In Depth
In Depth
-
SAP Hana storage 101
If you're starting down the road towards SAP Hana in-memory analytics you'll need to understand its storage requirements. Here are some basics to get you started Continue Reading
-
[email protected]: Women in technology – the shifting gender landscape
As Computer Weekly celebrates its 50th anniversary, we look back on the great women who have made technology as well as the IT industry possible Continue Reading
-
CIO Interview: Graeme Hackland, Williams Martini Racing
Williams Martini Racing CIO Graeme Hackland discusses network infrastructure, data analytics and the future for wearable tech and augmented reality in Formula 1 motor racing Continue Reading
-
Cost-effective managed IPS for small businesses
Small businesses typically struggle to afford cyber intrusion prevention systems, but the introduction of a service tailored for this market could change that Continue Reading
-
Make fictional expense claims a thing of the past
Some executives think that travel and entertainment (T&E) expense claims are a licence to practise their creative fiction skills Continue Reading
-
[email protected]: A history of IT outsourcing
Computer Weekly looks at where and when IT outsourcing was invented and considers the changes the sector has gone through since Continue Reading
-
Datacentre cooling upgrades: Helping operators decide where best to invest
Upgrading a datacentre cooling system is an expensive undertaking, but should operators stick with what they've always done or try something new? Continue Reading
-
The problem of passwords and how to deal with it
Security experts have long recognised passwords as inadequate, but finally technology is offering some viable alternative authentication methods that businesses can explore to keep their data safe Continue Reading
-
Overcoming the scale-up challenge of enterprise DevOps adoption
CIOs and IT leaders share their advice on what enterprises can do to accelerate the spread of DevOps within their organisations Continue Reading
-
[email protected]: The story of the internet, and how it changed the world
Computer Weekly’s journey through 50 years of innovation in technology continues with a look back at the history of the internet and the huge changes it has brought to society Continue Reading
-
[email protected]: Spreadsheets and ERP – 50 years of software coding business
Business software has been a rich field for IT professionals over the past five decades, and we are on the cusp of a new era of customers rolling their own for competitive advantage Continue Reading
-
[email protected]: The evolution of the CIO
From working in statistics departments to becoming a key part of any business transformation – as Computer Weekly gets ready to celebrate its 50th anniversary, we look back at the changing role of IT leaders Continue Reading
-
NoSQL database technology finds use cases, but still minority sport
From managing water meter data, through Bitcoin and video data, to web publishing, NoSQL database technology is finding real use cases. But it's likely to be stuck at 10% of the market for some time Continue Reading
-
Isle of Man: From seaside getaway to tech startup hub
The Isle of Man government is stepping up efforts to position itself as the low-tax jurisdiction of choice for the startup community. But what's it like to do business there? Continue Reading
-
[email protected]: The Great British chip invention
There is a link between the world’s first working computer and the world’s most successful chip: they are both British Continue Reading
-
NoSQL offerings from Microsoft and Oracle
Cloud and big data applications have led to a new wave of NoSQL data stores. We look at what Microsoft and Oracle have to offer Continue Reading
-
Growing possibilities for 3D printing
As 3D printing disrupts business and technology mandates, CIOs can gain new relevance as business enablers Continue Reading
-
[email protected]: Government IT goes full circle in the space of 50 years
As Computer Weekly prepares to celebrate its 50th anniversary this September, we take a look at how government IT has changed over the years Continue Reading
-
For IBM, the answer is Watson. But what is the question?
