In Depth
In Depth
-
IPv6: The security risks to business
IT security professionals say the security holes that will open up in many business organisations as the world moves over to internet protocol version six (IPv6) constitute a substantial security concern Continue Reading
-
What is big data and how can it be used to gain competitive advantage?
Cliff Saran discovers how big data can deliver big business benefits without excessive IT investment Continue Reading
-
How to write a disaster recovery plan and define disaster recovery strategies
Learn how to develop disaster recovery strategies as well as how to write a disaster recovery plan with these step-by-step instructions Continue Reading
-
How to manage semi-structured data
Semi-structured data is here to stay, and it offers the potential for business advantage to companies that handle and analyse it well. Mark Whitehorn has advice on how to do that. Continue Reading
-
IT in Europe e-zine: Data Management & BI Edition
The benefits of effective data management and business intelligence are many; so are the challenges. Get practical information and advice on data management & BI strategies in the IT in Europe ezine. Continue Reading
-
Why more businesses are nearshoring in Eastern Europe
Low-cost, highly skilled IT labour and a relatively close proximity to the UK is making Eastern Europe an increasingly attractive destination to UK businesses Continue Reading
-
Case study: How a small business can benefit from SaaS
Professional beauty products distributor SweetSquared considers using Microsoft Office 365 alongside browser-based SaaS. Continue Reading
-
How to combat advanced persistent threats: APT strategies to protect your organisation
Simple defence strategies will go a long way to preparing businesses for APTs Continue Reading
-
Top five IT finance and asset management issues
CIOs and anyone involved in IT procurement should assess the benefits of leasing and alternative financing over making capital purchases for new IT equipment, software and services. Cliff Saran looks at the options. Continue Reading
-
Five types of tape for backup or archive
There are plenty of tape formats to choose from when you are looking for a backup or archival medium. Here are five of the most common formats to consider. Continue Reading
-
Natural Disaster Recovery Planning from Christchurch Earthquakes
What do you do when the office is destroyed. We spoke to a number of companies in Christchurch about how they got up and running after the recent earthquakes. Continue Reading
-
Enterprise MLC: How flash vendors are boosting MLC write endurance
Enterprise MLC: Flash vendors are boosting MLC write endurance to level read/write wear, improve error correction and combat flash’s inherent tendency to write amplification. Continue Reading
-
Case study: Nissan Saves €10 million on LEAF Battery Production
In 2010 Nissan launched the world’s first mass produced electric car available from a major manufacturer, the LEAF (Leading, Environmentally friendly, Affordable, Family car). Continue Reading
-
Clarion Events Extends the Life of its System i and JD Edwards environment with Magic Software
Clarion Events is one of the UK's leading exhibition and event organisers. For over 30 years Clarion Events has been creating and developing stimulating and effective exhibitions, conferences and seated events in the UK, EMEA, Asia and America. ... Continue Reading
-
Disaster recovery: Risk assessment and business impact analysis
Disaster recovery: Risk assessment and business impact analysis are key stages in disaster recovery planning, but where do they fit into the DR planning process? Continue Reading
-
Block vs file for Hyper-V and VMware storage: Which is better?
Is block- or file-based storage better for Hyper-V and VMware virtual server environments? The answer depends on the precise needs of your virtual server environment. Continue Reading
-
The MCITP certification path to career success
Although not a substitute for proven work-experience, Microsoft’s MCITP certification endorses one’s technical knowledge and could improve job prospects. Continue Reading
-
Buyer's Guide: HP's Intelligent Resilient Framework (IRF) put to the test
In the world of datacentres and large-scale enterprise networks there has always been some form of perceived trade-off between performance and resilience. Building in resilience is absolutely essential of course, but it has historically affected ... Continue Reading
-
Linux certification in India: A guide
Linux deployments in data centers are fueling the need for skilled Linux administrators. A look at some Linux certification courses available in India. Continue Reading
-
Backup appliance: Backup software and hardware in one box
A backup appliance provides the backup app, processing power and disk to give all you need for SMB or branch office backup pre-packaged into one easy-to-manage box. Continue Reading
-
Case study: Examples and Results from the Hotel, Online, Retail, and Consumer Products Industries
A popular lodging company, with several thousand locations around the world, needed to improve the conversion rate for booking rooms on its own Web site vs. on online travel agency sites. Web-savvy customers, searching for the best deals, were ... Continue Reading
-
Making your PC fleet green
Planning for your computer fleet to satisfy the increasing need for environmental friendliness isn't as tough as it sounds. Here are five things CIOs can do. Continue Reading
-
SMB storage: What can you outsource to cloud storage and backup services?
