• Home
  • News
  • Big Data & Analytics
  • DevOps
  •  
    Security
    • Hacking
    • Privacy
    • Security
    • Technology
  • Internet of Things
  • OpenSource
  • Cloud & Infrastructure
  • Leadership
  • Events
  • Whitepapers
  • Top 100 CIOs
  • Research
  • SMB Spotlight
  • Newsletters
  • Sign in
  • Events
    • Upcoming events
      event logo
      Cybersecurity Strategy Briefing

      Investment Week in partnership with Computing are pleased to announce a half day briefing event focused on: Cybersecurity Strategy for Senior Technology and Security professionals of asset management firms to be held on Wednesday 5 October in London.

      • Date: 05 Oct 2016
      • Marriott Grosvenor Square, London, London
      event logo
      Big Data Virtual Summit

      The Big Data Virtual Summit will comprise expert keynotes, real world case studies and interactive discussion panels led by senior IT practitioners who will share their tips for Big Data technologies and data management strategies.

      • Date: 19 Oct 2016
      • Online
      event logo
      The UK IT Industry Awards

      The UK IT Industry Awards are the benchmark for excellence throughout the computer industry.

      • Date: 16 Nov 2016
      • Battersea Park Events Arena, London
      event logo
      Enterprise Security and Risk Management Summit 2016

      The Enterprise Security and Risk Management Summit is a leading annual conference that brings together over 200 CIOs and Senior IT professionals from across all industries to discuss and debate the most pressing security issues facing business today.

      • Date: 24 Nov 2016
      • To be confirmed, London
      View all events
      Online Panel Debates

      Computing hosts a series of online debates each with a panel of industry experts discussing trending topics. Register for upcoming and view previous debates on our webinar channel

      See more
  • Whitepapers
    • LATEST WHITEPAPERS
      Computing-resourcess-120x194
      In a ever increasing mobile world, traditional user authentication isn't good enough

      Security breaches are no longer just an IT problem. It is clear that organisations must hede recent warnings and look at deploying a multi-factor authentication method to keep up with ever-growing mobile workforce trend. This white paper looks at the benefits of multi-factor authentication. Download to learn more.

      Download
      Computing-resourcess-120x194
      Firewalls in the cloud: driving data further

      The growth in cloud computing capabilities and services has driven more data into places where traditional IT security measures cannot reach. This paper looks at the requirement for cloud application security, and how a the cloud firewall can deliver all of the benefits of traditional network security in a virtualised form-factor.

      Download
      Find whitepapers
      Search by title or subject area
      View all whitepapers
  • Top 100 CIOs
  • Research
  • Sign in
  •  
    •  

      Personalise your on site experience

      Download and use the apps

      Access your subscription from outside of the office

      Get relevant news and insight straight to your inbox

      Forgot your password?
     
     
      • Saved articles
      • Newsletters
      • Apps
      • Account details
      • Contact support
      • Sign out
     
  • Follow us
    • RSS
    • Twitter
    • LinkedIn
    • Newsletters
    • Apps
  • Register
  • SMB Spotlight
  • UC&C Spotlight
Computing
Computing
  • Home
  • News
  • Big Data & Analytics
  • DevOps
  • Security
  • Internet of Things
  • OpenSource
  • Cloud & Infrastructure
  • Leadership
 
  •  

    Personalise your on site experience

    Download and use the apps

    Access your subscription from outside of the office

    Get relevant news and insight straight to your inbox

    Forgot your password?
 
 
    • Saved articles
    • Newsletters
    • Apps
    • Account details
    • Contact support
    • Sign out
 

Computing

LATEST

bernard-wheeler
  • Software
Oracle: We’re cheaper for cloud than Amazon, Microsoft and, indeed, anyone else

Oracle cloud leader Bernard Wheeler touts the company as the most cost-effective cloud one-stop shop

  • 23 Sep
co-operative
  • Cloud and Infrastructure
Co-op Group puts Oracle HCM Cloud at the centre of its HR-driven business transformation
  • 23 Sep 2016
cloud and infrastructure review 2016
  • Cloud and Infrastructure
Computing Cloud & Infrastructure Review 2016
  • 22 Sep 2016
Champagne
  • Security
Announcing the Computing Security Excellence Awards
  • 15 Aug 2016
Guests at the UK IT Awards 2010
  • Leadership
The UK IT Industry Awards 2016 shortlist in full – are you in the running?
  • 30 Aug 2016

