computerweekly.com

Please wait for loading...




      (13050):

    /
     1  ~ 2014 oct 04small business computer networkHow to set up your small business computer network - Essential GuideSetting up a small business computer network has become easier over the years as operating systems and networking technologies have improved, and ...
     1  +1 2014 oct 02cyber liability insuranceAn introduction to cyber liability insurance cover - Computer WeeklyCyber liability insurance cover has been around for 10 years, but most security professionals seem to have not heard of it or know that it exists.
     1  +3 2014 oct 02recent treands in procurementSeven trends in public sector procurement that are scaring suppliersNow the gloves are off - it's about paying less, both in capital investment and servicing charges, without, of course, compromising current levels of service and  ...
     1  ~ 2014 oct 01slc vs mlcMLC vs SLC : Which flash SSD is right for you? - Computer WeeklyMLC vs SLC : Which flash SSD you choose depends on the performance you need and the price you want to pay, but the differences are not as great as you may ...
     1  +1 2014 sep 30video conferencing basicsEnterprise video conferencing and telepresence basics : A primerEnterprise video conferencing systems will save companies money in travel expenses and make the remote workforce more effective. Here's a guide to ...
     1  ~ 2014 sep 29windows patch managementMicrosoft patch management tools - Computer WeeklyKnowing the ins and outs of Windows patch management is great, but what good is that knowledge without the proper tools? In the final section of our Windows ...
     1  +2 2014 sep 29eastern europe software developmentWhy more businesses are nearshoring in Eastern EuropePromoting Eastern Europe as an outsourcing destination. > Five reasons .... Software testing and development is more straightforward, he says. "If a company is ...
     1  +1 2014 sep 28business continuity expertBusiness continuity : the expert view - ComputerWeekly.comOnce the core business processes are identified and prioritised, continuity experts advise a risk analysis, to assess how vulnerable the company's processes are ...
     1  +1 2014 sep 27contract to outsourceOutsourcing contracts : Getting started - Essential GuideOutsourcing contracts can be complex affairs, but a good outsourcing contract will examine service level agreements, penalties and rewards, timeframes and ...
     1  +1 2014 sep 25web application outsourcing countriesTop five outsourcing destinations to watch - ComputerWeekly.comArgentina is seen by many companies as an ideal location for outsourcing .
     1  ~ 2014 sep 20archive backup softwareData backup vs archiving : What's the difference? - Computer WeeklyLearn the difference between data backups and data archiving in terms of ... Data archiving software builds up metadata indexes on the stored ...
     1  ~ 2014 sep 19computer weeklyComputerWeekly .com | Information Technology (IT) News, UK IT The latest information technology (IT) news and IT jobs from ComputerWeekly . com. Stay ahead with IT management and technology news, blogs, jobs, case 
     1  +6 2014 sep 15outsourcing contracts
     1  +1 2014 sep 11develop software recovery strategiesDeveloping a disaster recovery strategy and detailed DR plansYou are now ready to develop DR recovery strategies . These strategies .... Look into BC/DR software products that can greatly simplify the process. A few dozen ...
     1  ~ 2014 sep 07ssd slc mlc
     1  ~ 2014 sep 06crm profitable customersCustomer relationship management : happy customers = profitable Customers , clients, consumers, call them what you will but without them, you don' t have a business, writes Jason Nash, product solutions marketing manager, ...
     1  +4 2014 sep 02developer from eastern europeIs Eastern Europe India's biggest threat for IT outsourcing This for instance has led some to user Eastern European firms for agile software development . Read the Marrable Services report here.
     1  ~ 2014 sep 01insurance broker portal soaAllianz Insurance improves service to brokers with new SOA platformAllianz Insurance improves service to brokers with new SOA platform ... The goal is to make a new portal site the main choice for brokers .
     1  ~ 2014 aug 30taxonomy document managementA guide to developing taxonomies for effective data managementThe story goes that if Microsoft had made completion of the properties box of all Office documents mandatory there would be no need for document management  ...
