase-T
Forget the predictions that copper-based 10 Gigabit Ethernet would run on 10Gbase-T. Copper-based Ethernet is here, but SFP Direct Attach maybe the cabling of choice. Continue Reading
-
April 06, 2011
06Apr2011
News
Indian BI technology market to grow by 16% in 2011: Gartner
The Indian BI technology market in 2011 will see a 16% growth over 2010. Read more about the latest BI technology market trends in this Gartner forecast. Continue Reading
-
April 06, 2011
06Apr2011
Tip
Botnet detection through DNS behavior and clustering analysis
Botnets are fast emerging as one of the most serious threats to Internet security today. This expert tip looks at how botnets can be detected analyzing their unique fast flux characteristics. Continue Reading
-
April 06, 2011
06Apr2011
Answer
How to set up a Dell EqualLogic configuration in a VMware environment
Find out what the key steps are for setting up a Dell EqualLogic configuration for an iSCSI SAN in a VMware virtual server environment. Continue Reading
-
April 05, 2011
05Apr2011
News
Sex offence technology helps business avoid legal liability
Technology that cross references image hash codes against child sexual abuse material will help businesses avoid legal liability. Continue Reading
-
April 05, 2011
05Apr2011
News
City of York falls foul of data protection act following printer mix-up
The City of York Council has fallen foul of the Data Protection Act after having accidentally disclosed personal data following a printer mix-up. Continue Reading
-
April 05, 2011
05Apr2011
News
Immigration cap will not stem flow of IT workers to UK on ICT visas
The immigration cap, which comes into force on 6 April 2011, will have little effect on the number of economic migrants entering the UK because businesses can continue to use the uncapped Intra Company Transfer (ICT) scheme to access skills, ... Continue Reading
-
April 05, 2011
05Apr2011
News
PizzaExpress parent turns to customer data analytics to target diners
The Gondola Group of restaurants, which includes PizzaExpress, Ask, Zizzi, Byron and Kettner's, has gone digital with targeted promotions to casual diners over the past 18 months. Continue Reading
-
April 04, 2011
04Apr2011
News
RSA discloses phishing-attack data breach details
RSA, the security division of EMC, has revealed the firm's data breach in mid March was the result of a spear phishing attack. The spear phishing attack exploited an Adobe Flash vulnerability that was unpatched at the time. Continue Reading
-
April 04, 2011
04Apr2011
In Depth
The power of ICT and its multiplier effect
Meet Michael Hedley, National Policy Manager for the Australian Information Industry Association (AIIA). Continue Reading
-
April 04, 2011
04Apr2011
Photo Story
Someone is watching you drive...
-
April 04, 2011
04Apr2011
Photo Story
Monitoring driver behaviour
-
April 04, 2011
04Apr2011
Photo Story
Managing fleet vehicles
-
April 04, 2011
04Apr2011
Photo Story
Keeping an eye on your driver employees
-
April 04, 2011
04Apr2011
Photo Story
Your own black box
-
April 04, 2011
04Apr2011
Photo Story
And your pay-as-you-behave score is...
-
April 04, 2011
04Apr2011
Photo Story
How pay-as-you-behave technology could transform car insurance
New IT systems can help calculate unique insurance premiums based on driver behaviour Continue Reading
-
April 01, 2011
01Apr2011
News
CSC to acquire troubled NHS supplier iSoft
IT services giant CSC has agreed to acquire troubled healthcare software firm iSoft after the latter suspended shares and put itself up for sale last week. Continue Reading
-
April 01, 2011
01Apr2011
News
Community networks to be part of Devon and Somerset broadband projects
Devon and Somerset county council has issued requests for tenders worth... Continue Reading
-
April 01, 2011
01Apr2011
News
Sex discrimination rife in IT, says report
Gender discrimination against women is rife in the IT sector, a report says. Continue Reading
-
April 01, 2011
01Apr2011
News
Samsung and Visa team up for mobile NFC payments
Samsung and Visa have formed a partnership to provide mobile payments in time for the 2012 London Olympic games. Continue Reading
-
April 01, 2011
01Apr2011
News
Exclusive interview: Deputy government CIO Bill McCluggage on the new government IT strategy
Bill McCluggage, deputy government CIO, talks exclusively to Computer Weekly about the changes in the government's new IT strategy. Continue Reading
-
April 01, 2011
01Apr2011
In Depth
Secure your SCADA architecture by separating networks
Many critical national infrastructure systems include supervisory control and data acquisition (SCADA) functionality. These systems can be viewed as the set of software, computers and networks that provide remote co-ordination of controls systems ... Continue Reading
-
April 01, 2011
01Apr2011
E-Zine
Building a business case for a green data centre
New mandatory initiatives have recently come into play in the U.K., pushing the idea of “greening up” the data centre higher on every companies’ priority list. Volume 1 of the Virtual Data Centre e-zine gives an overview of how these environmental ... Continue Reading
-
April 01, 2011
01Apr2011
E-Zine
Social media mining yields customer analysis
Marketing services company Mindshare and hotel chain Marriott International are mining social media to analyse customer sentiment. Learn about the benefits of their social media analytics programmes - and the issues they and other early adopters of ... Continue Reading
-
April 01, 2011
01Apr2011
Tip
Cloud disaster recovery services vs. traditional DR: A weigh-in
Do cloud disaster recovery services’ benefits outweigh those of traditional DR? An expert weighs the viability of these disaster recovery approaches. Continue Reading
-
April 01, 2011
01Apr2011
Tip
5 data mining techniques for optimal results
Faulty data mining makes seeking of decisive information akin to finding a needle in a haystack. Here are some tips to tweak your data mining exercises. Continue Reading
-
April 01, 2011
01Apr2011
Tutorial
Master data management tools guide for managers
Master data management tools help companies to consolidate their master data, to make it available across their divisions, and to keep it accurate, updated. Continue Reading
-
March 31, 2011
31Mar2011
News
Microsoft publishes report on its Security Development Lifecycle
Microsoft has published a new report that outlines nine years of progress in developing, improving and sharing the Security Development Lifecycle (SDL) process. Continue Reading
-
March 31, 2011
31Mar2011
Blog Post
Dear Phil Pavitt, this one is for you
How often do you, as an IT leader, tell people in other parts of the business what you have achieved? For many IT folk, that sort of self-promotion doesn't always come naturally - and often that ... Continue Reading
-
March 31, 2011
31Mar2011
News
SMB IT spending seeing significant growth
Small and medium businesses (SMBs) are increasing IT budgets and recruiting more IT skills Continue Reading