Browse Definitions :
81,637 results for:

delivering profits

Feature | ComputerWeekly.com

Computer Weekly wins top honour

News | ComputerWeekly.com

ComputerWeekly was last week declared the UK's campaigning magazine of the year at the publishing industry's annual awards for...

Atos wins DWP deal extension

News | ComputerWeekly.com

The Department for Work and Pensions has renewed a contract with IT services company Atos Origin to deliver medical advice and...

ControlGuard targets rogue devices

News | ComputerWeekly.com

ControlGuard Access Manager is an effective tool for controlling what devices users can add to their workstations and how they are used.

Fast Guide: VoIP encryption

News | ComputerWeekly.com

A guide to encryption within VoIP networks

Dell and EMC: Five more years

News | ComputerWeekly.com

Dell leans on EMC for support in the face of an SEC investigation and possible delisting from NASDAQ.

How do I establish recovery priority for my applications?

News | ComputerWeekly.com

If it's at the IT level, it comes from a data perspective. When you start moving up a little bit into the business side, people start looking at the ...

Shifting services back indoors

News | ComputerWeekly.com

Almost a quarter of blue chip firms in the UK are so disillusioned with outsourcing they are hauling their services back in-house.

How to break into a computer that is right at your fingertips

News | ComputerWeekly.com

Stressing the importance of physical security, Joel Dubin explains how a hacker can bypass a BIOS password and break into a computer.

Blair steps into Chinook battle

News | ComputerWeekly.com



Tony Collins

The Prime Minister, Tony Blair, will personally look into the circumstances of the crash of a Chinook helicopter...

Oracle bundles Fusion tools into one-stop SOA suite

News | ComputerWeekly.com

Oracle is offering a one-stop shop to customers seeking to build a service-oriented architecture (SOA) by bundling together several middleware ...

Demand for development skills soars as firms seek business edge

News | ComputerWeekly.com

Computer Weekly salary survey shows IT departments eager to secure skills for the future.

ID theft and national security

News | ComputerWeekly.com

Check out what some ITKnowledge Exchange members had to say about this controversial issue.

HP slashes jobs and shuts enterprise divison

News | ComputerWeekly.com

HP has announced 14,500 redundancies and will close down its separate enterprise sales division as part of its attempt to streamline operations and ...

TNT to provide staff with e-mail smartphones rather than laptops

News | ComputerWeekly.com

Logistics company TNT is to provide up to 700 staff worldwide with mobile e-mail, using the Nokia Communicator 9500 smartphone as...

Spyware removal checklist

News | ComputerWeekly.com

A step-by-step guide on how to remove spyware using antispyware tools including Spybot -- Search and Destroy, and HijackThis.

Quiz: Web attack prevention and defense

News | ComputerWeekly.com

Test your knowledge of the material covered in Web attack prevention and defense, including the fundamentals of securing a Web server.

Quiz: Identify and analyze Web server attacks, answer No. 5

News | ComputerWeekly.com

Quiz: Identify and analyze Web server attacks, answer No. 5

Quiz: Secure Web directories and development, answer No. 3

News | ComputerWeekly.com

Quiz: Secure Web directories and development, answer No. 3

Quiz: Identify and analyze Web server attacks, answer No. 4

News | ComputerWeekly.com

Quiz: Identify and analyze Web server attacks, answer No. 4

Quiz: Secure Web directories and development, answer No. 4

News | ComputerWeekly.com

Quiz: Secure Web directories and development, answer No. 4

Pre-CISSP: Options for the security newbie

News | ComputerWeekly.com

Shon Harris advises novice security practitioners on the value of entry-level certifications -- and good, old-fashioned experience -- in preparation ...

NHS trust creates wireless record

News | ComputerWeekly.com

University College London Hospitals (UCLH) NHS Trust has created the UK's largest single wireless network to support 7,000 users across eight ...