     1  ~ 2014 aug 27biometric control heathrowHeathrow tests biometric controls on passengers - Computer WeeklyHeathrow Airport is testing biometric fingerprint readers for passengers on selected flights, in a move which could pave the way for wider ...
     1  ~ 2014 aug 27hybrid cloud backup servicesCloud backup options: Pure cloud vs hybrid cloud backupWith pure cloud backup , data is copied directly to the service provider's cloud. With hybrid cloud backup , on the other hand, data is copied to a device with ...
     1  +4 2014 aug 26outsourcing buyer of scotlandThe future of Indian and Scottish outsourcing - Computer WeeklyFollowing my development of the Scottish Outsourcing Initiative early last year, .... finds cloud failings and commends cognitive computing; Buyer's Guide: What ...
     1  ~ 2014 aug 22platform outsourcing optionsWhat are the outsourcing options for the SME? - Computer WeeklyConsequently, many SMEs consider outsourcing some or all of their IT systems. But this can ... SME cloud options : infrastructure, platform or software services?
     1  ~ 2014 aug 22the future of itFuture Gazing: The Future of IT in 2020 - Computer WeeklyIn the future , the role of the CIO will be less about controlling and more about enabling the rest of the business to use technology in a more effective way.
     1  +1 2014 aug 18cto with no degreeTop five tips to carve your career as a CTO - ITWorksBy Jenny Williams on September 26, 2011 2:51 PM | No Comments ... a degree and don't think a MBA or any other degree is not essential to become a CTO .
     1  +5 2014 aug 18sme finance softwareThe best software for small businesses ( SMEs ) - Essential GuideFew businesses can do without finance and accounting software , which can often automate activities ... What sorts of software applications do larger SMEs use?
     1  ~ 2014 aug 17outsource web development ukraineOutsourcing in the Ukraine : benefits and drawbacksThe Ukraine offers highly skilled IT specialists at a low cost for companies looking to develop projects within Europe. But while the honesty of its ...
     1  ~ 2014 aug 16multiple projects software managementProject management software – Essential Guide - Computer WeeklyThere are literally dozens of good project management software applications out ... Multiple users can share file-based project plans or data held on a database, ...
     1  ~ 2014 aug 14it news feedsRSS News Feed | Technology News | ComputerWeekly.comCatch up with the latest information technology ( IT) news with technology RSS feeds from Computer Weekly.
     1  ~ 2014 aug 09future of itFuture Gazing: The Future of IT in 2020 - ComputerWeekly.com
     1  +2 2014 aug 09history of cloud computingA history of cloud computing - ComputerWeekly.comCloud computing has evolved through a number of phases which include grid and utility computing, application service provision (ASP), and Software as a ...
     1  ~ 2014 aug 07bp dana deasyBP appoints Mike Gibbs as group CIO to succeed Dana DeasyMike Gibbs is set to take over as BP's group CIO when incumbent Dana Deasy leaves the energy company in December.
     1  ~ 2014 aug 06reviewing of audit logsBest practices for audit , log review for IT security investigationsWhen it comes to IT security investigations, regular audit , log review and monitoring make getting to the root of a breach possible. Here you will learn best  ...
     1  ~ 2014 aug 03cloud based archivingCloud archive : What it is and what types of cloud archive services existArchived data that may require high-speed access is retained internally while lower-priority archive data is moved to low-cost, cloud - based archive storage.
     1  ~ 2014 aug 02storage tiering strategyTiered storage strategies and best practices - ComputerWeekly.comTiered storage strategies that assign data based on value as well as access and retention needs, can cut enterprise data storage costs and address storage  ...
     1  ~ 2014 jul 31outsource web portal developmentManaging web development : does outsourcing pay?It was an easy decision for Prodamus to outsource its web development . ... Initially, the task of building the portal was outsourced to a major web design ...
     1  ~ 2014 jul 29is cloud hosting secureTop five cloud computing security issues - ComputerWeekly.comRead more about cloud computing and security : A history of cloud ... How cloud hosting companies have approached security . As with most ...
