2024 eNewsletters |
June - Featuring |
Editor's Comment: It's high-fives all round this month with articles that offer five top tips for your network. First, Martin Saunders at Highlight brings IT observability into focus, giving us five ways that IT operations can increase their use of data to improve decisions and create quantifiable advantages... |
Observant IT
Martin Saunders at Highlight outlines the top 5 IT observability issues costing businesses time and money - and how to solve them |
Click here for the full contents.. |
May - Featuring |
Editor's Comment:This issue of the newsletter is following hot (very hot!) on the heels of the 2024 Network Computing Awards, which took place on May 23rd at an awards ceremony in London's Bloomsbury... |
It’s the office, but not as we know it
Principle Networks' Ian Wharton considers the future of the wireless network - and why the office we knew no longer exists |
Click here for the full contents.. |
April - Featuring |
Editor's Comment:Welcome to the April edition of the newsletter, where AI and the Cloud are looming large on the horizon. First, Quantum's Skip Levens gives us three best practice principles for getting to grips with artificial intelligence... |
Testing times
Guy Arieli at BlinqIO provides an overview of software testing automation - and why it really matters |
Click here for the full contents.. |
March - Featuring |
Editor's Comment:March has seen the release of Kaseya's 2024 MSP Benchmark Report, the company's annual audit of the state of play in the managed service providers' market, which this year sourced input from 1,000 MSPs from the Americas... |
You shall not pass!
It’s time to embrace the future of authentication and move towards passwordless, according to David Higgins at CyberArk |
Click here for the full contents.. |
February - Featuring |
Editor's Comment:We're focusing on the future of networks this month with articles that forecast the key industry trends for the coming year. First, Zyxel's Kevin Drinkall outlines three key major trends for networking in 2024... |
Forecasting the network space in 2024
HPE Aruba Networking's David Hughes gives us his top 5 networking and security predictions for 2024 |
Click here for the full contents.. |
January - Featuring |
Editor's Comment:The new year brings with it new resolutions and predictions - but we shouldn't be too quick to turn our back on the old, at least when it comes to IT. A new report from ETB Technologies this month has found that, while managed service providers... |
A commitment to agility
Network Computing catches up with Sam Chu, CEO and founder of Polywell Computers, a PC manufacturer with a unique focus on the small-to-mid-size marketplace |
Click here for the full contents.. |
2023 eNewsletters |
December - Featuring |
Editor's Comment:As is traditional we're ending the year with a look to the future (minus the Slade accompaniment) with articles that outline the path ahead for Wi-Fi and connectivity. First, Kalam Meah at TP-Link considers how businesses can embrace the next stage of connectivity with Wi-Fi 7... |
10 Wi-Fi Predictions for 2024 and beyond
The Wireless Broadband Alliance gives us ten predictions for 2024 that could change the way wireless technology is used |
Click here for the full contents.. |
November - Featuring |
Editor's Comment:Welcome to the November issue of the Network Computing Newsletter, where digital transformation and the cloud are high on the agenda. First Jon McElwee, cloud specialist at iomart, offers a guide to modernising monolithic legacy systems by moving to a microsystems environment... |
IoT and the future of networking
Alan Hayward at SEH Technology looks at the opportunities posed by IoT, the importance of reliable networks in this new era, and how integrations can be successful |
Click here for the full contents.. |
October - Featuring |
Editor's Comment:From cybersecurity to videogames, the skills shortage in the UK is being felt across a range of technology sectors, including our own. Gartner expects that demand for tech talent will "greatly outstrip supply" until at least 2026 based on forecast IT spend, and a new report from Opengear featured in the news... |
To 5G - and beyond!
Keysight Technologies’ Dylan McGrath gives a guide to the future of non-terrestrial network (NTNs) and the era of democratised connectivity |
Click here for the full contents.. |
September - Featuring |
Editor's Comment:In this issue of the newsletter you’ll find cybersecurity articles that range from A-Z (or at least from AI to zero trust). First, Daniel Hofmann, CEO at Hornetsecurity takes a look at the security implications of generative AI, which is now being utilised as a tool in both security defence postures and attacks... |
Observing the edge
Combining observability with edge computing ensures greater productivity and efficiency, according to Sascha Giese at SolarWinds |
Click here for the full contents.. |
August - Featuring |
Editor's Comment:This issue of the newsletter features two new product reviews fresh from the Network Computing test lab. First our reviewer David Mitchell looks at the AirCheck G3 Pro, NetAlly’s latest cost-effective, ruggedised handheld Wi-Fi 6 Wireless analyser. Expanding and improving on some of the features of the AirCheck G2... |
Closer to the edge
Edge infrastructure is what the UK's regions need for digital transformation, according to Wendy Shearer at Pulsant |
Click here for the full contents.. |
July - Featuring |
Editor's Comment:Are UK IT professionals in SMEs getting the advice they need when it comes to choosing the best cloud and security solutions for their business? According to new research from Sharp this month less than half of those surveyed in the UK felt knowledgeable enough on the benefits of cloud (40%) and IT security (44%) |
Expanding the cybersecurity workforce
Leon Ward at ThreatQuotient outlines five ways your business can bridge the cybersecurity skills gap to find and retain top talent |
Click here for the full contents.. |
June - Featuring |
Editor's Comment:With this year’s Infosecurity Europe taking place at ExCel London this week we thought it would be fitting to keep the focus on cybersecurity in this month’s newsletter. First, Will Dixon, Director of Academy & Community, ISTARI, considers whether the way forward for cyber education... |
Securing our hybrid future
How can we ensure the successful mitigation of threat as remote working evolves? John Michael at iStorage gives us his view |
Click here for the full contents.. |