News continued

dead-twitter
  • Communications
Google, Salesforce and Verizon in the frame for Twitter acquisition
  • 23 Sep 2016
Yahoo Messenger desktop logo
  • Security
BT and Sky subcribers may be hit by Yahoo hack
  • 23 Sep 2016
GCHQ building in Cheltenham
  • Security
Cyber security startup accelerators to launch with GCHQ backing
  • 23 Sep 2016
cloud-infrastructure-2016-devops
  • Cloud and Infrastructure
How do you sell DevOps to a sceptical workforce?
  • 23 Sep 2016
Apple logo
  • Mergers and Acquisitions
Apple buys big data and machine learning firm TupleJump
  • 23 Sep 2016
nick-ioannou
  • Cloud and Infrastructure
Argue with your cloud vendors, advises expert panel
  • 23 Sep 2016
Ransomware graphic
  • Security
Ransomware is the biggest threat today: Join the Inq Debate
  • 23 Sep 2016
hazlitt-panel
  • Cloud and Infrastructure
Firms bemoan lack of cloud skills
  • 23 Sep 2016
mick-bradley
  • Storage
Why software defined storage has failed to take off, according to Kaminario
  • 22 Sep 2016

LATEST WHITEPAPERS

Computing-resourcess-120x194
In a ever increasing mobile world, traditional user authentication isn't good enough

Security breaches are no longer just an IT problem. It is clear that organisations must hede recent warnings and look at deploying a multi-factor authentication method to keep up with ever-growing mobile workforce trend. This white paper looks at the benefits of multi-factor authentication. Download to learn more.

Download
Computing-resourcess-120x194
Firewalls in the cloud: driving data further

The growth in cloud computing capabilities and services has driven more data into places where traditional IT security measures cannot reach. This paper looks at the requirement for cloud application security, and how a the cloud firewall can deliver all of the benefits of traditional network security in a virtualised form-factor.

Download
Computing-resourcess-120x194
The world is your digital oyster: optimise your business with digital transformation

Digital transformation is sweeping every industry. The pace of change is exponential, and for businesses willing to embrace this brave new world, the possibilities are limitless. Download now to learn more about the importance of including digital transformation into your company's and optimise your business objectives.

Download

News continued

British Gas van and support worker
  • Cloud and Infrastructure
British Gas says DevOps and a startup culture key to deriving cloud benefits
  • 22 Sep 2016
Cloud computing image
  • Cloud and Infrastructure
Mix of cloud environments may be best tactic, rather than single setup
  • 22 Sep 2016
amiga500-1
  • Cloud and Infrastructure
The top 30 Amiga games of all time! Part 1
  • 22 Sep 2016
sept-res-main-pic
  • Strategy
Computing research: Cloud first, cloud only or cloud never?
  • 22 Sep 2016
blake-cahill-philips
  • Ecommerce
How Philips CDO Blake Cahill brought order to a digital ecosystem
  • 22 Sep 2016
Oracle's Dermot O' Kelly
  • Cloud and Infrastructure
Cloud-wary UK 'is ready' for Oracle one-stop IaaS model, says UK boss
  • 22 Sep 2016
Metropolitan police cap badge
  • Cloud and Infrastructure
Capgemini and Oracle t-Police cloud ERP finds 'at least 40 per cent' savings for cash-strapped UK forces
  • 22 Sep 2016
mclaren-car1
  • Hardware
Apple NOT in talks with McLaren about an acquisition – McLaren
  • 22 Sep 2016
The automated future when robots do our bidding. Until they decide not to
  • Cloud and Infrastructure
IBM to collaborate with MIT to develop AI-based vision systems
  • 21 Sep 2016
Enterprise-security-monty-bar

Enterprise Security & Risk Management 2016

Ensuring your enterprise is cyber safe – book your place today!
Read More
Uk-it-industry-awards-monty

The UK IT Industry Awards 2016

The UK IT Industry Awards, the most prestigious awards ceremony in IT, is only weeks away. Book your table now!
Read More

Opinion

brian-spector-miracl-ceo
Brian Spector
Digital certificates are dead – killed by issues of scalability and trust
  • 20 Sep 2016
peter-sbarski-ephemeral
Peter Sbarski
Serverless technologies: the future of cloud
  • 15 Sep 2016
warrington-2
Vince Warrington
The evolving CISO: It’s not about IT – it’s about business
  • 14 Sep 2016
piggy-bank-drowning
Peter Gothard
£1m is not enough for government to kick start the UK’s future in IoT
  • 12 Sep 2016

Latest Edition

sept-16-cover
Latest issue – September 2016

View now

Most read

  1. Cyber security startup accelerators to launch with GCHQ backing
  2. How do you sell DevOps to a sceptical workforce?
  3. How the Apple Watch 2 compares to the Samsung Gear S3
  4. The top 30 Amiga games of all time! Part 1
  5. BT and Sky subcribers may be hit by Yahoo hack
  • Contact
  • Marketing solutions
  • Enterprise IT Events
  • About Incisive Media
  • Terms & conditions
  • Privacy policy
  • RSS
  • Twitter
  • LinkedIn
  • Newsletters
  • Apps

© Incisive Business Media

© Incisive Business Media (IP) Limited, Published by Incisive Business Media Limited, Haymarket House, 28-29 Haymarket, London SW1Y 4RX, are companies registered in England and Wales with company registration numbers 9177174 & 9178013

Digital publisher of the year 2010, 2013 & 2016

Digital publisher of the year 2010, 2013 & 2016