IT strategy
IT strategy (information technology strategy) is a comprehensive plan that outlines how technology should be used to meet IT and business goals.. See complete definition.
-
News
10 Sep 2024
Belgium: Researchers at Imec tackle bioconvergence
Several initiatives are underway at Imec to apply semiconductor and related technology to a range of challenges in healthcare Continue Reading
By- Pat Brans, Pat Brans Associates/Grenoble Ecole de Management
-
News
22 May 2024
Dutch employers should discuss using algorithms in managing staff
Dutch organisations must engage in open discussions with employees about the use of algorithms and data in managing staff Continue Reading
-
News
07 Apr 2009
Spend on NHS NPfIT of £5.1bn exceeds initial budget
Taxpayer spending so far on the NHS’s National Programme for IT (NPfIT) has risen to £5.1bn, which is more than the scheme’s original total lifecycle cost. Continue Reading
By -
Photo Story
30 Mar 2009
Photos: Renault F1 aerodynamics and design for 2009
Ever wanted the inside track on what goes into redesigning an F1 car? Well this gallery should stear you in the right direction. Continue Reading
By -
Feature
24 Mar 2009
Deduce the location of the remaining domino tiles
Go to the homepage >> Try more puzzlers... Continue Reading
By- Jim Howson
-
Photo Story
04 Mar 2009
Photos: Digital program brings polar history to life
Images relating to two British icons, the glorious failure Scott of the Antarctic, and that leader without parallel, Ernest Shackleton, went online today at noon. Continue Reading
By -
News
23 Feb 2009
Exclusive: Computer Weekly publishes 'secret' gateway review
This is the first publication of an entire gateway review by an online news service. Continue Reading
By -
Photo Story
17 Feb 2009
Photos: Poor factory conditions for tech workers
A recent investigation by the National Labour Committee has found “prison-like” conditions in a Chinese factory supplying Dell, Microsoft, HP, Lenovo and IBM. The Meitai Plastics and Electronic Factory is in Dongguan City, Guangdong Province in south China. Continue Reading
By- Rebecca Thomson, Computer Weekly
-
Photo Story
16 Feb 2009
Photos: Mobile Healthcare in developing countries
Mobile technology has the potential to revolutionise health care in developing countries, particularly in the area of heath awareness schemes and training health care professionals. Continue Reading
By- Cliff Saran, Managing Editor
-
News
10 Feb 2009
Added critical data protection for SMBs
New technology aiming to solve small and medium size businesses’ perennial problems with protecting business critical data Continue Reading
By- Joe O’Halloran, Computer Weekly
-
Photo Story
03 Feb 2009
Snow show - snow photos from Computer Weekly
With heavy snowfalls across much of Britain, and London experiencing its heaviest snow for 18 years, here's a collection of some of the snowy scenes spotted by Computer Weekly staff and readers. Continue Reading
-
Photo Story
29 Jan 2009
Tearfund uses technology to support disaster relief
Charity Tearfund, which provided relief for victims of natural and man-made disasters, is using technology to enable its 1000 workers to access applications from anywhere. Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
Photo Story
28 Jan 2009
Photos: 2012 London Olympics – the challenges facing IT
The London Olympics 2012 venues and the IT supporting them. Continue Reading
By- Rebecca Thomson, Computer Weekly
-
Photo Story
21 Jan 2009
Photos: Royal Family and Beckhams census from 1911
The online census reveals the details of the 36 million people living in England and Wales in 1911. Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
Photo Story
19 Jan 2009
Photos: Depressed Robots we have come to love
The 19 of January, we're told is the most depressing day of the year. To celebrate this momentous day, we've picked out the most depressing robots. Continue Reading
By -
Feature
05 Jan 2009
Web 2.0 profiles
C hris Middleton profiles two very different approaches to so-called " w ikinomics " . One is a small not-for-profit organisation... Continue Reading
-
Photo Story
27 Dec 2008
