Business applications
At the heart of enterprise software strategy are the key business applications upon which every organisation relies. From enterprise resource planning (ERP) to customer relationship management (CRM), financial and accounts software to business intelligence (BI), such applications demand high investments and can deliver high returns. We analyse the latest product developments and the news from major suppliers such as Oracle, Microsoft and SAP.
-
E-Zine
09 Nov 2023
Heineken lets the data flow
In this month’s CW EMEA ezine, we find out about Heineken’s mission to make the most out of the data it holds through an enterprise-wide data ecosystem. We also look at how the UK has turned its back on the German government-funded Gaia-X data platform, why cyber experts are urging the EU to rethink vulnerability disclosure plans, and how the IT industry is responding to the software developer skills shortfall. Read the issue now. Continue Reading
-
News
20 Oct 2023
Collaboration paramount in KPN’s successful business transformation
KPN tells Oracle CloudWorld 2023 how it transformed when its legacy systems became obstacles to supporting its customers on their digital journeys Continue Reading
-
News
13 Jan 2006
Oracle bundles Fusion tools into one-stop SOA suite
Oracle is offering a one-stop shop to customers seeking to build a service-oriented architecture (SOA) by bundling together several middleware products. Continue Reading
-
Feature
09 Jan 2006
Voicing concerns on Skype
Skype has blazed a trail in the Voice over IP arena; its popularity hasn’t gone unnoticed by the hacker community however Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
18 Dec 2005
Trio of trouble: Malcode targets Windows, IM users
AV firms warn IT shops to guard against Dasher, Bagle and Banbra. Dasher targets a Windows flaw patched in October, while Banbra spreads through IM. Continue Reading
By - News 16 Nov 2005
- News 16 Nov 2005
- News 16 Nov 2005
-
News
14 Nov 2005
Demand for development skills soars as firms seek business edge
Computer Weekly salary survey shows IT departments eager to secure skills for the future. Continue Reading
-
News
06 Nov 2005
Hacking Windows: MSRPC vulnerabilities
In this excerpt from "Hacking Exposed, Fifth Edition: Network Security Secrets & Solutions," authors Stuart McClure, Joel Scambray and George Kurtz introduce MSRPC vulnerabilities and countermeasures. Continue Reading
-
News
20 Oct 2005
Author delves into novel attack methodologies
Review of Silence on the Wire, a book about security attack methodologies such as passive fingerprinting. Continue Reading
-
News
19 Oct 2005
Elements of a data protection strategy
In this excerpt from Data Protection and Lifecycle Management, Tom Petrocelli addresses the importance of securing data for regulatory compliance and outlines the five components of a data protection strategy. Continue Reading
-
News
27 Sep 2005
Secure your extended enterprise
How do you achieve the fine balance between ensuring that there is truly free access to sensitive information, without sacrificing security? Continue Reading
-
News
26 Sep 2005
Secure the interests of your extended enterprise
How do you achieve the fine balance between ensuring that there is truly free access to sensitive information and applications from both inside and outside the firewall, without sacrificing security? Continue Reading
-
News
20 Sep 2005
SAS drives product roundup
Serial-attached SCSI (or SAS) drives offer significant storage capacity at a much lower cost, while maintaining reasonable performance. Find out who the vendors are in this market. Continue Reading
By- Stephen J. Bigelow, Senior Technology Editor
-
News
18 Sep 2005
CCSP courses, exam changing next month
Those seeking Cisco's security credential and specialization in VPN, firewall and IDS will soon follow different curricula that better reflect the vendor's current product lines. Continue Reading
By- Anne Saita, TechTarget
-
News
13 Sep 2005
Ethernet users given greater product interoperability
A new network hardware testing standard will encourage enterprises, service providers and telcos to adopt cheaper and more flexible Ethernet technology for data, voice and video connectivity. Continue Reading
-
News
05 Sep 2005
IE 7.0 may usher in wave of RSS exploits
