Browse Definitions :
81,546 results for:

Understanding remote scripting: Managing Windows networks using scripts, Part 9

News | ComputerWeekly.com

Our series on managing Windows networks using scripts continues.

CISOs invisible to their organisations, says BT report

News | ComputerWeekly.com

Ignorance of cyber issues is leading to misplaced confidence in security in many organisations, as CISOs struggle to make themselves seen and heard

UKRI suspends services after ransomware attack

News | ComputerWeekly.com

UK Research and Innovation was hit by an undisclosed strain of ransomware at the end of January

How to manage mobility

News | ComputerWeekly.com

Planning a new mobility deployment? This tip and podcast offer eight strategies to make sure you get it right.

IR35 private sector reforms: IT contractors warned to be wary of non-compliant umbrella companies

News | ComputerWeekly.com

The proliferation of websites offering comparison site-like services for umbrella companies has prompted tax experts to warn IT contractors of the ...

Music publisher BMG taps into Google Cloud to manage and analyse streaming data processes

News | ComputerWeekly.com

Berlin-based record label and music publisher BMG is drawing on Google Cloud to revamp its infrastructure to accommodate the music industry's ...

Nokia, Mobily unveil world’s first sliced FWA deployment

News | ComputerWeekly.com

Global comms tech provider teams with Saudi Arabian telco to pilot world’s first 4G and 5G fixed wireless access network slicing on a live commercial...

European telecoms big guns team up to drive Open RAN deployments

News | ComputerWeekly.com

Major regional operators embark upon collaboration to provide a framework for the creation of an interoperable market for Open RAN

IR35 private sector reforms: Zurich Insurance under fire over contractor blanket ban

News | ComputerWeekly.com

Zurich Insurance is the latest high-profile financial services company to declare contractors can only continue to engage with it via umbrella setups...

Watts steps into Gass role at Tech Data

News | MicroScope

Distributor promotes its current UK&I managing director to take on even more responsibility

Set up an ad hoc WiFi network

News | ComputerWeekly.com

What if you wanted to do pretty much everything you can do on a network, but didn't have a router? You can set up an ad hoc network, in which you can...

VoIP, unified communications study reveals challenges

News | ComputerWeekly.com

VoIP and unified communications deployments can affect other applications. A study by Network General highlighted some challenges introduced by ...

Enabling Windows Vista's Network Mapping feature on domain networks

Tip | ComputerWeekly.com

Learn how to enabling Windows Vista's Network Mapping feature on domain networks.

Canalys: Cyber security channel set for further growth

News | MicroScope

Analyst house Canalys forecasts another decent year ahead for those set to can help customers fend off cyber attacks

EDITORIAL: It's time for a Net Neutrality debate

News | ComputerWeekly.com

Australia should sort out its position on Net Neutrality before the National Broadband Network is built, not afterwards, writes TechTarget ANZ Editor...

Implement job rotation for team motivation, productivity

Tip | ComputerWeekly.com

Indian CXOs are increasingly experimenting with job rotation for team motivation and productivity. Find out why job rotation helps, and how M&M ...

Cring ransomware hits ICS through two-year-old bug

News | ComputerWeekly.com

A long-disclosed vulnerability in Fortinet’s Fortigate VPN servers is being exploited to distribute Cring ransomware

Fulcrum snaps up Pure Technology Group

News | MicroScope

Leeds-based IT services player is the latest in the channel to be a target for investment

MoD calls on academics, industry and inventors to pitch cyber security ideas

News | ComputerWeekly.com

The Ministry of Defence is calling for innovative solutions from academia and industry to protect and secure UK interests in cyberspace.

Questions raised by New Zealand central bank boss, following cyber attack investigation

News | ComputerWeekly.com

The governor of New Zealand’s central bank said the organisation must answer questions about its security following a ‘significant’ attack

Legacy security architectures threaten to disrupt remote working

News | ComputerWeekly.com

Annual survey of IT leaders finds network security is of prime concern as most companies continue with work-from-home policies

Larry English calls for an information quality revolution

News | ComputerWeekly.com

Larry English, in an interview, calls for an information quality revolution that will put the customer first. New rules are necessary for the “...

