Browse Definitions :
81,545 results for:

Agnelo D'Souza

Photo Story | ComputerWeekly.com

Nabankur Sen

Photo Story | ComputerWeekly.com

Adapa Raja Vijay Kumar

Photo Story | ComputerWeekly.com

Sunil Dhaka

Photo Story | ComputerWeekly.com

Network management frameworks: FCAPS and ITIL

Tip | ComputerWeekly.com

Two network management frameworks exist that can be of some use for understanding and taming network management: FCAPS and ITIL. Learn more about ...

Network monitoring vendors sell SMBs on usability

News | ComputerWeekly.com

Ease-of-use is the key to SMB hearts when it comes to network monitoring. A new release from SolarWinds might give market leader Ipswitch some ...

Network engineering applications -- from 'Network troubleshooting and diagnostics'

News | ComputerWeekly.com

Network analysis applications, including protocol analysers, traffic generators, and simulation tools, can be used to understand how networks operate.

Cisco warns of UCM flaws

News | ComputerWeekly.com

Cisco has warned that several versions of its Unified Call Managers have security problems.

Early adopters of unified communications need to ask about security

News | ComputerWeekly.com

Unified Communications complicates security, which means special care is needed to extract value from the technology.

Why is VoIP authentication essential?

News | ComputerWeekly.com

VoIP authentication advice.

VoIP helps ensure disaster recovery

News | ComputerWeekly.com

VoIP bolsters your disaster recovery plans and should be at the core of any well-planned disaster recovery strategy.

VoIP security testing fundamentals

News | ComputerWeekly.com

VoIP security testing fundamentals are discussed in this guide -- how to test a VoIP system, what tools to use, how to use fuzzing to test VoIP ...

Unified communications trigger data leakage dangers, survey finds

News | ComputerWeekly.com

Companies are concerned about unintentional data leaks, according to a survey conducted by Osterman Research.

Non-unified communications can cost millions

News | ComputerWeekly.com

Fragmented communications are costing companies millions of dollars by disrupting workflow and business processes, a new study has revealed.

Assessing UK law enforcement data adequacy

News | ComputerWeekly.com

Data protection experts discuss the consequences of achieving data adequacy between the UK and EU for the UK’s intelligence services and criminal ...

VoIP sales up; Cisco admits security hole; Sipera releases top five vulnerabilities list

News | ComputerWeekly.com

This week's news featured VoIP sales increasing, Cisco admitting a serious security hole, and the year's top five VoIP security holes.

Windows Vista security settings

News | ComputerWeekly.com

Microsoft's Windows Vista is here. Here, Current Analysis senior analyst Andrew Braunberg discusses what network admins need to know about tightening...

UKtech50 2011: Vote now!

Feature | ComputerWeekly.com

Voting has begun to find out who is the most influential person in the UK IT community.

Computer Weekly wins digital publishing award

News | ComputerWeekly.com

Computer Weekly has won a prestigious publishing industry award for the product development of the year.

Government mutual will be a beacon for IT procurement

News | ComputerWeekly.com

The pension administration mutual being set up by the government will be the first of a wave of new business models that could shake-up central ...

Photos: How to upgrade your hard disk

Photo Story | ComputerWeekly.com

Installing a new hard disk drive is quite sraightforward, as long as you follow a few simple steps.

Photos: IT saving lives in Iraqi warzone

Photo Story | ComputerWeekly.com

Nearly six and a half years ago, IT engineers were among the first of the armed forces to arrive in Iraq when the war started. This month they will ...

The Milky Way from the Tooran desert in Iran

Photo Story | ComputerWeekly.com

Photos: Reclaiming the night sky

Photo Story | ComputerWeekly.com

Iranian photographer Babak Tafreshi has won the 2009 Lennart Nilsson scientific photography prize. According to the award panel, his images "reclaim ...

Charts: Outsourcing demand increasing according to Equaterra research

Photo Story | ComputerWeekly.com

Outsourcing demand increasing according to Equaterra research.

Photos: The IT Rich list 2009 - Cash, clicks and computers

Photo Story | ComputerWeekly.com

This list was compiled using the Sunday Times Rich List and only includes people working in the technology industry and those that reside in the UK. ...

How to install Windows 7 on a netbook

Photo Story | ComputerWeekly.com

Photos: How to install Windows 7 on a netbook

Photo Story | ComputerWeekly.com

It is possible to install Windows 7 Release Candidate 1 on a NetBook like the Lenovo S10, without burning a DVD and using a USB DVD drive. These ...

Chuck Norris on Twitter

Photo Story | ComputerWeekly.com

Google Street View - Big Ben

Photo Story | ComputerWeekly.com

All-metal case

Photo Story | ComputerWeekly.com

Photos: Award-winning, innovative product design of 2009

Photo Story | ComputerWeekly.com

The 2009 International Design Excellence Awards (IDEA) competition winners have just been announced.

Voice control iPhone 3G S

Photo Story | ComputerWeekly.com

Photos: First look at what makes the iPhone 3G S tick

Photo Story | ComputerWeekly.com

We've all heard about the iPhone 3G S, but what is different and why should we spend our hard earned money on it? We find out.