Experts warn that Web-feed enhancements in Microsoft's new Web browser may be just the thing crackers need to compromise networks and private data. Continue Reading
By -
News
05 Sep 2005
Extending perimeters
The news that, up until 2006, 70% of successful wireless local area network (WLAN) attacks will be because of the misconfiguration of WLAN access points and client software is disquieting on a number of levels. Continue Reading
-
News
30 Aug 2005
Antivirus can introduce dangerous network security holes into any OS
AV software is one of the most basic security steps available. It's also yet another gateway for security breaches. Continue Reading
By- Shawna McAlearney, News Editor
-
News
26 Aug 2005
High profile breach brings security to top of agenda
There’s nothing like an apparent breach at a global company to concentrate the mind when it comes to information and data security. Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
16 Aug 2005
Reduce risks of disaster recovery testing
Untested business continuity plans can leave your firm in the lurch, but taking down live environments is risky and complicated. Continue Reading
By- Matt Stansberry, TechTarget
-
Feature
28 Jul 2005
Lost at sea: securing the channel
As attacks seem to proliferate almost unabated, it’s worrying to think that of the three interested parties in the security technology market — the technology makers, the technology sellers and the technology users—not everyone shares a common view on the importance of the technology. Continue Reading
-
News
28 Jul 2005
Sarbox compliance costing companies
Companies’ required investments to attain compliance with the Sarbanes-Oxley data security legislation has come at the expense of dealing with other security threats, according to the Information Security Forum (ISF). Continue Reading
-
News
24 Jul 2005
Authentication takes a bite out of spam
Network and messaging experts offer helpful ammunition for network managers waving the white flag in the battle against spam. Continue Reading
By- Amy Storer, News Writer
-
Feature
22 Jul 2005
Riding the wave of change
CIOs can thrive as pace of change quickens, argues Des Lee Continue Reading
By- Des Lee
-
News
21 Jul 2005
Users look for value boost from Microsoft licence rejig
Software Assurance needs to offer better support, say IT directors Continue Reading
By- Cliff Saran, Managing Editor
-
News
21 Jul 2005
Sarbox draining corporate security budgets
Corporate investment to comply with the Sarbanes-Oxley data security legislation has come at the expense of dealing with other security threats, according to the Information Security Forum (ISF). Continue Reading
-
News
20 Jul 2005
Pop quiz: E-mail security
Find out how much you know about securing your organization's e-mail. Continue Reading
-
News
12 Jul 2005
Tony Asaro: Blogs and more
Read what Tony Asaro is talking about in this month's blog, and listen to him speak in a number of webcasts. Continue Reading
-
News
12 Jul 2005
Sarbox challenge drains security budgets
International corporate spending on compliance with the Sarbanes-Oxley data security legislation has come at the expense of dealing with other security threats, according to the Information Security Forum. Continue Reading
- Feature 13 Jun 2005
-
News
05 Jun 2005
Quiz: Secure Web directories and development, answer No. 1
Quiz: Secure Web directories and development, answer No. 1 Continue Reading
-
News
05 Jun 2005
Quiz: Secure Web directories and development, answer No. 2
Quiz: Secure Web directories and development, answer No. 2 Continue Reading
-
Feature
05 Jun 2005
Storage 911: How to troubleshoot your storage
Our emergency guide takes you through the steps you can take to prevent disaster, and then, more importantly, offers an organized list of usual suspects, from the complex to the deceptively simple. Continue Reading
-
News
04 Jun 2005
Life at the edge part 2: Divide and conquer with DMZs
Learn how a DMZ works and how it can protect Web servers. Continue Reading
-
News
03 Jun 2005
Quiz: Identify and analyze Web server attacks
Test your knowledge of the material covered in the "Identify and analyze Web server attacks" section of Intrusion Defense School. Continue Reading
-
News
31 May 2005
Network configuration: IIS SMTP mail relay service and Microsoft Exchange Server
Learn how to use the IIS SMTP mail relay service to prevent spammers from directly interacting with your Microsoft Exchange Server. Continue Reading