May - Featuring |
Editor's Comment:It’s been a busy month here at Network Computing with the main event being the 2023 Network Computing Awards, which took place at the Radisson Blu Edwardian in London’s Bloomsbury on 18th May. This is the 17th year of the Network Computing Awards, which once again celebrated the best networking technology... |
Finding the ideal IT partner
Rachel Thorne at Espria outlines the key questions you need to ask to ensure you have the right IT partner |
Click here for the full contents.. |
April - Featuring |
Editor's Comment:We've a bumper issue of the newsletter this month ahead of our big event in May, the 2023 Network Computing Awards. You still have time to crown your networking champions for this year by voting on the awards website, with voting closing on 9th May - that's the day after the coronation bank holiday appropriately enough! |
Localised training programmes: A solution for the UK tech skills shortage
Zeshan Sattar at CompTIA explains how localised training programmes could hold the key to solving the tech skills crisis |
Click here for the full contents.. |
March - Featuring |
Editor's Comment:We're offering a right royal welcome to this month's newsletter, where we have articles that look at how to best leverage and protect an asset that's precious to all businesses |
Protecting your organisation's crown jewels: production data
How do you avoid exposing critical data while still being able to effectively build applications to the highest standard? |
Click here for the full contents.. |
February - Featuring |
Editor's Comment:Few would argue that the modern workplace has permanently changed as a result of the pandemic, for better or worse. |
Shadow IT's clue to hybrid working engagement
With the right to WFH set to become enshrined in UK employment law, employee experience management is now critical - and businesses need to understand and improve the quality of the hybrid working environment |
Click here for the full contents.. |
January - Featuring |
Editor's Comment:We're kicking off the new year here at Network Computing with some dates for your diary, as nominations for the 2023 Network Computing Awards are now open |
The top five network trends for 2023
Douglas Wadkins at Opengear identifies the trends businesses must consider in 2023 to ensure their network is operationally fit-for-purpose |
Click here for the full contents.. |
2022 eNewsletters |
November - Featuring |
Editor's Comment:The internet of things ain't what it used to be, with current forecasts predicting that the number of IoT devices worldwide will rise to around 30 billion in the next few years |
Supermicro - Accelerating AI at Scale
AI architecture must scale effectively without sacrificing cost efficiency, which is why process and partnerships are critical, according to Supermicro |
Click here for the full contents.. |
October - Featuring |
Editor's Comment:It's close to midnight, and something evil's lurking in the dark - so it's a good job October is about more than just halloween then. |
Zeroing in on Cyber Security Awareness Month
Smarter Technologies put zero trust in the spotlight for October |
Click here for the full contents.. |
September - Featuring |
Editor's Comment:Arcserve has just released the key findings from its annual independent global research study, which show that the loss of critical data continues to disrupt businesses and remain an issue for organisations. |
Downtime doldrums and smart solutions
Alan Stewart-Brown at Opengear considers the top trends for networks that want to stay one step ahead of downtime |
Click here for the full contents.. |
August - Featuring |
Editor's Comment:After being delayed by the July rail strikes and following hot on the heels of the heatwave (in all senses)... |
How the Internet of Things is reaching maturity
After many years of hype IoT is finally maturing to a point where organisations are turning strategies into reality and planning into action, according to Phil Beecher, CEO and President, Wi-SUN Alliance |
Click here for the full contents.. |
July - Featuring |
Editor's Comment:It's been a busy time here at Network Computing as the 2022 Network Computing Awards will be taking place on Thursday 21st July... |
Stay aware of ransomware
Florian Malecki at Arcserve offers 5 steps companies should take to protect themselves from ransomware attacks |
Click here for the full contents.. |
June - Featuring |
Editor's Comment:Are we suffering from a cybersecurity identity crisis? According to the new CyberArk 2022 Identity Security Threat Landscape Report... |
Zero Trust in hybrid and remote working
Kevin Peterson at Xalient explores the security implications of hybrid and remote working for today's enterprise |
Click here for the full contents.. |
May - Featuring |
Editor's Comment:We have a busy issue of the newsletter for you this month ahead of the 2022 Network Computing Awards, which take on place on 23 June... |
Bridging the technology skills gap
Does diversity in cybsecurity actually matter? Ciara Campbell at Tenable gives us her take |
Click here for the full contents.. |
April - Featuring |
Editor's Comment:Are we suffering from a cybersecurity identity crisis? According to the new CyberArk 2022 Identity Security Threat Landscape Report... |
A resilient approach to hybrid working
Hybrid working presents a number of security challenges for IT teams. Rodolphe Harand at YesWeHack looks at how to address them |
Click here for the full contents.. |
March - Featuring |
Editor's Comment:The past two years of accelerated remote working have unquestionably strained our network usage, resulting in some significant internet outages.... |
Only the earliest detection beats security breaches
Organisations are failing to understand the true value of their networks as a critical tech asset, according to Phil Dunlop at progress |
Click here for the full contents.. |
February - Featuring |
Editor's Comment:With the recent release of the UK Government's updated Cyber Security Strategy: 2022 to 2030 now seems like the perfect time to look at the role risk assessment... |
Demystifying 5G
There are still many misconceptions that need clarification when it comes to 5G, according to David Fraser at Intel |
Click here for the full contents.. |
January - Featuring |
Editor's Comment:With the UK government suddenly declaring that there's no longer any need to work from home (the timing of the announcement being entirely unrelated to the ongoing revelations about Number 10 lockdown parties...
