Browse Definitions :
81,572 results for:

Data protection raid reveals anti union blacklist

Photo Story | ComputerWeekly.com

Camp scene with parhelia

Photo Story | ComputerWeekly.com

1) Bogota, Columbia

Photo Story | ComputerWeekly.com

Sony Ericsson Xperia neo

Photo Story | ComputerWeekly.com

Android 2.3 Gingerbread

Photo Story | ComputerWeekly.com

Ergonomically designed

Photo Story | ComputerWeekly.com

Reality display with mobile BRAVIA engine

Photo Story | ComputerWeekly.com

Photos: Sony Ericsson Xperia Neo

Photo Story | ComputerWeekly.com

The Sony Ericsson Xperia Neo will run on the new Android 2.3 Gingerbread operating with new features such as the iPhone folders system.

Welcome to the new-look ComputerWeekly.com

News | ComputerWeekly.com

Computer Weekly has launched its brand new website - the most important online development in the brand’s 45-year history.

How to upgrade your Wi-Fi Network

Photo Story | ComputerWeekly.com

With the 802.11n or Wireless-N standard ratified, now is the best time to consider a wireless network upgrade. Find out how in Cliff Saran's ...

Mobile World Congress in pictures

Photo Story | ComputerWeekly.com

More than 1,300 companies attracted in excess of 50,000 delegates from 200 countries to Mobile World Congress in Barcelona this week.

Videos and photos on your HD TV

Photo Story | ComputerWeekly.com

The IT starting grid - The team behind Red Bull Racing

Photo Story | ComputerWeekly.com

CERN: Exhibition center

Photo Story | ComputerWeekly.com

Photos: CERN - A tour of the large hadron collider

Photo Story | ComputerWeekly.com

This month is the 20th anniversary of the Web, which was invented by Tim Berners-Lee at Cern in March 1989.

Photos: F1 - The wind beneath Red Bull's wings

Photo Story | ComputerWeekly.com

This year see Red Bull Racing enter the Formula One championships with Sebastien Vettel and Mark Webber taking to the grid. We look at what goes into...

Facebook celebrates its fifth birthday

Photo Story | ComputerWeekly.com

Facebook celebrates its fifth birthday today, 4 February. See how the site has evolved in our photo gallery.

Upgrade your Wi Fi network to 802 11n

Photo Story | ComputerWeekly.com

Photos: Google Street View - A tour of London

Photo Story | ComputerWeekly.com

Take a virtual tour of London with Google Street View!

Top 10 Twitter marketing blunders in photos

Photo Story | ComputerWeekly.com

Twitter is supposed to be an intuitive technology, easy to get the hang of and proving its worth the more you use it. But on Twitter, as on many ...

Photos: Top Ten Google Android Apps

Photo Story | ComputerWeekly.com

Google's Android OS is taking over with over eighteen new devices de out by the end of the year. We look at the best apps currently available for ...

Red Balloon iGoogle photography competition

Photo Story | ComputerWeekly.com

Photos: Public to vote on amazing iGoogle art

Photo Story | ComputerWeekly.com

Google has opened public voting on an art competition which asks students take photographs that can be used as iGoogle Themes.

Hardware Samsung Jet flies in

Photo Story | ComputerWeekly.com

Photos: Samsung Jet flies in

Photo Story | ComputerWeekly.com

Samsung Electronics has launched a mobile phone that it hopes will compete with the iPhone.

Cooking capsules Top Ten Android Apps

Photo Story | ComputerWeekly.com

Photos: Hunting for water on the moon

Photo Story | ComputerWeekly.com

NASA's LCROSS mission is the latest in a series of attempts to divine water on the moon – some have hinted that our nearest neighbour may be ...

CeBIT 2009: KTM X-Bow

Photo Story | ComputerWeekly.com

Care-O-bot 3 - CeBIT 2009

Photo Story | ComputerWeekly.com

BT connects Dutch diplomatic missions

News | ComputerWeekly.com

New software-defined network services designed to enable secure collaboration and support digital transformation of network supporting Netherlands ...