-
Feature
18 May 2005
Controlling IT waste and redundancy through recentralization
A typical decentralized organization has many different departments such as accounting, HR, and manufacturing—all are defining and building IT infrastructures to support applications. In a decentralized environment, there is a structure in place within each of these departments to evaluate and purchase IT equipment and support. This leads to redundant purchases from different departments for similar systems and software. Continue Reading
-
Feature
10 May 2005
Learning Guide: Low-cost storage
Resources on low-cost networking, iSCSI, SATA and IP storage Continue Reading
-
News
21 Mar 2005
Linux lags Windows in new security report
A controversial research paper takes a critical look at two popular platforms' track record on vulnerabilities and fixes. In turn, its findings are facing sharp scrutiny as well. Continue Reading
By- Anne Saita, TechTarget
-
News
21 Mar 2005
Home Office waits for police database case
Second Bichard report reveals concerns about a lack of progress and buy-in from forces around England and Wales for the national... Continue Reading
-
News
16 Mar 2005
RootkitRevealer turns root kits' tactics back at them
A contributor reviews freeware RootkitRevealer from Sysinternals. Continue Reading
-
Feature
16 Mar 2005
Managed services: Looking to the long term
IT directors looking for an easy way to manage increasing volumes of data by buying more hardware could be storing up problems... Continue Reading
-
News
13 Mar 2005
Security Bytes: Turning servers into 'malcode pushers'
In other news, 'antispyware' company shut down during investigation and new Java Trojan hits alternative browsers. Continue Reading
By- SearchSecurity.com Staff
- News 08 Mar 2005
-
News
08 Mar 2005
A sound architecture involves both strong technology and a professional approach
Although many large organisations need to respond rapidly to changes in the market as well as to competition and globalisation... Continue Reading
By- Alan Brown
-
News
17 Feb 2005
Do you speak geek: All hail e-mail!
Test your knowledge of e-mail security with this quiz. Continue Reading
-
News
03 Feb 2005
Expect 13 Windows patches, some critical
Microsoft will release patches Tuesday to fix critical security holes in Windows Media Player, MSN Messenger, Microsoft Office and Visual Studio. Continue Reading
By -
Feature
14 Jan 2005
Financing the future
Don't get a headache working out the best ways to pay for hardware and software. Danny Bradbury offers a user-friendly guide to... Continue Reading
-
News
20 Dec 2004
Fixes, workaround for Kerberos 5 vulnerability
A security hole could be exploited to launch malicious code. But there are fixes and a workaround. Continue Reading
By -
News
09 Dec 2004
Data storage history quiz
We tend to take storage for granted these days, and expect bigger, better and faster performance out of our hardware and software. But did you know that storage has a long and illustrious history that started out not so big or so fast? Take our data storage history quiz and see how much you know about the beginning of data storage. You just might be surprised. Continue Reading
-
News
12 Nov 2004
NTFS permissions
This excerpt from Chapter 5 of "The definitive guide to Windows 2000 security" discusses the advantages of using NTFS for access control. Continue Reading
By- Paul Cooke
-
News
31 Oct 2004
Fast Guide: Storage Management
Managing your storage infrastructure has never been harder. Complex systems, unbelievable data growth rates and squabbling vendors are just a few of the issues hampering your ability to manage storage. This Fast Guide to storage management has everything you need to learn how to plan your storage environment, make sure it's running smoothly and stay on top of the trends fueling the next generation of storage management. Continue Reading
-
News
28 Oct 2004
MoD may write off £200m Chinook helicopters
The Ministry of Defence could write off more than £200m spent on eight Chinook Mk3 helicopters. Continue Reading
By -
News
23 Sep 2004
Multiple strategies guard youth services agency
Major corporations aren't the only ones who need to protect confidential information, ward off spam and malware, and defend against intrusion. Local youth service agencies must do the same, with far smaller budgets. Continue Reading
