Archive
Browse the full archive of Computer Weekly online content - see our most recent articles listed below, or browse by year of publication.
2012 Stories
-
May 04, 2012
04May2012
Photo Story
Samsung Galaxy SIII - Screen
-
May 04, 2012
04May2012
Photo Story
Samsung Galaxy SIII storage and memory
-
May 04, 2012
04May2012
Photo Story
Samsung Galaxy SIII camera
-
May 04, 2012
04May2012
Photo Story
Samsung Galaxy SIII connectivity
-
May 04, 2012
04May2012
Photo Story
Samsung Galaxy SIII - The most powerful phone on the market?
Samsung have unveiled the Galaxy SIII Android 4.0 powered smartphone to take on the likes of the HTC One X and the Apple iPhone 4S. Continue Reading
-
May 03, 2012
03May2012
News
Microsoft to fix 23 vulnerabilities in May 2012 Patch Tuesday
Microsoft said it plans to address flaws in Windows, Office, Silverlight and the .NET Framework. Continue Reading
-
May 03, 2012
03May2012
News
SOCA takes its website offline in DDoS response
Just days after SOCA shut down carder sites, the agency was the victim of a DDoS attack, leading SOCA to takes its website offline. Continue Reading
-
May 03, 2012
03May2012
Photo Story
11 IT security audit tools you can’t afford to skip
-
May 03, 2012
03May2012
Photo Story
4. Metasploit
-
May 03, 2012
03May2012
Photo Story
7. Social Engineering toolkit
-
May 03, 2012
03May2012
Photo Story
6. Nessus
-
May 03, 2012
03May2012
Photo Story
11. Password cracking tools
-
May 03, 2012
03May2012
Photo Story
11 security audit essentials
IT security audit tools automate the IT security audit process, making it more efficient and effective. Here are 11 must-have IT security audit tools. Continue Reading
-
May 03, 2012
03May2012
Photo Story
3. NMAP
-
May 03, 2012
03May2012
Photo Story
1. Maltego
-
May 03, 2012
03May2012
Photo Story
8. BeEF
-
May 03, 2012
03May2012
Photo Story
2. FOCA
-
May 03, 2012
03May2012
Photo Story
5. Burp Suite
-
May 03, 2012
03May2012
Photo Story
9. Nagios
-
May 03, 2012
03May2012
Photo Story
10. W3af - Web application attack and audit framework
-
May 03, 2012
03May2012
News
MasterCard certifies raft of NFC mobiles
MasterCard has certified HTC, Intel, LG, Nokia, RIM, Samsung and Sony mobiles to use its near field communications (NFC) payment system Continue Reading
-
May 03, 2012
03May2012
Opinion
Why the public sector is turning to multi-sourcing
Sarah Burnett explains why the public sector is moving from single sourcing to multi-sourcing, in an age of austerity. Continue Reading
-
May 03, 2012
03May2012
News
What UK citizens think about digital government
Two-thirds of UK citizens already use the internet to interact with government, according to Accenture research. Continue Reading
-
May 03, 2012
03May2012
News
European copyright ruling good for IT innovation, say lawyers
The top European court's ruling on copyright is good news for innovation, say lawyers Continue Reading
-
May 03, 2012
03May2012
Photo Story
4G from Covent Garden to Oxford Street
-
May 03, 2012
03May2012
Photo Story
Is 4G good for businesses?