Ofcom liberates BT to offer bespoke pricing

News | ComputerWeekly.com

Ofcom has announced proposals to allow BT to offer large business customers bespoke call prices, which should lead to discounts for some companies.

IT professionals set for annual charity sleep-out

Feature | ComputerWeekly.com

Senior IT professionals are gearing up to on London's Embankment near Tower Bridge on Friday 23 September 2005. The aim is to raise more than ...

How to win the jobs game

Opinion | ComputerWeekly.com

Many readers have been disappointed by recruitment agents. All the more reason to develop the relationship

five star reception

Feature | ComputerWeekly.com

access all routes

Feature | ComputerWeekly.com

LogicaCMG on Met payroll

News | ComputerWeekly.com

The Metropolitan Police Authority has selected LogicaCMG to provide a £31m fully-managed payroll and pension administration...

Met Police gets LogicaCMG on payroll

News | ComputerWeekly.com

The Metropolitan Police Authority (MPA) has selected LogicaCMG to provide a £31m fully-managed payroll and pension administration...

Lead from the top

Feature | ComputerWeekly.com

The starting line for effective data security is at board level, writes John Kavanagh in this review of current thinking and...

Top tools for testing your online security, part 2

News | ComputerWeekly.com

Michael Cobb explains what tools are helpful in maintaining Web security, including security scanners, benchmarking tools, monitoring services and ...

Spike ** LogicaCMG to manage Met payroll

News | ComputerWeekly.com

The Metropolitan Police Authority (MPA) has selected LogicaCMG to provide a £31m fully-managed payroll and pension administration...

Your shout: Security and skills

Opinion | ComputerWeekly.com

Have your say at computerweekly.com

Seeing the big picture

Opinion | ComputerWeekly.com

Information security is about securely bringing together the organisation's two most important assets - information and people.

Quiz: Secure Web directories and development, answer No. 5

News | ComputerWeekly.com

Quiz: Secure Web directories and development, answer No. 5

Quiz: Secure Web directories and development, answer No. 2

News | ComputerWeekly.com

Quiz: Secure Web directories and development, answer No. 2

Sarbox draining corporate security budgets

News | ComputerWeekly.com

Corporate investment to comply with the Sarbanes-Oxley data security legislation has come at the expense of dealing with other security threats, ...

Pop quiz: E-mail security

News | ComputerWeekly.com

Find out how much you know about securing your organization's e-mail.

Sarbox challenge drains security budgets

News | ComputerWeekly.com

International corporate spending on compliance with the Sarbanes-Oxley data security legislation has come at the expense of dealing with other ...

Inside MSRC: Debunking Excel exploits

Feature | ComputerWeekly.com

Microsoft's Christopher Budd puts the magnifying glass to Microsoft's July bulletinsand says one alleged Excel exploit isn't what it seems.

HP extends automated change and configuration to the datacentre

News | ComputerWeekly.com

A technology agreement with partner Voyence will enable HP to offer datacentre managers an automated network change and configuration management ...

Cardiff launches intelligent document system

News | ComputerWeekly.com

Cardiff, a division of Autonomy Corporation, has launched a new system to allow firms to get more out of their on-screen documents.

Mozilla fixes several Firefox flaws

News | ComputerWeekly.com

Several flaws could be used for man-in-the-middle, spoofing and cross-site scripting attacks. Mozilla has released Firefox 1.5.0.7 to address the ...

September 11: How Merrill Lynch recovered

News | ComputerWeekly.com

Merrill Lynch lost two data centres during the 11 September terrorist attacks in New York. The site is now functioning as a...

Symantec fixes NetBackup Puredisk flaw

News | ComputerWeekly.com

An unauthorised user could launch malicious code by exploiting a flaw in Symantec's Veritas NetBackup PureDisk product. But a fix is available.

Jamie Gruener's position on API sharing

News | ComputerWeekly.com

Key questions on API sharing answered

Somerfield speeds up product development with online system

News | ComputerWeekly.com

Supermarket chain Somerfield will this week go live with the first stage of an initiative to computerise its new product...

