Opinion
Opinion
-
Security Think Tank: Take care of security basics before automating
How can organisations evolve their security operations teams to do more automation of basic tasks and cope with dynamic IT environments? Continue Reading
-
Security Think Tank: How automation can reduce the load on the security operations team
How can organisations evolve their security operations teams to do more automation of basic tasks and cope with dynamic IT environments? Continue Reading
-
3, 2, 1, GDPR: How to be prepared on 25 May
There are seven key areas organisations should review to ensure compliance with the General Data Protection Regulation, and even though the deadline is less than four months away, it is still not too late to start Continue Reading
-
Safer Internet Day: Building online safety practices with young people
Many organisations around the UK are contributing to the important work on making the internet a safer place for everyone Continue Reading
-
How to achieve a healthy, balanced relationship with your ERP provider
Observing the enterprise software market today is like observing a major relationship crisis where one side is failing to listen to the other Continue Reading
-
Security Think Tank: Approaches to strengthening security operations
How can organisations evolve their security operations teams to do more automation of basic tasks and cope with dynamic IT environments? Continue Reading
-
Europe’s shameful role in spy-tech exports that led to torture and jail
Governments in Europe actively assisted in government oppression in Iran, Bahrain and Russia by providing states with sophisticated surveillance equipment. The European Parliament is pressing for changes in the law to restrict exports of ... Continue Reading
-
Security Think Tank: Automating basic security tasks
How can organisations evolve their security operations teams to do more automation of basic tasks and cope with dynamic IT environments? Continue Reading
-
Security Think Tank: Don’t automatically automate security
How can organisations evolve their security operations teams to do more automation of basic tasks and cope with dynamic IT environments? Continue Reading
-
Security Think Tank: Establish best practice before automating security processes
How can organisations evolve their security operations teams to do more automation of basic tasks and cope with dynamic IT environments? Continue Reading
-
Bitcoin is a bubble, but manias can have economic benefits
The UK's railway mania, the tulip bubble, the dot com boom and other collective economic madness – such as bitcoin – might lose people a lot of money, but they often lay down important foundations Continue Reading
-
Security Think Tank: Humans and AI machines in harmony
How can organisations evolve their security operations teams to do more automation of basic tasks and cope with dynamic IT environments? Continue Reading
-
We must avoid the Brexit risks to London's tech community
London's chief digital officer warns of the risks to jobs, innovation and investment if the UK pursues a hard Brexit when leaving the EU Continue Reading
-
Blockchain’s promise goes beyond fintech
By reducing the cost of peer-to-peer data and resource transfer, blockchain can remove the need for third parties and middlemen across industries Continue Reading
-
Zero in on your zero-day vulnerabilities
A zero-day attack comes, by definition, out of the blue. You cannot predict its nature or assess how much damage it might cause, but you can take some basic steps to protect yourself from a potentially crippling cyber strike Continue Reading
-
Why CryptoKitties shows the future of humanity in the robot age
Spending millions on blockchain-based cat collectibles might seem trivial, but it explains why economists aren’t worried about robots taking all our jobs Continue Reading
-
Building on the UK tech sector’s momentum in 2018
The UK’s digital and tech industry made great progress in 2017, and the government aims to further its support in 2018, says digital minister Continue Reading
-
How to boost your personal brand as an IT professional
Seven steps to help you build a personal brand in the workplace, articulate the value you provide and build your professional reputation Continue Reading
-
How to attract investors for your enterprise software startup
Are you looking to find an investor for your enterprise software company? This expert advice explains what investors will be looking to find in an innovative software business seeking backing Continue Reading
-
My brother Lauri Love should have the right to a trial in the UK
Lauri Love should face trial over hacking allegations in a British Court, rather than be extradited to the US, where his extraordinary skills will be lost to society, says his younger sister Continue Reading
-
Opinion: Why the UK’s visa expansion is important to the tech sector
Following the government’s decision to expand the UK’s visa scheme for overseas talent, home secretary Amber Rudd tells Computer Weekly why this will help the UK tech sector Continue Reading
-
Why UK police are learning cyber forensics
The need for the UK police force to conduct forensic investigations on computers is nothing new, but a rapid escalation of cyber crime has demanded a different approach Continue Reading
-
A guide for businesses to China’s first cyber security law
Companies that break China’s new cyber security law may be fined or even have their licence to trade in the country removed Continue Reading
-
Dmarc email validation – we're doing it all wrong
Dmarc is a hugely important way to reduce email fraud – just ask HMRC – but it also makes email marketing campaigns far more effective Continue Reading
-
A history of hacking and hackers
A security professional’s view on criminal hacking has shifted away from the traditional stereotype of the hacker, towards a much more diverse cross-section of wider society Continue Reading
-
Will the review of Gov.uk Verify fix the UK's digital identity problems?
