Understanding remote scripting: Managing Windows networks using scripts, Part 9
News | ComputerWeekly.comOur series on managing Windows networks using scripts continues.
CISOs invisible to their organisations, says BT report
News | ComputerWeekly.comIgnorance of cyber issues is leading to misplaced confidence in security in many organisations, as CISOs struggle to make themselves seen and heard
UKRI suspends services after ransomware attack
News | ComputerWeekly.comUK Research and Innovation was hit by an undisclosed strain of ransomware at the end of January
How to manage mobility
News | ComputerWeekly.comPlanning a new mobility deployment? This tip and podcast offer eight strategies to make sure you get it right.
IR35 private sector reforms: IT contractors warned to be wary of non-compliant umbrella companies
News | ComputerWeekly.comThe proliferation of websites offering comparison site-like services for umbrella companies has prompted tax experts to warn IT contractors of the ...
Music publisher BMG taps into Google Cloud to manage and analyse streaming data processes
News | ComputerWeekly.comBerlin-based record label and music publisher BMG is drawing on Google Cloud to revamp its infrastructure to accommodate the music industry's ...
Nokia, Mobily unveil world’s first sliced FWA deployment
News | ComputerWeekly.comGlobal comms tech provider teams with Saudi Arabian telco to pilot world’s first 4G and 5G fixed wireless access network slicing on a live commercial...
European telecoms big guns team up to drive Open RAN deployments
News | ComputerWeekly.comMajor regional operators embark upon collaboration to provide a framework for the creation of an interoperable market for Open RAN
IR35 private sector reforms: Zurich Insurance under fire over contractor blanket ban
News | ComputerWeekly.comZurich Insurance is the latest high-profile financial services company to declare contractors can only continue to engage with it via umbrella setups...
Watts steps into Gass role at Tech Data
News | MicroScopeDistributor promotes its current UK&I managing director to take on even more responsibility
Set up an ad hoc WiFi network
News | ComputerWeekly.comWhat if you wanted to do pretty much everything you can do on a network, but didn't have a router? You can set up an ad hoc network, in which you can...
VoIP, unified communications study reveals challenges
News | ComputerWeekly.comVoIP and unified communications deployments can affect other applications. A study by Network General highlighted some challenges introduced by ...
Enabling Windows Vista's Network Mapping feature on domain networks
Tip | ComputerWeekly.comLearn how to enabling Windows Vista's Network Mapping feature on domain networks.
Canalys: Cyber security channel set for further growth
News | MicroScopeAnalyst house Canalys forecasts another decent year ahead for those set to can help customers fend off cyber attacks
EDITORIAL: It's time for a Net Neutrality debate
News | ComputerWeekly.comAustralia should sort out its position on Net Neutrality before the National Broadband Network is built, not afterwards, writes TechTarget ANZ Editor...
Implement job rotation for team motivation, productivity
Tip | ComputerWeekly.comIndian CXOs are increasingly experimenting with job rotation for team motivation and productivity. Find out why job rotation helps, and how M&M ...
Cring ransomware hits ICS through two-year-old bug
News | ComputerWeekly.comA long-disclosed vulnerability in Fortinet’s Fortigate VPN servers is being exploited to distribute Cring ransomware
Fulcrum snaps up Pure Technology Group
News | MicroScopeLeeds-based IT services player is the latest in the channel to be a target for investment
MoD calls on academics, industry and inventors to pitch cyber security ideas
News | ComputerWeekly.comThe Ministry of Defence is calling for innovative solutions from academia and industry to protect and secure UK interests in cyberspace.
Questions raised by New Zealand central bank boss, following cyber attack investigation
News | ComputerWeekly.comThe governor of New Zealand’s central bank said the organisation must answer questions about its security following a ‘significant’ attack
Legacy security architectures threaten to disrupt remote working
News | ComputerWeekly.comAnnual survey of IT leaders finds network security is of prime concern as most companies continue with work-from-home policies
Larry English calls for an information quality revolution
News | ComputerWeekly.comLarry English, in an interview, calls for an information quality revolution that will put the customer first. New rules are necessary for the “...
Reasons why enterprise networking and security roles must stay separate
News | ComputerWeekly.comEnterprise network managers are responsible for configuring and managing network devices, but should they be accountable for tasks that are typically...
IM security threats and resources
News | ComputerWeekly.comInstant messaging applications have their own set of security guidelines to prevent hacking.
Aura will power Avaya-Nortel unified communications integration
News | ComputerWeekly.comAvaya has staked its future of retaining Nortel customers on its flagship SIP-based communications platform, Aura, as the heart of the Avaya-Nortel ...