Reasons why enterprise networking and security roles must stay separate

News | ComputerWeekly.com

Enterprise network managers are responsible for configuring and managing network devices, but should they be accountable for tasks that are typically...

IM security threats and resources

News | ComputerWeekly.com

Instant messaging applications have their own set of security guidelines to prevent hacking.

Aura will power Avaya-Nortel unified communications integration

News | ComputerWeekly.com

Avaya has staked its future of retaining Nortel customers on its flagship SIP-based communications platform, Aura, as the heart of the Avaya-Nortel ...

Channel roundup: Who's gone where?

News | MicroScope

Another week of movement across the channel, with vendors and partners hiring for growth

Networking certifications : How to pass your Network+ exam

News | ComputerWeekly.com

Learn how to pass your Network+ exam in this story on how to study and read to obtain your Cisco certification.

Security Zone: The ISO/IEC 38500 IT Governance Standard

Opinion | ComputerWeekly.com

IT governance means different things to different folks, yet it is generally understood to require alignment with best practice standards and ...

LinkedIn could beat Facebook to an IPO

News | ComputerWeekly.com

LinkedIn could be the first social network company to be floated on the stock market, according to reports.

More than 1,000 patient records lost on unencrypted laptop

News | ComputerWeekly.com

A doctor is to be disciplined following the loss of 1,147 patient records on an unencrypted laptop.

UK government reviews law on access to land for digital infrastructure

News | ComputerWeekly.com

Reacting to reports that agreements have been slow to conclude, holding up the roll-out of better mobile and broadband connectivity, UK government ...

Federal Government cancels OPEL contract

News | ComputerWeekly.com

The Federal Government has cancelled the OPEL contract for delivery of wireless broadband to regional areas

Contactless payment limit could rise to £100 as FCA seeks industry views

News | ComputerWeekly.com

UK financial services regulator is considering raising the contactless card payment limit to £100

Robert Gordon University delivers graphics workstations virtually

News | ComputerWeekly.com

Engineering and architecture students require PCs that can run GPU-accelerated applications. VDI has enabled them to be streamed remotely

5G to the fore as Ericsson beats expectations in financial year

News | ComputerWeekly.com

Strong year recorded by comms tech firm from continued high activity levels in North America, Northeast Asia and Europe, with 5G strong

‘Victory for free speech and openness’ after tribunal confirms no territorial restrictions to FOIA

News | ComputerWeekly.com

Freedom of information tribunal rules that investigative journalists and others can use the Freedom of Information Act if they live outside the UK or...

Does rapid UC innovation beget slow implementation rates?

News | ComputerWeekly.com

As unified communications (UC) technology grows, many enterprises are left to play catch-up.

Making the case for FCIP and FCoE

News | ComputerWeekly.com

FC over IP and FC over Ethernet let companies begin consolidating on one network platform as opposed to maintaining separate FC and Ethernet networks.

NCSC: Using your pet’s name as a password is very stupid

News | ComputerWeekly.com

If your email password is still Rex, Rover or Mr Fluffles, it’s probably best to change it, the NCSC has said

Is the NHS National Programme for IT terminally ill?

News | ComputerWeekly.com

A damning report from the National Audit Office (NAO) has revealed the woeful state of the NHS National Programme for IT (NPfIT), nine years after ...

Seven steps to successful negotiation for IT buyers

Opinion | ComputerWeekly.com

Nigel Owen of training consultancy Huthwaite International provides some key tips for benefiting both seller and buyer when negotiating a sale or ...

Google adds real-time traffic data to Android map app

Feature | ComputerWeekly.com

Google has updated its algorithms to support real-time data for its map application for smartphones running on the Android operating system (OS).

Hague calls for collaboration to realise full potential of cyberspace

News | ComputerWeekly.com

It is increasingly clear that countries with weak cyber defences and capabilities will find themselves at a serious strategic disadvantage given the ...