SMB storage: Cloud storage and backup offer many cost-saving advantages to SMBs, but drawbacks too, so what exactly can you outsource to the cloud right now? Continue Reading
-
Case study: Bell Canada rings up big revenues with Infor CRM
Bell Mobility, a division of Bell Canada Enterprises, implemented an Infor customer relationship management solution, Interaction Advisor, and worked with Infor to transform Bell Mobility’s two call centers - with a combined 550 customer service ... Continue Reading
-
MS-CLIS at IIIT Allahabad: Evaluation of the post grad course in infosec
With numerous infosec certs to choose from, we look at how the master’s in information security and cyber law (MS-CLIS) at IIIT Allahabad is different Continue Reading
-
Clustered NAS vs traditional NAS solutions
Clustered NAS offers file visibility across petabytes of storage and is hugely scalable with the ability to increase throughput, IOPS or disk space by adding extra nodes. Continue Reading
-
Object-based storage promises scalability and flexibility for static, unstructured data needs
Object storage gets rid of traditional file system hierarchies and puts in place a flat access structure that provides a good basis for hugely scalable unstructured data access. Continue Reading
-
The power of ICT and its multiplier effect
Meet Michael Hedley, National Policy Manager for the Australian Information Industry Association (AIIA). Continue Reading
-
Secure your SCADA architecture by separating networks
Many critical national infrastructure systems include supervisory control and data acquisition (SCADA) functionality. These systems can be viewed as the set of software, computers and networks that provide remote co-ordination of controls systems ... Continue Reading
-
Google adds real-time traffic data to Android map app
Google has updated its algorithms to support real-time data for its map application for smartphones running on the Android operating system (OS). Continue Reading
-
Remote replication: Comparing data replication methods
Learn how remote replication fits into a disaster recovery plan, as well as the various data replication methods available, such as host-based, array-based and network-based replication. Continue Reading
-
How virtual machine backup differs from traditional backup
Virtual machine backup can be accomplished with traditional backup tools but can be better effected with snapshots and dedicated virtual server backup products. Continue Reading
-
MLC vs SLC: Which flash SSD is right for you?
Which flash SSD you choose depends on the performance you need and the price you want to pay, but the differences are not as great as you may think Continue Reading
-
Third-party cloud management tools do the trick
Cloud customers are increasingly turning to third-party tools or add-on functions to meet specific cloud-management requirements Continue Reading
-
What is Near Field Communication (NFC)?