Channel roundup: Who's gone where?
News | MicroScopeAnother week of movement across the channel, with vendors and partners hiring for growth
Networking certifications : How to pass your Network+ exam
News | ComputerWeekly.comLearn how to pass your Network+ exam in this story on how to study and read to obtain your Cisco certification.
Security Zone: The ISO/IEC 38500 IT Governance Standard
Opinion | ComputerWeekly.comIT governance means different things to different folks, yet it is generally understood to require alignment with best practice standards and ...
LinkedIn could beat Facebook to an IPO
News | ComputerWeekly.comLinkedIn could be the first social network company to be floated on the stock market, according to reports.
More than 1,000 patient records lost on unencrypted laptop
News | ComputerWeekly.comA doctor is to be disciplined following the loss of 1,147 patient records on an unencrypted laptop.
UK government reviews law on access to land for digital infrastructure
News | ComputerWeekly.comReacting to reports that agreements have been slow to conclude, holding up the roll-out of better mobile and broadband connectivity, UK government ...
Federal Government cancels OPEL contract
News | ComputerWeekly.comThe Federal Government has cancelled the OPEL contract for delivery of wireless broadband to regional areas
Contactless payment limit could rise to £100 as FCA seeks industry views
News | ComputerWeekly.comUK financial services regulator is considering raising the contactless card payment limit to £100
Robert Gordon University delivers graphics workstations virtually
News | ComputerWeekly.comEngineering and architecture students require PCs that can run GPU-accelerated applications. VDI has enabled them to be streamed remotely
5G to the fore as Ericsson beats expectations in financial year
News | ComputerWeekly.comStrong year recorded by comms tech firm from continued high activity levels in North America, Northeast Asia and Europe, with 5G strong
‘Victory for free speech and openness’ after tribunal confirms no territorial restrictions to FOIA
News | ComputerWeekly.comFreedom of information tribunal rules that investigative journalists and others can use the Freedom of Information Act if they live outside the UK or...
Does rapid UC innovation beget slow implementation rates?
News | ComputerWeekly.comAs unified communications (UC) technology grows, many enterprises are left to play catch-up.
Making the case for FCIP and FCoE
News | ComputerWeekly.comFC over IP and FC over Ethernet let companies begin consolidating on one network platform as opposed to maintaining separate FC and Ethernet networks.
NCSC: Using your pet’s name as a password is very stupid
News | ComputerWeekly.comIf your email password is still Rex, Rover or Mr Fluffles, it’s probably best to change it, the NCSC has said
Is the NHS National Programme for IT terminally ill?
News | ComputerWeekly.comA damning report from the National Audit Office (NAO) has revealed the woeful state of the NHS National Programme for IT (NPfIT), nine years after ...
Seven steps to successful negotiation for IT buyers
Opinion | ComputerWeekly.comNigel Owen of training consultancy Huthwaite International provides some key tips for benefiting both seller and buyer when negotiating a sale or ...
Google adds real-time traffic data to Android map app
Feature | ComputerWeekly.comGoogle has updated its algorithms to support real-time data for its map application for smartphones running on the Android operating system (OS).
Hague calls for collaboration to realise full potential of cyberspace
News | ComputerWeekly.comIt is increasingly clear that countries with weak cyber defences and capabilities will find themselves at a serious strategic disadvantage given the ...
NHS £5bn IT procurement finally begins
News | ComputerWeekly.comThe Department of Health (DoH) has launched the formal procurement process for its £5bn restructuring of NHS IT.
What are some of the other options available to help manage unstructured data?
News | ComputerWeekly.comEliminate unnecessary data from your production storage. This typically involves moving the unnecessary data to a different tier or deleting the data...
What are some of the best practices for managing the growth of unstructured data?
News | ComputerWeekly.comIt starts with corporate policies around data management...
What is unstructured data and how is it different from structured data in the enterprise?
News | ComputerWeekly.comWhat we're really doing is designating our data as structured or unstructured. Let's start with structured data...
Cisco bolsters security with IronPort buy
News | ComputerWeekly.comCisco Systems agreed Thursday to buy Internet gateway security vendor IronPort Systems Inc. for $830 million.
Is an SMB environment too small for a SAN?
News | ComputerWeekly.comAlmost any size business can benefit from some type of SAN -- or "network storage"; whether it's NAS, iSCSI-based IP storage or FC storage...
Hybrid drives hit NAS boxes
News | ComputerWeekly.comDNF will be making hybrid drives available in all of its storage products, but it doesn't recommend them for IP SANs.