     1  ~ 2014 jul 28computer news feedsCatch up with the latest information technology (IT) news with technology RSS feeds from Computer Weekly.
     1  ~ 2014 jul 27history of the cloudOne of the first milestones in cloud computing history was the arrival of Salesforce.com in 1999, which pioneered the concept of delivering enterprise ...
     1  ~ 2014 jul 27it news ukComputerWeekly.com | Information Technology ( IT) News , UK IT Stay ahead with IT management and technology news , blogs, jobs, case studies, whitepapers and videos. ... Five top UK tech startup clusters outside London. ‎News - ‎Jobs - ‎Dilbert of the Day - ‎How John Lewis Conquered ...
     1  +3 2014 jul 27negative crm british gasVideo: British Gas CIO Dave Bickerton discusses massive IT British Gas is underpinning its business strategy with massive IT transformation as the firm sets out to turn its bad fortunes around ... British Gas ' imminent replacement of its Siebel customer relationship management ( CRM ) ...
     1  ~ 2014 jul 25psinet data storagePSINet targets vertical markets - Computer WeeklyPSINet is aiming to increase its channel partners by up to 25 per cent this year ... to having your personal data transferred to and processed in the United States.
     1  ~ 2014 jul 22data backup vs archivingThe key difference between backup vs . archiving is that data backups are designed for the rapid recovery of operational data , while data  ...
     1  ~ 2014 jul 22dwp ibm adepDWP adds agile development into IT contracts for £2bn Universal The Department for Work and Pensions ( DWP ) has modified contracts
     1  ~ 2014 jul 17e-business success storiesE - business success stories (They do exist!) - Computer WeeklyAre you struggling to come to terms with Internet technology, doubtful that your e - business plans will ever come to fruition? Don't give up! Six organisations tell ...
     2  +1 2014 oct 04jobs it field newsComputerWeekly.com | Information Technology (IT) News , UK IT Stay ahead with IT management and technology news , blogs, jobs , case ... and guides to help you develop your IT leadership skills. Visit the portal · Industry ‎News - ‎Jobs - ‎Dilbert of the Day - ‎IT Management
     2  +2 2014 oct 04computer jobs ukUK IT Jobs & Computer Job Vacancies from ComputerWeekly.com Use our computer job vacancy search to find the latest jobs in IT. ... Weekly is the leading provider of news, analysis, and opinion for the UK IT community.
     2  +10 2014 oct 03small it outsourcing companyIT outsourcing for small businesses (SMEs) – Essential GuideIT outsourcing can help small businesses reduce IT costs and access new ... IT may not be the core activity of a small business , so outsourcing can relieve the ...
     2  +9 2014 oct 03disaster recovery planningHow to write a disaster recovery plan and define ... - Computer WeeklyFormulating a detailed recovery plan is the main aim of the entire IT disaster recovery planning project. It is in these plans that you will set out the detailed steps ...
     2  ~ 2014 oct 02business project planHow to create a clear project plan - Computer WeeklyStep 1: Explain the project plan to key stakeholders and discuss its key components ... Business need and business problem; Project objectives, stating what will ...
     2  +99 2014 oct 01project plan examplesFor example , a project plan for constructing a new office building needs to include not only the specifications for the building, the budget and the schedule , but ...
     2  ~ 2014 sep 30raid stripe block size optimiseRAID chunk size the key to RAID striping performanceRAID chunk size in striped RAID levels is set for the best possible ... Performance , monitoring and optimisation , Data centre capacity planning, Server and OS, ...
     2  +3 2014 sep 28how to plan a projectHere is a six-step approach to creating a project plan . It provides a road map for project managers to follow and acts as the project manager's premier ...
     2  ~ 2014 sep 22outsourcing newsIT outsourcing news , help and research - ComputerWeekly.comRead the latest stories about IT outsourcing and offshore outsourcing and the issues affecting IT managers.