Near-field communication (NFC) allows data to be exchanged between devices via short-range, high frequency wireless communication technology by combining the interface of a smartcard and reader into a single device. Continue Reading
-
Analyzing cloud computing's past and future
The credit crunch, broadband penetration and the maturation of Web-based services have all contributed to cloud's increased adoption levels. But where will the cloud go from here? Continue Reading
-
Data migration projects: Avoid data migration errors with automation, orphaned storage remediation
Learn the top three things users should do when planning a data migration project, what data migration tools you should have, describe some of the most common data migration errors, and describe some storage environment challenges when migrating ... Continue Reading
-
Budget for innovation: Case study - standardising Dell
This case study is part of a Computer Weekly roundtable on budget for innovation where IT leaders discussed the balance between spending on maintenance and innovation. Continue Reading
-
EDS report on 'dangerous' Chinook software published for the first time
Computer Weekly is publishing, for the first time, a technical analysis of the software installed on the Chinook Mk2 helicopter, the Chinook model which featured in the RAF's worst peacetime crash. Continue Reading
-
A guide to storage virtualization
Few technologies are more confusing than storage virtualization. Without a guide to explain the different storage virtualization solutions, storage administrators who want to deploy this technology will be lost. Continue Reading
-
Apollo 11: The computers that put man on the moon
It is hard to appreciate the technical challenges involved in putting a man on the moon, but 1960s computer technology played a fundamental role. Continue Reading
-
Deduce the location of the remaining domino tiles
Go to the homepage >> Try more puzzlers... Continue Reading
-
Thin provisioning FAQ
Tony Lock, programme director at analyst group Freeform Dynamics, answers common questions on thin provisioning. Continue Reading
-
Web 2.0 profiles
C hris Middleton profiles two very different approaches to so-called " w ikinomics " . One is a small not-for-profit organisation... Continue Reading
-
The cloud computing revolution
Hewlett-Packard has become the latest supplier of many to sound the death knell on the IT department. Continue Reading
-
existing article from PC
In June 2008 tGOOGLE HYPERLINK IS HERE NHS Trust became the first trust to install the London Configuration Release...
Continue Reading -
The CERN laboratory and the Big Bang theory – Essential Guide
We answer 10 frequently asked questions about the CERN laboratory and Big Bang theory Continue Reading
-
NAS virtualization explained
NAS virtualization can refer to the ability to virtualise multiple NAS heads into a single virtualised file system or the ability to spawn multiple virtual file servers within a physical file server. Either way, performing NAS virtualisation via a ... Continue Reading
-
Facing up to security perils of outbound traffic
What about the threat from within and, more specifically, the security issues that arise from outbound traffic risks? Continue Reading
-
Chinook helicopter disaster - computer software failure or pilot error?
Chinook helicopter crash: was it computer software failure or a cause we'll never know? This article gives the background to the Chinook helicopter disaster with links to all the relevant articles published by ComputerWeekly and other useful web ... Continue Reading
-
Learn all about LUNs
A LUN is the unique address for a SCSI device or a virtual hard disk partition in a RAID configuration. This handbook tells how to manage and partition LUNs. Continue Reading
-
Wi-Fi linked to childhood autism
A study published this week in the Australasian Journal of Clinical Environmental Medicine warns that wireless communication technology may be responsible for accelerating the rise in autism among children. Continue Reading
-
Managed VoIP keeps regatta's communications afloat
The world's largest rowing regatta utilises managed VoIP to ease its year-round communications needs -- and for a temporary system during its celebrated two-day event. Continue Reading
-
Integrating San and Nas
Sas and Nas systems are very different types of storage, with different features that serve different business needs. Here are eight best practices for integrating San and Nas. Continue Reading
-
How to select a storage capacity planning tool
To select a storage management and capacity planning tool, first calculate how much storage is available and how much of your total storage capacity is actually being used. Continue Reading
-
How data deduplication works
Chapter one of our data deduplication handbook takes you under the hood to show how data deduplication works so you can maximise the efficiency of this data reduction technology. Continue Reading
-
Vanderbilt hospital fights archive growth with grid
Vanderbilt University Medical Centre simplifies document management using Bycast's archiving grid system. Continue Reading
-
Data storage hardware quiz
Storage hardware, also known as primary storage, is a critical aspect in running your storage shop. How does your knowledge of storage hardware stack up? Take our quick quiz and find out today! Continue Reading