|
Why software quality is vital in a digital-first world
Dr. Gareth Smith, Keysight's General Manager of Software Test Automation, explains why software quality now determines business success |
Click here for the full contents.. |
2021 eNewsletters |
December - Featuring |
Editor's Comment:As the year draws to a close and the UK Government's Plan B comes into effect it seems that, for many of us, remote working and all things...
|
Out of NetOptions?
Alan Stewart Brown, VP of EMEA at Opengear, explains how NetOps and network automation enhance the value of network engineers |
Click here for the full contents.. |
November - Featuring |
Editor's Comment:New research from Inmarsat has highlighted that the accelerated adoption of IoT networks during the pandemic has not been without its own set of challenges.
|
Riding the tidal wave of digital transformation
Jay Alexander, Chief Technology Officer, Keysight Technologies offers a guide to getting to grips with digital transformation and hybrid working |
Click here for the full contents.. |
October - Featuring |
Editor's Comment:This month's newsletter comes hot on the heels of the 2021 Network Computing Awards, which took place on Thursday 21st at the Leonardo Royal London.
|
The foundation for IoT success is business strategy
Experts from across the industry share their security insights as part of this year's Cybersecurity Awareness Month |
Click here for the full contents.. |
September - Featuring |
Editor's Comment:We've a busy issue of the newsletter this month ahead of our big networking event in October, the 2021 Network Computing Awards. |
The foundation for IoT success is business strategy
When it comes to IoT the potential for our lives, businesses and industries to transform and improve has never been greater, according to Peter Ruffley at Zizo. |
Click here for the full contents.. |
August - Featuring |
Editor's Comment:It's something of a surprise to discover that, according to Databarracks' recently released 2021 Data Health Check, the sudden and vast increase in remote working in the past year hasn't resulted in an equal growth in unplanned IT downtime. |
Prevention is better than cure
How businesses can strengthen their cybersecurity posture against the evolution of ransomware |
Click here for the full contents.. |
July - Featuring |
Editor's Comment:The dreaded return to commuting after working from home has taken a new twist for Northern Rail passengers in the past week... |
Securing dispersed networks in the era of hybrid work
Rodney Joffe at Neustar examines how our new era of work is highlighting the need to strengthen network security |
Click here for the full contents.. |
June - Featuring |
Editor's Comment:The COVID crisis has accelerated the adoption of cloud services for organisations and industry sectors alike, and to this end we have several articles in this issue of the newsletter that focus on digital transformation... |
The genie is out of the bottle - and needs guidance
What's the point in returning to regular on-premises work if you can also work remotely in the cloud? |
Click here for the full contents.. |
May - Featuring |
Editor's Comment:This week marked the third anniversary of the introduction of the GDPR. A cause for celebration? "The GDPR changed the way that companies collect and manage personal data... |
From one edge to another
Kris Beevers at NS1 explains why edge networking should not be confused with edge computing |
Click here for the full contents.. |
April - Featuring |
Editor's Comment:As the phrase 'post-pandemic' is now thankfully being used with increasing frequency we have several articles this month that look at the potential long-term ramifications of the pandemic |
Data protection in a post-pandemic environment
Adam Strange, a Data Classification Specialist at Titus, identifies the key processes and technologies business must adopt in the wake of COVID-19 |
Click here for the full contents.. |
March - Featuring |
Editor's Comment:For many of us March will mark a full year of lockdown. Few of us would've believed that we'd still be 'WFH' and wearing masks twelve months on |
Storage performance monitoring
Paessler AG explain why storage performance monitoring should be a standard part of every intelligent monitoring solution |
Click here for the full contents.. |
February - Featuring |
Editor's Comment:'Life on the edge' might be an all too apt way to describe the past year, but when it comes to edge computing the next twelve months seem unquestionably brighter. |
Optimising and securing device management in a corporate environment
Is there a device management solution powerful enough to support your corporate needs? Nadav Avni at Radix Technology offers a guide |
Click here for the full contents.. |
January - Featuring |
Editor's Comment:Welcome to our first newsletter of the new year. We're starting 2021 with several articles that examine what the next twelve months might have in store for our industry |
5G predictions for 2021
Jeremy Spencer, General Manager of Corporate Propositions, BT Enterprise, explains how 5G can better enable the digital transformation journey |
Click here for the full contents.. |
2020 eNewsletters |
Decemeber - Featuring |
Editor's Comment:2020 really is the gift that keeps on giving - assuming you're a cybercriminal. According to the recently released 2021 Cyber Security Industry Report 2021... |
Adding up the cost of a financial data breach
How can financial services organisations keep their confidential information secure to safeguard their data and reputation?... |
Click here for the full contents.. |
November - Featuring |
Editor's Comment:We may have passed the halfway point of the November lockdown but it remains a uniquely challenging and uncertain time for businesses... |
