Articles & blogs by Computing Staff

Legal issues behind technology mergers & acquisitions

jonathan-snade
Jonathan Snade of Thomas Eggar LLP explains what the legal issues are for buyers and sellers in an increasingly competitive market
28 Jul 2014

European cloud standardisation guidelines: what’s it about?

dierick-antoon-dla-piper1
Patrick Van Eecke and Antoon Dierick, of law firm DLA Piper, explain what the European Commission is doing to help firms standardise on cloud contracts
17 Jul 2014

What will the government's new data retention bill mean for UK businesses?

eversheds
James Walsh, head of telecoms, and Liz Fitzsimons, data protection specialist at Eversheds LLP discuss the new bill's implications
17 Jul 2014

It's a matter of distrust: Utilities in the age of transparency

Neil Kinson, vice president EMEA, Redwood Software, examines why the utility sector is falling behind its retail and US counterparts
15 Jul 2014

Applying best practice risk management in IT projects

Dennis Sheehan, senior training consultant at ILX Group, explains how IT projects must be run in order to minimise risk
08 Jul 2014

Using technology to improve Wimbledon

Sam Seddon, Wimbledon client executive at IBM, explains how new analytics is driving user engagement at the tennis championships
07 Jul 2014

What makes the ideal security analyst?

QA Training's Mark Amory explains what skills are necessary for a security analyst in order to deal with people, processes and technology
02 Jul 2014

Avoiding the storm clouds: cloud-based document storage and disclosure obligations

Elinor Thomas, senior associate at law firm DLA Piper, gives advice on how to avoid potentially expensive complications in cloud-storage agreements
26 Jun 2014

The biggest big data projects

There’s big data and then there’s really big data. These are the big data goliaths. Stuart Dommett, Intel Business IT Evangelist, takes a look at the largest big data projects of all time
20 Jun 2014

Is £266bn just the tip of the cybercrime iceberg?

Mark Sparshott, EMEA director at Proofpoint, argues that the EU is doing a good job at focusing business minds on security
19 Jun 2014

What makes the ideal security engineer?

QA's Mark Amory highlights the key qualities that firms are looking for in a security engineer
16 Jun 2014

Tweetdeck 'hack': rudimentary, but still widely shared

The XSS vulnerability in Tweetdeck showed just how easily scripts can be run on user devices from a simple security flaw.
12 Jun 2014

Delays in IT programmes - what to do when things go wrong - Part 2

Simon Kenyon, partner and head of IT litigation at DLA Piper, and Philip Hay-Jahans, senior manager at Boxwood continue their advice on what to do when IT programmes run into trouble
09 Jun 2014

What makes the ideal chief information security officer?

QA technical consultant Mark Hutchings explains which skills are prerequisites for a role as CISO
05 Jun 2014

Delays in IT programmes - what to do when things go wrong

Simon Kenyon, partner and head of IT litigation at DLA Piper, and Philip Hay-Jahans, senior manager at Boxwood, explain how to investigate the causes of project delays
05 Jun 2014