Virtual SAN purchase considerations

News | ComputerWeekly.com

The specific considerations for key virtual SAN products plus a series of specifications to help make on-the-spot product comparisons between vendors.

Security Blog Log: The never-ending PatchGuard debate

News | ComputerWeekly.com

This week, security vendor fright over the Windows Vista PatchGuard feature permeates the blogosphere. Is Microsoft the boogeyman, or just ...

Virtual SAN product specifications

News | ComputerWeekly.com

Product snapshots that highlight key specifications for a cross-section of VSAN platforms selected based on input from industry analysts and ...

Victory! Lords confirm CW stand - software flaw could have caused Chinook crash

News | ComputerWeekly.com

An historic House of Lords report has this week vindicated a five-year campaign by Computer Weekly for justice after the crash of...

MPs from all parties unite in fight to clear Chinook pilots

News | ComputerWeekly.com

This week the Tories led an unprecedented all-party move to get the Government to clear the names of the pilots blamed for the...

Instant messaging attacks rise in October

News | ComputerWeekly.com

In October alone, security firm Akonix Systems tracked 88 attacks that used instant messaging programs to spread. Attackers are also exploiting P2P ...

MoD refuses to concede error in Chinook verdict

News | ComputerWeekly.com

The Ministry of Defence (MoD), citing a new series of simulations by Boeing, has refused to clear the names of two pilots blamed...

Achieving the goal of CIO

Feature | ComputerWeekly.com

What exactly does a chief information officer do?Paul Burfitt, global CIO at AstraZeneca, analysed the various aspects of his job...

Best practices for enabling and maintaining compliance

News | ComputerWeekly.com

As part of our Storage Decisions conference preview series, Shaun Mahoney, senior storage engineer for Citigroup, Randy Wilson, assistant vice ...

Computer Weekly's evidence to the Public Accounts Committee

Feature | ComputerWeekly.com

We write to the Public Accounts Committee in relation to its consideration of the Chinook's FADEC computerised engine control...

Chinook report slams flawed MoD procurement methods

Feature | ComputerWeekly.com

Public Accounts Committee report into fatal crash of a Chinook Mk2 helicopter focused on a report by independent contractor EDS-Scicon, which was ...

New Mac OS X flaw exposed

News | ComputerWeekly.com

A Mac OS X flaw was exposed as part of the Month of Kernel Bugs. Also, a new Web site vows to follow the lead of researchers LMH and H.D. Moore with ...

BakBone brushes up replication software

News | ComputerWeekly.com

BakBone's NetVault Replicator version 5.0 includes automatic configuration of replication for remote sites, a capacity planning tool and a higher ...

Am I out of luck if I have a "mixed" email system (e.g., Exchange and Notes)?

News | ComputerWeekly.com

That's a "real-life" situation that we run into many times when we've gone out and worked with companies. We might be called in by a company that has...

School district expels outsourced backup, enrolls CDP

Feature | ComputerWeekly.com

Revere School District dumps tape and outsourced backup, and deploys SonicWall's continuous data protection product.

Zantaz buys data classification partner Singlecast

News | ComputerWeekly.com

Email archiving player Zantaz has purchased data classification startup Singlecast, which can categorise and apply policies to data before an email ...

Security Bytes: Hackers target the Terminator

News | ComputerWeekly.com

In other news, Symantec upgrades its Norton product line and the Anti-Phishing Working Group says phishing activity soared this summer.

Achieving compliance: a real-world roadmap

News | ComputerWeekly.com

A security manager's responsibilities extend beyond the technical aspects of the job. These days, effective governance and compliance are just as ...

Top tech tips from SearchStorage.com

News | ComputerWeekly.com

Check out the top tips on backup, SAN, NAS and storage management from SearchStorage.com.

Government blocks judicial review of Chinook disaster

News | ComputerWeekly.com

The Government has made it impossible for the families of two pilots blamed for the crash of Chinook helicopter ZD576 to seek a...