Object Storage to Tape
Fujifilm archiving software combines S3 with record write speed and maximum security... |
Click here for the full contents.. |
October - Featuring |
Editor's Comment:We had to take a slightly circuitous route to get here but we are pleased to announce that the winners of the 2020 Network Computing Awards have now arrived! In a normal year... |
Meeting the tests to get out of data lockdown
Digital transformation of any business has always been hampered by making sense of underlying data. And that data has been growing in volume at an unprecedented rate driven... |
Click here for the full contents.. |
September - Featuring |
Editor's Comment:We start this issue with the news that there's just a week left to vote on the 2020 Network Computing Awards. The awards were originally planned for April this year... |
Hackers for hire
Hacker for hire groups are on the rampage globally, leaving a trail of destruction in their wake. The right cyber resilience strategies must be put in place to counteract this growing threat |
Click here for the full contents.. |
August - Featuring |
Editor's Comment:If you're still finding the 'new normal' to be anything but then we have several articles for you this month that tackle the ever-present subject of remote working and all things... |
Why it's critical to use a comprehensive SD-Branch platform
Imagine enterprise networking without cumbersome stacks, exhausting on-site support, or costly backup connectivity |
Click here for the full contents.. |
July - Featuring |
Editor's Comment:According to a new report from Bitdefender "Half of infosec professionals (50%) revealed that their organisations didn't have a contingency plan in place... |
Transform or be disrupted
Data management and digital transformation are a significant opportunity for organisations with a view to the future. David McLeman, CEO at Ancoris, explores the opportunity |
Click here for the full contents.. |
May - Featuring |
Editor's Comment:This is our first newsletter since March for reasons that I'm sure are all too apparent. |
The process framework
Effective cybersecurity needs to be structured. A security framework like SASE could be a good place to start. Nathan Howe, Director of Transformation Strategy at Zscaler explains how to avoid the pitfalls |
Click here for the full contents.. |
March - Featuring |
Editor's Comment:I think it's safe to say that March hasn't exactly gone to plan for any of us, and for the first time the Network Computing team has wrapped the latest issue with the entire office working remotely |
Secure edge to edge
Hopeful assumptions that cloud providers will secure data are misplaced. Aron Brand, CTO at CTERA, offers some insight to help cloud-driven organisations ensure their end-to-end security |
Click here for the full contents.. |
February - Featuring |
Editor's Comment:We've a bumper issue of the newsletter this month as the build-up to April's Network Computing Awards continues. If you haven't voted already then be sure to visit the awards website |
Evolving cybersecurity
Cybersecurity is still a young industry but it's growing fast. Theresa Lanowitz, Director of Cybersecurity Communications at AT&T Cybersecurity thinks we are at a critical point in cybersecurity's evolution |
Click here for the full contents.. |
January - Featuring |
Editor's Comment:We're beginning the new year with a bang here at Network Computing with the news that nominations are now open for the 2020 Network Computing Awards. |
Knock, knock...
With testing and monitoring in place, building security around privileged credentials in the cloud is significantly important. Nick Bowman, EMEA Senior Manager at CyberArk shares an insight |
Click here for the full contents.. |
2019 eNewsletters |
November - Featuring |
Editor's Comment:We're fast approaching that most wonderful time of the year once again. Yes, nominations for the 2020 Network Computing Awards will be opening in just a matter of days!... |
Resilient or redundant?
Confusion regarding these two important network measures could cause operational chaos. Steve Cummins, VP at Opengear suggests that they are very different and that businesses must understand them better... |
Click here for the full contents.. |
October - Featuring |
Editor's Comment:We've a stack of security features for you this month � quite literally so in the case of the opinion piece from Andrew Bushby, UK director at Fidelis Cybersecurity... |
Cabling for Wi-Fi
The latest design standard for Wi-Fi requires an intelligent approach to cabling in order to derive full benefit. Valerie Maguire, Director of Standards & Technology at Siemon offers an informed insight... |
Click here for the full contents.. |
September - Featuring |
Editor's Comment:At the time of writing Greta Thunberg, the sixteen year-old Swedish climate change campaigner, is powerfully chastising world leaders at the United Nations Climate Summit... |
Are you compliant?
Most organisations established their GDPR compliance With a flurry of activity - but have they verified it since? Andrew Eden of Netpremacy explains... |
Click here for the full contents.. |
August - Featuring |
Editor's Comment:5G continues to make the headlines with Nicky Morgan, the UK's Digital Secretary, launching a �30 million UK-wide competition to spark a tech revolution in countryside communities |
Share the risk
Cybersecurity planning should begin with the basics. Mark Rodbert, CEO at idax Software explains the role of identity and access management |
Click here for the full contents.. |
July - Featuring |
Editor's Comment:We've now passed the first anniversary of the introduction of the GDPR - so what kind of a year has it been? Well this month has seen the Information Commissioner's Office (ICO) . |
Tick tock...
