Archive
Browse the full archive of Computer Weekly online content - see our most recent articles listed below, or browse by year of publication.
2012 Stories
-
March 09, 2012
09Mar2012
News
Apple iOS 5.1 patches 81 vulnerabilities
Alongside its ‘new iPad’ release, Apple Inc. releases iOS 5.1, the latest version of its mobile computing platform with fixes for 81 security holes. Continue Reading
-
March 09, 2012
09Mar2012
News
Buyer's Guide: Server Virtualisation
This Computer Weekly buyer’s guide looks at the potential barriers to successful virtualisation and how they can be overcome. Continue Reading
-
March 08, 2012
08Mar2012
News
Councils meet first superfast broadband deadline
All but two local authorities have met government deadlines to submit plans to roll out superfast broadband Continue Reading
-
March 07, 2012
07Mar2012
News
Systems integrators 'charge more in paperwork than SMEs do in delivery’
A systems integrator asked for more money from the government for an IT product proposal than an SME was able to deliver the actual service for. Continue Reading
-
March 07, 2012
07Mar2012
News
John Lewis prioritises IT investment above profit
John Lewis made significant technology investments in 2011, pushing profits down 3.8% to £353.8m Continue Reading
-
March 07, 2012
07Mar2012
News
NIST releases SP 800-153 WLAN security guidelines
The recently released NIST SP 800-153 addresses security of WLANS. Join us, as we take a closer look at the document’s recommendations. Continue Reading
-
March 07, 2012
07Mar2012
News
Government’s shared services strategy failing, says NAO
The government’s £1.4bn shared services centres have failed to achieve value for money, according to a report from the National Audit Office (NAO) Continue Reading
-
March 07, 2012
07Mar2012
News
FBI informer Hector Xavier Monsegur aids in arrest of LulzSec hackers
Authorities in the US, UK and Republic of Ireland have arrested seven suspected members of hacktivist group LulzSec, including Hector Xavier Monsegur, who helped investigators Continue Reading
-
March 06, 2012
06Mar2012
News
SAP boosts ByDesign ecosystem to support small business customisation
SAP is rolling out a partner programme for its ByDesign cloud-based product, to simplify implementation in SMEs Continue Reading
-
March 06, 2012
06Mar2012
News
Yahoo plans another round of job cuts
Yahoo is planning another round of redundancies as it continues to struggle with competition from rivals Google and Facebook Continue Reading
-
March 06, 2012
06Mar2012
News
CW500: Getting to grips with big data
Experts from Standard Life, Deloitte and Intelligent Business Strategies share some useful tips for CIOs on understanding big data Continue Reading
-
March 05, 2012
05Mar2012
Answer
Session fixation protection: How to stop session fixation attacks
Session fixation attacks rely on poorly managed Web application cookies. Rob Shapland answers a reader’s question on session fixation protection. Continue Reading
-
March 05, 2012
05Mar2012
News
NHS trusts to be freed from CSC contract commitments
The Department of Health has proposed a deal with CSC to release trusts in the National Programme for IT from their contractual obligations to use software from the troubled supplier. Continue Reading
-
March 05, 2012
05Mar2012
Photo Story
Windows for power users
-
March 05, 2012
05Mar2012
Photo Story
Final thoughts
-
March 05, 2012
05Mar2012
Photo Story
Support for normal Windows applications
-
March 05, 2012
05Mar2012
Photo Story
Windows side-by-side
-
March 05, 2012
05Mar2012
Photo Story
A first look: Windows 8 consumer preview
Windows 8 is not just an upgrade. It is a complete rework of the Windows OS. Speaking at the launch of the beta last week in Barcelona, Windows chief Steven Sinofsky called it a "generational change" Continue Reading
-
March 05, 2012
05Mar2012
Photo Story
Asynchronous programming with a sandbox runtime
-
March 05, 2012
05Mar2012
Photo Story
The Microsoft store
-
March 05, 2012
05Mar2012
Photo Story
Bundled Apps
-
March 05, 2012
05Mar2012
Photo Story
Hyper-V for desktop virtualisation
-
March 05, 2012
05Mar2012
Photo Story
Improved security
-
March 05, 2012
05Mar2012
Photo Story
Starting up Windows
-
March 05, 2012
05Mar2012
News
Rogue IT manager jailed for two years after £123k procurement scam
A rogue IT procurement manager has been jailed for two years after he colluded with two IT suppliers to defraud grocer Nisa Today out of £123,000 Continue Reading
-
March 02, 2012
02Mar2012
Opinion
Opinion: Is big data just big hype?