Capacity planning software specifications
News | ComputerWeekly.comGauging storage needs over time is one of the biggest challenges faced by IT administrators, and a new generation of capacity planning tools is ...
Web 2.0: CIOs want it their way
News | ComputerWeekly.comA new study found CIOs want Web 2.0 technology, but they're a little insecure about getting it from emerging specialized vendors.
Storage Security FAQ audiocast
News | ComputerWeekly.comDon't have time to dig into the FAQ text now? Download the audiocast in MP3 format and listen in the car, at the gym -- wherever you want. You can ...
Deals abound for high-end storage
News | ComputerWeekly.comThink high-end storage is out of your reach? Maybe not. Conversations with several storage buyers recently suggest that vendors are scrambling to ...
What are the disadvantages of unified storage over independent block and file systems?
News | ComputerWeekly.comThere are some compromises that you'll need to make; there are certainly some control granularity issues. The pattern of access for file-based data ...
Debian fixes multiple flaws
News | ComputerWeekly.comDenial-of-service, buffer overflow and format string vulnerabilities in Debian GNU/Linux that an attacker could use to remotely execute malicious ...
Court blocks former ICL solicitor's Pathway claim
News | ComputerWeekly.comFujitsu has won a court ruling to stop a former solicitor for the company pursuing allegations about the government's disastrous...
Quiz: Using IAM tools to improve compliance
Feature | ComputerWeekly.comA five-question multiple-choice quiz to test your understanding of the content presented by expert Tom Bowers in this lesson of SearchSecurity.com's ...
IP storage adoption plows ahead bringing tangible benefits
News | ComputerWeekly.comAccording to IDC, there were 32,124 terabytes (TB) of iSCSI storage deployed worldwide in 2005. That figure had almost tripled to 97,506 TB by 2006. ...
McAfee fixes flaw in Mac antivirus software
News | ComputerWeekly.comAttackers could exploit the hole in McAfee's Virex 7.7 antivirus program for Mac OS X to bypass the malware scanner, but a fix is available.
Is there any reliability difference with unified storage?
News | ComputerWeekly.comThere are a few minor differences, but usually not a significant difference...
Cisco VoIP management guide: VoIP management lifecycle
News | ComputerWeekly.comVoIP lifecycle management enables enterprises to safely pursue large production deployments. The management lifecycle includes the following four ...
Midrange storage array purchase considerations
News | ComputerWeekly.comA Buying Guide focusing on specific considerations for midrange disk array systems. Also find a series of specifications to help make on-the-spot ...
Microsoft investigates Windows Vista Mail flaw
News | ComputerWeekly.comAttackers could exploit a flaw in Windows Vista Mail to compromise PCs by tricking the user into opening a malicious email attachment. Microsoft is ...
Cisco VoIP management guide: Enterprise VoIP management solutions
News | ComputerWeekly.comEnterprise VoIP management solutions require two considerations: the scale of production environment and the need to extend support resources with a ...
CA backup bug exploitable on Vista
News | ComputerWeekly.comIn what appears to be the first exploit for a third-party app running on Vista, a previously patched buffer overflow vulnerability in CA BrightStor ...
Cisco VoIP management guide: Cisco requires proactive management
News | ComputerWeekly.comManaging Cisco VoIP solutions means network managers must rely on credible, experienced vendors to some extent. Fortunately, many vendors have ...
Attackers hit computers that manage Internet traffic
News | ComputerWeekly.comSeveral of the "root" servers that serve as the backbone of the Internet were targeted by digital miscreants Tuesday in the most significant attack ...
Police force secures data with biometrics
News | ComputerWeekly.comHumberside Police has issued biometric USB drives among staff to maintain data security.
What is the difference between virtualization switches and virtual SANs?
News | ComputerWeekly.comThe word "virtualization" is thrown around so much that it's hard to always know what it means...
Top Web security tips of 2006
Feature | ComputerWeekly.comCheck out the top five Web security tips of 2006 to get advice on securing Internet Explorer, ISA Server and Radius and a set of tools designed to ...
Symantec exploitation video hits YouTube
News | ComputerWeekly.comSymantec posted a clip on the popular video-sharing site showing researchers using a newly discovered flaw in Microsoft Word to drop an executable on...
Fujitsu won £800m Post Office contract after misrepresenting itself, says lawyer
Feature | ComputerWeekly.comHigh Court claim by ex-employee makes damning accusations
UK firms are offered help to migrate to open source
News | ComputerWeekly.comCompanies are being given help to migrate to free-license software by a joint initiative from OpenForum Europe and the National...