Following a cyber incident, there's a narrow window of opportunity to analyse, recover and comply. Daniel Saunders, Senior Incident Response Consultant at NTT Security offers some insight |
Click here for the full contents.. |
June - Featuring |
Editor's Comment:Since our last issue the 2019 Network Computing Awards have taken place at an evening ceremony in London on 2nd May. |
Beyond speed
5G will offer much more than is currently understood. David Millar, Business Development Director at Axians UK explains how it will revolutionise business |
Click here for the full contents.. |
April - Featuring |
Editor's Comment:The Easter break is fast approaching and so too is the deadline for voting on this year's Network Computing Awards. |
Transformation culture
Digital transformation makes huge promises, but its not just about the technology. Terry Storrar, Sales Director at MCSA explains the role of culture in the digital transformation journey |
Click here for the full contents.. |
March - Featuring |
Editor's Comment: We've got our head in the cloud this month with several articles offering an update on the state of play in cloud computing. |
Data protection: global disadvantage?
GDPR is live. Daryl Crockett, CEO of ValiDatum gives us her thoughts on how it is shaping up, asking if it really can lead to greater consumer data protection |
Click here for the full contents.. |
February - Featuring |
Editor's Comment: New year, new awards! We're pleased to announce that nominations for the 2019 Network Computing Awards are now open... |
Robotic Process Automation
Getting started with a significant new technology like AI is a challenge. Amyn Jaffer, Head of Intelligent Automation at Ultima explains the first formidable step along the 'Intelligent' Automation journey... |
Click here for the full contents.. |
January - Featuring |
Editor's Comment: New year, new awards! We're pleased to announce that nominations for the 2019 Network Computing Awards are now open... |
IoT in the shadows
BYOD is a thing of the past - or is it? Gary Cox, Technology Director for Infoblox in Western Europe, explores the troubling rise of Shadow IoT and how to detect it... |
Click here for the full contents.. |
2018 eNewsletters |
October - Featuring |
Editor's Comment: We've something of a security focus this month, with several articles that consider how we can best manage the ever-shifting attack surface.... |
The currency of blockchain
Blockchain is more - much more - than Bitcoin. Jonathan Wilkins, Marketing Director at EU Automation explains how blockchain can automate a range of business processes... |
Click here for the full contents.. |
September - Featuring |
Editor's Comment: We've something of a security focus this month, with several articles that consider how we can best manage the ever-shifting attack surface.... |
The identity foundation
Following up on a discussion at Infosecurity Europe with Editor, Ray Smyth, Andy Heather, VP and Managing Director, EMEA at Centrify... |
Click here for the full contents.. |
August - Featuring |
Editor's Comment: We've something of a security focus this month, with several articles that consider how we can best manage the ever-shifting attack surface.... |
Acting bad for good
Is it possible to act like a cybercriminal for good? Ram�n Vicens, CTO at cyber threat intelligence company Blueliv discusses fighting crime... |
Click here for the full contents.. |
June - Featuring |
Editor's Comment: Endpoint security is a topic we return to regularly in Network Computing, and a new survey by LogMeIn underlines the importance of doing so.... |
IoT Network Management
Management of the underlying IoT network is becoming increasingly critical to the IoT mission, explains... |
Click here for the full contents.. |
May - Featuring |
Editor's Comment: Artificial intelligence and machine learning are among the top buzzwords in the industry at the moment, and we here at Network Computing.... |
Intelligence that is artificial
AI-based cybersecurity is not an 'install and leave' option. Ken Gilmour, CTO at invinsec explains why... |
Click here for the full contents.. |
April - Featuring |
Editor's Comment: Since our last newsletter the 2018 Network Computing Awards have taken place at the Radisson Blu Edwardian in London.... |
The AI Sanity Check
Professor Peter Cochrane explains what happens as we step onto the second run of the artificial intelligence ladder... |
Click here for the full contents.. |
March - Featuring |
Editor's Comment: At the time of writing the NC team is busily (very busily!) preparing for the 2018 Network Computing Awards, which take place on 22nd March at the Raddison Blu Edwardian in London's Bloombsury... |
Could you be a hacker?
AI seems well positioned to improve business process and operations, but can it also help to deliver better IT?... |
Click here for the full contents.. |
February - Featuring |
Editor's Comment:First the bad news - nominations for the 2018 Network Computing Awards finalists have now closed. The good news however is that this year's finalists will be announced shortly... |
Could you be a hacker?
Artificial intelligence is everywhere, but what does AI mean exactly and, critically, what opportunities does it promise? ... |
Click here for the full contents.. |
January - Featuring |
Editor's Comment:First the bad news - nominations for the 2018 Network Computing Awards finalists have now closed. The good news however is that this year's finalists will be announced shortly... |
Could you be a hacker?