The rumoured review of the UK government’s identity assurance programme provides the ideal opportunity to fix problems and accelerate progress Continue Reading
-
The challenge of our era - digital transformation at Allianz
The insurance firm wants to become "digital by default" and its CIO explains the vital role DevOps and cloud play in its change programme Continue Reading
-
Criminal law: Are Twitter threats taken seriously?
As threats of violence become increasingly common online, law enforcement is taking stronger action against the perpetrators Continue Reading
-
Why now is the time to appoint a chief agility officer
Companies need to innovate and find new ways of getting products to the market more quickly. Appointing a chief agility officer to the board will help Continue Reading
-
How the iPhone shows the value of innovation in a capitalist economy
Ten years of watching the iPhone transform markets around the world demonstrates the economic value of technology innovation Continue Reading
-
Security Think Tank: Focus on high risk by automating low-risk patching
How should organisations address the need to keep software up to date with security patches without it costing too much or being too labour intensive? Continue Reading
-
Security Think Tank: Patching is vital and essentially a risk management exercise
How should organisations address the need to keep software up to date with security patches without it costing too much or being too labour intensive? Continue Reading
-
Rethink risk through the lens of antifragility
Antifragility is an exciting alternative that fuses value and risk, and CIOs and IT executives are well positioned to help Continue Reading
-
Gov.uk Verify and identity assurance - it's time for a rethink
The government's Verify identity platform is not meeting user needs - it's time to step back and review how best to make online identity for public services work Continue Reading
-
What to do first when hit by a cyber attack
What actions should organisations take if they suspect they have suffered a cyber security incident? Continue Reading
-
The rise of the ODMs: Should the branded hardware suppliers be worried?
The use of ODM datacentre hardware makes good economic sense for the hyperscale providers, but what about everyday enterprises? Continue Reading
-
Escaping waterfall government and the myth of 'digital transformation'
An agile approach to digital programmes will not transform Whitehall unless the waterfall approach to policy and decision-making is overhauled too Continue Reading
-
The internet of things: an overview
Despite security and other concerns, there are many benefits associated with embracing the internet of things Continue Reading
-
Security Think Tank: Risk of DNS attacks goes beyond websites
What are the main security risks associated with DNS and how are these best mitigated? Continue Reading
-
How AI is disrupting the role of call centres and call centre staff
Artificial intelligence could eliminate many white-collar jobs in coming decades. Its effects are already being felt in the call centre industry, but there is still no substitute for the human touch Continue Reading
-
Beware of Oracle’s developer Trojan Horse
The Oracle Technology Network allows developers to prototype applications for free, but there is a catch when it is time to deploy Continue Reading
-
Security Think Tank: Top three DNS-related security risks
What are the main security risks associated with the domain name system and how are these best mitigated? Continue Reading
-
Security Think Tank: Communication is key to cyber security in digital era
How can information security professionals help organisations to understand the cyber risks across increasingly digital businesses? Continue Reading
-
Obituary: Jonathan Green-Armytage, former Computer Weekly journalist
Computer Weekly marks the passing of one of the great tech reporters from the 1980s and 1990s Continue Reading
-
Gary McKinnon: Why Lauri Love should be spared the nightmare of extradition
Computer activist Lauri Love should be spared a life sentence in a US jail, says former hacker Gary McKinnon Continue Reading
-
Enterprise NAS performance challenges and how to resolve them
NAS storage can be used for mission critical workloads but NFS-based storage comes with performance challenges. Jim Bahn of Virtual Instruments outlines the main ones Continue Reading
-
A new nearshoring game is emerging
Countries selling themselves as nearshore business services locations need to change their sales pitches to avoid becoming like all the other countries doing the same Continue Reading
-
Consumer identity management is the core of real CRM
IAM + CRM is much more than simply IAM for external users, says Ivan Niccolai Continue Reading
-
Six essential processes for keeping data secure
Data security is increasingly vital for organisations as the countdown begins for compliance with new rules imposed by the EU’s general data protection regulation Continue Reading
-
Was that it? Business as usual for fintechs after Brexit vote
Following the Brexit vote, Fintech Times editor Bird Lovegod describes how financial services IT startups are getting on with business as usual Continue Reading
-
The true cost of running technology
