In Depth
In Depth
-
Horror stories of women in tech: The worst advice I’ve ever received
Women share experiences of being told to think like a male, keep your head down, and to not even bother with a career in tech. Continue Reading
-
How to manage the risk of the human factor in database administration
Fail to manage the risk of the human factor in database administration and you court disaster. DBAs, like air traffic controllers: work in pairs? Continue Reading
-
Top technologies that can make your datacentre green
Energy-efficient technologies that can reduce running costs in the datacentre and across the business Continue Reading
-
In-house tape vs cloud archiving: What are the pros and cons?
Have cloud archiving services reached a tipping point that makes them cheaper and easier to manage than in-house tape archives? Continue Reading
-
Business applications, data analytics can make business lean
Centralised business apps, such as ERP and CRM can frustrate, but also make a business lean. Data analytics has a fresh Six Sigma role to play Continue Reading
-
How to find the most vulnerable systems on your internal network
Most corporate networks share common vulnerabilities, but many could be mitigated with education in “hacker thinking” for technical staff Continue Reading
-
Social media: A security challenge and opportunity
Generation Y workers are posing increasing security challenges to their employers as they share data unreservedly Continue Reading
-
Rugby Football Union uses IBM predictive analytics for Six Nations
IBM tries out predictive analytics software, TryTracker, developed in association with the Rugby Football Union (RFU) Continue Reading
-
Process big data at speed
Low-cost solid state memory is powering high-speed analytics of big data streaming from social network feeds and the industrial internet. Continue Reading
-
How to effectively manage datacentre temperature and humidity
A datacentre is a complex facility with different cooling equipment and power systems. Here's how to monitor its temperature and humidity Continue Reading
-
How 3D printing impacts manufacturing
With the ability to create on-demand specialist tools, any initial investment in 3D printing technology could quickly pay for itself. Continue Reading
-
Online gambling sector bets on business intelligence
Online gambling and gaming industries crave structured business data. Volumes can be huge and they need to react to customer behaviour Continue Reading
-
GE uses big data to power machine services business
GE, one of the UK's largest manufacturers, is using big data analytics with data generated from machine sensors to predict maintenance needs Continue Reading
-
The limitations of traditional SaaS integration approaches
Time and budget constraints are forcing many organisations to rethink their integration strategy and find a well-aligned solution Continue Reading
-
How to integrate SaaS with your local business systems
As software as a service matures, CIOs need to look at how well cloud-based products integrate with existing on-premise systems Continue Reading
-
Business priorities: what to protect, monitor and test
How information security professionals can prioritise what to protect, monitor and test in the light of current budget and resource constraints Continue Reading
-
Top 10 gadget reviews of 2012
Inspect-a-Gadget has been busy reviewing a range of gadgets over the past 12 months and it has been another big year in the world of tech Continue Reading
-
Amazon: Gold standard of the cloud?
Amazon Web Services is the benchmark for cloud in the enterprise but can it handle the challenge of federated cloud services? Continue Reading
-
Shore up your organisation’s fleet with the right MDM
There are many mobile device management products, but approaches vary. We outline how to choose the right one for your business Continue Reading
-
How to preserve forensic evidence in the golden hour after a breach
There is a golden hour at the outset where a clear head and good planning can make or break any subsequent forensic investigation Continue Reading
-
Deduplication and single instance storage cut primary data storage costs
Data deduplication and single instance storage can cut costs in primary data environments, but implementations vary between suppliers. Continue Reading
-
How to secure Macs in the enterprise
Apple computers are becoming increasingly used in the enterprise - we look at how to securely introduce Macs in the corporate network Continue Reading
-
Data quality essential to master data management
It is possible to have a data quality initiative without master data management, but every MDM project must have a data quality element Continue Reading
-
How to gather BI dashboard user requirements to nail business strategy alignment
Many analytical systems -- data warehouses, business intelligence systems -- fail because user requirements are not collected properly Continue Reading
-
Software-defined datacentres demystified
As datacentre managers increasingly rely on software and automation, what can a software-defined datacentre bring to the enterprise? Continue Reading
-
Five personal branding obstacles CIOs face
Know the common personal branding obstacles faced by the Indian CIOs. Learn to do successful self-branding, step by step. Continue Reading
-