MoD's Chinook tactics spark a constitutional row

News | ComputerWeekly.com

Chinook: The MoD's actions over the crash of Chinook ZD576 could have legal ramifications

What storage managers are buying and why, page 2

News | ComputerWeekly.com

VoIP outsourcing: Save money and gain flexibility

News | ComputerWeekly.com

VoIP outsourcing is the way to go for organisations looking to deploy voice services quickly and flexibly without a major investment in skills and ...

Messaging Security School

News | ComputerWeekly.com

SearchSecurity.com's Messaging Security School has brought together some of the most knowledgeable experts in the messaging security field to offer ...

Top network security tips of 2006

Feature | ComputerWeekly.com

The top Windows networking security tips of 2006 cover a range of topics, including network isolation, open source Windows security tools, VPN ...

Oracle fixes 101 flaws

News | ComputerWeekly.com

Attackers could exploit 45 of the 101 flaws remotely without a username or password. Meanwhile, the new CPU offers more detail on the number of flaws...

Caught red handed by latest police IT

News | ComputerWeekly.com

Nmap Technical Manual

Feature | ComputerWeekly.com

By now, most infosec pros have heard of Nmap, and most would agree that even though the popular freeware tool is invaluable, installing, configuring ...

NHS IT - A personal view

Opinion | ComputerWeekly.com

The media last week was full of comment on the "problems" at the NHS IT project as Accenture ducked out. Yet again, the comment portrayed the project...

Microsoft to fold security into Windows division

News | ComputerWeekly.com

The software giant said the move would make future Windows development efforts more efficient. The changes take effect after Microsoft releases Vista.

Alliance and Leicester to overhaul core systems

Feature | ComputerWeekly.com

Alliance & Leicester has announced plans replace many of its core banking systems with Accenture’s Alnova Financial Solutions banking platform under ...

Microsoft to fix Visual Studio, Windows flaws

News | ComputerWeekly.com

Microsoft plans to release five security updates to address vulnerabilities in Windows and a flaw in Visual Studio as part of its monthly security ...

How to scour the world when outsourcing

Feature | ComputerWeekly.com



Thanks to Y2K compliance programmes, it is now perfectly acceptable for a firm to consider moving all or part of its systems ...

Storage Decisions Session Downloads: Smart Shopper Track (LV 2006)

Feature | ComputerWeekly.com

Very few storage managers have carte blanche when it comes to storage spending. Sessions in our "Smart Shopper track" help managers get the most bang...

Exploiting Software: How to Break Code, Chapter 7 -- Buffer Overflow

News | ComputerWeekly.com

This excerpt is from Chapter 7, Buffer Overflow of Exploiting Software: How to Break Code written by Greg Hoglund and Gary McGraw.

Did MoD deceive RAF inquiry?

News | ComputerWeekly.com

New information shows that the Ministry of Defence withheld information from an air chief marshal about software flaws that could...

Chinook: a breach of natural justice

News | ComputerWeekly.com

MPs slam MoD over 1994 crash whitewash. Software, not pilot error, could have killed 29

Chinook tragedy demands reform

News | ComputerWeekly.com



The Public Accounts Committee report into the Mull of Kintyre helicopter crash vindicates Computer Weekly's three-year campaign ...

Revamped Cisco WAFS worth the wait, users say

News | ComputerWeekly.com

Months late, Cisco has finally released a combined Wan optimisation and WAFS product, while startups like Riverbed have been snapping up the ...

New Microsoft Word zero-day exploit discovered

News | ComputerWeekly.com

Trojan.MDropper-Q is exploiting a vulnerability in Microsoft's word-processing application that could allow attackers to take control of certain ...

IT man on the 5am ferry as Horizon reaches Orkney

News | ComputerWeekly.com



James Rogers

Post Offices in two of the most isolated parts of the UK are the latest to go live as part of the Horizon ...