Ministry of Justice digital chief Arif Harbott discusses the importance of disclosing the costs of technology – and why it makes sense to invest to avoid expensive glitches Continue Reading
-
Security Think Tank: Many breaches down to poor access controls
In the modern business environment, what are the most common access control mistakes – and how best are these corrected? Continue Reading
-
The problem with passwords: how to make it easier for employees to stay secure
An organisation’s IT security can be compromised if staff do not follow a strict policy of using strong passwords to access internal systems Continue Reading
-
Security Think Tank: Top five access control mistakes
In the modern business environment, what are the most common access control mistakes and what is the best way to correct them? Continue Reading
-
Demystifying service delivery automation
What is service delivery automation and what can it do for your organisation? Continue Reading
-
Robots will transform, not replace, human work
Claims that robots will steal our jobs are commonplace – but humans will find themselves working side by side with robots, rather than being replaced by them Continue Reading
-
Why we’re measuring the digital economy in the wrong way
Conventional measures of productivity and growth, such as GDP, fail to capture the true effect of the digital revolution – but we're getting richer nonetheless Continue Reading
-
The problem of smart cities and connectivity in the UK
Only once leaders develop a framework for local economic and societal development can the “smart city” buzz can evolve into “intelligent communities” Continue Reading
-
How the Consumer Rights Act will affect the digital industry
Consumer legislation has been updated to take into account the unique nature of digital content – but what does it mean for technology suppliers? Continue Reading
-
The importance of e-leadership in meeting digital challenges
Henley Business School identifies ICT trends that will alter the demand of e-skills, especially those needed by e-leaders Continue Reading
-
Life’s a breach: How to handle the press after a hacking attack
Emily Dent, specialist in crisis PR, offers some advice to organisations that unexpectedly find themselves in the headlines Continue Reading
-
Three things you may not know that DNS data can tell you
Big data tools can help network administrators gather new insights into security and performance from DNS data Continue Reading
-
The top 10 myths about agile development
Examining some of the most common misconceptions in the growing field of agile software development Continue Reading
-
Can legislation stop cyber crime?
Rising cyber crime suggests criminal law does not deter criminals and that a better legal solution is required to prevent further rises Continue Reading
-
What is government as a platform and how do we achieve it?
There are lots of discussion going on at the moment about digital “platforms”, and the impact they might have on UK public services Continue Reading
-
Disrupted everything: How Google will change our world
While Apple could be the first company to hit a $1tn valuation, Google could be first to hit a $2tn market cap. But how will it get there? Continue Reading
-
Five questions every board should ask after Sony Pictures breach
What can the board do to avoid having to answer embarrassing questions at the next shareholder meeting? Continue Reading
-
Germany and the UK - Europe’s technology pioneers
Stephen Georgiadis, managing director at investment bank Altium, explores the thriving technology sectors in the UK and Germany Continue Reading
-
Revolutionising digital public service delivery
Public sectors across the world are attempting a transition away from closed, top-down, bureaucratic, and paper-based transactional models Continue Reading
-
Nobody has a monopoly on digital leadership
As IT becomes more strategic and pervasive, effective digital leadership is needed by just about every organisation Continue Reading
-
The digital CIO: ‘Fear of Google’ and the ethics of digital business
Could the big digital players be using their dominance by exerting unfair competition? Continue Reading
-
Watermelon SLAs – making sense of green and red alerts
Often IT SLAs don’t reflect the real service and service experience of users. They also aren’t focused enough on the business results Continue Reading
-
Define a software delivery strategy for business innovation – four key steps
As software takes a central role in modern business models, application delivery capability has become the key enabler of disruption Continue Reading
-
The legal considerations of the internet of things
As with many new technologies, there are a number of tricky legal challenges to consider as part of widespread IoT adoption Continue Reading
-
Opinion: The Strategic Execution Framework
Innovation. Agility. Performance. Scalability. Are these among the key initiatives for your company this year? Continue Reading
-
Five tips for managing project change requests
Change is an inevitable part of a project, so working out in advance how best to handle change requests will make the whole process much easier Continue Reading
-
Searching for the signal of open standards amid the growing noise of agile
For all its undeniable strengths, the use of agile in government is in danger of becoming a fetish Continue Reading
-
Should you allow a bring your own device policy?
