More IT articles

Chief data officers: the new ‘Big Data czars’?

14 July 2014

The chief data officer is an emerging position tasked with overseeing projects that aim to derive value from enterprise data sets: some observers think that CDOs could assume a defining role in shaping corporate success for the next 10 years.

Comment: Avoiding the black hole of software development

14 July 2014

Sometimes the ‘cheap’ option in a software project can end up being a lot more expensive, says Tim Fellows.

Invasive species: how ICT helps tackle the aliens

14 July 2014

Not all of the many hundreds of species designated ‘invasive’ have detrimental impacts on their adopted environments, but a lot of them do. Now the unintended consequences of globalisation are exacerbating the problem. Can information and communications technology help track the challenges?

Legal and ethical aspects of cyber warfare

14 July 2014

Nato’s Cooperative Cyber Security Center of Excellence put cyber conflicts at the centre of its two recent international gatherings, CyCon in Tallinn, Estonia, and the Ethics of Cyber Conflict workshop in Rome, Italy. E&T went along to both.

Software Reviews: Password managers

14 July 2014

The recent eBay data breach highlighted the importance of using unique and secure passwords.

How many security researchers does it take to hack a light bulb?

04 July 2014

How many cyber-security researchers does it take to hack a light bulb? About six, according to one firm, which has demonstrated that the manufacturers of the growing number of connected devices in our homes appear to have a security blind spot.

Analysis: Why investors are paying top dollar for Uber

27 June 2014

More than 12,000 black-taxi drivers descended on London this month to protest the rise of taxi app Uber, with Mayor of London Boris Johnson expressing his sympathy for their cause. The company was recently valued at around $17bn in advance of its IPO, so why are investors willing to pay so much?

HyperCat: Interoperability on the Internet of Things

27 June 2014

The rise of The Internet of Things is gathering pace, but unlike the heady days of the early Web big corporations have got a head start and are building it around proprietary solutions that refuse to cooperate. Is there a way to break down the barriers?

WW1: First World War communications and the 'Tele-net of Things'

16 June 2014

The exigencies of the 1914-1918 conflict meant that electronic communications on the Allied side had to find new ways to interoperate both on the battlefield and on the Home Front: but can the beginnings of 2014's interconnected domains be found in innovations that came out of the necessities of that war?

WW1: First World War technology: Room 40 secret intelligence unit

16 June 2014

After hostilities commenced in August 1914 the Admiralty's secret intelligence unit, Room 40, stepped-up its monitoring and codebreaking operations against Germany, providing the British armed forces with tide-turning information about the enemy's plans. This second of a two-part series highlights Room 40's operations from the outbreak of hostilities to the war's end.

Analysis: do router security problems foreshadow IoT hacks?

02 June 2014

Nothing is safe on the Internet, including your home router. That may already have been hacked – but if the world becomes as connected as companies are hoping, that could be the least of your worries.

Router vendors responding to growing attacks

19 May 2014

Router vendors are rapidly responding to the fact that hackers are turning their dastardly attentions to the internetworking devices that manage the Internet's data traffic flow.

First World War technology: Room 40 secret intelligence unit

19 May 2014

In the lead-up to the outbreak of hostilities in August 1914, Britain recognised the role telegraphy and wireless would play in the conflict, and took steps to stay ahead in the communications war. In advance of next month's First World War centenary issue, we plot the birth of the secret intelligence unit, 'Room 40'.

Retail security: XP expires as new POS-centric malware steps-up

18 May 2014

For many shopkeepers Windows XP was a cheap and capable operating system on which to run their applications – but Microsoft has ended its support of XP as new retail-targeting malwares have appeared. And will new point-of-sale models prove any safer?

Enterprise mobile security: defending the wireless realm

14 April 2014

Corporate smartphones, which process tasks previously done on secured PCs, now require the same protection against snooping and malware – and security providers are lining up to provide intermediate safeguard systems.

Analysis: What lessons can be learned from the Heartbleed fiasco?