Unilever enterprise data warehouse locked to business programmes
Unilever is building a global enterprise data warehouse (EDW) locked into the critical paths of high-profile business programmes. Continue Reading
-
Defining End-User Requirements in an HPC Project
Without properly defined requirements, an HPC project can spiral out of control. Taking a strategic approach when defining user requirements will lead to the ultimate success of an HPC project. Continue Reading
-
How to manage your assets and control business costs
Asset lifecycle management allows the IT department to improve governance, mitigate risk and improve service quality and efficiency Continue Reading
-
CW500: Managing the mobile workforce (part 1)
Mobile working has transformed Colt Telecommunications beyond recognition over the past three years Continue Reading
-
Cloud APIs at hand to connect to databases
The pros and cons of using cloud application programming interfaces (APIs) to connect users to databases via mobile or web Continue Reading
-
How to manage unstructured data for business benefit
The cloud offers some progress in the resource-sapping management of unstructured data, but it is critical to work back from the business case. Continue Reading
-
Tune Raid performance to get the most from your HDDs
Tune Raid performance at the storage controller to match application I/O demands to optimal hard drive (HDD) performance Continue Reading
-
Gathering retail intelligence
Learning their customers’ habits through business intelligence is vital for bricks-and-mortar retailers to stay competitive Continue Reading
-
Static code analysis tools gain traction in India as SDL models mature
Static analysis tools are gaining popularity with Indian companies as software development models and perspectives mature. Here are some popular choices. Continue Reading
-
HDFC Bank’s ISO 27004-compliant security metrics a boost toward GRC
An ISO/IEC 27004-compliant metrics program is a rarity in the Indian infosec circuit. Indian BFSI major HDFC Bank’s ISMS has been there, done that Continue Reading
-
Setting up a botnet is easier than you think
Acquiring, installing, configuring and using a powerful data-stealing banking Trojan toolkit is not as difficult as it sounds Continue Reading
-
Outsourcing IT services: goals and negotiations
Tactical and strategic negotiations are important to businesses of all sizes, from SMEs to the largest enterprises Continue Reading
-
If the popularity of ICT is on the rise, why are we scrapping the curriculum?
Recent GCSE results revealed more students are choosing to study ICT, however the government still plans to scrap the curriculum two years ahead of the planned computer science replacement Continue Reading
-
How to make sense of the big data universe
Analysing big data can be a daunting prospect, so find out what you need, where it is and how to deal with it Continue Reading
-
Predictive sports analytics put in play for Wimbledon, Formula One
Predictive analytics in sports is proving itself in tennis and car racing. Can it make the leap to team sports, long the preserve of barroom anoraks? Continue Reading
-
Best practice in outsourcing security
The issues CIOs must consider in balancing security needs and budgetary constraints Continue Reading
-
Men and women disagree on reasons why IT is less attractive to women
Mortimer Spinks and Computer Weekly survey finds men and women disagree on why IT is a less attractive career choice for females Continue Reading
-
Data virtualisation on rise as ETL alternative for data integration
The Phone House and Novartis have turned to data virtualisation from Denodo and Composite to gain a single logical view of disparate data sources. Continue Reading
-
High-performance computing drives high-performance F1 cars to success
Jennifer Scott investigates how Formula 1 team Marussia uses a supercomputer to design and test its cars on a budget Continue Reading
-
How technology is changing BPO
Karl Flinders discovers how IT has become central to the provision of outsourced business processes Continue Reading
-
iSCSI security: Networking and security options available
iSCSI security options include physical and virtual IP/Ethernet networking methods as well as built-in storage and switch device security features. Read about them here. Continue Reading
-
10 GbE: iSCSI bandwidth increase improves protocol’s position against FC
With a boost to iSCSI bandwidth with 10 Gigabit Ethernet, products that support the protocol offer features to rival Fibre Channel SANs, including scalability and hypervisor integration. Continue Reading
-
VMware backup and the VMware snapshot
The VMware snapshot is a critical component of VMware backup. In this guide to the basics of VMware backup, we walk you through the key processes and suggest some best practices. Continue Reading
-
CEH certification gains credence in IT security domain
CEH certification is much sought after in the IT security domain today. Here’s how you can obtain CEH certification and why you should attempt do so. Continue Reading
-
HyperCITY’s retail store management system: Profit with promotions
HyperCITY services a million customers selling them about 40,000 products. Know how one of India’s largest hypermarket chains accomplishes this. Continue Reading
-
Server SSD guide to form factors and implementations
