Browse Definitions :
81,629 results for:

Siemens' acquisition of UGS 'will benefit users'

News | ComputerWeekly.com

Top Windows server hardening tips of 2006

Feature | ComputerWeekly.com

Check out the top Windows server hardening tips of 2006 for helpful advice on domain controller penetration testing, security tips for the Windows ...

NetApp stokes midrange fires with new array

News | ComputerWeekly.com

The FAS 3040 is a scaled down version of the 64-bit 3070 architecture; NetApp officials say more moves downmarket will follow.

Report finds computer system likely culprit in Chinook crash

News | ComputerWeekly.com

A former air commodore - one of the highest ranks in the RAF - has questioned the airworthiness of the Chinook Mk2 helicopter...

Quiz: Defending mobile devices from viruses, spyware and malware

Feature | ComputerWeekly.com

A five-question multiple-choice quiz to test your understanding of the content presented in Defending mobile devices from viruses and malware lesson ...

NAS appliance specifications

News | ComputerWeekly.com

NAS appliances are noted for their convenience, offering dedicated internal storage that is relatively straightforward to identify and manage. The ...

NetApp revenues fall $61M short of forecast

News | ComputerWeekly.com

NetApp announces that its revenues are down 15% from last quarter, blaming a continued decline in data storage spending.

Top 10 mobile tips of 2006

Feature | ComputerWeekly.com

Review of the popular mobile technical tips of 2006 from our stable of mobile experts; Lisa Phifer, Craig Mathias, Daniel Taylor, Kevin Beaver and ...

MPs slam Libra as one of UK's worst PFI deals ever

News | ComputerWeekly.com

Costs more than double and Whitehall shoulders risk on magistrates IT.

Learning Guide: SAN-based backups

Feature | ComputerWeekly.com

Some of the best advice on the ins and outs of SAN-based backups

What is the difference between InfiniBand, SAS and iSCSI and where does each technology fit?

News | ComputerWeekly.com

InfiniBand is an interface; just like Fibre Channel (FC) or Ethernet. As an interface, InfiniBand carries different protocols...

Microsoft investigates new Word zero-day

News | ComputerWeekly.com

An unpatched memory-corruption flaw in Microsoft Word is the target of "limited" attacks in the wild, Microsoft confirmed Thursday.

Ex-helicopter chief says pilot verdict is 'ridiculous'

News | ComputerWeekly.com

A former director of helicopter procurement at the Ministry of Defence has described the blaming of the pilots for the crash on...

Voice over WLAN improves a hospital's communications

Feature | ComputerWeekly.com

A Voice over WLAN (VoWLAN) system was the solution to improving communications and response times for staff at one hospital, while boosting employee ...

Attackers ultimately drive security market, analyst says

News | ComputerWeekly.com

The security market is being driven by spam gangs, cyberthieves and other criminals bent on hacking into company and government databases to steal ...

VoIP services spell trouble for telcos

News | ComputerWeekly.com

The rise of VoIP is paving the way for companies that haven't traditionally sold voice services to do so. Telcos slow to move will be hard pressed to...

Warning issued over unpatched Firefox flaw

News | ComputerWeekly.com

Vulnerability clearinghouse Secunia and US-CERT have issued advisories about the input validation flaw

Flaw found in MSN Messenger

News | ComputerWeekly.com

Attackers could exploit a flaw in MSN Messenger to run malicious code on targeted machines, according to Danish vulnerability clearinghouse Secunia.

Application-aware storage promises intelligence and automation

News | ComputerWeekly.com

Storage professionals overbuy both performance and capacity in an effort to forestall potential storage problems. Tiered storage was one way to ...

3PAR, EqualLogic file for IPOs

News | ComputerWeekly.com

The emerging storage companies file S-1 forms with the SEC, though some experts warn they could be headed for a volatile market.

Cisco management guide: Selecting a VoIP solution

News | ComputerWeekly.com

Selecting a VoIP solution means deciding on independent VoIP tools or a VoIP solution suite of integrated products.