Photos: 2008 review of the year in IT
Review of the IT events of the year in pictures. From Bill Gates leaving Microsoft, through to the launch of the Large Hadron Collider, to the outsourcing implications of the attacks on Mumbai, 2008 has been one hell of a year Continue Reading
By -
Photo Story
22 Dec 2008
Best business gadgets 2008
2008 has seen a raft of great gadgets hit the market, but which ones are the most useful for the IT professional? Continue Reading
By -
News
19 Dec 2008
Mobile broadband demand props up crunched WiMAX
Research predicts global recession to cause enterprises to postpone WiMAX adoption but mobile will lead recovery Continue Reading
By- Joe O’Halloran, Computer Weekly
-
Photo Story
19 Dec 2008
Photos: Barclays hi-tech Piccadilly branch
Barclays bank has opened a cutting-edge branch in Piccadilly Circus demonstrating how technology is changing the way the bank can serve customers. Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
10 Dec 2008
MoD was warned not to fly Chinook on day of crash
A senior defence official warned the Ministry of Defence to suspend flights of a Chinook helicopter because of safety concerns on the day the aircraft crashed... Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
08 Dec 2008
Chinook ZD576: How the Fadec engine control software worked and what could have gone wrong
What follows is some of the evidence ... Continue Reading
By -
News
08 Dec 2008
Victory over Chinook crash after 14 years
A brave, independent stand by the Defence Secretary John Hutton and his predecessor Des Browne, against 14 years of obfuscation and immovable arrogance by the Ministry of Defence, has led finally to justice over the notorious crash of a Chinook helicopter in June 1994. Continue Reading
By -
News
08 Dec 2008
Tens of thousands of IT jobs at risk in global finance sector
The investment banking industry will see thousands of job cuts as mergers are completed and companies prepare for a slowdown in business. Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
04 Dec 2008
How the Mytob virus caused havoc in the NHS
The Mytob virus has been removed from 5,000 PCs at Continue Reading
By - News 28 Nov 2008
-
Feature
20 Nov 2008
existing article from PC
In June 2008 tGOOGLE HYPERLINK IS HERE NHS Trust became the first trust to install the London Configuration Release...
Continue ReadingBy- Computer Weekly Staff
-
News
18 Nov 2008
Union calls for return of 4,000 offshored jobs
Lloyds TSB Group Union will use the bank's extraordinary general meeting today to encourage shareholders to support the return of 4,000 jobs...
Continue ReadingBy- Karl Flinders, Chief reporter and senior editor EMEA
-
Photo Story
04 Nov 2008
Photos: Gartner Symposium Keynote, Cannes
The Gartner Symposium in Cannes 2008 kicked off with a sombre message for chief information officers and IT directors: "IT must innovate in this economic downturn." Continue Reading
By- Cliff Saran, Managing Editor
-
News
01 Sep 2008
Fujitsu seeking £700m over NHS IT contract termination
Fujitsu is reported to be seeking £700m from the Department of Health after its £1bn contract as a local service provider Continue Reading
By -
News
21 Aug 2008
Microsoft and Novell expand Windows/Linux integration deal
Microsoft and Novell are extending their interoperability agreement to tie Windows closer to Novell's SUSE Linux in the enterprise. Continue Reading
-
News
31 Jul 2008
Minister hails Fujitsu’s leaving NPfIT as sign of strength
The termination of Fujitsu's... Continue Reading
By -
Feature
16 Jul 2008
Facing up to security perils of outbound traffic
What about the threat from within and, more specifically, the security issues that arise from outbound traffic risks? Continue Reading
By -
News
16 Jun 2008
Gary McKinnon broke into 73,000 US government computers, Lords told
Self confessed British hacker Gary McKinnon, who is fighting extradition to the US, broke into more than 73,000 US government computers, including those of the US Army, Navy and Nasa, and deleted critical data, the House of Lords heard today. Continue Reading
By -
Feature
28 May 2008
Chinook helicopter disaster - computer software failure or pilot error?