-
Checklist for purchasing hardware-based encryption
Encryption appliances sit inline on a network and use specially designed electronics to encrypt data at line speeds, essentially eliminating the performance penalty imposed by encryption software running on a general server. While software-based ... Continue Reading
-
CRM strategies for SMBs
Keeping your customers happy is job number one. With CRM software, luckily, that job becomes a lot easier. Here we present our top five CRM tips for SMBs. Continue Reading
-
Open source strategies for SMBs
One way to make the most of a tight budget is to invest in open source technologies. Not only are they generally more secure than most off-the-shelf proprietary products, they're usually free too. Here we present our top five open source tips for ... Continue Reading
-
IP PBX eases VoIP transition for gas company
An IP PBX with Sip helped one gas company upgrade to a new phone system while also jumping into VoIP. Continue Reading
-
San availability and reliability
This chapter outlines some of the techniques and tactics used to achieve high availability and redundancy in a San (FC or iSCSI). These can include port aggregation, trunking, and failover. Continue Reading
-
How to select the right IP PBX
Selecting the right IP PBX system for your company can be complicated. Here are some important things to consider when purchasing an IP PBX. Continue Reading
-
Storage session downloads: infrastructure track
This track looks at San and Nas issues, virtualization, distance demands, remote offices and how to build out systems. Continue Reading
-
Open communications vs. closed communications
Open communications are key to making the inevitable multimodal, multi-supplier communication environment work, so why aren't more suppliers providing open-source systems? Continue Reading
-
Surviving e-discovery
It's been eight months since the Federal Rules of Civil Procedure were amended, and e-discovery rulings are all over the map, creating chaos for companies that must comply. Continue Reading
-
Understanding VoWLAN
Like VoIP, VoWLAN contributes to cost efficiency. Because calls can be routed over the data network internally or over the Internet externally, mobile telephony costs can be eliminated or decreased significantly. In the long term, VoWLAN deployment ... Continue Reading
-
User performs data storage U-turn
U-Store-It, a national self-storage company, decentralized its data centers, migrated data from SAN to DAS and de-clustered Exchange to simplify storage management. Continue Reading
-
SaaS apps being deployed by business units, not IT
When it comes to deploying applications via SaaS, IT is still behind the curve. What's preventing IT from getting control over the programs business units want? Continue Reading
-
Experts: IDS is here to stay
IDS technology has survived predictions that it would be replaced by IPS. One expert says it will remain a separate product while IPS is folded into firewalls. Continue Reading
-
VoIP performance management abounds at VoiceCon
VoIP performance management tools were announced at VoiceCon, signaling a shift in focus from infrastructure to end-user experience. Continue Reading
-
Hosted and managed VoIP fundamentals
Adoption rates of hosted VoIP and managed VoIP are increasing as more companies look to reduce the costs and complexities of deploying VoIP in house. Enterprises are factoring revenue growth, enhanced productivity and communication services into ROI... Continue Reading
-
Backup reporting expands to add capacity planning
Aptare adds capacity planning for primary data storage to its product line, joining Symantec in recent attempts to broaden the appeal of reporting software. Continue Reading
-
Voice over WLAN improves a hospital's communications
A Voice over WLAN (VoWLAN) system was the solution to improving communications and response times for staff at one hospital, while boosting employee satisfaction. Continue Reading
-
Firewall deployment options increase for enterprises
With a growing number firewall configuration options, companies need to spend more time and put more effort into determining how to design and deploy firewalls. Continue Reading
-
Asterisk PBX solves enterprise's growing communication problem
An Asterisk-based PBX proved to be the solution to one enterprise's communications growing pains. Continue Reading
-
VoIP models and services: Complete guide
With clear, concise explanations of existing VoIP business models and deployment methodologies, this guide will enable you to weigh the pros and cons of each based on your needs. Continue Reading
-
How to cheat at VoIP Security
Securing a VoIP infrastructure requires planning, analysis, and detailed knowledge about the specifics of the implementation you choose to use. Continue Reading
-
Disaster recovery and business continuity fundamentals
The importance of disaster recovery and business continuity planning has been underscored in the wake of Hurricane Katrina, the Avian flu and 9/11. As important as maintaining continuous communications in a disaster is staying connected when random,... Continue Reading
-
Does compliance make encryption always necessary?
