Video interview: Why develop for Windows 8?

Posted · Add Comment

Hardware PC, Servers, Storage, Data centre, Mobile, Networking, Chips & processors, Printers Enterprise software Operating systems, Open source, Windows, Developer, Mobile, Database, Business applications, SOA, Web, Middleware, BI, Virtualisation, Collaboration, Licensing, Financial applications, Cloud applications, CRM IT services Outsourcing, Consultancy, Hosting, Cloud, Offshore, Startups IT security Antivirus, IAM, Risk management, Data protection, Continuity, Cybercrime, Data […]

EE reveals UK’s first 4G pricing plans

Posted · Add Comment

EE has released its tariffs for the UK’s first 4G contracts, which will be available from the end of October. EE – created from the merger of T-Mobile and Orange and formerly known as Everything Everywhere – has outlined price plans for enterprise customers, as well as consumers, along with added extras for those […]

NFU Mutual automates paper processes with Tibco

Posted · Add Comment

Insurance company NFU Mutual is to automate its paper-based claims handling using business process management tools from Tibco. The multimillion pound project will help the rural insurer streamline its claims-management processes across its regional service centres, maximise claims management efficiency and enhance its customer service. NFU Mutual will use Tibco’s Spotfire analytics platform, Nimbus […]

Cyber attacks launched at London 2012 Olympic Games every day

Posted · Add Comment

The IT supporting the London 2012 Olympics and Paralympics was hit by cyber attacks every day during the Games, including some that were well organised and automated and one in particular that was a major assault. London 2012 CIO Gerry Pennell revealed the scale of the threats that the Olympics successfully coped with in […]

Three boosts staff numbers in Scotland

Posted · Add Comment

Three has announced it will be recruiting almost 800 new staff by the end of 2014. The majority of the roles will be based at its Glasgow offices with the addition 380 telesales staff, making the total employees close to 1,000. However, the rest of the jobs will either be in its retail stores […]

Renegotiating outsourcing contracts to fit new reality

Posted · Add Comment

Downturn drives renegotiation Position of strength Haggling Change is good Organisations in many sectors seek to renew the terms in their contractual agreements as they adjust to the economic climate. IT outsourcing is going through a period of major change as the result of an economic downturn of extreme proportions alongside major advances in […]

XSS attacks remain top threat to web applications

Posted · Add Comment

Cross-site scripting (XSS) attacks remain the top threat to web applications, databases and websites, an analysis of 15 million cyber attacks in the third quarter of 2012 has revealed. Other top attack techniques are directory traversals, SQL injections (SQLi), and cross-site request forgery (CSRF), according to the latest web application attack report by cloud […]

Attackers besiege Google Android OS, Trend Micro reveals

Posted · Add Comment

Google’s Android mobile operating system (OS) is under siege by attackers, with malware and information stealing adware targeting the platform up 483% in the last quarter. While Apple’s relatively rigorous approach to vetting apps before allowing them on the App Store has minimised security risk, Google’s open platform has become a hotbed of malicious […]

How to manage your assets and control business costs

Posted · Add Comment

Asset lifecycle management allows the IT department to improve governance, mitigate risk and improve service quality and efficiency. Without an investment in IT asset lifecycle management people, process and technology, there is no way you can credibly answer questions about the IT assets of your organisation. IT departments need information on what assets they […]

Security Think Tank: IP theft: Have you got all the bases covered?

Posted · Add Comment

Organisations holding information which gives them a competitive advantage and allows them to compete in business should have an awareness of what intellectual property (IP) they hold.  Examples of intellectual property include: plans for a product launch; a trade secret, like a chemical formula; company contact lists; marketing and sales strategies; computer code; customer information; […]