RSS - BCS: Latest Business Articles
  • Castle On Island
    Information security used to be simple. We locked doors, bolted windows, and that was sufficient. We took our cues for IT security architecture design from the same places, castles, walls, defence in depth, onion models, and network security based models positioned against external attack. These risks are not entirely the whole story says Ralph O’Brien MBCS.
  • Tablet Showing Graph
    Enterprise resource planning (ERP) implementation methodologies have evolved over the years to cover all possible aspects of an implementation project, but they have not necessarily kept up with developments in the ERP packages themselves.
  • Data Graph
    David Reynolds, Chair of the PROMS-G, the specialist group for project and programme management, explains the role of the group and its various activities.
  • Woman With Thought Bubble
    What enterprise cloud computing actually is, how it differs from cloud computing, how it extends the cloud stack to include business process as a service (BPaaS), and how it makes the new business service generation more agile.
  • Hand On Touchscreen
    Biometric authentication holds a lot of promise for identity and access management. Industry analysts laud the new technology and jostle to take the stand as the authority on the subject.

Related Publications

Cloud computingCloud Computing
The articles in this ebook provide practical information and advice on various aspects of cloud computing.

Mobile Computing: Securing your workforceMobile Computing
Written by security experts this ebook looks at the pitfalls and solutions of a mobile workforce.

A Manager's Guide To IT LawA Manager’s Guide to IT Law
A comprehensive guide that discusses IT-related legal issues.