Shop cart

Welcome

Information technology

Providing information on aspects of information technology for members and the public.

IT Factfiles

 

Communicating by email - a good practice guide Communicating by email - a good practice guide

This factfile provides a best practice guide designed to aid members and the public communicate by email

Communicating by Email - A good practice guide

Computer based SCS Computer based safety critical systems

This factfile provides an introduction for members and the public to computer based safety critical systems and their uses

Computer Based Safety Critical Systems

Cloud computing Cloud computing (part 1): an introduction to cloud computing

This paper introduces cloud computing and examines key factors in its design, implementation and adoption

Cloud Computing (part 1)

Cloud computing part 2 Cloud computing (part 2): commercial opportunities and business cases

An introduction to the commercial opportunities and business cases for cloud computing

Cloud Computing (part 2)

Cloud computing part 3 Cloud computing (part 3): the security challenge

An introduction to the security challenges for cloud computing

Cloud Computing (part 3)

Cloud computing part 4 Cloud computing (part 4): procurement and commissioning

An introduction to the challenges for procurement and commissioning of cloud computing

Cloud Computing (part 4)

Demand attentive networks (DAN) Demand attentive networks

Creating the perception of unlimited bandwidth in an untethered fibre-wireless world.

Demand attentive networks

e-Business reference centre e-Business reference centre

This factfile provides a list of useful ICT related internet sites which may be of use to members, business and the public

e-Business reference centre

Formal Methods Formal methods

An introduction to formal methods for systems and software development

Formal Methods

Identity Management Identity management: myths and realities

This factfile provides an introduction for members and the public to identity management, including the myths and realities that surround this topic

Identity Management: Myths and Realities

Open source Open source software

The shift to open source software is one of the most important current trends in technology, yet it is surprisingly little discussed compared with other developments - including those that, ironically, have only been made possible by the adoption of open systems

Open source software

Dates potentially causing problems in computer systems from 2001-2100 Potential problem dates for computers

This factfile provides a list of potential dates which may cause problems for computer systems between 2001-2100 for members and the public

Potential problem dates for computers

Radio frequency identification device technology (RFID) Radio frequency identification device technology (RFID)

This factfile provides an introduction for members and the public to radio frequency identification (RFID) technology and its uses

Radio frequency identification device technology (RFID)

 

IT position statements from the IET

 

Digital Britain – Illegal file sharing Digital Britain - illegal file sharing

An introduction to illegal file sharing and government plans to legislate against it

Digital Britain - Illegal File Sharing

Information Assurance Information assurance strategy

This position statement provides an introduction for members and the public to information assurance and its uses

Information Assurance Strategy

Information security - with opportunity comes risk Information security - with opportunity comes risk

Better information security with a little help from the IET and ISAF

Information Security - with opportunity comes risk