Patching and security updates have eaten the most into IT technicians' time over the last three years, while licencing is responsible for the most expenditure from IT budgets, research by Computing has revealed. Over 100 IT professionals ...
Tags: IT Budget
Major cloud providers such as Google, Amazon and Facebook will "gobble up" the competion as smaller providers struggle to compete with what the giants have to offer. That's what Josko Grljevic, information systems director for ...
The demand for improved telecom connectivity in Canada's North is real, says a new Conference Board of Canada report, and "the interest in the issue has never been greater". Published by the Centre for the North, "Mapping the Long-Term ...
Tags: Consumer Electronics
Computerworld - Corporate attitudes toward bring-your-own-device (BYOD) policies appear to fall into one of three categories, according to a survey of IT users released this week: There's no official BYOD policy, devices are banned, or no ...
Tags: BYOD Policies
Attackers are actively targeting Internet-connected industrial control systems (ICS) in an effort to compromise their operation, according to data collected from a global network of honeypot systems that simulate water pumps. The ICS ...
A new report from the SANS Institute and RSA on help desk security and privacy finds help desk workers are the easiest victims for a determined social engineering criminal. Due to metrics and basic job requirements, end user and network ...
Tags: Computer Products, software
New research has shown that the vast majority of businesses are exposing sensitive corporate data to cyber-criminals by failing to implement effective BYOD strategies. The report, released this week, found that just over half of the 570 ...
Tags: Computer Products, software
Hewlett-Packard plans to stop supporting the venerable operating system OpenVMS in 2020. Long valued for its reliability and renowned for breakthrough features, OpenVMS came into being in October 1977, when Digital Equipment Corp. started ...
Tags: Computer Products, software
The complexity of existing IT systems is acting as a major barrier to the adoption of cloud, with many CIOs unsure as to how to adapt to the technology, warns a report by ICT services provider NTT Europe. Based on the views of 300 CIOs ...
Tags: Computer Products, Cloud Adoption, software
AT&T has invested $16 million in international Network Disaster Recovery programme. AT&T, a telecommunications company, has welcomed IT professionals from around the globe to its Business Continuity and Disaster Recovery Forum, held from ...
Tags: AT&T, Disaster Recovery Drill, Network Disaster Recovery, Global Network
Oracle's recent upgrade to its online forums has divided the portal's many users, with some saying the update brings welcome changes but others claiming it is bug-riddled and inferior to its predecessor. After the revamped Oracle ...
Tags: Oracle, Online Forums
The average organisation believes it would spot a data breach in 10 hours, a McAfee global survey of IT professionals has found. But is that result good, indifferent or an indication of the downright complacent? The firm’s ...
Tags: Data Breaches, McAfee
Middle Eastern businesses want to invest in IT during 2013, but they’re struggling to find skilled candidates to fill posts, according to new research released by CompTIA, a non-profit association for the IT industry. According to ...
Tags: Middle East, IT Pros
BYOD, cloud and virtualisation will transform the role of the IT manager from technical specialist to central business communicator, according to new research by Aruba Networks. Aruba’s ‘20/20 Vision’ report, which was ...
Tags: BYOD, IT Manager
Check Point has published its second mobile security report, revealing that 79% of businesses had a mobile security incident in the past year, in many cases incurring substantial costs. The report found mobile security incidents cost more ...