Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message


Topic Zone

Latest News

Latest Features

  • The future of enterprise search

    Future search systems will get to know the user - and communities of users - as much as the content it crawls, analyses and indexes, say observers.

  • What's wrong with mobile browsers?

    We need to move to a web model for mobile applications - but at the moment our browsers let us down, says Craig Mathias.

  • Gotta have it

    Is Boot Camp really Apple's big play for the enterprise desktop? No. The enterprise desktop is a commodity world. Apple doesn't do commodities.

  • Virtual privacy

    VPNs shouldn't be a mystery, you just need to decide which of the different VPN technologies you ought to use.

  • Microsoft more open about Longhorn features

    As Microsoft approaches a major milestone in the development of Longhorn, company executives are talking more about the features of the Windows XP successor.

  • Microsoft's Windows Server chief on Linux, 64-bit computing (part 2)

    Bob Muglia, senior vice president of Microsoft's Windows Server division, discusses the road map for future operating system releases, the competitive threat posed by Linux and the promise of 64-bit computing. Part 2 of the interview.

Featured White Papers

In Today?s Web 2.0 Environment, Proactive Security Is Paramount. Are You Protected?

Applications are now enabled over the Internet and the use of corporate intranets and extranets are now critical components of business. Indeed, organizations now build their businesses on Web infrastructures, and we?ve even seen the proliferation of completely ?virtual? companies that have no physical headquarters at all. Today?s business model includes inbound access for remote employees, partners, and customers. Internal employees also reach beyond the edge of the internal network to communicate and gather information across the Internet. This bi-directional aspect of IP-based application access creates significant security challenges for enterprises, however. Communication methods are both inbound and outbound, and so too, threats have also become both inbound and outbound in nature.
Download whitepaper

IPSec in the Solaris 9 Operating Environment

The Solaris Operating Environment (OE) is a leading provider of secure network computing capabilities. This lead is extended with the extension of the Internet Protocol Security (IPSec) capabilities in the Solaris 9 OE.
Download whitepaper

In Today?s Web 2.0 Environment, Proactive Security Is Paramount. Are You Protected?

This paper outlines these new threats and discusses the limited effectiveness of legacy Web security solutions against those threats. The paper then outlines the new proactive security paradigm that is necessary for securing Web 2.0 applications and protecting the enterprises that use them on a daily basis.
Download whitepaper

How to Use Lotus Domino to Publish Policies and Procedures Online

For IBM Lotus professionals, using Domino for publishing internal documentation may be an obvious choice. Still, lots of Lotus shops do not have a simple way to publish and maintain their corporate policies and procedures manuals, training materials, product information, disaster recovery plans, and other critical documents.
Download whitepaper

Multicast: Conformance and Performance Testing

The sustained expansion of Internet communications continues to generate new services and network applications. At the same time, the exponential growth in the number of concurrent users who want to simultaneously access shared data in corporate intranets, as well as the global Internet, has generated the need for applications that provide data access while minimizing bandwidth requirements. The implementation strategy adopted by many of these emerging applications involves sending packets from one or more senders to a group of recipients?in a single operation. This technique is referred to as ?IP Multicast.?
Download whitepaper

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map