2018 Issues |
January - Featuring |
Editor's Comment:With so many media channels devoted to reporting the minutiae of the latest cyber incident, it is easy to forget the inevitability of risk. |
 PDF Version |
AI, your business and the IT infrastructure
AI seems well positioned to improve business process and operations, but can it also help to deliver better IT? Birger Lie... |
Click here for the full contents.. |
2017 Issues |
December - Featuring |
Editor's Comment:With so many media channels devoted to reporting the minutiae of the latest cyber incident, it is easy to forget the inevitability of risk. |
 PDF Version |
IoT at scale
The opportunity afforded by IoT is immense and diverse, but deployment needs some help. Nick Sacke, Head of IoT and Products at Comms365... |
Click here for the full contents.. |
September - Featuring |
Editor's Comment:Like any industry, applied IT and its practitioners are inevitably influenced by the hype and trends that surround it... |
 PDF Version |
Network security disorder
In crypto security random numbers are critical. Richard Moulds, General Manager at Whitewood Security explains why a good random number is hard to find... |
Click here for the full contents.. |
August - Featuring |
Editor's Comment:In thirteen years of being Editor of Network Computing, I have witnessed a lot of changes... |
 PDF Version |
Closing the detection gap
The real-time detection of cyberattackS is about to get serious - and it's not optional. Matt Walmsley, EMEA Director at Vectra Networks explores the issues... |
Click here for the full contents.. |
May - Featuring |
Editor's Comment:Digital Transformation is a term that until recently was rarely heard but now, as they say, is
'growing legs'... |
 PDF Version |
The IoT security stand-off
Those deploying IoT must be more demanding concerning security; but should IoT vendors be more responsible too? ... |
Click here for the full contents.. |
April - Featuring |
Editor's Comment: A recent speech made at the Usenix Enigma security conference by Dr Ian Levy, the Technical
Director at the UK's National Cyber Security Centre, caused a bit of a kerfuffle... |
 PDF Version |
Lean wireless networks
Cloud-based Wi-Fi estate management is one way to deliver utility class wireless networks in the context of limited I.T. resources. Steve Johnson... |
Click here for the full contents.. |
January - Featuring |
Editor's Comment:Considering my introduction to the final edition of Network Computing for 2016 ("Don't
wait for change, cause it")... |
 PDF Version |
Line of DEMARCation
The UK government has adopted DMARC to protect UK Citizens. Patrick Peterson, Founder and Executive Chairman of Agari and a founding member OF DMARC... |
Click here for the full contents.. |
2016 Issues |
November - Featuring |
Editor's Comment:I am writing this introduction on a cold but sunny November day having just learned
the outcome of the American Presidential Election.... |
 PDF Version |
Monitoring the hybrid network
A hybrid cloud environment presents new risks to services and data. Rob Farmer, Senior Director at Ipswitch explains how network monitoring can help... |
Click here for the full contents.. |
September - Featuring |
Editor's Comment:As the politicians of the UK and EU exchange banter and even plan for what
seems to be the inevitable exit of the UK from the EU, life goes on. |
 PDF Version |
A cloud of uncertainty
Preparing for Brexit is fraught with problems. Nick Brackney, product marketer at ExtraHop explores the Brexit climate change challenge... |
Click here for the full contents.. |
July - Featuring |
Editor's Comment:Well, it happened. On the 23rd of June 2016, the United Kingdom, through a
national referendum, voted to leave the EU. Already the Science and
Research sector has spoke |
 PDF Version |
Hyper critical
Hyper-convergence is gaining traction. Sushant Rao, Director of Product and Solutions Marketing at DataCore considers its effect on storage infrastructure... |
Click here for the full contents.. |
May - Featuring |
Editor's Comment: If there was one piece of advice I would offer to IT and networking professionals at this precise time, it would be these two things [sic]... |
 PDF Version |
Losing network control
IT teams fear losing control of business transactions, apps and infrastructure. Michael Hack, Senior VP at Ipswitch explores the challenge of controlling IT complexity... |
Click here for the full contents.. |
March - Featuring |
Editor's Comment: In the last issue of the magazine I suggested that IT and network professionals need to step up and take a leadership role in the use of IoT in their own organisation - but I didn't mention customers... |
 PDF Version |
The key to securing IoT data
CEO of Covata, Trent Telford, explains why key management is critical to securing the Internet of Things... |
Click here for the full contents.. |
January - Featuring |
Editor's Comment: Just as the network perimeter has vanished, much the same has happened to the ownership of IT and the organisation’s network... |
 PDF Version |
Freedome for Business from F-Secure
Mobile devices present a major security challenge for businesses and yet it seems that their employees just can't do without them... |
Click here for the full contents.. |
2015 Issues |
November - Featuring |
Editor's Comment:With product announcements ranging from the trivial to the bizarre, the Editor distils the essence of those that are of interest to the Networking community... |
 PDF Version |
The Network Computing Masterclass series...
.… going beyond technology and product. This Network Management Masterclass series is in association with Paessler AG. |
Click here for the full contents.. |
September - Featuring |
Editor's Comment: If, as it is suggested, IT technology is in some way to blame for a botched high profile football transfer, it once again illustrates the dependency organisations have placed upon the IT network ... |
 PDF Version |
The right move for web security
The UK's largest property website, Rightmove, explains how WhiteHat has helped them to improve and underpin... |
Click here for the full contents.. |
July - Featuring |
Editor's Comment: At first reading I thought it was good news that IT spending is forecast by Gartner to reach $3.5 trillion during 2015... |
 PDF Version |
It's the data, stupid!
Salo Fajer, CTO at Digital Guardian explains why the most effective way to keep information secure must centre on protecting the data... |
Click here for the full contents.. |
May - Featuring |
Editor's Comment: Have you noticed that the subject of data is rapidly rising up through the noise level of IT discussions? Have you noticed people who (and I generalise) know nothing... |
 PDF Version |
Secure Apps, secure business
In order to fully secure business assets, Ade Foxall, CEO of Camwood believes that an upgrade in approach is... |
Click here for the full contents.. |
March - Featuring |
Editor's Comment: As you may know, it is now thought that the so-called ancient Chinese curse, "May you live in interesting times" ... |
 PDF Version |
The silicon safety net
Sandboxing as a security technology is often overlooked. Andrew Avanessian, EVP of consultancy and technology services at Avecto, ... |
Click here for the full contents.. |
January - Featuring |
Editor's Comment: Over 60% of UK SMEs expect their IT budget to increase in 2015, according to independent research by Cloud and Data Centre specialist, Node4... |
 PDF Version |
Big data, big security
When it comes to Big (unstructured) data, security is a process and not an objective. Guillermo Lafuente,... |
Click here for the full contents.. |