NHS £5bn IT procurement finally begins

News | ComputerWeekly.com

The Department of Health (DoH) has launched the formal procurement process for its £5bn restructuring of NHS IT.

What are some of the other options available to help manage unstructured data?

News | ComputerWeekly.com

Eliminate unnecessary data from your production storage. This typically involves moving the unnecessary data to a different tier or deleting the data...

What are some of the best practices for managing the growth of unstructured data?

News | ComputerWeekly.com

It starts with corporate policies around data management...

What is unstructured data and how is it different from structured data in the enterprise?

News | ComputerWeekly.com

What we're really doing is designating our data as structured or unstructured. Let's start with structured data...

Cisco bolsters security with IronPort buy

News | ComputerWeekly.com

Cisco Systems agreed Thursday to buy Internet gateway security vendor IronPort Systems Inc. for $830 million.

Is an SMB environment too small for a SAN?

News | ComputerWeekly.com

Almost any size business can benefit from some type of SAN -- or "network storage"; whether it's NAS, iSCSI-based IP storage or FC storage...

Hybrid drives hit NAS boxes

News | ComputerWeekly.com

DNF will be making hybrid drives available in all of its storage products, but it doesn't recommend them for IP SANs.

Capacity planning software specifications

News | ComputerWeekly.com

Gauging storage needs over time is one of the biggest challenges faced by IT administrators, and a new generation of capacity planning tools is ...

Web 2.0: CIOs want it their way

News | ComputerWeekly.com

A new study found CIOs want Web 2.0 technology, but they're a little insecure about getting it from emerging specialized vendors.

Storage Security FAQ audiocast

News | ComputerWeekly.com

Don't have time to dig into the FAQ text now? Download the audiocast in MP3 format and listen in the car, at the gym -- wherever you want. You can ...

Deals abound for high-end storage

News | ComputerWeekly.com

Think high-end storage is out of your reach? Maybe not. Conversations with several storage buyers recently suggest that vendors are scrambling to ...

What are the disadvantages of unified storage over independent block and file systems?

News | ComputerWeekly.com

There are some compromises that you'll need to make; there are certainly some control granularity issues. The pattern of access for file-based data ...

Debian fixes multiple flaws

News | ComputerWeekly.com

Denial-of-service, buffer overflow and format string vulnerabilities in Debian GNU/Linux that an attacker could use to remotely execute malicious ...

Court blocks former ICL solicitor's Pathway claim

News | ComputerWeekly.com

Fujitsu has won a court ruling to stop a former solicitor for the company pursuing allegations about the government's disastrous...

Quiz: Using IAM tools to improve compliance

Feature | ComputerWeekly.com

A five-question multiple-choice quiz to test your understanding of the content presented by expert Tom Bowers in this lesson of SearchSecurity.com's ...

IP storage adoption plows ahead bringing tangible benefits

News | ComputerWeekly.com

According to IDC, there were 32,124 terabytes (TB) of iSCSI storage deployed worldwide in 2005. That figure had almost tripled to 97,506 TB by 2006. ...

McAfee fixes flaw in Mac antivirus software

News | ComputerWeekly.com

Attackers could exploit the hole in McAfee's Virex 7.7 antivirus program for Mac OS X to bypass the malware scanner, but a fix is available.

Is there any reliability difference with unified storage?

News | ComputerWeekly.com

There are a few minor differences, but usually not a significant difference...

Cisco VoIP management guide: VoIP management lifecycle

News | ComputerWeekly.com

VoIP lifecycle management enables enterprises to safely pursue large production deployments. The management lifecycle includes the following four ...

Midrange storage array purchase considerations

News | ComputerWeekly.com

A Buying Guide focusing on specific considerations for midrange disk array systems. Also find a series of specifications to help make on-the-spot ...

Microsoft investigates Windows Vista Mail flaw

News | ComputerWeekly.com

Attackers could exploit a flaw in Windows Vista Mail to compromise PCs by tricking the user into opening a malicious email attachment. Microsoft is ...

Cisco VoIP management guide: Enterprise VoIP management solutions

News | ComputerWeekly.com

Enterprise VoIP management solutions require two considerations: the scale of production environment and the need to extend support resources with a ...