How data deduplication eases storage requirements

News | ComputerWeekly.com

Storage administrators are struggling to handle spiraling volumes of documents, audio, video, images and large email attachments. Adding storage is ...

LexisNexis fights crime with storage

Feature | ComputerWeekly.com

The document search company is offering a new data forensics service staffed by former federal agents and powered by commodity NAS.

Pilkington gets flexible with Infor

News | ComputerWeekly.com

Pilkington, the global glass manufacturer, is poised to go live with Infor software designed to predict demand for its auto-glass aftermarket, after ...

How far apart can SAN locations be?

News | ComputerWeekly.com

Storage locations can potentially be very far apart, separated by thousands of miles, even around the globe. The real consideration in selecting ...

Malware: The ever-evolving threat

News | ComputerWeekly.com

The first tip in our series, "How to assess and mitigate information security threats"

MP slams slow payment of tax credit IT compensation

News | ComputerWeekly.com

The biggest compensation deal agreed between the government and a computer supplier - over tax credit IT problems - will, at the present rate of ...

Network-based attacks

News | ComputerWeekly.com

The second tip in our series, "How to assess and mitigate information security threats."

UK clearing house joint venture to provide online payment service

News | ComputerWeekly.com

UK clearing house Bacs has embarked on a joint venture with a US software company to provide an online bill presentation and...

Cisco issues warning for wireless LAN controller flaws

News | ComputerWeekly.com

Cisco Systems is warning customers of flaws in its wireless LAN controllers that initially crippled a wireless network at Duke University.

Serious flaw affects BIND Internet server software

News | ComputerWeekly.com

BIND DNS software, used in translating domain names into IP addresses for Internet traffic, has a flaw that could trick users into visiting a ...

SearchSecurity.com Blogs

News | ComputerWeekly.com

CDP platform purchase considerations

News | ComputerWeekly.com

Busy IT organizations are employing continuous data protection (CDP) technologies to guard data on the fly, essentially eliminating the backup window...

Cisco users upbeat about security direction

News | ComputerWeekly.com

Cisco customers say the vendor's security strategy is headed in the right direction, which is why they believe the networking giant's IronPort ...

Security Metrics: Replacing Fear, Uncertainty, and Doubt

News | ComputerWeekly.com

In this chapter excerpt from "Security Metrics: Replacing Fear, Uncertainty and Doubt," author Andrew Jaquith reveals ways to present security data ...

Security update fixes Yahoo Widgets flaw

News | ComputerWeekly.com

Attackers could exploit a Yahoo Widgets flaw to run malicious code on compromised Windows computers, but a security update is available.

SaaS: Tricks and traps of uploading data in bulk

News | ComputerWeekly.com

The dark side of SaaS is losing control over your data. Learn how to stay in control while uploading data in bulk in this new report from Info-Tech ...

NAS management software specifications

News | ComputerWeekly.com

Network attached storage (NAS) appliances and gateways must be configured and managed using NAS management software that allows administrators to ...

Microsoft adds CA vets to anti-malware team

News | ComputerWeekly.com

Microsoft has hired Jakub Kaminski, one of CA's more talented and well-regarded antivirus researchers, and three of his colleagues from CA's ...

Most antispam technologies get failing grade

News | ComputerWeekly.com

An independent study finds that many enterprises are not satisfied with traditional antispam technologies.

New hacking technique exploits common programming error

News | ComputerWeekly.com

Researchers at Watchfire Inc. say they discovered a new technique that exploits a common dangling pointer error.

Crash Course: Recovery

News | ComputerWeekly.com

What good is backing up your data if you can't get it back? The goal of this Crash Course on recovery is to make sure you can effectively and ...

Demand more from agencies: fine tune the recruitment process and reap the rewards

Opinion | ComputerWeekly.com

Users must be proactive in ensuring that recommended candidates are suitable

Download SAN Guide Chapter 1: Management (PDF)

News | ComputerWeekly.com

You asked for it, so here it is -- a printable version of our SAN All-In-One Guide. Download Chapter 1: Management in .pdf format now.

Do all the vendors offer unified storage?

