Browse Definitions :
81,647 results for:

Blackberry Curve 9380

Photo Story | ComputerWeekly.com

Windows for power users

Photo Story | ComputerWeekly.com

Final thoughts

Photo Story | ComputerWeekly.com

Asynchronous programming with a sandbox runtime

Photo Story | ComputerWeekly.com

At a glance

Photo Story | ComputerWeekly.com

Case study: Cogenta migrates to Claranet VDC

News | ComputerWeekly.com

Cogenta is among the first customers for Claranet’s Virtual Data Centre (VDC) service, which launched last month.

President of European Parliament critical of Acta

News | ComputerWeekly.com

After a weekend of public protests against the controversial Anti-Counterfeiting Agreement (Acta), the president of the European Parliament has added...

Social media to support business continuity

News | ComputerWeekly.com

Three-quarters of organisations will use social media as part of their business continuity management (BCM) strategies by 2015 with communication ...

Cisco wants EU to reconsider Microsoft Skype deal

News | ComputerWeekly.com

Cisco is calling on European Union authorities to reconsider the unconditional approval of Microsoft’s $8.5bn acquisition of Skype.

MinIO stakes leadership claims in cloud object container storage

News | ComputerWeekly.com

2016 startup MinIO reckons it has first mover advantage as a container-native platform that provides private/cloud object storage in and orchestrated...

Hays Recruitment service desk project is all gain and no pain

News | ComputerWeekly.com

The firm was attracted by the many benefits of a cloud-based service desk, but chief among them was the low risk involved in implementation

Agnelo D'Souza

Feature | ComputerWeekly.com

SearchSecurity.in CISO Power List 2012 Profile: Agnelo D‘Souza, CISO, Kotak Mahindra Bank.

Sunil Dhaka

Feature | ComputerWeekly.com

SearchSecurity.in CISO Power List 2012, Profile: Sunil Dhaka, CISO, ICICI Bank.

CW500: Jos Creese, CIO of Hampshire County Council

Video | ComputerWeekly.com

In this CW500 Club video, Local CIO Council chairman Jos Creese, the CIO of Hampshire County Council, talks to Computer Weekly editor in chief Bryan ...

Computacenter adds to picture of strong Q4

News | MicroScope

Channel player issues trading update that adds to a growing list of evidence that H2 and the last few months of last year were robust for the channel

Pankaj Agrawal

Feature | ComputerWeekly.com

SearchSecurity.in CISO Power List 2012 Profile: Pankaj Agrawal, CISO & Head of Technology Governance, Aircel

Sameer Ratolikar

Feature | ComputerWeekly.com

SearchSecurity.in CISO Power List 2012: Profile for Sameer Ratolikar, CISO, Bank of India.

Arup Chatterjee

Feature | ComputerWeekly.com

SearchSecurity.in CISO Power List 2012 Profile: Arup Chatterjee, CISO, WNS Global Services.

Does the PSN need to happen before the cloud?

News | ComputerWeekly.com

The deployment of public services networks (PSN) will need to happen before widespread uptake of CloudStore services occur, IT heads said at a ...

Nokia Lumia 900

Photo Story | ComputerWeekly.com

ZTE Era

Photo Story | ComputerWeekly.com

DWP tenders for £25m IDA services

News | ComputerWeekly.com

The Department for Work and Pensions (DWP) has tendered for a £25m identity assurance (IDA) framework to create a marketplace of providers across the...

Top 10 smartphones to look out for in 2012

Photo Story | ComputerWeekly.com

The rate at which smartphones are being released looks like it won't ease up, this photo story looks at the best phones of the year ahead.

Cannon Conundrum

Photo Story | ComputerWeekly.com

Insane Terrain and Don’t Crash

Photo Story | ComputerWeekly.com

The Spitfire was designed at Hursley House

Photo Story | ComputerWeekly.com

Flight Frenzy

Photo Story | ComputerWeekly.com

Hursley House

Photo Story | ComputerWeekly.com

Faraz Ahmed

Photo Story | ComputerWeekly.com

Subrahmanya Gupta Boda

Photo Story | ComputerWeekly.com

The CISO Power List, 2012

Photo Story | ComputerWeekly.com

Pankaj Agrawal

Photo Story | ComputerWeekly.com

The CISO Power List, 2012

Photo Story | ComputerWeekly.com

Our CISO Power List for 2012 brings you the who’s who in the Indian information security scene. Join us, as we pay tribute to India’s top 15 CISOs.