By- Edmund X. DeJesus, Contributing Writer
-
Feature
14 Sep 2004
The gift of CRM
For Red Letter Days, a provider of gift experiences for corporates and consumers, a CRM system was essential to give it market... Continue Reading
-
News
27 Aug 2004
Over-specify when buying low cost replacement for Frame Relay
A project manager reveals how a VPN saved £275,000 a year Continue Reading
By- Peter Skipwith
-
News
28 Jul 2004
Automated SQL injection: What your enterprise needs to know
The second of a two-part interview with SPI Dynamics CTO Caleb Sima tells what you should fear, why and what you can do to mitigate your risk. Continue Reading
By- Shawna McAlearney, News Writer
-
News
25 Jul 2004
Know Your Enemy -- Learning about Security Threats: Chapter 8, Legal Issues
Find out more about the legal issues swirling around the use of Honeypots. Continue Reading
-
News
18 Jul 2004
Enterprise-class RAID functions, part 2: N-way mirroring, splitting and more
With the convergence of RAID and lower-priced storage technologies, advanced RAID functions can be enjoyed by any small-to-medium sized organization with critical data. Continue Reading
By- Randy Arnott
-
News
09 Jul 2004
Old Mutual rolls out web reporting software to meet new regulations
Financial services group Old Mutual has rolled out web-based reporting software across its business worldwide to consolidate data... Continue Reading
By -
News
21 Jun 2004
Users at risk after web host attack
Users have been warned to brace themselves for attacks on sites which provide patch downloads and web hosting services. Continue Reading
By -
News
10 May 2004
'Whispering keyboards' could be next attack trend
An IBM researcher's found a way to lift passcodes and other sensitive data by recording the sound of keystrokes. Continue Reading
By- Niall McKay, Contributing Writer
-
News
19 Apr 2004
UK clearing house joint venture to provide online payment service
UK clearing house Bacs has embarked on a joint venture with a US software company to provide an online bill presentation and... Continue Reading
By -
News
15 Apr 2004
Bacs launches online billing service
UK clearing house Bacs has embarked on a joint venture with a US software company to provide an online bill presentation and... Continue Reading
By -
News
28 Mar 2004
Software Forensics: Chapter 2 -- The Players: Hackers, Crackers, Phreaks, and Other Doodz
Read Chapter 2, Players: Hackers, Crackers, Phreaks, and Other Doodz, from the book "Software Forensics" written by Robert M. Slade. Continue Reading
-
Feature
15 Mar 2004
Achieving the goal of CIO
What exactly does a chief information officer do?Paul Burfitt, global CIO at AstraZeneca, analysed the various aspects of his job... Continue Reading
By -
News
27 Oct 2003
Council migrates to web enabled benefits system
Liverpool City Council has completed a six-week data migration project to get its £5m housing benefit and council tax system up... Continue Reading
By- James Rogers
-
Feature
16 Apr 2003
Thought for the day: Flights of fancy
Launch a Java-based office suite? Simon Moores questions the sanity of any company that would consider doing so, even if it is... Continue Reading
By- Simon Moores at Zentelligence
-
News
18 Jul 2002
MoD will defy Lords and MPs and stand by Chinook verdict
The Ministry of Defence will defy two Parliamentary select committees next week by formally backing the verdict of negligence... Continue Reading
By -
News
18 Jul 2002
EMC and HP allow mix and match storage
Rivals EMC and Hewlett-Packard have agreed to expand a cross-licensing agreement for certain storage system application... Continue Reading
-
News
05 Jun 2002
Peer urges Tony Blair to intervene over Chinook
Lord Chalfont, the head of a Parliamentary campaign to clear the names of two pilots blamed for a Chinook helicopter crash in... Continue Reading
By -
News
10 Mar 2002
September 11: How Merrill Lynch recovered
Merrill Lynch lost two data centres during the 11 September terrorist attacks in New York. The site is now functioning as a... Continue Reading
-
Feature
14 Sep 2001
CBI warns on cybercrime
A new survey warns that UK e-commerce is being stifled by rising crime and consumer caution about buying goods on the Internet Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
24 Aug 2001
HP gambles on Itanium