-
May 03, 2012
03May2012
Photo Story
Samsung 4G dongle
-
May 03, 2012
03May2012
Photo Story
Logging into the O2 4G London trial
-
May 03, 2012
03May2012
Photo Story
Upload 776 Mbytes in the time it takes to down a pint
-
May 03, 2012
03May2012
Photo Story
4G: The final destination
-
May 03, 2012
03May2012
Photo Story
Varying bandwidth depending on proximity to hotspots
-
May 03, 2012
03May2012
Photo Story
A 4G tour in London
Trefor Davies, chief technology officer at Timico, is on O2's 4G trial in London. How fast is 4G really? Continue Reading
-
May 02, 2012
02May2012
News
US to legislate to protect Facebook passwords from employers
The US is planning legislation that will protect Facebook passwords from prying employers Continue Reading
-
May 02, 2012
02May2012
News
How Micro-Electro-Mechanical systems are taking over mobile devices
In this report extract Juniper Research looks at the growing use of MEMS (micro-electro-mechanical systems) in mobile devices, tables, laptops and notebooks. Continue Reading
-
May 02, 2012
02May2012
News
Briefing: Handheld PCs, smart phones and mobile payments.KPMG
The latest trends, market research and analysis, on handheld PCs, smartphones, and the mobile payment market from KPMG. Continue Reading
-
May 02, 2012
02May2012
News
Supercomputers: prestige objects or crucial tools for science and industry ?
Professor Hans Werner Meuer, co-founder of the Top500 supercomputer list, presents a critical assessment of high performance computing technology and applications. Continue Reading
-
May 02, 2012
02May2012
News
Five trends that will affect your cloud strategy
Businesses need to keep a close eye on the evolution of cloud based services to avoid wasting money and missing out on business opportunities. Continue Reading
-
May 02, 2012
02May2012
News
CW Special report on Capita
Packed with graphs and diagrams, the report is essential reading for any organisation working with, or thinking of working with Capita. Continue Reading
-
May 02, 2012
02May2012
News
Unlocking growth potential in emerging markets
Emerging markets offer huge potential for technology companies to expand. This report from Grant Thornton assess the opportunities in a range of emerging markets. Continue Reading
-
May 01, 2012
01May2012
News
From the Editor: Big data arrives, but plagued by governance challenges and skills shortage
Big data offers big opportunities, but governance challenges and skills shortages could pose big problems. Continue Reading
-
May 01, 2012
01May2012
News
How global recruitment company runs IT with one in-house worker
Recruitment services company Alexander Mann Solutions is harnessing cloud computing and expanding nearshore IT services to support a one-man internal IT department. Continue Reading
-
May 01, 2012
01May2012
E-Zine
NAC technology evolves in a BYOD policy world
In this month's IT in Europe e-zine, we try to give a helping hand with articles examining the strategies and technologies that will help meet users' bring-your-own-device (BYOD) demands and maintain the right balance between flexibility and ... Continue Reading
-
May 01, 2012
01May2012
News
G-Cloud cost £4.93m to set up, says Maude
The government’s G-Cloud programme and CloudStore cost £4.93m to set up, Cabinet Office minister Francis Maude said in response to a parliamentary question. Continue Reading
-
May 01, 2012
01May2012
News
Open Data Center Alliance focuses on big data collaboration
The Open Data Center Alliance, a group of 12 major IT users, is collaborating with industry on big data architectures Continue Reading
-
April 30, 2012
30Apr2012
Photo Story
Hello Computer Weekly
-
April 30, 2012
30Apr2012
Photo Story
Bug caught
-
April 30, 2012
30Apr2012
Photo Story
Robot with a message
-
April 30, 2012
30Apr2012
Photo Story
On the bus
-
April 30, 2012
30Apr2012
Photo Story
InfoSecurity Europe: Odd Bugs