News | ComputerWeekly.com

No. Some vendors are moving in that direction and others have a limited number of OEM product offerings now. However, several vendors currently offer...

Enterprise switch upgrade specifications

News | ComputerWeekly.com

Product snapshots highlighting key specifications for a cross section of popular enterprise-class switch products.

Hacking for Dummies: Chapter 10 -- Wireless LANs

News | ComputerWeekly.com

Read Chapter 10, Wireless LANs, from the book "Hacking for Dummies" written by Kevin Beaver.

SOA, Web services security gaining priority at large enterprises

News | ComputerWeekly.com

All enterprises will have to find tools to secure Web services as Web-based languages, such as extensible markup language (XML) will be gradually ...

Novell to acquire Senforce for endpoint security

News | ComputerWeekly.com

Novell is acquiring Senforce, an early network access control supplier, to integrate its endpoint security features and develop an endpoint ...

SANS: Attackers may be attempting Trend Micro exploits

News | ComputerWeekly.com

The SANS Internet Storm Center (ISC) warns that attackers may be attempting to exploit flaws in Trend Micro products to hijack computer systems.

Rootkit found in older Sony USB device

News | ComputerWeekly.com

F-Secure says it discovered rootkit technology in Sony's Micro Vault USM-F fingerprint reader software. The find comes two years after controversy ...

Web security gateways meet rising malware threats

News | ComputerWeekly.com

Web security gateways combine layered defense against the rising tide of Web-based malware with URL filtering and application control.

Data storage startups emerge from stealth

News | ComputerWeekly.com

Three new storage firms have come out of stealth mode this June. Analysts predict the next new crop of startups will focus on wireless storage, ...

EMC reports Clariion surge, data archiving slump

News | ComputerWeekly.com

EMC's revenues are up this quarter, attributed in part to a big boost in Clariion sales, but CEO Joe Tucci is critical of the company's execution in ...

EMC CEO tips hat on future storage plans

News | ComputerWeekly.com

At a media event in Sydney, EMC CEO, Joe Tucci said the company is working on storage tuned to the needs of Web 2.0 apps and also plugged the ...

VoIP network monitoring improves VoIP deployment

News | ComputerWeekly.com

VoIP network monitoring and pre-deployment analysis are becoming more important as VoIP application overlay becomes denser

What is the impact of unstructured data on backup and restore and disaster recovery in general?

News | ComputerWeekly.com

As data volumes grow, there's a bigger problem meeting recovery time objectives. We depend on our data, and we have set recovery times for our ...

What are some of the biggest challenges with unstructured data?

News | ComputerWeekly.com

By far, the volume of data has to be the biggest challenge...

Storage switch startup burns out, turns to security

News | ComputerWeekly.com

The company formerly known as Maxxan has been rechristened CipherMax and is now marketing a storage switch/encryption appliance with one point of ...

RSA Conference 2007: Special news coverage

News | ComputerWeekly.com

Check out news, interviews, product announcements, podcasts and more live from the RSA Conference 2007 in San Francisco.

How to secure a wireless Lan

Feature | ComputerWeekly.com

Stuart Okin and Ian Hellen at Microsoft UK give their opinion on how different forms of data encryption can protect wireless Lan...

IT staff predict e-government success despite councillors’ doubts

News | ComputerWeekly.com

Tony Blair has failed to convince councillors in almost half of the UK’s local authorities of the value of e-government.

Core Security CEO to step down

News | ComputerWeekly.com

Paul Paget, the CEO of penetration testing software vendor Core Security Technologies said he is better-suited for start-ups

Zero-day auction site highlights ethical debate

News | ComputerWeekly.com

A new auction site plans to cash in on flaw research. Executive Editor Dennis Fisher explores if it's a viable business model and if research should ...

Zero-day auction site complicates security efforts, IT pros say

News | ComputerWeekly.com

WabiSabiLabi, the eBay-like marketplace for zero-day flaws, will make it tougher for companies to ward off attackers, some IT security professionals ...

