Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message


Topic Zone

Latest News

Latest Features

  • Ocado - a disruptive company to rival Google?

    Online groceries retailer Ocado wants it to be known that it is a tech, not a retail, company at heart. Techworld meets the company?s CTO Paul Clarke to explore his and the company?s technology journey.

  • iPhone 6 rumor rollup for the week ending July 4

    The tropical deluge Hurricane Arthur dumped on the U.S. East Coast was as nothing to the deluge of rumors dumped by the iOSphere, most of them dealing with parts.

  • Beware the next circle of hell: Unpatchable systems

    Insecure by design and trusted by default, embedded systems present security concerns that could prove crippling

  • Six free network vulnerability scanners

    Vulnerability scanners can help you automate security auditing and can play a crucial part in your IT security. They can scan your network and websites for up to thousands of different security risks, producing a prioritised list of those you should patch, describe the vulnerabilities, and give steps on how to remediate them. Some can even automate the patching process.

  • The ABCs of the Internet of Things

    You've heard the term and probably read stories about smart homes where the toaster talks to the smoke detector. But what makes it all connect? When will it become mainstream, and will it work?

  • Security-vendor snake oil: 7 promises that don't deliver

    Beware bold promises from a multibillion-dollar industry that can't prevent your IT systems from being routinely hacked

  • 10 Big Data startups to watch

    The Big Data space is heating up ? to the point that many pundits already see it as the over-hyped heir to "cloud." The hype may be a bit much, but Big Data is already living up to its potential, transforming entire business lines, such as marketing, pharmaceutical research, and cyber-security.

  • Who's to blame for 'catastrophic' Heartbleed Bug?

    The Heartbleed Bug, basically a flaw in OpenSSL that would let savvy attackers eavesdrop on Web, e-mail and some VPN communications that use OpenSSL, has sent companies scurrying to patch servers and change digital encryption certificates and users to change their passwords. .

  • Invasion of the body snatchers: wearable devices are coming for you

    A place in your pocket is no longer enough for mobile gadget makers: now, they want your body.

  • In-memory technologies move databases to real time

    Last week, application-performance monitoring service provider New Relic launched an offering that allows customers to mine its operational data for business intelligence.

Featured White Papers

The internet enterprise

Data is everywhere, produced by everything from smartphones to sensor devices and home thermostats that can sense environments and maintain temperatures. There is more data available than ever before on customer behaviour and response to company offers. This vast tide of data from the digital world is engulfing the real world, introducing an entirely new approach for doing business. Traditional markets are being violently disrupted by new, data-fueled companies. Download this white paper to discover how evolving technology standards are transforming how companies manage data.
Download whitepaper

University student services excel

The average university student comes equipped with a laptop, a smartphone, and often a desktop computer and video player. These savvy students have spent a lifetime on the Internet and rely on it and their devices for both entertainment and their studies. A big portion of their university life will be spent in front of a screen. What?s behind the screen, and on the network, has a huge impact on their learning experience. Download this case study to discover how The University of Westminster is making networking issues a thing of the past for its students, and learn how you can learn from their experience.
Download whitepaper

Mining Big Data in the enterprise for better Business Intelligence (BI)

Worldwide, the amount of raw data is growing exponentially, due in part to the explosion of connected devices, Internet services, social media, cameras, sensors and user-generated content. Moreover 90% of corporate data, including documents, web pages and email, is unstructured. The sheer volume and complexity of data is overwhelming typical database software and the situation is calling for a new approach. Download this white paper to find out more.
Download whitepaper

Combating digital fraud

In the digital world, the rules of the game have changed. Transactions happen remotely at speeds beyond human perception, and on a potentially vast and automated scale. Human oversight is expensive, fallible and slow, leaving visibility on any one event or customer reduced to a degree that would have seemed incredible to businesses from the pre-internet age. Download this white paper to discover why digital fraud is such a priority for the CIOs agenda.
Download whitepaper

Trends for 2014 and the challenge of internet privacy

The aim of this report is to make the community aware of the present computer threat landscape and, accordingly, attempt to predict its possible evolution in the coming years. On this basis, in 2011, a growing trend for botnets and malware for profit was noticeable1. In 2012, the main trend was directly related to threats designed for mobile platforms. One year later, our main topic was vertiginous growth of malicious codes for mobile devices and at present, although these threats keep growing and evolving, the main topic focuses on the growing concern expressed by users regarding Internet privacy. Download this white paper to discover more.
Download whitepaper

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map