Chinook helicopter crash: was it computer software failure or a cause we'll never know? This article gives the background to the Chinook helicopter disaster with links to all the relevant articles published by ComputerWeekly and other useful web links. Continue Reading
By -
News
27 May 2008
New doubts raised on Chinook crash ruling
A former senior officer who helped write rules for RAF accident inquiries has spoken publicly for the first time about his concerns over the cause of a controversial Chinook helicopter crash 14 years ago. Continue Reading
By -
News
23 Jan 2008
Network managers: master project management to get better salaries
Network technicians will need to learn project manager skills if corporate rollouts of wider and more advanced networks are to be successful, according to attendees at the Cisco Networkers 2008 this week. Continue Reading
-
News
22 Jan 2008
Fujitsu may quit NHS National Programme for IT
The board of an NHS trust has learned of a "significant" risk of Fujitsu ending its £900m contract to supply and implement hospital systems across southern England as part of the National Programme for IT. Continue Reading
By -
News
11 Dec 2007
San adoption cuts costs and power
Advanced storage driving datacentre area and energy consumption reduction Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
26 Nov 2007
Ofcom fines broadband provider
Ofcom has fined broadband provider Prodigy £30,000 for failing to comply with requirements to provide information on how it allows customers to switch broadband provider. Continue Reading
- News 16 Nov 2007
-
News
14 Nov 2007
Home Office awards £650m e-Borders contract
The Home Office has awarded its £650m eBorders contract to a consortium led by Raytheon Systems. Continue Reading
-
Feature
06 Nov 2007
Managed VoIP keeps regatta's communications afloat
The world's largest rowing regatta utilises managed VoIP to ease its year-round communications needs -- and for a temporary system during its celebrated two-day event. Continue Reading
By- Kate Dostart, Associate Editor
-
News
06 Nov 2007
Non-unified communications can cost millions
Fragmented communications are costing companies millions of dollars by disrupting workflow and business processes, a new study has revealed. Continue Reading
By- Andrew R. Hickey, News Editor
-
News
06 Nov 2007
Adaptec reports losses
Adaptec's revenue was down year over year, as well as sequentially; DataDirect says the InfiniBand business is booming. Continue Reading
By- SearchStorage.com Staff
-
News
06 Nov 2007
CommVault revenues spike after update of Simpana backup app
CommVault attributes a spike in sales to the integration of features such as archiving, replication and search into its backup products. Continue Reading
By -
News
01 Nov 2007
ISCSI storage gets performance makeover
Suppliers, including Ibrix, Mellanox, Alacritech and EqualLogic, are offering juiced-up new iSCSI configurations, while 3PAR, CipherMax and NeoScale boost data security products. Continue Reading
By- SearchStorage.com Staff
-
Feature
31 Oct 2007
Vanderbilt hospital fights archive growth with grid
Vanderbilt University Medical Centre simplifies document management using Bycast's archiving grid system. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
30 Oct 2007
EMC's Tucci vows to keep up with new features
EMC CEO says storage giant is widening its technology net to match innovations of smaller competitors. Continue Reading
By -
News
29 Oct 2007
Unified communications platform gets SMB twist
While unified communications has eluded the SMB market, Siemens has released an all-in-one UC appliance specifically for the SMB. Continue Reading
By- Andrew R. Hickey, News Editor
-
News
28 Oct 2007
Advanced data storage final exam
Are you up to date on advanced data storage technologies? Take our final exam and evaluate your knowledge of advanced data storage. This final exam isn't for the weak. Continue Reading
-
News
28 Oct 2007
NetApp releases $3K iSCSI SAN
NetApp pushes further down-market with the release of the S300, the latest SMB iSCSI SAN in its StoreVault line. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
23 Oct 2007
Product Roundup: ISCSI
Here's a look at some of the vendors and products that make up the iSCSI market. Continue Reading
-
News
21 Oct 2007
Tackling the backup and recovery challenges of tomorrow
Your data backup and data recovery challenges never stop changing. In this videocast, an EMC executive and a storage analyst discuss the new approaches you'll need to solve tomorrow's backup and recovery challenges. Continue Reading
-
News
21 Oct 2007
VoIP certification credentials
