Data management

Data management News

First mobile device with MIPS 64-bit processor coming in 2016

The Warrior i6400 chip will support Android 64-bit operating systems starting with the L release read more »

Why hackers may be stealing your credit card numbers for years

Hackers may have the upper hand for years as the retail industry slowly upgrades its systems, analysts said read more »

Government launches managed email framework

Contract to be used immediately to replace secure NHS email system NHSmail provided by Microsoft read more »

MoJ seeks help with project to digitise courts

Supplier to plug the gap until the cross-government Identity Assurance programme is up and running read more »

Backoff malware infections are more widespread than thought

The number of businesses hit by the data-stealing Backoff malware may be substantially more than the 1,000 or so companies estimated by federal officials. read more »

Intel amps up desktop performance with its first 8-core PC chip

The chip is aimed at gaming and high-performance desktops read more »

more news ..

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.


Windows 8

Windows 8

Check out our latest articles on Microsoft's next-generation operating system.


Securing the Enterprise

 Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyver criminals.


HP acquisitions

HP acquisitions

Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.


Advertisement
Data management In Depth

What these 6 CEOs learned from working at Salesforce

Learning from the SaaS pioneer read more »

CIOs should prepare for tough questions over power usage within IT

New mandatory energy audits will see IT leads scrutinising power usage - but it also spells opportunities for long-term savings read more »

Connected cars: a big data headache or opportunity for insurers?

Telematics take-up may be only by five percent of the market right now – but insurance companies must prepare for when it reaches critical mass read more »

Is the open plan office a data security headache?

Google and Facebook market their shared workspace and informality to potential recruits but... read more »

Moving toward smart and secure continuous software delivery

Agile development can highten tensions between security and development teams read more »

IT investment trends in a resurgent economy

Stephen Georgiadis, managing director and UK head of technology at investment bank Altium, discusses investment trends in the technology sector read more »

more in depth ..
Data management Slideshows

The worst cloud outages of 2014 (so far)

Which companies have failed the worst when it comes to cloud outages in 2014? Time for the list no one wants to land on read more »

11 post-holiday checklist tips for CIOs

As the holiday period ends, it's a good time for your IT organisation to undertake some of those long put-off tasks. Here are tips from four CIOs and CTOs for cleaning up your IT environment. read more »

The 10 most terrifying security nightmares revealed at the Black Hat and Def Con hacker conferences

Hacked planes. Unstoppable, utterly malicious flash drives. Hotel automation gone crazy. These are the 10 most terrifying security stories out of the premier hacker and security conferences in Las Vegas. read more »

Silicon Valley tech execs behaving badly

Move over Donald Sterling. The exploits of these misbehaving technology executives give the now-infamous billionaire L.A. Clippers owner a run for his money when it comes to moronic acts. read more »

more slideshows ..
White Papers

Putting IT back in control of BYOD

The benefits of BYOD read more »

4 ways IT can control contact centre costs

Lower the time your IT group spends managing contact centre technology read more »

more white papers ..

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

ComputerworldUK Knowledge Vault

ComputerworldUK
Share
x
Open