Search Computerworld UK

Search Computerworld UK website for

Here are some of our latest articles from the last few days

Order results by relevancy / date

DDOS attack size up 50-fold over past decade

The size of the largest DDOS attack was fifty times larger last year than ten years ago, according to a new survey of Internet service and hosting providers, and attacks are also increasing in numbers and in sophistication.
More Like This

St Andrews tops global university rankings for IT services

St Andrews University's IT team has gone from 'failing' to claim the title of 'best university service desk in the world' in just five years.
More Like This

Oracle Service Cloud gets more social

Oracle has released an update to its Oracle Service Cloud that adds new tools to give companies more insight about their customers.
More Like This

ICO to work with Ofcom to attempt to regulate the Internet of Things

The regulator published a report that detailed how spectrum availability, data privacy, network security and network addresses should be regulated as the world becomes increasingly connected - and businesses learn more about its customers.
More Like This

UK Oracle User Group CEO James Haslam resigns

The UK Oracle User Group has announced that its CEO James Haslam is stepping down. He leaves after 19 years with the independent body.
More Like This

Cambridge University turns to Intel Xeon Phi chips to meet growing high performance computing demands

University is investing £20 million in new HPC data centre
More Like This

Is your platform secure? Really?

The introduction of the cloud architecture, with its virtualisation basis, has created new avenues of attack. The challenge of protecting the organisational assets and process, while avoiding adverse impact on service levels, is growing. Although many organisations view security as a simplistic access to assets, the Solitaire Interglobal Ltd. (SIL) view includes a broad reaching view of security. Download this white paper to gain insight into factors that will affect security and how to overcome them
More Like This

Centrify Server Suite: Strengths & Challenges

Centrify is best known for their capability of integrating UNIX and Linux accounts management into Microsoft Active Directory, but also supports integration of Mac OS X. Download this report to learn about the strengths and challenges of its Centrify Server Suite and how it makes for an interesting offering for organizations that run both Microsoft Active Directory and UNIX/Linux environments.
More Like This

Apple posts record sales, says Watch will ship in April

Record revenue from the iPhone and Mac computer sales helped Apple bring in US$74.6 billion in revenue last quarter, up from $57.6 billion a year earlier.
More Like This

Dell Kace can now manage enterprises' Chromebooks

A new version of Dell's Kace K1000 Systems Management Appliance adds support for a wider array of devices, including Chromebooks, so enterprises and other organisations can better control these Chrome OS computers.
More Like This

Close the Window on Three Windows Server Threat Scenarios

Find out about three common Windows Server threat scenarios. Security breaches are all over the news, many of them a result of either insider threats or advanced persistent threats. Companies and government agencies are looking for solutions to mitigate the risks these threats present. Download this whitepaper to discover three common Windows Server threat scenarios and how they can be neutralized.
More Like This

Snapchat and Twitter violate each other's personal space

Things are about to get testy between the Snapchat ghost and Twitter's birdie as the popular Internet companies invade each other's space: Twitter has launched a private group messaging feature, while Snapchat added news content.
More Like This

Magic Quadrant for Identity and Access Management as a Service

The IDaaS market is still in its early days. Vendors come from distinctly different backgrounds, and there are significant variances among providers with regard to IAM functional depth and support provided for different use cases. This Magic Quadrant identifies the leaders, challengers, niche players and visionaries in the IAM market. Download this white paper to gain insight into vendor performance based on the evaluation of key criteria
More Like This

Figuring out the future: How the financial services industry can keep pace with consumer demand

Automation enables a standardised audit trail, making sure the right people have access to the right systems and guaranteeing that financial institutions adhere to industry standards, while reducing the need for cost involved in keeping legacy IT systems running.
More Like This

New SAP Hana tool aims to put Big Data insights within closer reach

A new SAP rapid-deployment service aims to help enterprises tap its Hana in-memory database and computing platform for business-intelligence initiatives involving Big Data.
More Like This

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

ComputerworldUK Knowledge Vault