Many organisations look to encryption to protect sensitive data. Yet hundreds of millions of people who use the Internet also use encryption, yet most of them don't even know it. Continue Reading
-
Justifying VoIP deployment without cost-analysis
VoIP and UC deployment ROI can be measured using non-financial metrics. Learn more about VoIP ROI in this article from Yankee Group's Zeus Kerravala. Continue Reading
-
ISO 27001 could bridge the regulatory divide, expert says
Karen Worstell, former CISO at Microsoft and AT&T Wireless, now on the advisory board of Neupart A/S, explains how ISO 27001 can be used to help companies comply with a variety of regulations and standards Continue Reading
-
Videoconferencing tool gives Uno an edge
Videoconferencing has given Pizzeria Uno the ability to bring together more than 200 people and has enabled more efficient and cost-effective communication. Continue Reading
-
Inside MSRC: Microsoft Server flaw should be given high priority
An Active Directory flaw in Windows 2000 server and Windows Server 2003 should be given high priority, according to Christopher Budd of the Microsoft Security Response Center (MSRC). Continue Reading
-
Data migration product specifications
Part of the Tiered Storage Buying guide focusing on product specifications for data migration tools. Continue Reading
-
State agency tiers records storage with Compellent
The South Carolina attorney general's office estimates it will save thousands by storing millions of paper records in digital format using Compellent's automated tiered storage. Continue Reading
-
Corporate Mergers and Acquisitions Security Learning Guide
A panel of experts breaks down M&A security priorities and explains the best ways to manage disparate security staffs, technologies and policies. Continue Reading
-
Hacking for Dummies: Test your firewall rules
Before someone else hacks your firewall, test your firewall rules during the self-hacking process to test your network's security. Continue Reading
-
IBM chief engineer talks green storage
IBM engineer Clod Barrera discusses the growing energy crisis in storage, the need for better power efficiency metrics and the future for "green" products. Continue Reading
-
Storage Decisions Downloads: Executives' storage guide
Ideas of where firms' storage should be and where it's headed. Also key ways to integrate new technologies, processes and ideas without going over budget. Continue Reading
-
Prevent network hacks with secure Web browsing
Hackers can penetrate your network in almost unlimited ways these days, and that includes through your Web browser. Learn how to improve Web browser security and keep these hackers out of your network. Continue Reading
-
Big Microsoft Vista concerns for Big Pharma
The second installment of an ongoing series examining the challenges of deploying Windows Vista and the considerations that go into the decision to roll out the new OS. Continue Reading
-
Is a merger or acquisition in Sourcefire's future?
Sourcefire founder and Chief Technology Officer Martin Roesch, talks about how Sourcefire fits into Security 3.0 theme and how the firm may be involved in a future merger or acquisition. Continue Reading
-
Why hacking contests, 'month-of' projects don't help
Ivan Arce, chief technology officer of Core Security Technologies explains why he thinks hacking contests and public vulnerability disclosure projects do little to improve IT security. Continue Reading
-
Web applications tangle security researchers, attract attackers
Web application security researchers are finding that some of their work could land them on the wrong side of the law. As a result, Web applications are more vulnerable to attack. Continue Reading
-
Tiered Storage School: Table of Contents
Get a better understanding of what tiering can do for your storage, how it works and why a tiered plan can aid in backup, DR, overall management and long-term archive Continue Reading
-
The Art of Software Security Testing
Identifying software security flaws including the proper methods for examining file formats. Continue Reading
-
Data retrieval strategies: Document management software overview
The role of document management software in data storage and how it can mitigate risk for the enterprise. Continue Reading
-
Deploying VoIP: Five things every CIO should know
Navigating the complexity of a VoIP deployment can be overwhelming and it may seem like you need a technical degree to understand it. Here are five tips to help steer through the fog of a VoIP migration. Continue Reading