Isle of Man: From seaside getaway to tech startup hub

Feature | ComputerWeekly.com

The Isle of Man government is stepping up efforts to position itself as the low-tax jurisdiction of choice for the startup community. But what's it ...

Apple iOS 5.1 patches 81 vulnerabilities

News | ComputerWeekly.com

Alongside its ‘new iPad’ release, Apple Inc. releases iOS 5.1, the latest version of its mobile computing platform with fixes for 81 security holes.

CIO interview: Rob Pringle, global IT director, Gazprom

News | ComputerWeekly.com

Rob Pringle, director of global IT at Gazprom Marketing and Trading, reveals the secret of rolling out IT quickly

Birkbeck College consolidates servers to cut PUE rating to 1.3

News | ComputerWeekly.com

Birkbeck College has consolidated four equipment rooms into one £700,000 datacentre with a PUE rating of just 1.3

Councils meet first superfast broadband deadline

News | ComputerWeekly.com

All but two local authorities have met government deadlines to submit plans to roll out superfast broadband

FBI informer Hector Xavier Monsegur aids in arrest of LulzSec hackers

News | ComputerWeekly.com

Authorities in the US, UK and Republic of Ireland have arrested seven suspected members of hacktivist group LulzSec, including Hector Xavier Monsegur...

UK regulator PhonepayPlus fines Dutch typosquatting companies

News | ComputerWeekly.com

UK phone regulator PhonepayPlus fines two Dutch firms £100,000 for exploiting well-known websites Wikipedia, Twitter and YouTube

Voltas’ SAP business intelligence (BI) powers move to improve profits

News | ComputerWeekly.com

The CFO and IT maven at India’s engineering solutions major Voltas Ltd detail how they worked together on a SAP BusinessObjects BI implementation ...

Five not the only magic number for Three in 2021

Feature | ComputerWeekly.com

With a new CEO beginning to put into practice its plan, mainly a pivot towards business, mobile operator Three UK has been eyeing up new ...

Cisco unveils product consolidation plan

News | ComputerWeekly.com

Cisco has unveiled details of the product line consolidation it hopes will turn around the company after its struggles with poor financial ...

Oracle and SAP worst for government ERP cost differences

News | ComputerWeekly.com

Oracle and SAP have been singled out as having the most inconsistent prices for ERP systems across government departments.

Cisco back on acquisition trail after record quarter

News | ComputerWeekly.com

Cisco Systems has reported record revenues of $11.5bn for the second fiscal quarter that ended 28 January 2012, up 11% on the year-ago quarter, and ...

Malwarebytes also hit by SolarWinds attackers

News | ComputerWeekly.com

The nation state group that attacked SolarWinds in December got inside Malwarebytes by exploiting privileged access to its Microsoft Office 365 ...

EC publishes proposed data protection reforms

News | ComputerWeekly.com

European Justice Commissioner, Viviane Reding, has unveiled the new European data privacy framework that includes new regulation.

Orange announces submarine cable linking US East Coast to France

News | ComputerWeekly.com

Global telco claims significant reinforcement of connectivity and resilience on what it says is the most important submarine route in the world, with...

How Globe Telecom is doubling down on cloud

News | ComputerWeekly.com

The largest mobile operator in the Philippines has moved its legacy systems to the cloud and there is more to come as it looks towards deploying ...

Hybrid working a reality but business leaders not yet giving up on the office

News | ComputerWeekly.com

Research finds C-suite executives and business leaders will primarily split their workforces between on-site and remote work, with markedly small ...

Time for a truce in IT’s battle with RPA

Feature | ComputerWeekly.com

Lack of governance and limited resources have put IT departments at loggerheads with business-led robotic process automation. But RPA and IT teams ...

NIST releases SP 800-153 WLAN security guidelines

News | ComputerWeekly.com

The recently released NIST SP 800-153 addresses security of WLANS. Join us, as we take a closer look at the document’s recommendations.

VMware - vCenter

Photo Story | ComputerWeekly.com

CA Application Performance Management

Photo Story | ComputerWeekly.com

IBM - Tivoli Monitoring for Virtual Environments

Photo Story | ComputerWeekly.com

Compuware CloudSleuth

Photo Story | ComputerWeekly.com

AWS and Telstra team up on 5G

News | ComputerWeekly.com

Australia’s Telstra will explore a range of AWS’s edge computing offerings that can be integrated into its 5G network to speed up the performance of ...