Many certifications touch on voice over IP topics tangentially, but numerous credentials now focus a fairly substantial portion of their coverage on this subject matter. In this certification survey, we take a look at available certifications, distinguishing between those credentials for which VoIP is a primary topic and those for which it is secondary. Continue Reading
By -
News
21 Oct 2007
Intellectual property lawsuits dog storage industry
The proliferation of patent litigation among data storage companies could stifle technological innovation and drive up costs to the user. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
14 Oct 2007
VMware takes on data migration
VMware supports migrating data between disc arrays with Storage VMotion, changing the equation between server and storage virtualisation devices. Continue Reading
By- Beth Pariseau, Senior News Writer
-
Feature
10 Oct 2007
Checklist for purchasing hardware-based encryption
Encryption appliances sit inline on a network and use specially designed electronics to encrypt data at line speeds, essentially eliminating the performance penalty imposed by encryption software running on a general server. While software-based encryption is typically handled as a specific event or process (e.g., encrypting data during a backup process), appliance-based encryption normally can handle any quantity of data in flight. Continue Reading
-
News
09 Oct 2007
Switch upgrades and replacements
In this chapter of our guide to SAN expansion best practices, you'll learn about the physical limitations of switches, how to architect the switching infrastructure and how to find opportunities to deploy ISCSI. Continue Reading
-
Feature
09 Oct 2007
CRM strategies for SMBs
Keeping your customers happy is job number one. With CRM software, luckily, that job becomes a lot easier. Here we present our top five CRM tips for SMBs. Continue Reading
-
Feature
09 Oct 2007
Open source strategies for SMBs
One way to make the most of a tight budget is to invest in open source technologies. Not only are they generally more secure than most off-the-shelf proprietary products, they're usually free too. Here we present our top five open source tips for SMBs. Continue Reading
-
News
05 Oct 2007
Podcast: the true cost of IT security
In this interview, Cliff Saran speaks to Martin Sadler, director of HP's Trusted Systems Lab, about how much should we be expected to spend and how much security is enough. Hackers are getting smarter and Martin believes newly trained IT professionals are ill-equipped to deal with the sophisticated nature of modern attacks due to limitations in the current way IT security is taught. Continue Reading
By- Cliff Saran, Managing Editor
-
News
04 Oct 2007
Pillar announces support for 1 TB SATA drives
Pillar is one of the earliest to announce 1 TB SATA drives in an enterprise array. IBM's SVC becomes the first storage virtualization product certified with VMware. Continue Reading
By- SearchStorage.com Staff
-
News
02 Oct 2007
Web 2.0 strategies for SMBs
Web 2.0 technologies are catching on at companies of all sizes. Find out how to make them work for your SMB with SearchSMB.com's top five Web 2.0 tips. Continue Reading
-
Feature
01 Oct 2007
How to select the right IP PBX
Selecting the right IP PBX system for your company can be complicated. Here are some important things to consider when purchasing an IP PBX. Continue Reading
By -
News
01 Oct 2007
UK will lead £13m study on electronic ID
The UK is to spearhead a £13m pilot project covering 13 European countries to test the interoperability of several electronic identity verification systems. This may eventually give citizens and businesses access to e-government services across the EU, if governments can agree to accept one another's vetting processes. Continue Reading
By -
News
26 Sep 2007
Microsoft releases Windows Server 2008 RC0
Windows Server 2008 Release Candidate 0 (RC0) is now available for customer review. Continue Reading
-
News
24 Sep 2007
PCI council adds Pin security to remit
The PCI Security Standards Council has added Pin Entry Device (PED) security technology to its payments industry testing portfolio to streamline standardisation. Continue Reading
-
Feature
23 Sep 2007
Storage session downloads: infrastructure track
This track looks at San and Nas issues, virtualization, distance demands, remote offices and how to build out systems. Continue Reading
-
News
16 Sep 2007
3PAR adds tiered storage management tool
The new version of the System Reporter management tool for 3PAR's high-end arrays now includes monitoring for tiered storage environments. Continue Reading
By- SearchStorage.com Staff
-
News
16 Sep 2007
Storage Decisions Session Downloads: Data Protection and Backup Track (NYC 2007)