12 April 2014

The continuing furore over the Heartbleed bug holds important lessons for the IT industry, both about the way it responds to major incidents and also the way software is produced.

The rise of the thinking machines

31 March 2014

At the intersection of Big Data and artificial intelligence computers are quickly beginning to rival the decision making power of humans raising questions about how much responsibility should be ceded to machines.

Modelling and simulation innovation: just do the math

14 March 2014

Modelling and simulation tools are increasingly using powerful maths and physics computations to engineer a wider range of products faster and more accurately.

Analysis: When was the Web really invented?

12 March 2014

12 March 2014 marks 25 years since the birth of the protocol and mark-up language that has made the Internet familiar to anyone who has accessed a computer or smartphone. But is this really the anniversary of the World Wide Web?

The Web at 25 – is it showing its age?

12 March 2014

From humble beginnings the World Wide Web has become the backbone of modern civilisation, but the inability of its creators to foresee its meteoric rise has resulted in shaky foundations.

Technology brands top for value in 2014

10 March 2014

Apple's success in pioneering new types of product has helped it top a global league table that assesses the value of corporate brands.

Hannover Messe 2014: e-vehicle technology powers ahead

10 March 2014

E&T magazine is again a preferred media partner for this year's Hannover Messe showcase of industrial and engineering technology innovation. This last of three previews surveys in brief the technology-specific trade shows that make-up Hannover Messe 2014 - and includes details of FREE ENTRY for IET members.

Analysis: Why reports of bitcoin’s demise missed the point

07 March 2014

Mt. Gox's demise rocked the bitcoin community, but, like San Francisco's occasional earthquakes, it was not entirely unexpected.

Embedded technology powers cyber-physical systems

13 February 2014

The embedded computers used to control industrial machinery are starting to talk among themselves – and it's a process that could change the way we program managing systems.

Display technology: coming to a screen near you

13 February 2014

Digital signage and display screen technologies are getting closer together – and are now integral to helping us find our way in the world.

Turing Lecture 2014 speaker interview: Dr Bernard Meyerson

12 February 2014

IBM’s vice president of innovation Dr Bernard Meyerson wants to change the future. Not simply in the direction of IT, but in using computers to sidestep traffic gridlock, deadly diseases, and energy blackouts. 

How utilities are profiting from Big Data analytics

20 January 2014

Suppliers of electricity, gas and water to European homes and businesses are finding ways to analyse the vast volumes of data their new smart systems are generating in order to gain insights in customer trends and operational efficiencies.

Technological singularity and transhumanism - new world for old

20 January 2014

Will technology provide a perfect future for the ascent of man? Or is it wishful thinking by techno-pundits who want to believe human progress is all toward a utopian state of existence?

Noise from electronic circuitry causes design headaches

20 January 2014

Design teams are trying to find ways to overcome the apparently random nature of electronic interference.

Dr Brian May on stereographic photography

20 January 2014

Brian May might well be best known as a virtuoso musician of world renown, and most of us will be aware that his doctorate is in astrophysics, but he is also a world expert on early stereographic photography technology.

Mark Surman, outfoxing the cookie monster

20 January 2014

The Mozilla Foundation believes that the best way to increase user power on the Internet is to turn users into creators. We talk to executive director Mark Surman about how this could be achieved.

Cyber-psychopathy: what goes on in a hacker's head

20 January 2014

What goes on inside the hacker mind? How are their thought processes shaped by social and technological change? And could techniques like Neuro-Linguistic Programming help to turn talented but misguided IT personnel away from a beckoning Black Hat career?

Data storage technology rethought

16 December 2013

Storage technology is getting a rethink. It might seem straightforward - but it isn't. Alongside the pros and cons skirmishing between hard-disk and solid-state drives, new challenges are coming from data-intensive applications and the need to analyse massive data sets.