Server SSD offers immense gains in IOPS and throughput. We look at how it works, form factors available and its advantages and pitfalls, and we survey key vendors in the market. Continue Reading
-
Cloud backup options: Pure cloud vs hybrid cloud backup
Cloud backup is increasingly being seen as a flexible and cost-effective option by many organisations, but what are the pros and cons of pure cloud backup and hybrid cloud backup? Continue Reading
-
Essar’s WAN encryption strategy to secure data in motion: In focus
Indian conglomerate Essar puts WAN encryption in place using Cisco’s GET VPN to protect data flows between remote locations. A closer look. Continue Reading
-
Making money from data: Financial business intelligence at work
Finance professionals are heavy users of BI and predictive analytics software. Find out how a variety of European finance functionaries are analysing trends, cutting costs and finding new business. Continue Reading
-
HPC storage requirements: Massive IOPS and parallel file systems
We survey the key vendors in HPC storage, where huge amounts of IOPS, clustering, parallel file systems and custom silicon provide storage for massive number crunching operations. Continue Reading
-
Blade servers: How to decide on Unix or Linux
If you’re contemplating Unix or Linux for your blade server, or a migration from one to the other, in this guide you will find everything you need to make up your mind. Useful Unix and Linux command lines also included. Continue Reading
-
Bank of India’s 2FA with mutual authentication goes beyond OTPs
Indian BFSI major Bank of India chose mutual authentication when it required a two factor authentication (2FA) solution. There’s been no looking back. Continue Reading
-
Unified storage goes mainstream
Unified storage has gone mainstream, with full protocol support from the top five vendors. We survey the options available, including single platforms and NAS gateways. Continue Reading
-
How to make your network green
Make sure your network and datacentre run efficiently as part of a green networking strategy Continue Reading
-
Virtual machine storage optimisation methods explained
Virtual machine storage for virtual desktops and servers has to deal with heavy and random I/O patterns. We survey the key methods of optimising storage for virtual machines. Continue Reading
-
Buyer's Guide: How to upgrade to IPv6
IPv6 is an increasingly hot topic in the networking industry. We examine the issues for older hardware support. Continue Reading
-
Arup Chatterjee
SearchSecurity.in CISO Power List 2012 Profile: Arup Chatterjee, CISO, WNS Global Services. Continue Reading
-
Agnelo D'Souza
SearchSecurity.in CISO Power List 2012 Profile: Agnelo D‘Souza, CISO, Kotak Mahindra Bank. Continue Reading
-
Sunil Dhaka
SearchSecurity.in CISO Power List 2012, Profile: Sunil Dhaka, CISO, ICICI Bank. Continue Reading
-
Sameer Ratolikar
SearchSecurity.in CISO Power List 2012: Profile for Sameer Ratolikar, CISO, Bank of India. Continue Reading
-
Pankaj Agrawal
SearchSecurity.in CISO Power List 2012 Profile: Pankaj Agrawal, CISO & Head of Technology Governance, Aircel Continue Reading
-
Buyer's Guide: Tips for small companies on IPv6 migration
There is no rush to switch from IPv4 to IPv6, but there is no harm in being prepared for IPv6. We look at the practical issues for SMEs. Continue Reading
-
Buyer's Guide: How to prepare your organisation for IPv6
The switch to IPv6 – on 6 June – shows just how imminent the transition from IPv4 to IPv6 is. Is your organisation ready? Continue Reading
-
Midrange SAN vendors boost solid-state and drive options
With desktop and server virtualisation driving the market, midrange SAN vendors boost solid-state and spinning-disk options to bring enterprise-like performance. Continue Reading
-
When X.509 security certificates fail, servers break
Why are X.509 certificates causing computers to stop dead? Continue Reading
-
In-memory database technology gains ground, but challenges remain
In-memory database technology improves specific application performance notably. But challenges need to be met before in-memory database becomes the norm. Continue Reading
-
Key account management strategy at Tata Motors gets enhanced IT edge
Indian auto major Tata Motors’ key account management strategy relies significantly on IT. We examine its key account management portal project in-depth. Continue Reading
-
Alternatives to passwords: Replacing the ubiquitous authenticator
As the relative security of passwords falters, are they destined for obscurity? Continue Reading
-
Interview: From Apollo Mission to agility manifesto
One of the 17 original authors of the agile manifesto was Jim Highsmith who, after a previous tenure at NASA, now works as an executive consultant at ThoughtWorks. Continue Reading
-
Disaster recovery audit, maintenance and continuous improvement
Drawing up strategies for disaster recovery audit, maintenance and continuous improvement are the key final stages in the development of a disaster recovery programme. Continue Reading
-
UKtech50: Meet the 50 most influential people in UK IT
Computer Weekly has announced the final listing for the second annual UKtech50, the definitive list of the real movers and shakers in UK IT. Continue Reading
-
What are the outsourcing options for the SME?
