Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

Blogs

Latest Posts

We’ll no more go a-roaming…

November, 25 2014 03:15 PM

We’ll no more go a-roaming…

Car makers have big plans for connected cars and they don't much like roaming charges - particularly as advanced driver assistance systems and streaming entertainment products devour data.

So what if the Regin malware is British - this is just old-fashioned spying, right?

November, 25 2014 12:21 PM

So what if the Regin malware is British - this is just old-fashioned spying, right?

Is Regin the first example of a British cyberspying platform? Documented this week in some detail by Kaspersky Lab and to a lesser extent by Symantec, some experts privately think so even if getting them to say as much is proving difficult. In an area of software built on quicksand, nobody wants to sound too sure for fear of sounding foolish later on.

Cognitive computing: What it means to you

November, 21 2014 03:26 PM

Cognitive computing: What it means to you

Those who have had a glimpse of this cognitive computing recognise its importance and the potential it has to change the way we look at computers in the future. However, there exists a degree of confusion over what it is, how it works and why it’s different. That’s entirely understandable – it’s truly cutting edge and requires a significant mind-shift to comprehend what ‘cognitive’ means in practical terms.

China's 'knock-off' J-31 fighter - cyberwar spoils or an an example of its self-deception?

November, 17 2014 01:54 PM

China's 'knock-off' J-31 fighter - cyberwar spoils or an an example of its self-deception?

The Chinese Government has been accused of numerous military-industrial cyber-attacks against the US, the direct effects of which are almost impossible to gauge. The troubled case of China’s J-31 'Shenyang' stealth fighter, formally unveiled at the Zhuhai Air Show last week, might turn out to be a fascinating exception to this rule.

'Malvertising' research blog pulled after ad network objects to methodology

November, 14 2014 05:40 PM

'Malvertising' research blog pulled after ad network objects to methodology

Earlier this week security startup Lastline pulled a blog outlining malvertising research it did into the ‘Top 10 dirtiest ad networks’ after one or more of those mentioned objected to the firm’s methodology.

Total Recall, IoT and your next cab ride

November, 12 2014 12:02 AM

Total Recall, IoT and your next cab ride

A good couple of weeks for news about connected cars. M2M module maker and Octo Telematics announced that they were joining forces to offer a self-install black box for usage-based insurance (UBI). That’s a good idea, because the costs of “professional” installation impacts negatively on the business case for UBI.

Stories that caught my eye this week

November, 11 2014 12:26 PM

Stories that caught my eye this week

A round-up of the top stories to pique my interest over the last seven days

Small steps v giant leaps

November, 03 2014 02:32 PM

Small steps v giant leaps

Exploring technology does not have to be scary. Dan Hartveld, CTO at Red Ant, provides some practical advice on how businesses can be more innovative without causing too much disruption.

Things that think

November, 03 2014 08:43 AM

Things that think

Things that think The Internet of Things (IoT) sounds like a good idea. It ought to be fun; after all, it’s fun thinking up all those wacky ideas for connected products like connected driving shoes and the connected toothbrush. So why shouldn’t it be fun to make them too?

Anti-virus is no longer enough - new apps show how vulnerability scanning is becoming a must

October, 29 2014 02:24 PM

Anti-virus is no longer enough - new apps show how vulnerability scanning is becoming a must

It has taken a long time, but slowly and surely computer security has reached the moment where it moves away from simply securing a device from specific threats to one in which more attention is paid to its everyday security state.

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map