CA backup bug exploitable on Vista

News | ComputerWeekly.com

In what appears to be the first exploit for a third-party app running on Vista, a previously patched buffer overflow vulnerability in CA BrightStor ...

Cisco VoIP management guide: Cisco requires proactive management

News | ComputerWeekly.com

Managing Cisco VoIP solutions means network managers must rely on credible, experienced vendors to some extent. Fortunately, many vendors have ...

Attackers hit computers that manage Internet traffic

News | ComputerWeekly.com

Several of the "root" servers that serve as the backbone of the Internet were targeted by digital miscreants Tuesday in the most significant attack ...

Police force secures data with biometrics

News | ComputerWeekly.com

Humberside Police has issued biometric USB drives among staff to maintain data security.

What is the difference between virtualization switches and virtual SANs?

News | ComputerWeekly.com

The word "virtualization" is thrown around so much that it's hard to always know what it means...

Top Web security tips of 2006

Feature | ComputerWeekly.com

Check out the top five Web security tips of 2006 to get advice on securing Internet Explorer, ISA Server and Radius and a set of tools designed to ...

Symantec exploitation video hits YouTube

News | ComputerWeekly.com

Symantec posted a clip on the popular video-sharing site showing researchers using a newly discovered flaw in Microsoft Word to drop an executable on...

Fujitsu won £800m Post Office contract after misrepresenting itself, says lawyer

Feature | ComputerWeekly.com

High Court claim by ex-employee makes damning accusations

UK firms are offered help to migrate to open source

News | ComputerWeekly.com

Companies are being given help to migrate to free-license software by a joint initiative from OpenForum Europe and the National...

Cisco software vulnerable to attack

News | ComputerWeekly.com

Cisco's Clean Access software and Clean Access Manager are at risk to attack. A malicious user can access a database snapshot and download it without...

Metasploit Framework 3.0 released

News | ComputerWeekly.com

Brief: Metasploit Framework 3.0 contains 177 exploits, 104 payloads, 17 encoders and 30 auxiliary modules that perform such tasks as host discovery ...

How can a company set retention policies with such a glut of unstructured data?

News | ComputerWeekly.com

It depends; there are no easy answers to this. There are a number of initiatives that a company should undertake, including disaster recovery, ...

Cisco VoIP managment guide: Required management tasks

News | ComputerWeekly.com

Comprehensive VoIP management includes the basic network management tasks, but also includes monitoring services such as dial tone delivery, call ...

How is unstructured data affecting storage administrators and other staff?

News | ComputerWeekly.com

There is absolutely an effect. Additional data volume translates into...

On the right side of the law

Feature | ComputerWeekly.com

What are the legal and regulatory issues that could affect the running of your company? What are the ramifications of the Data...

Should I use data deduplication to manage unstructured data?

News | ComputerWeekly.com

Absolutely; there are two areas where data deduplication, or single-instance storage, can help...

Adobe Reader users urged to upgrade

News | ComputerWeekly.com

Adobe Reader 8 fixes serious flaws attackers could exploit for cross-site scripting and other attacks.

Cisco fixes IOS flaws

News | ComputerWeekly.com

Attackers could exploit three Cisco IOS flaws to cause a denial of service or launch malicious code. The networking giant has released fixes.

Disaster Recovery Planning Podcasts

News | ComputerWeekly.com

DR expert Jon Toigo explains how the new realities of business make DR planning an essential element of daily IT process, procedure, product ...

What's in an IT name?

Feature | ComputerWeekly.com

What exactly does a chief information officer do?Paul Burfitt, global CIO at AstraZeneca, analysed the various aspects of his job...

Fewer IT supplier conflicts are going to court

News | ComputerWeekly.com

Law firms have reported a sharp fall in the number of IT disputes reaching the courts over the past 12 months as more users turn...

iSCSI SANs grow in midmarket, enterprise

News | ComputerWeekly.com

Because transporting "SCSI over IP" leverages ubiquitous Ethernet networks, that translates to lower cost, easier maintenance and simpler management,...