Interview with Jason Healey

16 December 2013

Jason Healey belongs to that rare breed of historians who have themselves made history. A qualified pilot, an experienced policymaker and respected academic, he founded a new scholarly discipline, History of Cyber Conflict, by putting together - 'A Fierce Domain: Conflict in Cyberspace, 1986-2012'.

Nasa's Control Centers: design and history

16 December 2013

The design, architecture and technology of Nasa's legendary Mission Control Centers reflects the 20th century's tempestuous history and represents an important part of America's cultural identity from that period.

Big Analogue Data - why bigger isn't always better

15 October 2013

Big data sets are valued for the patterns and trends that they reveal when analysed by equally massive computing resources, but scientists are now questioning whether bigger is always better when it comes to deriving value from the analogue world.

Healthcare identity assurance - warding off fraud

15 October 2013

The healthcare industry is under attack, with imposters, fraudsters and cyber-criminals pretending to be people they are not to acquire personal patient data. But the ID theft clampdown has begun.

Whatever happened to Broadband over Power Line?

15 October 2013

It looked like a meeting of technologies that promised much in principle, but the marriage of high-speed data and mains electricity supply has proved to be a challenge too far for the engineers hoping to channel broadband over power lines.

How to disarm an infrastructure hacker

14 October 2013

The media has been full of reports of cyber-attacks on critical infrastructure, but the fear is that there is far worse to come.

The State vs The People

14 October 2013

As the world becomes ever more digitised, the uneasy relationship between personal privacy and national security grows increasingly complex.

Identity - how safe are you online?

14 October 2013

With more and more people living out large parts of their lives online, cybercriminals are finding endless new ways of stealing identities.

Software reviews: Web browsers

14 October 2013

If you have only ever run the browser that came with your computer, an upgrade to something more modern could make using the Web both faster and safer.

News analysis: Should retailers push for a digital Christmas?

30 September 2013

The lead up to Christmas would not be the same without frantic, last-minute shopping trips, packed shopping centres and, of course, retailers pushing for purchases by any means necessary to avoid disappointing sale figures. Yet industry experts are urging retailers to switch their usual tactic of employing the ‘traditional’ selling channels, and instead adopt innovative technology to boost sales.

Hacking the Internet - bringing down infrastructure

17 September 2013

Why should hackers try to disable computers when they might be able to set their sights higher? Routers can be just as vulnerable as servers, so why not bring down the entire Internet?

Re-building the server - microprocessors to memory moves

16 September 2013

Concern over attributes like energy consumption is set to radically change the way computer servers are designed – but will we at last be able to move away from the conventions that have dominated design for the last 20 years?

Interview - Evgeny Morozov

16 September 2013

Technologists seek out problems in order to demonstrate their problem-solving technologies. And the Internet isn't the answer to everything, says Evgeny Morozov.

News analysis: Social media data security under the spotlight

29 August 2013

In 1999, Friends United first hit the social media radar, shortly followed by MySpace, Facebook, Twitter and most recently Snapchat and Vine. Initially designed for social interaction, social media channels now process other traits. 

News analysis: Calculating the true cost of cyber-crime

28 August 2013

While governments state that cyber security is now one of their top national challenges, the overall cost-impact cyber security is incurring – both in terms of necessary investment and damaging outcomes following an attack – is far from clear.

Bridging the divide: simple software combats isolation in the developing world

22 August 2013

Charities frequently talk about building bridges with the developing world, and one NGO has been building bridges for them since 2001. But thanks to a new software tool designed by young engineers in the UK the time is in sight when they will no longer have to.

Biometric authentication is reality not fiction

12 August 2013

Biometric authentication is finding more and more parts of the human body to prove we really are who we say we are. But will it ever fulfil the promise of so many sci-fi representations? And will it ever be worth pursuing in preference to simpler checks?

Latest Issue

E&T cover image 1511

"Do-It-Yourself in technology is becoming a quietly subversive act against prescriptive globalisation, as well as a general force for good"

E&T jobs

More jobs ▶


Choose the way you would like to access the latest news and developments in your field.

Subscribe to E&T