Kate Murray

Contributor | TechTarget

Kate is the associate managing editor of e-products at TechTarget, working with the Business Initiatives and Central Editorial teams.

When X.509 security certificates fail, servers break

Feature | ComputerWeekly.com

Why are X.509 certificates causing computers to stop dead?

Cogenta migrates to Claranet VDC

Photo Story | ComputerWeekly.com

Podcast interview: Stephen Glen, WorkIT on hosting and private clouds

News | ComputerWeekly.com

Stephen Glen, software architecture engineer at retail intelligence firm WorkIT, discusses hosting and cloud computing.

Government launches CloudStore and names G-Cloud suppliers

News | ComputerWeekly.com

The government has launched its CloudStore, a catalogue of 1,700 cloud-based, pre-approved IT services now available for the public sector to buy.

Adding a new private VLAN

Photo Story | ComputerWeekly.com

EDF signs £100m datacentre deal with Atos

News | ComputerWeekly.com

Energy company EDF has signed a £100m 10-year deal with outsourcing provider Atos for datacentre services

RightScale

Photo Story | ComputerWeekly.com

Eight of the best cloud computing tools

Photo Story | ComputerWeekly.com

Cloud computing is a growing part of many IT strategies. Computer Weekly has found eight of the best tools available for your company.

Where is Intel going to place its next strategic bet?

News | ComputerWeekly.com

Intel is getting a new CEO and the company is on a mission to move beyond the x86, a processor architecture that it has defined and dominated

Fewer than a third of UK organisations plan mobile security projects

News | ComputerWeekly.com

Despite the media hype around the adoption of mobile technologies and the need to secure them, relatively few UK organisations are planning mobile ...

IBM Fusion Activity leaders

Photo Story | ComputerWeekly.com

Robo Rescue

Photo Story | ComputerWeekly.com

Slick Racer

Photo Story | ComputerWeekly.com

Market Mayhem

Photo Story | ComputerWeekly.com

Mystery Chase

Photo Story | ComputerWeekly.com

ISDN implementation: Part 2 -- Protocols, components and router options

Tip | ComputerWeekly.com

ISDN provides for digital transmission over ordinary telephone copper wire as well as over other media uses. In this continuation of his tip on ISDN ...

How is SIP winning favor over H.323?

News | ComputerWeekly.com

What are the similarities, differences and major reasons between SIP and H.323. And why is one winning?

Woodland Trust hit by cyber attack in December

News | ComputerWeekly.com

Conservation charity is investigating what it describes as a ‘sophisticated’ cyber attack but has waited nearly two months to inform its members

Wireless security protocols -- How WPA and WPA2 work

News | ComputerWeekly.com

WPA and WPA2 improve upon WEP's encryption methods for better 802.11 wireless security.

Best practices for instant messaging security

Tip | ComputerWeekly.com

In this tip, Brien Posey details the steps you can take to protect your organisation from security problems when implementing an instant messaging ...

Evaluating messaging and email platforms

News | ComputerWeekly.com

Messaging and email systems are incorporating more capabilities than ever. Learn what to think about when upgrading your messaging platform.

Comparing VoIP vendors

News | ComputerWeekly.com

For many companies, the tough decision isn't whether to use IP telephony or not -- it's which vendor to choose. We've collected some of Carrie ...

Network summarization -- Supernetting and wildcard masks

Tip | ComputerWeekly.com

Supernetting allows one routing table entry to represent an aggregation of networks. Network engineers need to understand supernetting, how to read ...

Boeing outsources to Dell affecting 600 IT jobs

News | ComputerWeekly.com

US aircraft manufacturer contracts hundreds of IT roles to Dell as it accelerates outsourcing plans

USB storage devices: Two ways to stop the threat to network security

Tip | ComputerWeekly.com

USB storage devices pose a significant threat to network security. This tip discusses some basic strategies for blocking unauthorized USB device use.