Making the backup process seamless and reliable is critical. This track covers the staple backup technologies such as disk and tape, but also has an eye on the litany of new technologies set to drastically alter the data protection landscape. Speakers will explain how emerging technologies such as data de-duplication, continuous data protection (CDP) and encryption are changing how managers perform and monitor copies of data. Continue Reading
-
News
16 Sep 2007
Communications-as-a-service taking hold
Communications-as-a-service is taking hold worldwide as a viable hosted IP telephony system. Continue Reading
By- Andrew R. Hickey, News Editor
-
News
10 Sep 2007
Product Roundup: E-discovery
A look at some of the suppliers and products that make up the e-discovery market. Continue Reading
-
News
09 Sep 2007
Virtual appliance lets users convert DAS to iSCSI San
LeftHand Networks has released an edition of its SaniQ iSCSI San software that will convert locally attached disc to networked storage. Continue Reading
By- Beth Pariseau, Senior News Writer
-
Feature
07 Sep 2007
Surviving e-discovery
It's been eight months since the Federal Rules of Civil Procedure were amended, and e-discovery rulings are all over the map, creating chaos for companies that must comply. Continue Reading
-
News
07 Sep 2007
Microsoft update to patch critical Windows flaw
Microsoft plans to patch a critical flaw in Windows and plug holes in MSN Messenger, Visual Studio, and Windows services for Unix. Continue Reading
By- SearchSecurity.com Staff
-
News
07 Sep 2007
Government warns of dangerous QuickBooks Online flaw
Attackers could exploit two flaws in the popular Intuit QuickBooks Online Edition to cause buffer overflows and download or upload files in arbitrary locations, US-CERT warned. Continue Reading
By -
News
07 Sep 2007
Cybercriminals employ toolkits in rising numbers to steal data
The market is increasing for crimeware toolkits that help cybercriminals avoid detection and exploit flaws, according to new research from security vendor, Finjan. Continue Reading
By- Robert Westervelt, TechTarget
-
News
06 Sep 2007
Data security breach at Pfizer affects thousands
A Pfizer employee removed files exposing 34,000 people to potential identity fraud, according to the company. It was the third data breach at the company in three months. Continue Reading
By- SearchSecurity.com Staff
-
News
05 Sep 2007
NAC switches, appliances help track users, malware
Some vendors are offering switches and appliances to monitor traffic for malware and unauthorized access, as the NAC market including Cisco NAC and Microsoft NAP sorts itself out. Continue Reading
By- Neil Roiter, TechTarget
-
News
05 Sep 2007
Firefox security issues persist despite update
Despite Mozilla's recent Firefox security update, researchers say there's another way attackers could exploit the browser for malicious purposes. Continue Reading
By -
News
29 Aug 2007
Rootkit found in older Sony USB device
F-Secure says it discovered rootkit technology in Sony's Micro Vault USM-F fingerprint reader software. The find comes two years after controversy over Sony's DRM technology. Continue Reading
By -
Feature
29 Aug 2007
SaaS apps being deployed by business units, not IT
When it comes to deploying applications via SaaS, IT is still behind the curve. What's preventing IT from getting control over the programs business units want? Continue Reading
By- Shamus McGillicuddy, Enterprise Management Associates
-
News
28 Aug 2007
Unified communications slow to change U.S. work culture
Unified communications implementation is still high, but many enterprises have yet to allow users all its advantages. Continue Reading
By- Kate Dostart, Associate Editor
-
News
28 Aug 2007
Data archives overview
When a file is lost due to user error, or data is corrupted because of system problems, the affected data can be restored from a backup. An archive is different from a backup because the data may not be used for months, even years, but must be accessed quickly when needed. There is simply no time to search through burgeoning volumes of tape or optical media to locate important files. Traditional backup platforms are poorly suited for archival data storage, and users are relying on disk storage systems for a mix of performance and reliability. Files can be archived to any disk storage system, but content-addressed storage (CAS) technology has appeared to support archiving efforts. Continue Reading
By- Stephen J. Bigelow, Senior Technology Editor
-
News
28 Aug 2007
SANS: Attackers may be attempting Trend Micro exploits
The SANS Internet Storm Center (ISC) warns that attackers may be attempting to exploit flaws in Trend Micro products to hijack computer systems. Continue Reading
By -
News
26 Aug 2007
What is considered best practices in terms of backup vaulting (offsite storage) frequency?