If the deluge of headlines and vendor marketing materials is anything to go by, big data is the next big thing. So how much is there really to all this big data talk? Continue Reading
-
March 02, 2012
02Mar2012
News
Somerset Council to bring Southwest One services back in house
Somerset County Council is seeking to bring key services back in house from Southwest One , the troubled joint-venture it created with IBM in 2007. Continue Reading
-
March 02, 2012
02Mar2012
Blog Post
Loving it when an identity plan comes together
To quote a phrase that was mightily popular in the 1980s: I love it when a plan comes together. In this case, it's not even my plan, but it's one I've found myself writing about often over the past ... Continue Reading
-
March 02, 2012
02Mar2012
E-Zine
Next-generation network management techniques
This issue examines how network managers can simplify their management tools and use key protocols like NetFlow and IPFIX, and hardware like matrix switches. Learn how network managers are adopting new tools that give them better control over ... Continue Reading
-
March 02, 2012
02Mar2012
News
The cloud: time for delivery
This report clears up the confusion around cloud, which stems directly from the muddling together of two vastly different perspectives on cloud services. Continue Reading
-
March 02, 2012
02Mar2012
News
The mindset of the chief information officer
This study evaluates the leadership role that chief information officers perform in helping their organisations achieve their commercial goals. Continue Reading
-
March 02, 2012
02Mar2012
News
2012 security outlook
This report, based on extensive research from chief information security officers, identifies the top 10 security imperatives for 2012. Continue Reading
-
March 01, 2012
01Mar2012
News
RSA 2012: IT security experts urge enterprises to ban smartphone BYOD schemes
Enterprises should ban employees from using their own smartphones for work, a panel of IT security practitioners told the RSA Conference 2012 Continue Reading
-
March 01, 2012
01Mar2012
Podcast
The best place for SSD in a virtual machine environment
Using SSD in a virtual machine environment is the ideal choice to speed response times to I/O demands, but where should you install it within the server and storage infrastructure? Continue Reading
-
March 01, 2012
01Mar2012
News
DWP tenders for £25m IDA services
The Department for Work and Pensions (DWP) has tendered for a £25m identity assurance (IDA) framework to create a marketplace of providers across the public sector. Continue Reading
-
March 01, 2012
01Mar2012
Photo Story
HTC One X
-
March 01, 2012
01Mar2012
Photo Story
Nokia 808 PureView
-
March 01, 2012
01Mar2012
Photo Story
Sony Xperia P and U
-
March 01, 2012
01Mar2012
Photo Story
HTC One S
-
March 01, 2012
01Mar2012
Photo Story
Samsung Galaxy Beam
-
March 01, 2012
01Mar2012
Photo Story
Huawei Ascend D Quad
-
March 01, 2012
01Mar2012
Photo Story
Asus Padfone
-
March 01, 2012
01Mar2012
Photo Story
Panasonic Eluga
-
March 01, 2012
01Mar2012
Photo Story
Nokia Lumia 900
-
March 01, 2012
01Mar2012
Photo Story
ZTE Era
-
March 01, 2012
01Mar2012
Photo Story
Top 10 smartphones to look out for in 2012
The rate at which smartphones are being released looks like it won't ease up, this photo story looks at the best phones of the year ahead. Continue Reading
-
March 01, 2012
01Mar2012
E-Zine
Finding a home for Flash
Vendor consolidation is a fact of economic life. The bigger a company is, the more it can push economies of scale. The cloud is threatening to accelerate this consolidation significantly. IT and storage are not commodities today, but that may not ... Continue Reading
-
February 29, 2012
29Feb2012
News
IT departments risk losing responsibility for IT security
IT security professionals can no longer take it for granted that IT security will continue as part of the IT function Continue Reading
-
February 29, 2012
29Feb2012
News
London Borough of Southwark gets 4G connectivity
Network provider UK Broadband has switched on its first 4G Long Term Evolution (LTE) system in the London Borough of Southwark Continue Reading
-
February 29, 2012
29Feb2012
News
Does the PSN need to happen before the cloud?