Gradually, organisations are realising that they need to achieve more effective security. Raef Meeuwisse, ISACA governance expert & author, recommends that you think like a cybercriminal.... |
Click here for the full contents.. |
2017 eNewsletters |
December - Featuring |
Editor's Comment:It's that most wonderful time of the year once again. Yes we've been making a list and checking it twice, and are happy to announce that nominations are now open for the 2018 Network Computing Awards... |
The sin of ignorance
Ransomware is crippling UK businesses - and it's now time for organisations to act, according to Anthony O'Mara of Malwarebytes... |
Click here for the full contents.. |
November - Featuring |
Editor's Comment:Why should the WAN miss out when it comes to all things software-defined? This month we have two articles that outline the appeal of software-defined wide area networks... |
Network security disorder
In crypto security random numbers are critical. Richard Moulds, General Manager at Whitewood Security... |
Click here for the full contents.. |
October - Featuring |
Editor's Comment:We're putting the emphasis on the D in GDPR this month with several articles focusing on the role of data... |
The people premium
Kirill Kasavchenko at Arbor Networks explains why technology alone won't secure your network |
Click here for the full contents.. |
September - Featuring |
Editor's Comment:We�re putting the emphasis on the D in GDPR this month with several articles focusing on the role of data... |
A revolution in data storage
Two European Managers from Fujifilm Recording Media - Richard Alderson, Head of Recording Media in the UK and Ireland and Franca Stevan, Head of Recording Media in Italy - discuss the current state of play for tape technology |
Click here for the full contents.. |
August - Featuring |
Editor's Comment:We�re putting the emphasis on the D in GDPR this month with several articles focusing on the role of data... |
A cyber security movie
Discovery at the speed of data is growing across a range of applications. But how can it be connected to actionable outcomes for I.T.? Mark Boggia |
Click here for the full contents.. |
May - Featuring |
Editor's Comment:Digital transformation is a hot topic at the moment � and it probably can�t come quick enough for the NHS, particularly in the wake of this month�s ransomware attack... |
Is the cybersecurity industry too entrenched?
Tackling contemporary malware with a decade old mindset won't do, according to Sean Sullivan at F-Secure |
Click here for the full contents.. |
April - Featuring |
Editor's Comment:April is always one of the busiest months in the Network Computing calendar - particularly when the NC Awards are held right at the end of March!... |
The Internet of communications
Nick Hawkins at Everbridge explains how IoT can enable structured critical communications for the benefit of all |
Click here for the full contents.. |
March - Featuring |
Editor's Comment:Who needs New Year�s resolutions when you can make New Year�s nominations instead? You still have until the end of this week to make your nominations for the finalists of the 2017 Network Computing Awards... |
The digital value platform
A lack of platform integration standards will impede digital transformation. Chris Harding of The Open Group explains why |
Click here for the full contents.. |
February - Featuring |
Editor's Comment:We've got something of a bumper issue of the newsletter this month, all part of the build-up for the main event in March - namely the Network Computing awards... |
What's lurking in the sandbox?
At one time the sandbox was a safe haven. Dick Bussiere, Technical Director at Tenable Network Security provides some insight into what might be lurking there |
Click here for the full contents.. |
January - Featuring |
Editor's Comment:Who needs New Year�s resolutions when you can make New Year�s nominations instead? You still have until the end of this week to make your nominations for the finalists of the 2017 Network Computing Awards... |
Networking in the New Year
David Galton-Fenzi of Zycko and Nuvias Group gives his top five networking predictions for the year ahead... |
Click here for the full contents.. |
2016 eNewsletters |
December - Featuring |
Editor's Comment:It's that most wonderful time of the year once again when we here at Network Computing put up our festive banners and deck the NC halls with signs of good cheer... |
What's in a name?
With DNS-based attacks once again making headlines, Herv� Dh�lin of EfficientIP explains the risks... |
Click here for the full contents.. |
November - Featuring |
Editor's Comment: We've keeping a keen eye on the network this month with several pieces on network monitoring. Ravid Circus, VP Products at Skybox, explains how automated network monitoring... |
Monitoring the hybrid network
A hybrid cloud environment presents new risks to services and data. Rob Farmer, Senior Director at Ipswitch... |
Click here for the full contents.. |
October - Featuring |
Editor's Comment:It seems as if one of the most notable 'contributions' to October's National Cyber Security Awareness Month initiative will be last week's massive DDoS attack on DNS... |
The best of both worlds
Andrew Stuart at Datto makes the case for hybrid cloud |
Click here for the full contents.. |
September - Featuring |
Editor's Comment:Autumn is upon us and so too is IP Expo Europe, which takes place on the 5-6th October 2016 at London�s ExCeL... |
VDI: it's your move
Atchison Frazer at Xangati explains the essentials for a successful virtual desktop infrastructure |
Click here for the full contents.. |
August - Featuring |
Editor's Comment:The Internet of Things, cloud computing and BYOD represent some of the biggest security challenges to our IT infrastructure... |
Cyber security must be a C-Suite priority
Adam Boone of Certes Networks asks why cyber security experts are not involved from day one in every strategic decision |
Click here for the full contents.. |
July - Featuring |
Editor's Comment:Brexit is a done deal (well, not done exactly) but what will the UK�s departure from the EU mean for the GDPR? The EU General Data Protection Regulation won�t come into effect until 24th May 2018... |
Tackling the General Data Protection Regulation
If you take the right steps now then you�ll have nothing to fear from GDPR, writes Brian Chappell at BeyondTrust |
Click here for the full contents.. |
June - Featuring |
Editor's Comment:We�ve a decidedly cloudy outlook to things in June - but we�ll leave talk of Brexit for future issues and instead concentrate on cloud computing for now. Two new reports on the state of cloud adoption in the UK... |
A promising trajectory
ISACA International President Christos Dimitriadis on the demand for skills-based cybersecurity training |
Click here for the full contents.. |
May - Featuring |
Editor's Comment:There's a lot of talk about digital transformation in the industry this month as evidenced by two newly released studies. Brocade's latest global research, featured in the news section... |
Losing network control
Michael Hack at Ipswitch explores the challenge of controlling IT complexity |
Click here for the full contents.. |
April - Featuring |
Editor's Comment:The EU General Data Protection Regulation (GDPR) was finally passed on April 14th and will come into effect by early 2018 - meaning that we all need to start planning... |
EU data: in or out?