A top Hewlett-Packard executive has signalled his company's commitment to Intel Itanium processor in perhaps the strongest terms... Continue Reading
-
News
22 Aug 2001
Intel's open source warning for Sun
Intel, the chip manufacturing giant, has warned Sun Microsystems that the economic slowdown could drive many enterprises to use... Continue Reading
By- Emma Nash
-
Feature
04 May 2001
Taxing times for global issues
International traders have always had to overcome a complex array of tariffs and local tax laws. But with the advent of... Continue Reading
- Feature 26 Mar 2001
- Feature 25 Mar 2001
- News 13 Mar 2001
- News 07 Mar 2001
-
Feature
28 Feb 2001
Growing pains
Five e-commerce companies tell E-Business Review how they overcame initial teething problems Continue Reading
By- Simon Lubin
-
Feature
28 Feb 2001
When all is safely gathered in
Portals are a great way to gather all of your company's services into one easily accessible place. Danny Bradbury takes a look at... Continue Reading
-
Feature
28 Feb 2001
Leaked MoD notice reveals new Chinook system hazard
The MoD has claimed that the problems with the Chinook's Fadec software were minor faults. Yet a leaked MoD notice warns of a... Continue Reading
By -
News
28 Feb 2001
MoD knew about safety hazard on Chinook MkII
Two leaked internal documents contradict claims by the Ministry of Defence that problems with the engine control system of the... Continue Reading
By - Feature 28 Feb 2001
-
Feature
28 Feb 2001
Grpup-buying sites prove unpopular
Group buying sites seemed like a good idea, but failed to attract much attention. Sun and Microsoft's sites, on the other hand,... Continue Reading
By -
Feature
14 Feb 2001
Spring has sprung for Spring
Spring Group has moved its business environment on-line with the development of a fully integrated web operating system. Continue Reading
-
Feature
31 Jan 2001
The 3 flavours of 2001
Before the end of the year, three new technologies will emerge triumphant. Sanjay Manandhar reports. Continue Reading
By- Sanjay Manandhar
-
Feature
10 Jan 2001
Towards an inclusive future
Leeds City Council is fighting social exclusion using customer service centres. Paul Donovan reports Continue Reading
By- Paul Donovan
-
News
10 Jan 2001
SMS to boost open system productivity
Tivoli is promising to bring the benefits of system managed storage (SMS) to the open systems world with its Storage Tank... Continue Reading
-
Feature
10 Jan 2001
A big blueprint for e-business
Companies have been making mistakes with their e-business strategies since the whole brouhaha over online commerce started. But... Continue Reading
-
Feature
03 Jan 2001
Not-very-mobile-commerce
Mobile commerce is a dream coming true, say the telcos. Well they would, wouldn't they? Simon Quicke reports Continue Reading
By- Simon Quicke, Microscope Editor
-
News
06 Dec 2000
Euro raises UKB2B fears
Is the euro a help or a hindrance for UKB2B plans, asks Ross Bentley Continue Reading
By- Ross Bentley
-
Feature
29 Nov 2000
Chinook report slams flawed MoD procurement methods
Public Accounts Committee report into fatal crash of a Chinook Mk2 helicopter focused on a report by independent contractor EDS-Scicon, which was hired to assess the Chinook’s Fadec engine control system Continue Reading
By -
News
01 Nov 2000
Software expert attacks MoD's 'preposterous' Chinook claims
The Ministry of Defence's latest claim that there is 'no doubt' over the cause of the Chinook helicopter crash have raised... Continue Reading
By -
Feature
18 Oct 2000
Customers could be winners as Abbey risks opening up to rivals
Abbey National's online mortgage service will break new ground, but it is not without risks. Nick Huber reports Continue Reading
By -
Feature
28 Jun 2000
The Chinook accident in 1989 - the facts
Problem with fault logic of FADEC software identified at key meeting Continue Reading
-
Feature
03 May 2000
Planning for e-commerce: balance your workload
Capacity planning isn't easy, but it's not rocket science either, says Danny Bradbury. And that makes the recent failure of some... Continue Reading
-
News
08 Mar 2000
Software safety issues were noticed by MOD before Chinook crash
A leaked draft memo written by a senior RAF officer reveals for the first time that there were safety concerns over the software used in the type of Chinook Mk2 helicopter that crashed on the Mull of Kintyre in June 1994. Continue Reading
By - Feature 01 Mar 2000