Employers are realising there are challenges presented by BYOD which, if not dealt with, could have a serious impact on the business Continue Reading
-
Living with Google Glass – not quite useful enough to overcome the dork-factor
Businesses will use Google Glass first, says Simon Dring after spending a few days living with the technology. Continue Reading
-
User acceptance testing needs real training, not just a short course
In spite of its importance, user acceptance testing (UAT) is often chaotic, problematic and ineffective Continue Reading
-
Intel x86 and IBM Power CPUs: Which, when, why?
There are only three processors left in the market for mission-critical applications. Which should you chose ? Continue Reading
-
Technology, society and morality: the implications for technology leaders
Technology is evolving at a pace and scale that has never been experienced. Society is struggling to keep up with the social and moral implications Continue Reading
-
Array-based or vSphere Replication for VMware SRM?
What’s the best replication method for VMware Site Recovery Manager (SRM)? GlassHouse Technologies’ Paul Grimwood runs the rule over array-based replication and vSphere Replication Continue Reading
-
Who owns your LinkedIn account?
It is common for employees to use personal social networking accounts for work, but who actually owns those accounts? Continue Reading
-
Privacy concerns in the digital world
Considering the full spectrum of privacy, people need to ask themselves if they are comfortable with all their characteristics in the public domain Continue Reading
-
Nirvanix failure – a blow to the cloud storage model?
Cloud storage firm Nirvanix has given customers a deadline to retrieve their data. Are the reasons for its failure specific to Nirvanix or a real blow to cloud storage overall? Continue Reading
-
Gartner: Benefits of mobile collaboration
The rapid adoption of smart devices, both in the workplace and outside, has raised expectations about accessibility and user experience Continue Reading
-
When to use flash SSD instead of SAS or SATA?
When to use flash SSDs instead of SAS or SATA spinning disk is all down to application requirements, says David Boyle, senior consultant at GlassHouse Technologies (UK) Continue Reading
-
How to appoint a new outsourcing supplier
Outsourcing can come with its own security risks if not managed appropriately, making due diligence and clear contractual arrangements key Continue Reading
-
The dangers of internet cafés
Businesses need clear computer use policies and need to ensure staff are properly trained in data protection, writes Garry Mackay Continue Reading
-
The data fragmentation challenge
Few organisations have policies to guide where data should and should not be stored. The result: data fragmentation Continue Reading
-
Whiteboard it – the power of graph databases
Graph databases map relationships between entities in a network. They won’t replace conventional relational databases, but for harnessing the value of interconnectedness they mark a breakthrough Continue Reading
-
The ideology of hacking
Business leaders need to be educated on the true threats their firms face and IT security professionals have to arm their executives with that information Continue Reading
-
How to assess the security of a cloud service provider
As businesses continue to put more information online, understanding cloud suppliers and agreements has never been more important Continue Reading
-
BBC's DMI project failure is a warning to all organisations
The decision to cancel the BBC’s Digital Media Initiative (DMI) with nothing to show for the almost £100m spent on it should be a warning to other organisations about the risks involved in large-scale IT projects Continue Reading
-
The challenges of information governance in our increasingly litigious age
Formulating the right enterprise-wide information governance policies is essential in heading off potential legal and compliance costs Continue Reading
-
Why IT education is failing
There are a plethora of UK IT educational projects and initiatives but no focus or urgency to channel the energy of teachers, says entrepreneur, Rick Chandler. Continue Reading
-
The Great Deverticalisation – part 5: Mind the GaaP
Politicians and government have the opportunity, through the power of open platforms, to take the lead in creating modern public services Continue Reading
-
Empowering users: It is not all about BYOD
The real benefits of bring your own device (BYOD) only arise when the right culture and mindset are developed Continue Reading
-
The Great Deverticalisation - part 4: The role of the private sector
Why do we persist in running vertically integrated organisations when standardising many of these processes would free us up to do things so much better, and more cheaply? Continue Reading