A selection of photos showing how far exhibitors will go to get people to their stands at InfoSecurity Europe 2012... Continue Reading
-
April 30, 2012
30Apr2012
Photo Story
Ready for action
-
April 30, 2012
30Apr2012
News
Half of UK networks vulnerable to APTs
Many UK corporate networks are vulnerable to advanced persistent threats (APTs), a survey has revealed. Continue Reading
-
April 30, 2012
30Apr2012
News
Government launches MyCSP mutual project
The government has launched the first of a planned series of mutuals which take public services and split the ownership between government, staff and private sector. Continue Reading
-
April 30, 2012
30Apr2012
News
Swift builds underground datacentre to keep bank transactions in Europe
Swift is building an underground datacentre to make it possible to fully process European bank transactions in Europe Continue Reading
-
April 30, 2012
30Apr2012
News
CIO interview: David Bulman, chief information officer, Virgin Atlantic
Six months after joining Virgin Atlantic as CIO, David Bulman is leading a transformation at the airline with mobile technology at its heart. Continue Reading
-
April 27, 2012
27Apr2012
News
SOCA shuts down network of CVV sellers' carder sites
The Serious Organised Crime Agency shut down 36 CVV sellers who were selling stolen credit card and banking credentials to buyers around the world. Continue Reading
-
April 27, 2012
27Apr2012
Tip
Prepare for BCP audits with nine best practices
Business continuity plans are ineffective without proper BCP audits. Our expert has some guidelines on how to prepare for BCP audits. Continue Reading
-
April 27, 2012
27Apr2012
News
Amazon results demonstrate commitment to cloud
Amazon's AWS cloud business made $500m in sales in the first quarter of 2012, comprising 3.79% of Amazon's Q1 business Continue Reading
-
April 26, 2012
26Apr2012
In Depth
Essar’s WAN encryption strategy to secure data in motion: In focus
Indian conglomerate Essar puts WAN encryption in place using Cisco’s GET VPN to protect data flows between remote locations. A closer look. Continue Reading
-
April 26, 2012
26Apr2012
News
Infosec 2012: Unscrubbed hard drives a threat to business, says ICO
Unscrubbed hard drives on computers that are decommissioned and sold on represent a significant risk to business Continue Reading
-
April 25, 2012
25Apr2012
Photo Story
India Inc: IT OPEX vs. CAPEX in 2012-13
-
April 25, 2012
25Apr2012
Photo Story
Status of business continuity investments for 2012-13 in India
-
April 25, 2012
25Apr2012
Photo Story
Business continuity priority across sectors
-
April 25, 2012
25Apr2012
Photo Story
Status of IT applications enabling business processes
-
April 25, 2012
25Apr2012
Photo Story
Cost reduction, a priority for India Inc -- E&Y
-
April 25, 2012
25Apr2012
Photo Story
India Inc's operational IT spending analyzed
-
April 25, 2012
25Apr2012
Photo Story
Sectorwise IT budget composition of Indian enterprises
-
April 25, 2012
25Apr2012
Photo Story
Top five security technologies identified for 2012-13 - E&Y
-
April 25, 2012
25Apr2012
Photo Story
Current usage status of BI and DW across verticals in India
-
April 25, 2012
25Apr2012
Photo Story
Application software spending outlook of India Inc for 2012-13
-
April 25, 2012
25Apr2012
Photo Story
IT spend as a percentage of revenue by co size: India
-
April 25, 2012
25Apr2012
Photo Story
Business continuity is a priority for India Inc - E&Y
-
April 25, 2012
25Apr2012
Photo Story
Indian industries show high appetite for business intelligence
-
April 25, 2012
25Apr2012
Photo Story
Status of infosec technologies for 2012-13 in India
-
April 25, 2012
25Apr2012
Photo Story
Cost reduction, a priority across sectors in India
-
April 25, 2012
25Apr2012
Photo Story
What will Indian enterprises spend on in 2012-13?
-
April 25, 2012
25Apr2012
Photo Story
India Inc's infosec spending outlook for 2012, sector-wise
-
April 25, 2012
25Apr2012
Photo Story
Is BI a priority investment for Indian companies?