Cycling along - Google Street View watches kid fall over

Photo Story | ComputerWeekly.com

Photos: Google Street View watches kid fall over

Photo Story | ComputerWeekly.com

The Google Street View car passes a kid that buckles and falls off his bike at the worst possible moment.

Photos: Top ten fake celebrities to follow

Photo Story | ComputerWeekly.com

There’s been a long and varied history of people pretending to be someone else on the internet.

The IT rich list

Photo Story | ComputerWeekly.com

Photos: Most dangerous places to outsource your IT

Photo Story | ComputerWeekly.com

A report published by the Brown-Wilson Group details which locations are the most risky places to offshore your IT.

Renault F1 - Rolling road tests in a wind tunnel

Photo Story | ComputerWeekly.com

Photos: Renault F1 aerodynamics and design for 2009

Photo Story | ComputerWeekly.com

Ever wanted the inside track on what goes into redesigning an F1 car? Well this gallery should stear you in the right direction.

Guess that kit... quick

Photo Story | ComputerWeekly.com

WIN Guess that kit - Smartphones but are you a Smartperson?

Photo Story | ComputerWeekly.com

Enter our Guess that kit competition to have a chance of winning £50 worth of Amazon vouchers. All you need to do is guess what mobile phone is ...

Argonne supercomputer shows mechanisms behind supernovas

Photo Story | ComputerWeekly.com

Witch takes shape

Photo Story | ComputerWeekly.com

Rebuilding the oldest working computer in the world

Photo Story | ComputerWeekly.com

Witch, the Wolverhampton Instrument for Teaching Computing, has found a new home at Bletchley Park, where it will be restored.

Homescreen Nokia N97

Photo Story | ComputerWeekly.com

Photos: Nokia N97

Photo Story | ComputerWeekly.com

See photos of the new Nokia N97 that will be launched in June.

The party begins!

Photo Story | ComputerWeekly.com

Photos: Nokia N97 launch party

Photo Story | ComputerWeekly.com

Nokia ran an official launch event for its much anticipated N97 smartphone at the Getty Image Gallery in London. Computer Weekly presents the ...

Nokia 5530 XpressMusic

Photo Story | ComputerWeekly.com

Photos: Nokia's E72, 5530 XpressMusic and 3710 fold

Photo Story | ComputerWeekly.com

Nokia have unveiled three new phones in the E72, 5530 XpressMusic and 3710 fold. We take a closer look.

James Garner presents the Blog Awards ceremony

Photo Story | ComputerWeekly.com

Photos: Highlights of the Blog Awards 2009 party!

Photo Story | ComputerWeekly.com

The blog awards were held in Shoreditch House, here are some highlights

Government extends G-Cloud deadline

News | ComputerWeekly.com

The government has extended its G-Cloud deadline following the application of more than 500 businesses to its framework.

Review of Visual Studio Lightswitch

Photo Story | ComputerWeekly.com

A review of Visual Studio Lightswitch, Microsoft's simplified self-service development tool.

Tennis avatars

Photo Story | ComputerWeekly.com

Player stats

Photo Story | ComputerWeekly.com

Player strengths and weaknesses

Photo Story | ComputerWeekly.com

Player movement tracking

Photo Story | ComputerWeekly.com

Measuring performance in real-time

Photo Story | ComputerWeekly.com

The IT that serves Wimbledon 2011

Photo Story | ComputerWeekly.com

IBM provides an integrated end-to-end scoring system that delivers live tennis results to the BBC TV graphics, on-court scoreboards, match ...

The Office UI

Photo Story | ComputerWeekly.com

Creating an email

Photo Story | ComputerWeekly.com

Start Page

Photo Story | ComputerWeekly.com

Building your own website in Office 365

Photo Story | ComputerWeekly.com

And the winner is

Photo Story | ComputerWeekly.com

Calendar view

Photo Story | ComputerWeekly.com

Office 365 versus Google Apps

Photo Story | ComputerWeekly.com

How does Office 365 compare to Google Apps...

Keeping IT equipment cool is a challenge

Photo Story | ComputerWeekly.com

Using virtual servers

Photo Story | ComputerWeekly.com

Photos: How Team Lotus uses IT to drive its Formula One racing

Photo Story | ComputerWeekly.com

Norfolk-based Team Lotus believes its IT environment and eight-strong IT team is crucial to climbing the Formula One grid and making its cars race ...

Photos: Barclays hi-tech Piccadilly branch

Photo Story | ComputerWeekly.com

Barclays bank has opened a cutting-edge branch in Piccadilly Circus demonstrating how technology is changing the way the bank can serve customers.