Proofpoint delivers strong messaging security

News | ComputerWeekly.com

Proofpoint Messaging Security Gateway is a highly recommended, affordable solution for big enterprises that need protection from email-based attacks.

Storage Decisions Session Downloads (NYC 2006)

Feature | ComputerWeekly.com

Take a look at the sessions that floored at the Storage Decisions conference in New York City, September 27-29, 2006.

How to manage encryption keys

News | ComputerWeekly.com

Encryption is an effective way to secure data, but the encryption keys used must be carefully managed to ensure data remains protected and accessible...

Top client security tips of 2006

Feature | ComputerWeekly.com

A network user without the proper know-how is a ticking time bomb when it comes to security. Check out our top five client hardening tips of 2006 to ...

Secure network perimeter to result from Symantec-Juniper deal

News | ComputerWeekly.com

Juniper and Symantec announced a deal to integrate Symantec's client security software with Juniper's security hardware. The result will allow ...

Flaw found in Firefox 2.0

News | ComputerWeekly.com

Attackers could exploit the security flaw to crash versions 1.5.0.7 and 2.0 of the browser, according to various security advisories.

Security Bytes: Data breach affects 100,000 military personnel

News | ComputerWeekly.com

Meanwhile: Phishers use a phone trick to dupe PayPal users; the PCI security standard will get more teeth and a survey illustrates an increase in ...

UK IT leaders plan a night under the stars for charity

Feature | ComputerWeekly.com

About 250 senior IT professionals will take part in the annual Byte Night charity sleep-out on London’s Embankment on 22 September in an effort to ...

NetApp taps SAP for datacentre

News | ComputerWeekly.com

Network Appliance (NetApp) has added to its technology collaboration SAP offering SAP compliance and certification for its datacentre offerings.

More from SearchSecurity -- July 2006

News | ComputerWeekly.com

Highlights from the July 2006 issue of Information Security magazine.

Security Bytes: Investigators slam VA over data breach

News | ComputerWeekly.com

Meanwhile: Cisco patches a router application flaw, a Washington law firm sues IBM over a server attack; and spammers sucker Web surfers with fake ...

Networking
  • network scanning

    Network scanning is a procedure for identifying active devices on a network by employing a feature or features in the network ...

  • networking (computer)

    Networking, also known as computer networking, is the practice of transporting and exchanging data between nodes over a shared ...

  • What is SD-WAN (software-defined WAN)? Ultimate guide

    Software-defined WAN is a technology that uses software-defined networking concepts to distribute network traffic across a wide ...

Security
  • identity management (ID management)

    Identity management (ID management) is the organizational process for ensuring individuals have the appropriate access to ...

  • fraud detection

    Fraud detection is a set of activities undertaken to prevent money or property from being obtained through false pretenses.

  • single sign-on (SSO)

    Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials -- for ...

CIO
  • IT budget

    IT budget is the amount of money spent on an organization's information technology systems and services. It includes compensation...

  • project scope

    Project scope is the part of project planning that involves determining and documenting a list of specific project goals, ...

  • core competencies

    For any organization, its core competencies refer to the capabilities, knowledge, skills and resources that constitute its '...

HRSoftware
  • recruitment

    Recruitment is the process of finding, screening, hiring and onboarding qualified job candidates.

  • Workday

    Workday is a cloud-based software vendor that specializes in human capital management (HCM) and financial management applications.

  • recruitment management system (RMS)

    A recruitment management system (RMS) is a set of tools designed to manage the employee recruiting and hiring process. It might ...

Customer Experience
  • martech (marketing technology)

    Martech (marketing technology) refers to the integration of software tools, platforms, and applications designed to streamline ...

  • transactional marketing

    Transactional marketing is a business strategy that focuses on single, point-of-sale transactions.

  • customer profiling

    Customer profiling is the detailed and systematic process of constructing a clear portrait of a company's ideal customer by ...

Close