Alessandro Porro at Ipswitch on preparing your business for the EU's General Data... |
Click here for the full contents.. |
March - Featuring |
Editor's Comment:There's only one place for us to start this month and that's at the tenth annual Network Computing Awards, which were held on March 17th. The evening ceremony, held at the Hotel Russell... |
Smart data pipes
It's time to take a dynamic, rather than reactive stance towards the DDoS threat, writes... |
Click here for the full contents.. |
February - Featuring |
Editor's Comment:We've got a bumper issue of the newsletter this month, the last one before the 2016 Network Computing Awards on March 17th. You still have until March 7th to cast your votes for this year's winners, so please... |
Beyond convergence
Andrew Pitkethly at Misco explains why hyper-convergence might be the network engineer's... |
Click here for the full contents.. |
January - Featuring |
Editor's Comment:The first Newsletter of the New Year feels like the perfect time to announce that the finalists for the 2016 Network Computing Awards have now been determined by online nominations and voting... |
Boosting security in the post-password workplace
David Howell at ManageEngine explains why the Secure Shell (SHH) key is the heir... |
Click here for the full contents.. |
2015 eNewsletters |
December - Featuring |
Editor's Comment:Just as we head towards the festive break the newly finalised EU data protection regulations have arrived like the Ghost of Christmas Yet to Come with portents of a grim future if we don�t change our ways... |
Timing is everything
Mikko Hannula at Coriant explains why a major upgrade in mobile network synchronisation is required |
Click here for the full contents.. |
November - Featuring |
Editor's Comment:A (hopefully) Happy Black Friday/Cyber Monday to you all! Retailers, consumers and IT managers alike have been bracing themselves for a huge surge in demand this week - but will those crucial websites stay up... |
Virtualised printing
What can be done to overcome the printing challenges in a virtualised and cloud-based... |
Click here for the full contents.. |
October - Featuring |
Editor's Comment:A slightly belated welcome to this month's newsletter! We're rapidly running out of days in the month, largely due to the fact that we've been moonlighting somewhat on our... |
Frictionless security
Adam Boone at Certes Networks outlines three principles for protecting applications... |
Click here for the full contents.. |
September - Featuring |
Editor's Comment:It seems we�re rapidly approaching events and awards season here in the office with IP EXPO Europe just two weeks away and the Computing Security Awards being held the same week... |
The law of things
Ruth Arkley, Associate and Nicola Fulford, Head of Data Protection and Privacy at Kemp Little... |
Click here for the full contents.. |
August - Featuring |
Editor's Comment:We�ve gone somewhat on the defensive this month with several articles looking at the best way to protect our network resources. Where should we draw the line when it comes to secutrity?... |
Visibility: software defined
Making the case for a single view of network traffic in the context of improved security |
Click here for the full contents.. |
July - Featuring |
Editor's Comment:There seems to be a growing realisation that sharing security intelligence is the way forward for combatting cybercrime, as evidenced by a new survey by The Aspen Institute and Intel Security... |
Virtual test networks
Don�t risk testing that new application on a production network! There is another way, writes Frank Puranik of iTrinegy |
Click here for the full contents.. |
June - Featuring |
Editor's Comment:Without wishing to step on the toes of our sister publication Computing Security we�ve a distinct focus on security issues in this month�s newsletter. But then there�s scarcely... |
Network data: balancing the load
Arya Barirani of Infoblox explains the benefits of Global Server Load Balancing |
Click here for the full contents.. |
May - Featuring |
Editor's Comment:We�re all well aware of the cyber threats that originate from outside our IT perimeters but now the focus is increasingly turning to the insider threat which, though rarely malicious... |
Tackling the cyber security skills shortage
What can organisations do to mitigate the IT security skills gap? |
Click here for the full contents.. |
March - Featuring |
Editor's Comment:The business and IT living together in perfect harmony? Perhaps it�s not quite as unlikely as it sounds! We begin this month with a thought-provoking piece from Ray Smyth,... |
IT and business unity
Network Computing editor Ray Smyth explains why IT and business people must unite as one |
Click here for the full contents.. |
February - Featuring |
Editor's Comment:It�s all systems go here for the 2015 Network Computing Awards, which are now just four weeks away. You�ll find a link to the voting page in the events section of this issue, so... |
Putting SDN in its rightful place
The world is changing - but not because of Software Defined Networking, according to Scott Strickland of IBM |
Click here for the full contents.. |
January - Featuring |
Editor's Comment:So how has your January gone so far? Dropped any massive, very public bombshells about the future of encryption in the UK, for example? As sound bites go David Cameron�s... |
The element of business security
Russell Horton, COO of Elitetele.com, on the importance of securing your business in an increasingly complex IT landscape |
Click here for the full contents.. |
2014 eNewsletters |
December - Featuring |