Attackers target two Microsoft security flaws

News | ComputerWeekly.com

Symantec warned customers about attacks targeting two Microsoft security flaws -- an unpatched DirectX Media vulnerability and the XML Core Services ...

Apple iPhone to provoke complex mobile attacks, expert warns

News | ComputerWeekly.com

Mikko Hypponen, director of antivirus research at F-Secure, said he expects mobile malware attacks to escalate thanks to interest in Apple's iPhone.

Apple releases fixes for Mac OS X, iPhone vulnerabilities

News | ComputerWeekly.com

Apple Computer has released software patches fixing critical vulnerabilities in Mac OS X and its newly released iPhone.

What is the difference between SAN routing, channel extension and virtualization?

News | ComputerWeekly.com

Some folks see SAN routing as just segmentation; some see it as protocol conversion; some see it as distance enablement. SAN routing really embraces ...

Threats to physical security

News | ComputerWeekly.com

Tip No. 6 in our series, "How to assess and mitigate information security threats."

Home Office to introduce new police database to fight gun crime

News | ComputerWeekly.com

Home secretary John Reid has announced a new information database to help tackle increasing gun crime.

What has been the impact of storage virtualization on SAN deployments?

News | ComputerWeekly.com

I really have not seen storage virtualization driving storage area network (SAN) deployment...

Information theft and cryptographic attacks

News | ComputerWeekly.com

The third tip in our series, "How to assess and mitigate information security threats."

Chinook 10 years on

News | ComputerWeekly.com

This week sees the 10th anniversary of the Chinook ZD576's crash, as former top military officers cast doubt on the finding that...

Council migrates to web enabled benefits system

News | ComputerWeekly.com

Liverpool City Council has completed a six-week data migration project to get its £5m housing benefit and council tax system up...

Fast Guide: Storage Management

News | ComputerWeekly.com

Managing your storage infrastructure has never been harder. Complex systems, unbelievable data growth rates and squabbling vendors are just a few of ...

Training for CISSP Certification: SearchSecurity.com's Security School

News | ComputerWeekly.com

Study guides for each of the ten domains of the CBK for those preparing to take the CISSP exam or expanding their knowledge of security concepts and ...

Latest Microsoft flaws affect Windows, IE, Excel

News | ComputerWeekly.com

Microsoft released nine security updates Tuesday -- six of them critical -- for flaws in Internet Explorer, Excel and other programs within the ...

IT pros impede PCI, Sarbanes Oxley compliance

News | ComputerWeekly.com

The biggest barrier to collaboration between IT and compliance professionals is the lack of understanding about risk and compliance issues by ...

Fixed-content data archiving products get a boost

News | ComputerWeekly.com

Caringo, EMC and HDS spruce up their fixed-content data archiving products as buzz around compliance and legal discovery continues.

PCI council adds Pin security to remit

News | ComputerWeekly.com

The PCI Security Standards Council has added Pin Entry Device (PED) security technology to its payments industry testing portfolio to streamline ...

Corel offers WordPerfect for free

News | ComputerWeekly.com

Corel has made available a beta version of its WordPerfect Lightning software for free, in a bid to attract users into buying the advanced commercial...

Are there regulatory compliance issues related to unstructured data?

News | ComputerWeekly.com

The most important issue is legal discovery. You may not know what you have or how to find it, so it can be very difficult to find the files that may...

Roundup: Vista security, breakability touted at RSA Conference

News | ComputerWeekly.com

At RSA Conference 2007, Microsoft extolled the security virtues of its new operating system, but others weren't afraid to demonstrate how Vista ...

NEC reveals HydraStor grid storage

News | ComputerWeekly.com

NEC announces its HydraStor array for secondary storage, touting its grid storage architecture, automated policies for data management and scalable ...

Hacking For Dummies: Chapter 7 -- Passwords

News | ComputerWeekly.com

In his latest book, "Hacking For Dummies," Kevin Beaver takes the reader into the mindset of a hacker in order to help admins fend off ...

NHS IT plan risky but will not fail, says OGC

News | ComputerWeekly.com

The £2.3bn national programme to modernise health service IT systems is "risky and ambitious" but it has sufficient safeguards in...

