We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

Law

Law News

Two more states eye drone use limits

read more »

Court rejects Lavabit appeal, cites improper procedural handling

Questions around the government's legal right to encrypted communications must wait for the next case read more »

Net neutrality ruling complicates US transition to IP networks

The court's ruling raises questions about the FCC's authority to require VoIP providers to compete calls, carry all traffic read more »

Lavaboom builds encrypted webmail service to resist snooping

The service has started accepting registrations for its upcoming beta testing period read more »

Mt. Gox has filed for liquidation in Japan, says report

A long, convoluted road lies ahead for what was once the world's largest exchange for bitcoin read more »

Cellular industry makes concession on kill switch

Carriers, phone makers and a lobbying group announce a voluntary agreement, but it might not be enough read more »

more news ..

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.


Windows 8

Windows 8

Check out our latest articles on Microsoft's next-generation operating system.


Securing the Enterprise

 Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyver criminals.


HP acquisitions

HP acquisitions

Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.


Advertisement
Law In Depth

The mainframe turns 50, or, why the IBM System/360 launch was the dawn of enterprise IT

In 1964, mainframes weren't new, but IBMs' System/360 revolutionised the computer industry read more »

Invasion of the body snatchers: wearable devices are coming for you

Privacy and form-factor are some of the big questions for this emerging category read more »

Security should no longer be 'cementing' the status quo

If your security programme is struggling, don't stick with it because it's the way things have always been done read more »

CyberLocker's success will fuel future copycats

Ransomware with unbreakable encryption will attract cyber bandits like flies to offal read more »

The principles of modern IT for the ambitious business

Are businesses prepared for the third platform of computing? read more »

CIO not the only one to blame for Target breach

Beth Jacob's resignation not surprising, but disappointing analysts say read more »

more in depth ..
Law Slideshows

Apple vs. the world - Apples definitive legal battles

Here you’ll find a list of some of the most important, influential, notable, and even downright silly legal battles that Apple has been involved in since first forming in 1976 read more »

A potted history of the IT industry: 25 years of milestones

Epoch making events from the last two and a half decades read more »

How much do top tech CEOs take in perks?

Jets! Cars! Home security services! All of these perks add to tech CEOs' pay packages read more »

The first 2,000 years of computing

A visual history of mechanical computation devices read more »

more slideshows ..
White Papers

Putting IT back in control of BYOD

The benefits of BYOD read more »

4 ways IT can control contact centre costs

Lower the time your IT group spends managing contact centre technology read more »

more white papers ..

ComputerworldUK Knowledge Vault

ComputerworldUK
Share
x
Open