Reporter's notebook: Hidden gems of Interop

News | ComputerWeekly.com

The Interop conference in New York this week featured the usual suspects talking about their newest offerings and the industry at large.

The Tao of automated network management

News | ComputerWeekly.com

Read or podcast this article about taking the first step toward an automated future by integrating network management tools.

Cisco bulks up data center switching

News | ComputerWeekly.com

Cisco Systems Inc. today made significant announcements in its data center switching line: an 8-port, 10 GigE module; a blade switch for Fujitsu ...

What is data loss prevention? -- An introduction to DLP

News | ComputerWeekly.com

This Q&A discusses what data loss prevention (DLP) is and how it differs from other networking security products in securing your enterprise and ...

When fighting peer-to-peer, packet shaping can be more effective than cat-and-mouse

News | ComputerWeekly.com

Crimping access to P2P applications may be a more effective approach than trying to ban them.

When fighting peer-to-peer, packet shaping can be more effective than cat-and-mouse

News | ComputerWeekly.com

Some network managers are finding that slowing peer-to-peer protocols discourages piracy better than blocking it, which users invariably find a way ...

Connecting ISDN PRI to a VPN via a Cisco AS5350

News | ComputerWeekly.com

Sudhanshu Gupta examines how to connect an ISDN PRI to a VPN using a Cisco AS5350.

5: Francis Maude, Cabinet Office minister

Photo Story | ComputerWeekly.com

19: Ian Watmore, COO, Efficiency and Reform Group and Permanent Secretary, Cabinet Office

Photo Story | ComputerWeekly.com

3: Joe Harley / His successor, CIO, HM Government

Photo Story | ComputerWeekly.com

9: Tom Steinberg, Founder of MySociety

Photo Story | ComputerWeekly.com

4: Phil Smith, CEO, Cisco UK & Ireland

Photo Story | ComputerWeekly.com

Bristol Council gets open source go-ahead after CESG discussions

News | ComputerWeekly.com

Bristol City Council has been cleared to build an IT infrastructure using open source software after a visit from CESG, the cyber security arm of the...

Elder's edge: Sales force management on cloud platform

News | ComputerWeekly.com

Elder Pharma gave up its manual processes for sales force management and went in for a public cloud platform. The results have been remarkable

Exit clause in SLAs: 7 key pointers

Tip | ComputerWeekly.com

An exit clause is a useful tool to close a deal when any agreed and important terms of a service contract are dishonored. Here are seven points to ...

E-Skills National Skills Academy for IT launches training subscription service for SMEs

News | ComputerWeekly.com

E-Skills UK's National Skills Academy for IT has set up a training subscription service aimed at small businesses and self-employed IT professionals.

Chinese software flaw makes infrastructure vulnerable, warns report

News | ComputerWeekly.com

China's public infrastructure is vulnerable to cyber attack because of vulnerabilities in software used to run weapons systems, utilities and ...

CSC closes acquisition of iSoft ahead of NHS IT contract renegotiations

News | ComputerWeekly.com

Outsourcing provider CSC has closed the acquisition of beleaguered healthcare application provider iSoft for $189m (£115m).

CIO interview: Michael Foster, European vice-president of IT, FedEx Express

News | ComputerWeekly.com

What role should IT play in business? This is the question Michael Foster, vice-president of IT at Fedex Europe, tackles at the global courier. Cliff...

Former T-Mobile employees ordered to pay nearly £80,000 for data theft

News | ComputerWeekly.com

The Chester Crown Court has ordered two former employees of UK mobile operator T-Mobile to pay a total of £73,700 after stealing and selling customer...

European Commission gives green light to CSC acquisition of beleaguered iSoft

News | ComputerWeekly.com

The European Commission (EC) has approved CSC's acquisition of healthcare software maker iSoft.

Why the High Court ruling in the Newzbin2 case is such a big deal

News | ComputerWeekly.com

The creative industries have welcomed the UK High Court ruling that BT must block access to pirated content aggregator site Newzbin2, but why is the ...