IBM is promoting its Watson natural language processing analytics technology as it tries to move its core business beyond technologies that it pioneered, but which have become commoditised. Will it fly? Continue Reading
-
My first IoT project: A guide for businesses
We’ve all had a good giggle about having our fridges hacked – but now it’s time to get real. What are the first steps enterprises should take when implementing their first internet of things project? Continue Reading
-
It makes sense to go hyperscale/hyper-converged
Hyperscale computing and storage are the norm for web giants. Hyper-converged scenarios make it possible for small and medium-sized enterprises to gain the advantages of combined server/storage nodes Continue Reading
-
How to build your own IoT with Azure
Microsoft’s Azure cloud platform has gone well beyond mere virtual machines and orchestrated workflows. It can now also power internet of things applications Continue Reading
-
An overview of cloud customer relationship management
Businesses are confident about buying customer relationship management (CRM) software as a cloud-based service. Computer Weekly looks at the main players Continue Reading
-
UK startups seek to lead the world in smart city technologies
Government trade mission to south-east Asia helps UK startups to target the region’s growing smart city projects Continue Reading
-
How 3D printing will disrupt industry worldwide
The technology is helping startups model prototypes and inventory suppliers lop millions from supply chain costs Continue Reading
-
[email protected]: How networking became the core of IT
Compared with the network, Computer Weekly is but a sprightly youngster. We take a look back not at just 50, but 200 years of British innovation in communications technology Continue Reading
-
PCIe SSD: Cache vs storage tier
Adding PCIe flash is a popular way of speeding up application response times, with more rapid I/O guaranteed, but should PCIe SSD be added as cache or as a tier of storage? Continue Reading
-
Graph database technology starts to come of age beyond social media
Graph databases, based on mathematics known for three centuries, are starting to yield value for businesses beyond Facebook and Twitter Continue Reading
-
[email protected]: How UK home brew gave computing to the masses
From batch processing to the graphical user interface, from desktop PCs to smartphones, from luggables to wearables, computing has come a long way since Computer Weekly was first published in 1966. We look at some of the personal computers that ... Continue Reading
-
[email protected]: From bricks to clicks – how technology has changed the shopping experience
As Computer Weekly prepares to celebrate its 50th anniversary, we look back at how retail has evolved from the small corner store of the 1960s to the omni-channel world of today Continue Reading
-
Amazon S3 storage 101: Object storage in the cloud
Amazon Simple Storage Service (S3) has emerged as a de facto standard for accessing data in the cloud. We run the rule over S3, its key attributes and what you need to know to use it with your applications Continue Reading
-
[email protected]: From local innovations to centralisation – 50 years of healthcare IT
From broom cupboards doubling as server rooms to teleprinters and green screens, as Computer Weekly prepares to celebrate its 50th birthday, we look back at NHS innovations, pitfalls and attempts to digitise over the past five decades Continue Reading
-
[email protected]: Data management – Five decades of prospecting for business value
Data management and business intelligence have been at the heart of business value creation for decades. Read about how Computer Weekly has tracked their promise and tribulations Continue Reading
-
[email protected]: The changing face of the datacentre over the past 50 years
As Computer Weekly prepares to celebrate its 50th anniversary, we take a look back at how the design and role of the datacentre has changed over the past five decades Continue Reading
-
Singapore’s Jurong Health Services: Transforming healthcare through data technologies
Ng Teng Fong General Hospital (NTFGH) is being recognised for its high standards of data use Continue Reading
-
[email protected]: Storage – From punched cards to flash and the cloud
Since the launch of Computer Weekly in 1966, we have moved from a world of punched cards and paper tape to one where flash and the cloud have revolutionised data storage Continue Reading
-
[email protected]: From ICL to ITIL
Standardisation helps industries to grow. Here in the UK, a number of highly influential standards emerged that have become building blocks for the modern computer industry Continue Reading
-
[email protected]: Fertile British breeding grounds for information security innovation
Computer Weekly is marking its 50th anniversary this year with a series of articles celebrating 50 years of British technology innovation. In this article, we look at the evolution of information security threats and some of the British innovation ... Continue Reading
-
Hunters: a rare but essential breed of enterprise cyber defenders
They wait, they watch, they search the outer reaches of networks and the darkest corners of the web, setting traps, crafting tools, collecting evidence and going in pursuit: they are the hunters Continue Reading
-
How to manage IT access for external users
Identity and access management has extended from being solely an internal IT management process to focus on external business engagement too Continue Reading
-
[email protected]: From Captain Kirk to 5G – 50 years of mobile
As Computer Weekly prepares to celebrate the 50th anniversary of our first edition in 1966, we look back at 50 years of British innovation and development in mobile networking Continue Reading
-
IAM is the future for managing data security
Why identity and access management is taking centre stage in companies’ access policies Continue Reading
-
[email protected]: The heyday of British computing - how the Brits ruled IT
We examine how the 1940s, 1950s and 1960s became an age of great innovation for the British computer industry Continue Reading
-
[email protected]: 1966 - Computer Weekly goes to bat for the British computer industry
Launched in 1966 as part of a modernising wave to change British society, Computer Weekly battled for the nation’s industry against the US, and saw IT as an entry ticket to the Common Market Continue Reading
-
Co-ordinate outsourced services with Siam
We look at the practical considerations of implementing an effective service integration and management strategy Continue Reading
-
Combine data mining and simulation to maximise process improvement
Data mining and computer simulation can be used together to better model and improve industrial processes, city development and other complex systems Continue Reading
-
Datacentre heat reuse: Why aren’t more operators doing it?
With the datacentre industry’s sustainability habits coming under increasingly close scrutiny, we find out why operators are not rushing to reuse their waste heat Continue Reading
-
Microsoft’s underwater datacentre: The pros and cons of running subsea facilities
Underwater datacentres can help providers save on land costs and cooling, but at what cost to the environment? Continue Reading
-
What are containers and microservices?
