With Network on Demand, customers will be able to start up and modify services directly through an online portal read more »
The project aims to improve how open source software is developed and consumed read more »
The errors, which can shut off traffic, are occurring more frequently with little explanation, said Renesys read more »
Cisco fixed a vulnerability in server baseband management controllers and VMware in network virtualization products read more »
Verizon's LTE network and Terremark cloud will help the shellfish operation monitor its impact and operations read more »
Attackers use cross-site request forgery techniques to change router settings when users visit malicious websites read more »more news ..
When home security requires levels of expertise found in an SME, BYOD poses problems read more »
FOSDEM is the most important meeting ground for the world's open source developers, and you can attend free of charge. Will you be there? read more »more blogs ..
Watch this on demand webinar which explores IT innovation, managed print services and business agility.
Check out our latest articles on Microsoft's next-generation operating system.
Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyver criminals.
Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.
Router In Depth
Develop a security baseline and measure systems against the baseline read more »
Insecure by design and trusted by default, embedded systems present security concerns that could prove crippling read more »
Windows 8 adds even more features to increase productivity and remain compliant read more »
Is technological dependency and the data that fuels it making us more resilient or more fragile? read more »
There are no vendors large enough to control the IoT but vendors can make a mess of it. read more »
There's a wireless battle brewing, with Bluetooth mesh just the latest contender read more »more in depth ..
Hacked planes. Unstoppable, utterly malicious flash drives. Hotel automation gone crazy. These are the 10 most terrifying security stories out of the premier hacker and security conferences in Las Vegas. read more »
Microsoft leads the way, but has plenty of company on jobs cut front read more »
Projects hoping for financial backing include wind and solar chargers, drones and a panoramic video camera read more »
The Internet of Things is changing simple homes into smart homes, where everything from your lights to your locks can be controlled from your smartphone. Here are a few products that can help you get started. read more »more slideshows ..
Maximise the effectiveness of collaboration read more »
Deliver solutions that deliver exceptional user experience read more »more white papers ..