The pace of change of technology can cause the small and medium enterprise (SME) critical issues which outsourcing can only address with carefully researched decisions. Continue Reading
-
Case study: Nokia rethinks HR with web portal
Mobile phone manufacturer Nokia has reduced its HR costs by between 20% to 30% after rolling out a web-based HR portal for its 60,000 employees. Continue Reading
-
UKtech50: Honouring the most influential people in UK IT
Computer Weekly has announced the final listing for the second annual UKtech50, the definitive list of the real movers and shakers in UK IT - the CIOs, industry executives, public servants and business leaders driving the creation of a high-tech ... Continue Reading
-
UKtech50 2011: Vote now!
Voting has begun to find out who is the most influential person in the UK IT community. Continue Reading
-
CIO interview: Tony Prestedge, COO, Nationwide
Tony Prestedge took over as COO at Nationwide in 2010, mid-way through a five-year transformation project. He tells Karl Flinders how the company is transforming its business through a £1bn investment in technology, how the IT department changed ... Continue Reading
-
CIO interview: Martin Davies, head of technology at Bet365
The success story of £5.4bn-per-year online gambling company Bet365 is nothing to do with luck and everything to do with technology. Continue Reading
-
Advantages and disadvantages of cloud computing
Among the advantages and disadvantages of cloud computing are that it offers a high degree of scalability, but incidents such as cloud outages make it less reliable. Continue Reading
-
RightNow: Oracle and next-generation CRM
In his opening keynote presentation at the RightNow Summit 2011 in Newport, Greg Gianforte, RightNow founder and chief executive officer, presented his view of device-aware CRM. Continue Reading
-
How Capex vs. Opex affects data centre outsourcing decisions
Capex vs.Opex comparison reveals that although cloud services help avoid capital expenses on building own data centres, its Opex model can turn costly if IT pros aren’t cautious. Continue Reading
-
The consumerisation of IT: it’s a trickle, not a tide, but you still need to be ready
If media headlines and supplier claims are to be believed, organisations today are faced with an unstoppable tide of many different types of personal device connected to the corporate network Continue Reading
-
The top five SME security challenges
Best practice in IT security and compliance for small and medium-sized enterprises (SMEs) is often seen as a "grudge purchase", but SMEs face the same threat as larger organisations - just without their budgets. Continue Reading
-
Social Media Awards 2011: Vote now!
Computer Weekly's search for the best use of social media in IT is back for its fourth year, in association with IBM, and we want you vote for the best uses of social media in UK IT. Fill out the form below and submit your vote. Continue Reading
-
Application - aware networking emerges but has far to go
Application awareness is emerging on firewalls and WAN optimization devices,but efforts fall short of a network-wide strategy,especially at Layers 2 and 3. Continue Reading
-
Improved debt collection with BI: An ICICI Bank story
Debt collection can gain immensely by BI. By powering this, ICICI Bank has effectively turned debt collection into a customer-relations management program. Continue Reading
-
Disaster recovery awareness and testing require training, strategic plans
After you develop DR plans, disaster recovery awareness and testing strategies ensure the plan works and that everyone knows their role within it. Continue Reading
-
Project management process challenges: Lessons from SBI, M&M, & NCDEX
Project management process is usually riddled with challenges. Use these insights from India’s largest enterprises to effectively manage your projects. Continue Reading
-
Bombay Stock Exchange’s server consolidation journey
BSE recently consolidated its servers and began its cloud computing journey. Find out more about BSE’s server consolidation initiative in this case study. Continue Reading
-
Self-encrypting drives: SED the best-kept secret in hard drive encryption security
The SED solves many common data loss problems and is easy to use and manage with minimal impact on system performance – yet relatively few businesses and governments use SEDs. Continue Reading
-
Action against e-waste
Every day, tonnes of electronic waste (e-waste) is sent to Africa from the EU. It is illegal to trade in e-waste and despite this almost all e-waste is dumped in places where no facilities exist for safe recycling with a minority of e-waste being ... Continue Reading
-
Computer Weekly Features List
In this series of articles we will cover why desktop virtualisation is growing in popularity, what type of products are now available, how businesses are deploying VDI and the challenges in getting it working. Continue Reading
-
Encryption techniques and products for hardware-based data storage security
Encryption techniques can be applied to data on the drive or array, at the host or in the fabric. We survey the key hardware-based methods and products available for data storage security. Continue Reading
-
ATA over Ethernet offers SAN storage on a budget
ATA over Ethernet offers SAN storage on a budget, at 20% of the cost of Fibre Channel and half that of iSCSI SANs. But, does being a one-vendor protocol mean it’s a non-starter? Continue Reading
-
How the financial services sector uses big data analytics to predict client behaviour
The financial services sector has gone through unprecedented change in the last few years. Customers are expecting a more personalised service from their banks. Regulators have reacted to the credit crunch with significant changes to regulation with... Continue Reading