More than two-thirds of firms would invest in dedicated remote working connectivity

News | ComputerWeekly.com

Firms are faced with supporting more remote working for their businesses going forward, and a survey has shed light on what form this support will ...

Cisco IP Communications Express: CallManager Express with Cisco Unity Express

News | ComputerWeekly.com

Creating an intercom network between IP phones that support speakerphone capabilities is a relatively painless process when using Cisco CallManager ...

13: Tim Berners-Lee, World Wide Web inventor; director of Open Data Institute

Photo Story | ComputerWeekly.com

The UKtech50: The top 20

Photo Story | ComputerWeekly.com

Following on from our successful afternoon yesterday, where we unveiled the most influential people within the UK IT industry, ComputerWeekly brings ...

HP Slate - Tablets set to kill the iPad CES 2011

Photo Story | ComputerWeekly.com

RIM Blackberry Playbook - Tablets set to kill the iPad - CES 2011

Photo Story | ComputerWeekly.com

Acer Iconia - Tablets set to kill the iPad CES 2011

Photo Story | ComputerWeekly.com

Samsung Galaxy Tab - Tablets set to kill the iPad CES 2011

Photo Story | ComputerWeekly.com

Asus Eee Slate - Tablets set to kill the iPad - CES 2011

Photo Story | ComputerWeekly.com

Toshiba tablet - Tablets set to kill the iPad CES 2011

Photo Story | ComputerWeekly.com

Vizio Via - Tablets set to kill the iPad CES 2011

Photo Story | ComputerWeekly.com

Display - Apple iPad 2

Photo Story | ComputerWeekly.com

Slimmer design - Apple iPad 2

Photo Story | ComputerWeekly.com

A5 dual core processor - Apple iPad 2

Photo Story | ComputerWeekly.com

HDMI output - Apple iPad 2

Photo Story | ComputerWeekly.com

Close-up of Pionen entrance

Photo Story | ComputerWeekly.com

Entrance to Wikileaks Bond villain bunker

Photo Story | ComputerWeekly.com

Wikileaks meeting room

Photo Story | ComputerWeekly.com

Photos: Royal Family and Beckhams census from 1911

Photo Story | ComputerWeekly.com

The online census reveals the details of the 36 million people living in England and Wales in 1911.

Cortado Workplace - iPad 2 for business

Photo Story | ComputerWeekly.com

Networking
  • local area network (LAN)

    A local area network (LAN) is a group of computers and peripheral devices that are connected together within a distinct ...

  • TCP/IP

    TCP/IP stands for Transmission Control Protocol/Internet Protocol and is a suite of communication protocols used to interconnect ...

  • firewall as a service (FWaaS)

    Firewall as a service (FWaaS), also known as a cloud firewall, is a service that provides cloud-based network traffic analysis ...

Security
  • identity management (ID management)

    Identity management (ID management) is the organizational process for ensuring individuals have the appropriate access to ...

  • fraud detection

    Fraud detection is a set of activities undertaken to prevent money or property from being obtained through false pretenses.

  • single sign-on (SSO)

    Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials -- for ...

CIO
  • IT budget

    IT budget is the amount of money spent on an organization's information technology systems and services. It includes compensation...

  • project scope

    Project scope is the part of project planning that involves determining and documenting a list of specific project goals, ...

  • core competencies

    For any organization, its core competencies refer to the capabilities, knowledge, skills and resources that constitute its '...

HRSoftware
  • recruitment management system (RMS)

    A recruitment management system (RMS) is a set of tools designed to manage the employee recruiting and hiring process. It might ...

  • core HR (core human resources)

    Core HR (core human resources) is an umbrella term that refers to the basic tasks and functions of an HR department as it manages...

  • HR service delivery

    HR service delivery is a term used to explain how an organization's human resources department offers services to and interacts ...

Customer Experience
  • martech (marketing technology)

    Martech (marketing technology) refers to the integration of software tools, platforms, and applications designed to streamline ...

  • transactional marketing

    Transactional marketing is a business strategy that focuses on single, point-of-sale transactions.

  • customer profiling

    Customer profiling is the detailed and systematic process of constructing a clear portrait of a company's ideal customer by ...

Close