Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message


Topic Zone

Latest News

Latest Features

  • Whatever happened to the IPv4 address crisis?

    In February 2011, the global Internet Assigned Numbers Authority (IANA) allocated the last blocks of IPv4 address space to the five regional Internet registries. At the time, experts warned that within months all available IPv4 addresses in the world would be distributed to ISPs.

  • 6 dirty secrets of the IT industry

    IT pros blow the whistle on the less-than-white lies and dark sides of the tech business

  • The year in tech quotes

    With 2013 coming to an end, we took our annual look back at quotes from news stories over the last 12 months. Here are a handful that stuck with us through the year:

  • 6 dirty secrets of the IT industry

    IT pros blow the whistle on the less-than-white lies and dark sides of the tech business

  • Our Internet privacy is at risk -- but not dead (yet)

    Legislation, stealth technologies, and emerging data privacy markets are proving that the battle for our Internet privacy has only just begun

  • Driverless cars yield to reality: It's a long road ahead

    Take a drive on Highway 101 between Silicon Valley and San Francisco these days and you might see one of Google's driverless cars in the lane next to you. The vehicles are one of the most visible signs of the increasing amount of research going on in the area related to automated driving technology.

  • Spy-proof enterprise encryption is possible, but daunting

    Data encryption could help enterprises protect their sensitive information against mass surveillance by governments, as well as guard against unauthorized access by ill-intended third parties, but the correct implementation and use of data encryption technologies is not an easy task, according to security experts.

  • Our Internet privacy is at risk -- but not dead (yet)

    Legislation, stealth technologies, and emerging data privacy markets are proving that the battle for our Internet privacy has only just begun

  • 2012 - The year in quotes

    Some of the most memorable IT-related quotes were uttered in courtrooms this year, which involved a steady stream of legal challenges about intellectual property. In no particular order, these are some of the comments that stuck with us as 2012 winds to a close.

  • Standardising cloud encryption is key to improving security

    Valuable data stored in the cloud is sure to be a target. What can be done to make it harder to steal?

Featured White Papers

Enabling mobile users and staying compliant

Operating in a regulated industry, like healthcare, adds a layer of complexity to many things ? including mobility. While enterprises in other industries may be concerned about security ? health-related organisations and their business associates are obliged by law to conform to detailed rules around storing and sharing sensitive data. Download this white paper to discover how healthcare organisations are able to remain compliant and enable mobile workers, and learn how your business can do the same.
Download whitepaper

Data Protection Law

The paper reviews the process of ICT disposal and relates it to current UK data protection requirements. It then introduces some of the changes happening to this legislation and concludes with recommendations for UK businesses to follow in order to not only comply with current UK Data Protection law, but also hypostatises on steps to take to future proof against future changes to the law and technology.
Download whitepaper

Why data protection law supports the use of managed security services

European data protection law permits an organisation to use a Managed Security Service Provider ('MSSP') such as Dell SecureWorks. Actually, not only does the law permit the use of a MSSP, but in many respects it also supports it, in the sense that good quality managed security services provide an enhanced level of security measures, expertise and awareness and enable organisations to make efficient use of their resources, thereby enabling them to achieve better data security and meet the requirements of the law. Download this white paper to understand the legal position IT is in and consider the characteristics of a good quality MSSP for data protection purposes.
Download whitepaper

How flash changes everything

Today, it is quite likely that your company is facing a growing crisis in storage. Accommodating exponential growth on flat spend seems intractable, and yet servers and networks have been getting exponentially faster and cheaper following Moore?s Law for decades. Storage has failed to keep pace because of mechanical disk. While capacity and cost have grown explosively, hard drive performance has been flat. As a result, the performance per GB of disk (its IOPS density) has been getting exponentially slower! Download this white paper to understand why flash memory is the key to resolving this crisis and how your organisation can benefit.
Download whitepaper

Advanced threats: the new world order

Today's sophisticated cyber attackers are willing to invest significant time, energy and resources to tailor their attacks to a particular target. These advanced persistent threats (APTs) are becoming a critical consideration for improving your security tactics.
Download whitepaper

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map