Computer glitch halts Post Office card transactions

News | ComputerWeekly.com

Customers have been unable to complete card transactions at the Post Office after a computer glitch across all branches...

DWP adds agile development into IT contracts for £2bn Universal Credit system

News | ComputerWeekly.com

The Department for Work and Pensions (DWP) has modified contracts governing the supply of its £2bn Universal Credit system by adding clauses ...

DWP asks system integrators to list SME contractors to open up public sector deals

News | ComputerWeekly.com

The Department for Work and Pensions is asking its systems integrators to list the number of SMEs in their supply chains, in a move designed to open ...

Case study: New Look builds social media platform to extend e-commerce site

News | ComputerWeekly.com

New Look has launched a social media platform to extend its e-commerce website and multi-channel offering. New Look Daily is a cloud-based customer ...

Adobe issues security updates for Flash, Shockwave, Photoshop and RoboHelp

News | ComputerWeekly.com

Adobe has issued fixes for vulnerabilities in Flash, Shockwave, Photoshop, RoboHelp and Flash Media Server in the latest security update.

Vodafone increases UK enterprise sales, driven by greater data traffic

News | ComputerWeekly.com

Vodafone's latest results reflect increased use of smartphones and data consumption within the workplace.

Virgin Media trials 1.5Gbps broadband at London's Silicon Roundabout

News | ComputerWeekly.com

Virgin Media has rolled out broadband speeds of up to 1.5Gbps as part of a trial for businesses in the "Silicon Roundabout" area of London...

Virgin Media sees small drop in business sales, and loses 18,000 broadband users

News | ComputerWeekly.com

Cable telecoms supplier Virgin Media has reported a small drop in business revenue for its second quarter, while the firm also revealed it has lost ...

Carphone Warehouse uses business process management to increase customer satisfaction

News | ComputerWeekly.com

Retailer Carphone Warehouse is claiming a 25% jump in its customer satisfaction ratings after investing in BPM software to help staff deal with sales...

Cisco to axe 10,000 jobs

News | ComputerWeekly.com

Cisco Systems may cut as many as 10,000 jobs, roughly 14% of its workforce, to combat weak profit growth, according to Bloomberg.

Cyber criminals deploy TDL-4 virus to create indestructible botnet of 4.5m computers

News | ComputerWeekly.com

Over 4.5 million computers around the world have been infected by the TDL-4 virus, creating an indestructible botnet.

Communications minister Ed Vaizey says US ISP piracy deal could pave way for UK

News | ComputerWeekly.com

The top five US internet service providers (ISPs) have agreed with film and music producers to issue warnings to customers suspected of online piracy...

What guidelines should our listeners use for oversubscribing or under subscribing?

News | ComputerWeekly.com

Oversubscription has long been a contentious topic...

WAN/WAFS platform specifications

News | ComputerWeekly.com

Product snapshots highlighting key specifications for a cross section of WAFS and WAN optimisation products intended for small, medium, and large ...

When should I use a SAN vs. NAS or iSCSI?

News | ComputerWeekly.com

It's often a matter of block vs. file...

NTFS permissions

News | ComputerWeekly.com

This excerpt from Chapter 5 of "The definitive guide to Windows 2000 security" discusses the advantages of using NTFS for access control.

Storage area network FAQ audiocast

News | ComputerWeekly.com

Don't have time to dig into the FAQ text now? Download the storage area network audiocast in MP3 format and listen in the car, at the gym -- wherever...

Storage management software finalists

News | ComputerWeekly.com

Find out who was selected as finalists in the storage management software category for our storage products of the year

Users say keeping it simple means keeping one vendor

News | ComputerWeekly.com

Despite some potential benefits of heterogeneous shops, users at Storage Decisions say they find sticking with one vendor a better way to survive the...

Burton Group: Web application firewall market maturing

News | ComputerWeekly.com

Web application firewalls have improved performance and functionality, but it still takes time, knowledge and skills to implement them, according to ...

Analysis: Intelligence key to security business case

News | ComputerWeekly.com

Information security is becoming an increasingly important part of any business as the value of information assets continually grow, as do the ...

In IT security, vendor size does not compute

News | ComputerWeekly.com

With consolidation gripping the security industry, companies are seeking out the most stable security vendors, but analysts and experts say the ...