     2  +9 2014 sep 18outsourcing contract
     2  ~ 2014 sep 17it project planHere is a six-step approach to creating a project plan . It provides a road map for project managers to follow and acts as the project manager's premier ...
     2  +10 2014 sep 15rbs itRBS IT head Mike Errington retires - Computer WeeklyIn February 2014, sources in the finance IT sector told Computer weekly that Errington will be a casualty of RBS's cost-cutting plan, known as ...
     2  +1 2014 sep 13lastest cookie privacy guide legslationHow to comply with the EU cookie law - ComputerWeekly.comThe EU cookie law is a piece of privacy legislation that was originally adopted by all EU ... The ICO has issue two sets of guidelines , so far, with the most recent  ...
     2  +1 2014 sep 13latest cookie privacy guide legislation
     2  +1 2014 sep 11forced browsingForced browsing : Understanding and halting simple browser attacksForced browsing occurs when an attacker guesses or discovers the URL of a restricted website page or file. Expert Rob Shapland explains how to halt this ...
     2  ~ 2014 sep 11master data management securitySecurity Zone: Security in master data managementA master data management (MDM) system is a set of both tools and processes to help companies maintain a consistent record of their ...
     2  ~ 2014 sep 09develop recovery strategiesThe crux of disaster recovery planning is a detailed recovery plan based on a disaster recovery strategy tailored to your organisation's unique risk profile.
     2  -1 2014 sep 03managing multiple projects softwareProject management software – Essential GuideThere are different ways in which project management software is made ... Multiple users can share file-based project plans or data held on a database, if only ...
     2  +14 2014 sep 03flash base e cardPCIe SSD: What it is and how you can use it - ComputerWeekly.comDRAM and flash - based SSDs are the next best option, especially if feeding data to ... By submitting you agree to receive email from TechTarget and its partners.
     2  +1 2014 aug 28disaster recovery plan databaseHow to write a disaster recovery plan and define disaster recovery Learn how to develop disaster recovery strategies as well as how to write a disaster ... Formulating a detailed recovery plan is the main aim of the entire IT disaster recovery ..... In-memory database systems worth thinking about, McKnight says.
     2  +1 2014 aug 27disaster recovery best practicesIT disaster recovery plan best practices : Fundamentals in DR planningIn this Special Report, find out the basics to best implement your IT disaster recovery plan, including detailed guidelines for performing key business impact and ...
     2  ~ 2014 aug 27computer blog sitesIT Blogs , Technology & Computing Blogs | ComputerWeekly.comIT blogs and computer blogs from ComputerWeekly.com. Get the latest opinions on IT from leading industry figures on key topics such as security, risk ...
     2  +2 2014 aug 26uk it industryUK IT industry : 'We have a bright future' - ComputerWeekly.comUsers, suppliers and consultants from all areas of IT tack-led the motion, "This house believes the UK IT industry has passed from adolescence to senility without ...
     2  +2 2014 aug 26tesco customer experience managementTesco takes a multi-channel approach to customer experienceTesco has been using an array of Oracle technology, including its ... Information Management ... Tesco was invited to talk about its customer experience strategy during a keynote at Oracle OpenWorld in San Francisco.
     2  ~ 2014 aug 25computer blog websitesIT Blogs, Technology & Computing Blogs | ComputerWeekly.comIT blogs and computer blogs from ComputerWeekly.com. ... Computer Weekly Editor's Blog : Technology on trial - justice system could do better ... Search this site . ‎When IT Meets Politics - ‎David Lacey's IT Security Blog - ‎Open Source Insider
     2  -1 2014 aug 24it news rssCatch up with the latest information technology ( IT) news with technology RSS feeds from Computer Weekly.
     2  -1 2014 aug 20unstructured data managementHow to manage unstructured data for business benefitThe cloud offers some progress in the resource-sapping management of unstructured data , but it is critical to work back from the business case.
     2  +26 2014 aug 16disaster recovery interviewFour key questions in disaster recovery planning - Computer WeeklyView the latest CIO interviews , videos and guides to help you develop your IT ... Disaster recovery planning, a subset of business continuity, comprises the ...