Windows Vista voice command tricked

News | ComputerWeekly.com

An attacker found a way to play audio commands at a user's machine tricking the voice command capability in Vista into running arbitrary code.

Outsourced VoIP helps devastated company recover

Feature | ComputerWeekly.com

Outsourced VoIP helped a Berkeley company keep up business as usual after a fire destroyed its offices.

Balancing the cost and benefits of countermeasures

News | ComputerWeekly.com

The final tip in our series, "How to assess and mitigate information security threats."

Attacks targeted to specific applications

News | ComputerWeekly.com

The fourth tip in our series, "How to assess and mitigate information security threats."

Compellent adds boot from SAN consolidation

News | ComputerWeekly.com

Update saves storage space by consolidating boot volumes into a "golden" copy of the OS, but experts are troubled by a lack of partnerships with ...

Hitachi launches 1 TB SATA disk drive

News | ComputerWeekly.com

Hitachi has taken the wraps off three new products: a 1 TB enterprise SATA disk drive, a 2.5-inch SAS drive and a 300 GB multi-interface drive.

How to assess and mitigate information security threats

News | ComputerWeekly.com

Learn how to assess and mitigate information security threats, like rootkits, worms and Trojans in the tip series created in collaboration with ...

Continuous backup gains traction

News | ComputerWeekly.com

For continuous backup technology, 2004 is the year that vendors have moved from promises to actual products. Although the market is still small -- ...

Will all storage systems be unified storage in the future?

News | ComputerWeekly.com

I don't think that "all" storage systems will be unified...

What does unified storage really mean?

News | ComputerWeekly.com

This can often be confusing once you read vendors' marketing materials. Simply stated, unified storage [or multiprotocol storage] refers to a...

What is the advantage of having unified storage?

News | ComputerWeekly.com

There is debate about that. Many customers may prefer to have just one storage system, avoiding specialized storage systems, like NAS for file-based ...

What about the system features, like snapshot and remote replication?

News | ComputerWeekly.com

At this point in time, most customers expect to have these features in both block- and file-based storage products...

What will be the impact on performance when mixing block and file in the same system?

News | ComputerWeekly.com

Caching difficulties are one concern since caching patterns may not be optimized for block-based storage...

Networking
  • local area network (LAN)

    A local area network (LAN) is a group of computers and peripheral devices that are connected together within a distinct ...

  • TCP/IP

    TCP/IP stands for Transmission Control Protocol/Internet Protocol and is a suite of communication protocols used to interconnect ...

  • firewall as a service (FWaaS)

    Firewall as a service (FWaaS), also known as a cloud firewall, is a service that provides cloud-based network traffic analysis ...

Security
  • identity management (ID management)

    Identity management (ID management) is the organizational process for ensuring individuals have the appropriate access to ...

  • fraud detection

    Fraud detection is a set of activities undertaken to prevent money or property from being obtained through false pretenses.

  • single sign-on (SSO)

    Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials -- for ...

CIO
  • IT budget

    IT budget is the amount of money spent on an organization's information technology systems and services. It includes compensation...

  • project scope

    Project scope is the part of project planning that involves determining and documenting a list of specific project goals, ...

  • core competencies

    For any organization, its core competencies refer to the capabilities, knowledge, skills and resources that constitute its '...

HRSoftware
  • recruitment management system (RMS)

    A recruitment management system (RMS) is a set of tools designed to manage the employee recruiting and hiring process. It might ...

  • core HR (core human resources)

    Core HR (core human resources) is an umbrella term that refers to the basic tasks and functions of an HR department as it manages...

  • HR service delivery

    HR service delivery is a term used to explain how an organization's human resources department offers services to and interacts ...

Customer Experience
  • martech (marketing technology)

    Martech (marketing technology) refers to the integration of software tools, platforms, and applications designed to streamline ...

  • transactional marketing

    Transactional marketing is a business strategy that focuses on single, point-of-sale transactions.

  • customer profiling

    Customer profiling is the detailed and systematic process of constructing a clear portrait of a company's ideal customer by ...

Close