The deployment of public services networks (PSN) will need to happen before widespread uptake of CloudStore services occur, IT heads said at a roundtable meeting. Continue Reading
-
February 29, 2012
29Feb2012
News
Datacentres and mobile devices drive 7% server shipment rise in 2011
Server shipments rose 7% in 2011 as businesses built datacentres and smartphones and tablets were increasingly used to access web content Continue Reading
-
February 28, 2012
28Feb2012
In Depth
Virtual machine storage optimisation methods explained
Virtual machine storage for virtual desktops and servers has to deal with heavy and random I/O patterns. We survey the key methods of optimising storage for virtual machines. Continue Reading
-
February 28, 2012
28Feb2012
News
Mobile technology training in demand
A massive 81% of IT professionals are planning to bolster their skills in mobile computing as 84% see this as an area of growth in the market. Continue Reading
-
February 28, 2012
28Feb2012
News
Social media to support business continuity
Three-quarters of organisations will use social media as part of their business continuity management (BCM) strategies by 2015 with communication during crises a key component of its role. Continue Reading
-
February 28, 2012
28Feb2012
In Depth
Buyer's Guide: How to upgrade to IPv6
IPv6 is an increasingly hot topic in the networking industry. We examine the issues for older hardware support. Continue Reading
-
February 27, 2012
27Feb2012
Photo Story
Blackberry Curve 9380
-
February 27, 2012
27Feb2012
Photo Story
Nokia 700
-
February 27, 2012
27Feb2012
Photo Story
HTC Wildfire S
-
February 27, 2012
27Feb2012
Photo Story
HTC ChaCha
-
February 27, 2012
27Feb2012
Photo Story
Blackberry Curve 9360
-
February 27, 2012
27Feb2012
Photo Story
Samsung Galaxy Y
-
February 27, 2012
27Feb2012
Photo Story
Blackberry Curve 9300
-
February 27, 2012
27Feb2012
Photo Story
Top 10 budget smartphones for SMEs
This photo story looks at what options IT managers have when equipping their small business with smartphone son a budget. While Blackberry is usually the choice for any business, it’s good to look around at what alternatives offer and whether a ... Continue Reading
-
February 27, 2012
27Feb2012
Photo Story
Samsung Galaxy Ace 2
-
February 27, 2012
27Feb2012
Photo Story
Nokia Lumia 710
-
February 27, 2012
27Feb2012
Photo Story
Samsung Galaxy Mini 2
-
February 27, 2012
27Feb2012
News
Post Office reveals plans for identity assurance services
The Post Office is tendering for hardware and software which will enable it to be a provider of the government's Identity Assurance (IDA) services. Continue Reading
-
February 27, 2012
27Feb2012
News
WAN optimisation: improving the performance of business applications
How can WAN optimisation support IT consumerisation and cloud computing? Continue Reading
-
February 25, 2012
25Feb2012
Photo Story
Burgess Cooper
-
February 25, 2012
25Feb2012
Photo Story
At a glance
-
February 25, 2012
25Feb2012
Photo Story
Sunil Varkey
-
February 25, 2012
25Feb2012
Photo Story
Vishal Salvi
-
February 25, 2012
25Feb2012
Photo Story
Faraz Ahmed
-
February 25, 2012
25Feb2012
Photo Story
Subrahmanya Gupta Boda
-
February 25, 2012
25Feb2012
Photo Story
The CISO Power List, 2012
-
February 25, 2012
25Feb2012
Photo Story
Pankaj Agrawal
-
February 25, 2012
25Feb2012
Photo Story
The CISO Power List, 2012
Our CISO Power List for 2012 brings you the who’s who in the Indian information security scene. Join us, as we pay tribute to India’s top 15 CISOs. Continue Reading
-
February 25, 2012