Shell HR gains from structured information quality programme

News | ComputerWeekly.com

Oil giant Shell’s human resources function has been on an information quality journey since 2002, integrating historically decentralized businesses ...

ISCSI gets a boost from InfiniBand

News | ComputerWeekly.com

The InfiniBand protocol has already gained popularity in some bleeding-edge storage systems; a new spec will now standardise connection to iSCSI ...

IP telephony unites New Orleans nonprofit after Katrina

News | ComputerWeekly.com

Hurricane Katrina nearly disbanded the Catholic Charities Archdiocese of New Orleans, until the nonprofit rolled out a hosted voice solution

IT pros worried about unsecured devices

News | ComputerWeekly.com

IT admins keep working to make networks secure even as more unsecured personal gadgets their way into companies.

Unified communications translates to intelligent communications

News | ComputerWeekly.com

Unified communications and its business benefits were the underlying themes of the keynote presentations yesterday at VoiceCon Spring 2007.

VoiceCon Spring 2007: More news from the show

News | ComputerWeekly.com

Unified communications and VoIP were big topics at VoiceCon Spring 2007. Here are some news highlights from the show.

8: Darrell Stein, Director of IT & logistics, Marks & Spencer

Photo Story | ComputerWeekly.com

Photos: Hardware Hoarders - Your old computers (PART 1)

Photo Story | ComputerWeekly.com

Last year we invited Computer Weekly readers to send us photos and videos of the oldest IT equipment they've held on to, and to share their excuses ...

The preparation of message tapes using a Perforator

Photo Story | ComputerWeekly.com

The Lorenz SZ42 encryption machine

Photo Story | ComputerWeekly.com

Radio receivers for message interception

Photo Story | ComputerWeekly.com

The Heath Robinson

Photo Story | ComputerWeekly.com

The Heath Robinson machine

Photo Story | ComputerWeekly.com

Neil Slaters Sinclair ZX80

Photo Story | ComputerWeekly.com

Photos: Step-by-step guide to IE 8

Photo Story | ComputerWeekly.com

Too scared to install Internet Explorer 8? Have a look at our step-by-step guide before you take the plunge.

The London 2012 Olympic Stadium

Photo Story | ComputerWeekly.com

The computers that won the war: Bletchley Park's codebreaking equipment is rebuilt

Photo Story | ComputerWeekly.com

The Tunny Gallery, opened at The National Museum of Computing at Bletchley Park on 26 May 2011, tells the incredible story of the interception and ...

Size does matter in computer services industry

Photo Story | ComputerWeekly.com

Salary by industry sector

Photo Story | ComputerWeekly.com

Big utilities pay less than industry average

Photo Story | ComputerWeekly.com

Top earners

Photo Story | ComputerWeekly.com

Biggest earners in small manufacturing companies

Photo Story | ComputerWeekly.com

Distributive sector salaries are competitive

Photo Story | ComputerWeekly.com

Networking
Security
  • identity management (ID management)

    Identity management (ID management) is the organizational process for ensuring individuals have the appropriate access to ...

  • fraud detection

    Fraud detection is a set of activities undertaken to prevent money or property from being obtained through false pretenses.

  • single sign-on (SSO)

    Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials -- for ...

CIO
  • IT budget

    IT budget is the amount of money spent on an organization's information technology systems and services. It includes compensation...

  • project scope

    Project scope is the part of project planning that involves determining and documenting a list of specific project goals, ...

  • core competencies

    For any organization, its core competencies refer to the capabilities, knowledge, skills and resources that constitute its '...

HRSoftware
  • Workday

    Workday is a cloud-based software vendor that specializes in human capital management (HCM) and financial management applications.

  • recruitment management system (RMS)

    A recruitment management system (RMS) is a set of tools designed to manage the employee recruiting and hiring process. It might ...

  • core HR (core human resources)

    Core HR (core human resources) is an umbrella term that refers to the basic tasks and functions of an HR department as it manages...

Customer Experience
  • martech (marketing technology)

    Martech (marketing technology) refers to the integration of software tools, platforms, and applications designed to streamline ...

  • transactional marketing

    Transactional marketing is a business strategy that focuses on single, point-of-sale transactions.

  • customer profiling

    Customer profiling is the detailed and systematic process of constructing a clear portrait of a company's ideal customer by ...

Close