Independently deployable bits of code can be used to build agile applications. We look at some of the main players Continue Reading
-
Divide and conquer in software architecture
Applications built out of independently deployable modules are the future of flexible solution development Continue Reading
-
Five CIO tips for building an IT strategy in the digital age
CIOs and strategy experts share their experiences of creating an IT strategy that makes the most of the digital revolution Continue Reading
-
Cloud storage appliances: What they are and who provides them
We look at the cloud storage appliance market – everything from local gateway presentation of the cloud, via hybrid cloud, to the new generation of cloud-resident appliances Continue Reading
-
Unaligned I/O: A storage performance killer
As the stack piles higher – with virtual servers, their virtual disks and guest operating systems – the scope for unaligned or misaligned I/O to affect performance increases Continue Reading
-
Digitisation connects customers to companies on a new level
‘Digital’ provides more ways for people and businesses to connect than ever before, and a transformed role for IT in businesses old and new Continue Reading
-
NAS vs object: Which one for large volumes of unstructured data?
Both NAS and object storage offer highly scalable file storage for large volumes of unstructured data, but which is right for your environment? Continue Reading
-
Interview: James Bamford on surveillance, Snowden and technology companies
Investigative journalist and documentary maker James Bamford was among the first to uncover the secrets of the US National Security Agency and its global surveillance Continue Reading
-
How to deal with the aftermath of a data breach
Considering that a data breach could happen to any company, at any time, a plan of action is the best tactic Continue Reading
-
Disaster recovery planning: Where virtualisation can help
The disaster recovery planning process is not fundamentally technology-centric, so when can virtualisation make it quicker and easier to restore services after an unplanned outage? Continue Reading
-
The next stage in quantum key distribution
Authentication schemes based on quantum physics are emerging to address the growing number of ways to compromise data traffic Continue Reading
-
How to free your business and staff with self-service
Introducing self-service IT can improve efficiency and hand control to the employee – so long as it’s done right Continue Reading
-
Top five things to know about flash and storage tiering
Automated storage tiering boosts storage efficiency and saves money, but why is tiering different from caching, why is it suited to use with flash and how do suppliers differ? Continue Reading
-
Snapshots: Hypervisor vs Array
Snapshots are a valuable part of the data protection toolkit, but where is it best to run them from – the hypervisor or the storage array? We look at the pros and cons Continue Reading
-
First steps taken on 'omni-channel' customer experience
The future customer experience might be personalised, but there is a long road ahead yet Continue Reading
-
Does Cambridge University Hospital’s Epic project indicate NHS lacks capacity?
Cambridge University Hospitals NHS Foundation Trust’s £200m eHospital project was seen as a model of how an NHS trust could revolutionise its IT, autonomously. A tale of over-ambition? Continue Reading
-
Acquire new skills for technology management
The age of the customer requires organisations to focus on both the business technology and IT agendas Continue Reading
-
Avoiding security issues when recycling hardware
What are the options for the environmentally and ethically responsible recycling of end-of-life hardware, without compromising data security? Continue Reading
-
Object storage: Cloud vs in-house
Object storage is a rising star in data storage, especially for cloud and web use. But what are the pros and cons of cloud object storage or building in-house? Continue Reading
-
Next‑generation CIOs: The changing role of IT leaders
The position of CIO is changing and there are more people in the role from less technical backgrounds than in the past Continue Reading
-
Is digital disruption a threat or an opportunity for banks?
Banks have been relatively unaffected by the digital revolution that has transformed other industries – but that's about to change Continue Reading
-
How CIOs can raise their 'IT clock speed' as pressure to innovate grows
CIOs are facing pressure from the board to roll out IT projects increasingly quickly. How can they do that without running unacceptable risks? This article, based on cutting-edge research among leading businesses, offers some answers Continue Reading
-
The true cost of a cyber security breach in Australia
The costs of cyber security breaches can quickly add up with fines, reputational damage and overhauls to network security all hitting the coffers. The case of one Australian firm shows why paying a ransom to a hacker might be tempting. Continue Reading
-
EU Data Protection Regulation: What the EC legislation means for cloud providers
With the European Commission's data protection rules set to drop before 2016, take a look at what the changes mean for the cloud and datacentre community Continue Reading
-
Virtualisation and disaster recovery: DR features in Hyper-V
We run the rule over the key functionality in Microsoft Hyper-V that can help with disaster recovery, including backup, migration, high availability and replication Continue Reading
-
The security dangers of home networks
Most companies take reasonable steps to protect their networks from virus attacks, but one area of vulnerability that is often overlooked is infection from employees’ home networks Continue Reading
-
How to ensure strong passwords and better authentication
Five steps to ensure stronger passwords and better authentication to reduce the threat of business data theft Continue Reading
-
Max Schrems: The man who broke Safe Harbour
Schrems has persuaded a high court judge to confirm that Edward Snowden’s evidence is acceptable in court and that the US is engaged in mass surveillance of European citizens Continue Reading
-
Ford reduces injuries with virtual assembly programme
Ford is using computer-aided design to help reduce cases of productivity-sapping musculoskeletal disorders caused by the labour process Continue Reading
-
The best desktop strategy: Forget the desktop
Before licensing and rolling out an updated operating system, it may be time to revise your IT estate Continue Reading
-
Netherlands uses female role models to encourage girls into IT industry
The Netherlands needs to shake up its education system to attract more girls into IT, as only 10% of its IT workforce are women Continue Reading
-
Risky and untested: What went wrong with the ESN procurement?