As a consultant, this is something that I run into frequently. There seems to be a belief that if you're a smaller shop or smaller business: You don't have a lot of data, and you don't need to send your data offsite very often. A lot of times, the decision to send tapes offsite is dictated, unfortunately, by the growing capacity of tape media. If you're backing up 100 gigabytes a week, it becomes embarrassing to a lot of folks to send that tape cartridge offsite because it's not full. Continue Reading
-
News
26 Aug 2007
IBM back in iSCSI SAN fray
IBM is looking to take on HP's MSA and EMC's AX150, as well as EqualLogic and LeftHand, with a new iSCSI SAN product OEMed from LSI. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
23 Aug 2007
Nokia Intellisync boosts device management
Nokia Intellisync has released updates to its Mobile Suite to enhance remote device support, loss and theft protection, and management capabilities. Continue Reading
By- Andrew R. Hickey, News Editor
-
Feature
23 Aug 2007
Experts: IDS is here to stay
IDS technology has survived predictions that it would be replaced by IPS. One expert says it will remain a separate product while IPS is folded into firewalls. Continue Reading
By -
News
22 Aug 2007
Trend Micro fixes flaws in ServerProtect, PC-cillin
Attackers could tamper with servers and run malicious code by exploiting flaws in Trend Micro's ServerProtect, Anti-Spyware and PC-cillin products. But fixes are available. Continue Reading
By -
News
22 Aug 2007
Attackers target two Microsoft security flaws
Symantec warned customers about attacks targeting two Microsoft security flaws -- an unpatched DirectX Media vulnerability and the XML Core Services flaw patched in MS07-042. Continue Reading
By -
Feature
21 Aug 2007
Backup reporting expands to add capacity planning
Aptare adds capacity planning for primary data storage to its product line, joining Symantec in recent attempts to broaden the appeal of reporting software. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
20 Aug 2007
Sourcefire acquires open source ClamAV
Sourcefire, maker of the popular Snort open source IDS tool, has acquired ClamAV, an open source email gateway scanning tool. Continue Reading
By -
News
20 Aug 2007
VMware acquires HIPS provider Determina
VMware, the leader in virtualization software, has acquired Determina, a provider of host IPS technology. Continue Reading
-
News
20 Aug 2007
3PAR, EqualLogic file for IPOs
The emerging storage companies file S-1 forms with the SEC, though some experts warn they could be headed for a volatile market. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
19 Aug 2007
College campuses prepare for Microsoft Vista challenges
With new Vista machines coming to campus, the IT shops of academia have no choice but to embrace the latest Windows OS and its security implications. Continue Reading
By -
News
17 Aug 2007
Wal-Mart deploys new data security system
Wal-Mart Stores has deployed a data security and encryption system to secure data going over its global network. Continue Reading
-
News
16 Aug 2007
TJX profit takes hit over data breach
TJX says it has spent $256 million responding to the massive data breach that exposed 45 million customers to identity fraud, and the bottom line has suffered as a result. Continue Reading
By- SearchSecurity.com Staff
-
News
15 Aug 2007
Latest Microsoft flaws affect Windows, IE, Excel
Microsoft released nine security updates Tuesday -- six of them critical -- for flaws in Internet Explorer, Excel and other programs within the Windows OS. Continue Reading
By -
Feature
15 Aug 2007
Asterisk PBX solves enterprise's growing communication problem
An Asterisk-based PBX proved to be the solution to one enterprise's communications growing pains. Continue Reading
By- Kate Dostart, Associate Editor
-
News
14 Aug 2007
Novell to acquire Senforce for endpoint security
Novell is acquiring Senforce, an early network access control supplier, to integrate its endpoint security features and develop an endpoint management suite. Continue Reading
By- Robert Westervelt, TechTarget