-
April 25, 2012
25Apr2012
Photo Story
IT spend as percentage of revenue across Indian industries
-
April 25, 2012
25Apr2012
Photo Story
Sectorwise review: Improving IT function effectiveness
-
April 25, 2012
25Apr2012
Photo Story
India Inc's IT priorities in 2012-13 -- E&Y
Explore India Inc’s top five IT spending priorities of 2012-13. Also view the slideshow of key data points of this Ernst & Young-CIO Klub survey. Continue Reading
-
April 25, 2012
25Apr2012
News
Infosec 2012: Internet security body to tackle SSL problems
The Trustworthy Internet Movement (TIM) is to tackle implementation and governance internet communication protocol (SSL) as its first project. Continue Reading
-
April 25, 2012
25Apr2012
News
Infosec 2012: Patching alone can deliver 80% protection
Keeping software up to date with security patches can deliver 80% protection from cyber threats, says security firm Secunia. Continue Reading
-
April 25, 2012
25Apr2012
News
IT spending outlook of India Inc to be cautiously optimistic - E&Y
Explore India Inc’s top five IT spending priorities of 2012-13. Also view the slideshow of key data points of this Ernst & Young-CIO Klub survey. Continue Reading
-
April 25, 2012
25Apr2012
News
SAP reports double-digit growth
SAP has continued where it left off last year with an 11% increase in sales in the first three months of 2012. Continue Reading
-
April 25, 2012
25Apr2012
News
Apple overtakes IBM and HP in sales
Apple has posted another remarkable set of financial results, overtaking IT giants IBM and HP in sales during its latest financial quarter. Continue Reading
-
April 25, 2012
25Apr2012
News
Infosec 2012: Cloud enables security expertise for SME
Small and medium enterprises (SMEs) typically face the same threats as bigger organisations, but lack the same level of expertise and other security resources. Continue Reading
-
April 24, 2012
24Apr2012
Photo Story
Infosecurity Europe 2012
-
April 24, 2012
24Apr2012
Photo Story
Phill Cracknell, Yell.com
-
April 24, 2012
24Apr2012
Photo Story
Eugene Kaspersky at Infosecurity Europe 2012
-
April 24, 2012
24Apr2012
Photo Story
Tim Wilson, NHS City and Hackney
-
April 24, 2012
24Apr2012
Photo Story
It is not a Meerkat
-
April 24, 2012
24Apr2012
Photo Story
Infosecurity Europe
With 300 exhibitors and hundreds of delegates, security is still hot on the IT agenda. Cliff Saran presents the highlights of infosecurity Europe Continue Reading
-
April 24, 2012
24Apr2012
News
Investigation reveals serious cloud computing data security flaws
Context Information Security found that data stored by a cloud customer could be accessed by the next customer to spin up a VM on the same disk. Continue Reading
-
April 24, 2012
24Apr2012
Tip
6 point SIEM solution evaluation checklist
With SIEM solutions gaining steam in India, Satish Jagu of Genpact shares concise tips based on the lessons from his SIEM implementation experiences. Continue Reading
-
April 24, 2012
24Apr2012
News
2012 Information Security Breaches Survey
Security breaches cost the UK billions over the last 12 months as cyber attacks reached record levels. Continue Reading
-
April 23, 2012
23Apr2012
In Depth
Making money from data: Financial business intelligence at work
Finance professionals are heavy users of BI and predictive analytics software. Find out how a variety of European finance functionaries are analysing trends, cutting costs and finding new business. Continue Reading
-
April 23, 2012
23Apr2012
News
John Lewis pilots virtual fashion mirrors
John Lewis is using augmented reality to enable customers to try clothes on virtually, as part of its multichannel offering. Continue Reading
-
April 23, 2012
23Apr2012
News
UK firms see competitors as greater cyber attack risk than criminals
More than half of UK firms expect a cyber attack in the next six months, but see competitors as a greater risk than criminals Continue Reading
-
April 20, 2012
20Apr2012
News
BBC wants to build a cultural API
With over 80 years of cultural information in its archive, the BBC is looking at making programme metadata available Continue Reading
-
April 20, 2012
20Apr2012
News
Outsourcing in the UK slows down in early 2012
Outsourcing in the UK has slowed considerably in the first three months of 2012 with the value of contracts signed falling well below last year. Continue Reading