In his first major interview since walking away from the Emergency Services Network procurement, Airwave COO John Lewis reveals why his company could take no further part in the process, and discusses the future of emergency services communications Continue Reading
-
How technology is helping deliver aid to Syrian refugees in the Middle East
The Syrian refugee crisis has engulfed the Middle East, but technology is proving to be an essential tool to help aid organisations support displaced people Continue Reading
-
Virtualisation and disaster recovery: DR features in VMware
The key areas of functionality in VMware that can help with disaster recovery – including VMware backup, migration, high availability and replication Continue Reading
-
How to fully test IT networks for vulnerabilities
Making sure a company network is secure is a very important task, and one that should be scheduled regularly Continue Reading
-
Flash in NAS file access storage: Does it need it – and, if so, how much?
While flash is rapidly going mainstream for primary storage with the all-flash datacentre, does NAS file access storage need flash – and, if so, how much? Continue Reading
-
Inside Taiwan: The engine room of the internet of things
Computer Weekly travelled to Taiwan to meet some of the tech companies that are quietly laying the foundations for the internet of things Continue Reading
-
Case study: Philips takes agile approach to building bridges between business and IT
Dutch technology giant talks up the success of its attempts to embrace agile IT delivery methods, and how it's shaping future customer engagements Continue Reading
-
Why Pegasystems' CEO, Alan Trefler, has learned to think smaller
Pegasystems has made its name supplying CRM, analytics and case management software to the world's largest companies. Now CEO Alan Trefler plans to use cloud computing to broaden Pega's appeal Continue Reading
-
Councils explore options for online mapping tools
Councils are drawing on Ordnance Survey, Google Maps and OpenStreet Map for online mapping. What’s the optimal mix? Continue Reading
-
Using SAP Hana as a data warehouse
Enterprises are using SAP Hana for in-memory data marts and SAP Business Warehouse implementations that integrate with other data warehouses Continue Reading
-
Case study: Open University uses Microsoft Azure to create course content clearance hub
The Open University recently scooped the award for Best Cloud Project at the CW European User Awards, and here's why Continue Reading
-
Digital transformation needs business leaders to develop new skills
A panel of experts discuss the capabilities business leaders and corporate IT need to develop for digital Continue Reading
-
OpenStack Swift 101: the object store for OpenStack apps
We run the rule over the OpenStack Swift object storage architecture, its key components, how it achieves resiliency and the data protection methods in use and development Continue Reading
-
SaaS criteria to track for business outcomes
Organisations should evolve their SaaS selection criteria to focus on newer metrics that are better indicators of supplier performance Continue Reading
-
All-flash vs hybrid flash for virtual desktop storage
With massive random I/O and a huge bias towards writes, virtual desktop storage – especially for the more feature-rich VDI 2.0 – requires the speed of all-flash and hybrid flash storage Continue Reading
-
Business cases emerge from growing pains of Hadoop 1.0
The hype around the early generation of Hadoop is giving way to the reality of business programmes based on Hadoop 2 and Apache Spark Continue Reading
-
Better user acceptance testing through log management
Application log management provides insight into application behaviour, which can be used to build better software and gain a better hold of user acceptance testing Continue Reading
-
Still running Windows Server 2003? Don’t panic
Many organisations are facing the prospect of running Windows 2003 server unsupported. Where do you go from here? Continue Reading
-
Using data analytics to deliver more personalised customer service
Personalisation has been the goal for many retailers, but can the emergence of big data analytics be the solution they are looking for? Continue Reading
-
OpenStack Cinder: Block storage on the open-source cloud platform
OpenStack Cinder 101: The fundamentals of Cinder, how it is implemented, how to provision it, how it works with third-party storage arrays, its features and more Continue Reading
-
App development companies fight back against digital piracy
How can digital companies protect their IP against a tidal wave of smartphone boosted piracy? Is digital rights management software effective enough, or is it better to adapt your business model? Continue Reading