Cisco software vulnerable to attack
News | ComputerWeekly.comCisco's Clean Access software and Clean Access Manager are at risk to attack. A malicious user can access a database snapshot and download it without...
Metasploit Framework 3.0 released
News | ComputerWeekly.comBrief: Metasploit Framework 3.0 contains 177 exploits, 104 payloads, 17 encoders and 30 auxiliary modules that perform such tasks as host discovery ...
How can a company set retention policies with such a glut of unstructured data?
News | ComputerWeekly.comIt depends; there are no easy answers to this. There are a number of initiatives that a company should undertake, including disaster recovery, ...
Cisco VoIP managment guide: Required management tasks
News | ComputerWeekly.comComprehensive VoIP management includes the basic network management tasks, but also includes monitoring services such as dial tone delivery, call ...
How is unstructured data affecting storage administrators and other staff?
News | ComputerWeekly.comThere is absolutely an effect. Additional data volume translates into...
On the right side of the law
Feature | ComputerWeekly.comWhat are the legal and regulatory issues that could affect the running of your company? What are the ramifications of the Data...
Should I use data deduplication to manage unstructured data?
News | ComputerWeekly.comAbsolutely; there are two areas where data deduplication, or single-instance storage, can help...
Adobe Reader users urged to upgrade
News | ComputerWeekly.comAdobe Reader 8 fixes serious flaws attackers could exploit for cross-site scripting and other attacks.
Cisco fixes IOS flaws
News | ComputerWeekly.comAttackers could exploit three Cisco IOS flaws to cause a denial of service or launch malicious code. The networking giant has released fixes.
Disaster Recovery Planning Podcasts
News | ComputerWeekly.comDR expert Jon Toigo explains how the new realities of business make DR planning an essential element of daily IT process, procedure, product ...
What's in an IT name?
Feature | ComputerWeekly.comWhat exactly does a chief information officer do?Paul Burfitt, global CIO at AstraZeneca, analysed the various aspects of his job...
Fewer IT supplier conflicts are going to court
News | ComputerWeekly.comLaw firms have reported a sharp fall in the number of IT disputes reaching the courts over the past 12 months as more users turn...
iSCSI SANs grow in midmarket, enterprise
News | ComputerWeekly.comBecause transporting "SCSI over IP" leverages ubiquitous Ethernet networks, that translates to lower cost, easier maintenance and simpler management,...
Windows Vista voice command tricked
News | ComputerWeekly.comAn attacker found a way to play audio commands at a user's machine tricking the voice command capability in Vista into running arbitrary code.
Outsourced VoIP helps devastated company recover
Feature | ComputerWeekly.comOutsourced VoIP helped a Berkeley company keep up business as usual after a fire destroyed its offices.
Balancing the cost and benefits of countermeasures
News | ComputerWeekly.comThe final tip in our series, "How to assess and mitigate information security threats."
Attacks targeted to specific applications
News | ComputerWeekly.comThe fourth tip in our series, "How to assess and mitigate information security threats."
Compellent adds boot from SAN consolidation
News | ComputerWeekly.comUpdate saves storage space by consolidating boot volumes into a "golden" copy of the OS, but experts are troubled by a lack of partnerships with ...
Hitachi launches 1 TB SATA disk drive
News | ComputerWeekly.comHitachi has taken the wraps off three new products: a 1 TB enterprise SATA disk drive, a 2.5-inch SAS drive and a 300 GB multi-interface drive.
How to assess and mitigate information security threats
News | ComputerWeekly.comLearn how to assess and mitigate information security threats, like rootkits, worms and Trojans in the tip series created in collaboration with ...
Continuous backup gains traction
News | ComputerWeekly.comFor continuous backup technology, 2004 is the year that vendors have moved from promises to actual products. Although the market is still small -- ...
Will all storage systems be unified storage in the future?
News | ComputerWeekly.comI don't think that "all" storage systems will be unified...
What does unified storage really mean?
News | ComputerWeekly.comThis can often be confusing once you read vendors' marketing materials. Simply stated, unified storage [or multiprotocol storage] refers to a...
What is the advantage of having unified storage?
News | ComputerWeekly.comThere is debate about that. Many customers may prefer to have just one storage system, avoiding specialized storage systems, like NAS for file-based ...
What about the system features, like snapshot and remote replication?
News | ComputerWeekly.comAt this point in time, most customers expect to have these features in both block- and file-based storage products...
What will be the impact on performance when mixing block and file in the same system?
News | ComputerWeekly.comCaching difficulties are one concern since caching patterns may not be optimized for block-based storage...