25Feb2012
Photo Story
Arup Chatterjee
-
February 25, 2012
25Feb2012
Photo Story
Satish Das
-
February 25, 2012
25Feb2012
Photo Story
Shobitha Hariharan
-
February 25, 2012
25Feb2012
Photo Story
Manish Dave
-
February 25, 2012
25Feb2012
Photo Story
Sameer Ratolikar
-
February 25, 2012
25Feb2012
Photo Story
Agnelo D'Souza
-
February 25, 2012
25Feb2012
Photo Story
Nabankur Sen
-
February 25, 2012
25Feb2012
Photo Story
Adapa Raja Vijay Kumar
-
February 25, 2012
25Feb2012
Photo Story
Sunil Dhaka
-
February 24, 2012
24Feb2012
News
Lloyds bank saves £2bn after HBOS IT integration
Lloyds Banking Group says the integration of its multiple brands has saved more than £2bn per year, with IT a major contributor. Continue Reading
-
February 24, 2012
24Feb2012
News
Windows security case study: Controlling Windows 7 user privileges
After migrating from Windows XP to Windows 7, Oxford University Press used Avecto’s Privilege Guard to control Windows 7 user privileges. Continue Reading
-
February 24, 2012
24Feb2012
Blog Post
The man who might be king (well, deputy king)
When Computer Weekly interviewed Cabinet Office permanent secretary Ian Watmore recently, he cited three names as the key people driving change in IT across the public sector. Two were to be ... Continue Reading
-
February 24, 2012
24Feb2012
News
Countryside worst affected by slow broadband
A third of UK homes have broadband speeds well below the national average, but rural areas fare the worst, according to research. Continue Reading
-
February 23, 2012
23Feb2012
In Depth
Arup Chatterjee
SearchSecurity.in CISO Power List 2012 Profile: Arup Chatterjee, CISO, WNS Global Services. Continue Reading
-
February 23, 2012
23Feb2012
In Depth
Agnelo D'Souza
SearchSecurity.in CISO Power List 2012 Profile: Agnelo D‘Souza, CISO, Kotak Mahindra Bank. Continue Reading
-
February 23, 2012
23Feb2012
In Depth
Sunil Dhaka
SearchSecurity.in CISO Power List 2012, Profile: Sunil Dhaka, CISO, ICICI Bank. Continue Reading
-
February 23, 2012
23Feb2012
News
KPIT leverages VDI solution’s success
In order to reduce refresh cycle costs of 1200 desktops, KPIT Cummins opted for a VDI solution. We take a look at KPIT’s implementation journey. Continue Reading
-
February 23, 2012
23Feb2012
News
OSSIM update enables cyber threat intelligence sharing
The latest update to the Open Source Security Information Management (OSSIM) base system includes a mechanism for sharing cyber threat intelligence. Continue Reading
-
February 23, 2012
23Feb2012
News
IT service buyers cautious but no panic
Economic uncertainty has led to less demand for IT services but panic has not set in as Western IT services firms report modest growth. Continue Reading
-
February 23, 2012
23Feb2012
News
Predictive analytics used to cut costs in oil sector
Predictive analytics is being used in the oil and gas industry to better manage asset maintenance on capital equipment. And a more enterprisewide adoption of the technology is predicted. Continue Reading
-
February 22, 2012
22Feb2012
In Depth
Sameer Ratolikar
SearchSecurity.in CISO Power List 2012: Profile for Sameer Ratolikar, CISO, Bank of India. Continue Reading
-
February 22, 2012
22Feb2012
In Depth
Pankaj Agrawal
SearchSecurity.in CISO Power List 2012 Profile: Pankaj Agrawal, CISO & Head of Technology Governance, Aircel Continue Reading
-
February 21, 2012
21Feb2012
News
Social media users demand more meaningful interactivity
British people want more from the social media platforms they use as demand for more meaningful user experiences increases. Continue Reading