LAN-free, serverless and domino backups, oh my.

News | ComputerWeekly.com

In case you've missed anything, here's a roundup of some of the best original technical content that appeared on SearchStorage.com the week of May...

Black Hat Las Vegas 2007: Special news coverage

News | ComputerWeekly.com

SearchSecurity.com covers all the controversy at this year's show with news, features, podcasts, interviews, exploits and more direct from Las Vegas.

First integrated children's system goes live

News | ComputerWeekly.com

The first web-based system to help councils meet new legal requirements for information sharing among teachers, social workers...

Nokia Intellisync boosts device management

News | ComputerWeekly.com

Nokia Intellisync has released updates to its Mobile Suite to enhance remote device support, loss and theft protection, and management capabilities.

Storage Decisions Session Downloads: Data Protection and Backup Track (NYC 2007)

News | ComputerWeekly.com

Making the backup process seamless and reliable is critical. This track covers the staple backup technologies such as disk and tape, but also has an ...

Stock exchanges face IT challenge to prove ‘best execution’ under Mifid

News | ComputerWeekly.com

In less than two months Europe's stock exchange technology will be put to the test when the Markets in Financial Instruments Directive (Mifid) brings...

Apple iPhone crack discovered by security researchers

News | ComputerWeekly.com

Researchers have found a way to take complete control of the Apple iPhone by sending a user to a malicious Web site.

Disaster recovery and business continuity fundamentals

Feature | ComputerWeekly.com

The importance of disaster recovery and business continuity planning has been underscored in the wake of Hurricane Katrina, the Avian flu and 9/11. ...

Oracle plans 46 security updates for database, software

News | ComputerWeekly.com

Attackers could tamper with database servers and host operating systems by exploiting flaws across Oracle's product line.

Bala retires from CIO role

News | ComputerWeekly.com

S R Balasubramanian has retired from the role of CIO at Godfrey Phillips, but continues his professional activities through consultancy

Twitter plans to expand advertising business as investment raises value to $8bn

News | ComputerWeekly.com

Twitter has outlined plans to increase advertising revenue and avoid an initial public offering (IPO) after reaching more than 100 million active ...

Six reasons why the NHS National Programme For IT failed

Opinion | ComputerWeekly.com

Like many men, I don't go to the doctor very often. The last time I did, I was with my GP for 25 minutes: five minutes discussing my symptoms and 20 ...

Barclays customers unable to log into online bank accounts

News | ComputerWeekly.com

Barclays has confirmed some customers are unable to log into online bank accounts and are experiencing slow response times

Networking
Security
  • identity management (ID management)

    Identity management (ID management) is the organizational process for ensuring individuals have the appropriate access to ...

  • single sign-on (SSO)

    Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials -- for ...

  • fraud detection

    Fraud detection is a set of activities undertaken to prevent money or property from being obtained through false pretenses.

CIO
  • IT budget

    IT budget is the amount of money spent on an organization's information technology systems and services. It includes compensation...

  • project scope

    Project scope is the part of project planning that involves determining and documenting a list of specific project goals, ...

  • core competencies

    For any organization, its core competencies refer to the capabilities, knowledge, skills and resources that constitute its '...

HRSoftware
  • Workday

    Workday is a cloud-based software vendor that specializes in human capital management (HCM) and financial management applications.

  • recruitment management system (RMS)

    A recruitment management system (RMS) is a set of tools designed to manage the employee recruiting and hiring process. It might ...

  • core HR (core human resources)

    Core HR (core human resources) is an umbrella term that refers to the basic tasks and functions of an HR department as it manages...

Customer Experience
  • martech (marketing technology)

    Martech (marketing technology) refers to the integration of software tools, platforms, and applications designed to streamline ...

  • transactional marketing

    Transactional marketing is a business strategy that focuses on single, point-of-sale transactions.

  • customer profiling

    Customer profiling is the detailed and systematic process of constructing a clear portrait of a company's ideal customer by ...

Close