     2  +4 2014 aug 16techno news feeds
     2  ~ 2014 aug 15founder of cloudA history of cloud computing - Computer Weekly
     2  -1 2014 aug 14managed hosting reserachManaged services and hosting services news, help and research Read the latest stories about hosting services and managed services and the options for external provision of data centres and other IT services.
     2  ~ 2014 aug 14video conferencing policyWhat to include in a secure video conference policyVideo conferencing is often the norm at organisations these days, so learn how to create a secure video conference policy to prevent accidental or intentional ...
     2  ~ 2014 aug 14quantum lifecycle managementAn Introduction to Quantum Lifecycle Management - Computer WeeklyQuantum Lifecycle Management (QLM) will enable the “Internet of Things” to have an impact on business and the world at large in a way similar to the Internet  ...
     2  ~ 2014 aug 14red letter secure emailCRM: a valuable gift for Red Letter Days - Computer WeeklyThe journey of Red Letter Days to be the UK's leading provider of
     2  ~ 2014 aug 14latest technology feeds
     2  +7 2014 aug 13customer database mediaTop six tips to improve your organisation's social media CRM strategyBut by adding social content to the customer database - such as a customer's Twitter handle, recent blog post, or LinkedIn profile. Adding social media data to ...
     2  ~ 2014 aug 13second hand softwareIs second - hand software illegal? - Computer WeeklyThe action by Federation Against Software Theft to suspend one of its members confuses users over legal second user licences.
     2  -1 2014 aug 13business software packagesThe best software for small businesses (SMEs) - Essential GuideThe most popular software packages include accounts, office productivity, email and communications, but nowadays, most business activities can be improved ...
     2  -1 2014 aug 12database management software natsCode crashes Nats system - Computer Weeklyand analytics, Database management , Data warehousing, MDM/Integration,
     2  -1 2014 aug 11history of cloud
     2  ~ 2014 aug 07computer data recoveryComputer data recovery - Essential Guide - ComputerWeekly.comComputer data recovery can be a tricky business, usually requiring the help of hard drive data recovery experts. But in all hard drive recovery situations, experts  ...
     2  -1 2014 aug 07software for smesThe best software for small businesses is software designed to help them to run their operations better, cut costs and replace paper processes. The most popular  ...
     2  -1 2014 aug 05email archiving serviceEmail archiving services : How they work and how to select a serviceWhy use email archiving services ? The primary reason is because they address a major headache for the IT department. While email is vital to the flow of ...
     2  ~ 2014 aug 05cisco it business intelligenceHow Cisco got closer to its customers using BI - Computer WeeklyNetwork equipment maker Cisco has turned itself into one of the world's most respected logistics-based firms by using business intelligence  ...
     2  +1 2014 aug 03pci-express solid state drivePCIe SSD : What it is and how you can use it - Computer WeeklyPCIe SSD is a new way of adding the speed of a solid-state drive (SSD) to server and storage devices. What are the benefits, drawbacks and adoption rate of ...
     2  ~ 2014 jul 31pos operating systemPoint of Sale ( POS ) software - Essential Guide - ComputerWeekly.comPoint of Sale ( POS ) software, also known as electronic Point of Sale (ePOS), is an essential application for retail or hospitality businesses because it manages ...
     2  +1 2014 jul 30augmented reality printed paperAugmented Reality and Print : Gimmick or Game Changer According to Juniper Research, the mobile Augmented Reality (AR) market ... This might be a moving version of the static image on the paper , ...
     2  ~ 2014 jul 29outsourcing secrets revealedTop PLCs' outsourcing secrets revealed - Computer WeeklyOutsourcing has moved beyond simply being a cost-effective approach to IT to become a strategic tool in the corporate armoury, according to a ...
     2  +11 2014 jul 28outsource company goalOutsourcing IT services : goals and negotiationsBased on Forrester's contract review activities, it appears a lot of services outsourcing contracts are defined from the provider's perspective. It is not easy for IT ...
    1 2 of 131 pages