Editor's Comment:�The Nightmare Before Christmas� wasn�t a Sony production but the company is certainly in the middle of one now. This time last year the Sony PS4 was the must-have Christmas present for gamers, representing a significant upturn in the company�s recent fortunes... |
My network: everyone's stuff
Ray Smyth, Editor of Network Computing and Business Technology Mentor, considers some of the challenges concerning industrial scale network connectivity |
Click here for the full contents.. |
November - Featuring |
Editor's Comment:We've a bit of a network monitoring theme going on this issue, starting with an opinion piece from Rony Kay... |
The elements of effective network monitoring
Networks are getting faster and more complex - but have network monitoring and diagnostics kept up? |
Click here for the full contents.. |
October - Featuring |
Editor's Comment:The hybrid cloud and Software-defined networking (SDN) were two of the most talked about technologies... |
Improving the speed of business with an SDN-enabled data centre
Jean Turgeon of Avaya outlines what CIOs should know about the impact of SDN technology on the data centre |
Click here for the full contents.. |
September - Featuring |
Editor's Comment:Autumn's finally here and with it comes one of the biggest IT events of the year. Running from 8-9 October at... |
Managing your home network
As the Internet of Things become normality, who will be the IT admin at home?... |
Click here for the full contents.. |
August - Featuring |
Editor's Comment:So when was the last time you hugged your server? "Server hugger", in case you didn't know.... |
Going the extra mile
John Dickey, CTO of Talari Networks explains why organisations must improve the efficiency of their WANs |
Click here for the full contents.. |
July - Featuring |
Editor's Comment:So how was your SysAdmin Day? In case you missed it (possibly due to having too much work on)... |
Staying safe in the mobile world
Sean Newman, Security Strategist at Cisco, on the rise of mobile devices at work - and the risks they bring with them... |
Click here for the full contents.. |
June - Featuring |
Editor's Comment:We start this issue with a new acronym for the collection - one that might well strike fear into the heart of the typical network manager!... |
Bring Your Own ...what next?
Nick Bowman of F5 on turning consumer and user-led trends into an asset... |
Click here for the full contents.. |
May - Featuring |
Editor's Comment:It's a case of mind the gap this month - not just the IT skills gap but the apparent growing divide between the IT department and the boardroom. ... |
Help needed?
Mark Keepax of ASG Software considers whether IT professionals have lost sight of the end-user... |
Click here for the full contents.. |
April - Featuring |
Editor's Comment:If there was any doubt that April is a big month for security issues then the discovery of the Heartbleed bug has underlined the fact... |
The future and you
With the season of IT shows upon us, Network Computing Editor and Business Technology Mentor... |
Click here for the full contents.. |
March - Featuring |
Editor's Comment:March is always a hectic month here at Network Computing - but in a good way! This year's Network Computing Awards took... |
The future and you
Ray Smyth, editor of Network Computing and Business Technology mentor considers the shape of things to come... |
Click here for the full contents.. |
February - Featuring |
Editor's Comment:Welcome to this month's newsletter. January is a distant, soggy memory and the year's networking calendar is now in full swing... |
Network profit
Andy Singleton, Director of Product Development at Masergy, explains why a performing network is also a profitable one..
|
Click here for the full contents.. |
January - Featuring |
Editor's Comment:Rail fares are up and Easter eggs are in the shops - it must be January! Welcome to the first Network Computing newsletter for 2014... |
When network operations meet security
As threat vectors evolve there is an increasing crossover of responsibilities between network operations and network security. |
Click here for the full contents.. |
|
2013 eNewsletters |
December - Featuring |
Editor's Comment: We begin this December issue with the not entirely festive news that 58% of IT professionals will be on standby for a Christmas call-out despite planned holidays, according to a new survey commissioned by... |
IP control for big data
Scott Breadmore of Efficient IP explains why the basics of network management will become even more important with the arrival of big data... |
Click here for the full contents.. |
November - Featuring |
Editor's Comment: Welcome to the November edition of the Network Computing Newsletter. Last month we covered NASA�s struggles with its public cloud strategy and now the International Space station (ISS) has experienced... |
A question of authenticity
Are authentication services sowing the seeds of their own security failure? If you�re working remotely then you must ensure that you manage and protect your identity, writes Steve Watts, co-founder of SecurEnvoy... |
Click here for the full contents.. |
October - Featuring |
Editor's Comment: Welcome to the second edition of the Network Computing newsletter. We lift off this issue with an article by Campbell Williams of Six Degrees Group on why NASA�s cloud strategy has been brought... |
Is NASA's data lost in space?
A recent report has revealed that it's not just the cloud over Cape Canaveral that's been troubling NASA of late, writes Campbell Williams, group strategy and marketing director, Six Degrees Group... |
Click here for the full contents.. |