Batman Arkham Asylum

Photo Story | ComputerWeekly.com

Track-side laptops are refreshed every two years

Photo Story | ComputerWeekly.com

The team collects huge volumes of data during races

Photo Story | ComputerWeekly.com

Equipment must be robust

Photo Story | ComputerWeekly.com

Ensuring communication links

Photo Story | ComputerWeekly.com

See how Team Lotus built its IT infrastructure in six months

Photo Story | ComputerWeekly.com

How Team Lotus uses IT to drive its Formula One racing

Photo Story | ComputerWeekly.com

Team Lotus relies on its track-side IT for races

Photo Story | ComputerWeekly.com

CIO interview: Juliette Atkinson, IT director, Bradford University

News | ComputerWeekly.com

Bradford University’s IT director took a different route than most to get into IT leadership

QLC flash storage: What it costs and its best use cases

Feature | ComputerWeekly.com

QLC flash brings high capacities at costs coming down close to spinning disk. So what are the use cases for QLC solid state, which make best use of ...

The best place for SSD in a virtual machine environment

Podcast | ComputerWeekly.com

Using SSD in a virtual machine environment is the ideal choice to speed response times to I/O demands, but where should you install it within the ...

Top 10 budget smartphones for SMEs

Photo Story | ComputerWeekly.com

This photo story looks at what options IT managers have when equipping their small business with smartphone son a budget. While Blackberry is usually...

CIO priorities 2012: Ali Jaffri, ICT manager, Gallions Housing

News | ComputerWeekly.com

Ali Jaffri, ICT manager at Gallions Housing, talks about the challenges of 2012.

Five Neat Things You Can Do Out of the Box with Liferay Portal

Tip | TheServerSide.com

If you've ever run a competitive portal, you know that so many of them have little more than the "weather portlet" or "bookmarks" portlet after ...

Burgess Cooper

Photo Story | ComputerWeekly.com

HTC ChaCha

Photo Story | ComputerWeekly.com

Blackberry Curve 9360

Photo Story | ComputerWeekly.com

Samsung Galaxy Y

Photo Story | ComputerWeekly.com

Blackberry Curve 9300

Photo Story | ComputerWeekly.com

GlaxoSmithKline adopts digital service in the cloud

News | ComputerWeekly.com

Pharmaceutical giant GlaxoSmithKline (GSK) is standardising how it engages online with consumers and healthcare professionals through a cloud-based ...

Hackers expose weak security on Digital Playground porn site

News | ComputerWeekly.com

A hacking group claims to have stolen the details of more than 70,000 users of the Digital Playground porn site

FBI investigates Anonymous intercept of call with Scotland Yard

News | ComputerWeekly.com

The US Federal Bureau of Investigation (FBI) is looking into how a conference call with Scotland Yard was intercepted by a member of the activist ...

Somerset Council to bring Southwest One services back in house

News | ComputerWeekly.com

Somerset County Council is seeking to bring key services back in house from Southwest One , the troubled joint-venture it created with IBM in 2007.

Generation Y is a myth, says Corporate Executive Board research

News | ComputerWeekly.com

Generation Y – the computer-literate youngsters who need the latest high-tech gadget to work effectively – is a myth, the latest research reveals

IT professionals prioritise Windows 7 upgrade, but cloud takes a back seat

News | ComputerWeekly.com

Windows 7 upgrade will drive virtualisation but businesses are slow to take up cloud computing

Lloyds bank saves £2bn after HBOS IT integration

News | ComputerWeekly.com

Lloyds Banking Group says the integration of its multiple brands has saved more than £2bn per year, with IT a major contributor.

5. AirMobile agent for PDA

Photo Story | ComputerWeekly.com

Networking
  • local area network (LAN)

    A local area network (LAN) is a group of computers and peripheral devices that are connected together within a distinct ...

  • TCP/IP

    TCP/IP stands for Transmission Control Protocol/Internet Protocol and is a suite of communication protocols used to interconnect ...

  • firewall as a service (FWaaS)

    Firewall as a service (FWaaS), also known as a cloud firewall, is a service that provides cloud-based network traffic analysis ...

Security
  • identity management (ID management)

    Identity management (ID management) is the organizational process for ensuring individuals have the appropriate access to ...

  • single sign-on (SSO)

    Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials -- for ...

  • fraud detection

    Fraud detection is a set of activities undertaken to prevent money or property from being obtained through false pretenses.

CIO
  • IT budget

    IT budget is the amount of money spent on an organization's information technology systems and services. It includes compensation...

  • project scope

    Project scope is the part of project planning that involves determining and documenting a list of specific project goals, ...

  • core competencies

    For any organization, its core competencies refer to the capabilities, knowledge, skills and resources that constitute its '...

HRSoftware
  • recruitment management system (RMS)

    A recruitment management system (RMS) is a set of tools designed to manage the employee recruiting and hiring process. It might ...

  • core HR (core human resources)

    Core HR (core human resources) is an umbrella term that refers to the basic tasks and functions of an HR department as it manages...

  • HR service delivery

    HR service delivery is a term used to explain how an organization's human resources department offers services to and interacts ...

Customer Experience
  • martech (marketing technology)

    Martech (marketing technology) refers to the integration of software tools, platforms, and applications designed to streamline ...

  • transactional marketing

    Transactional marketing is a business strategy that focuses on single, point-of-sale transactions.

  • customer profiling

    Customer profiling is the detailed and systematic process of constructing a clear portrait of a company's ideal customer by ...

Close