Topics Archive
Free guide to low-code & no-code platforms
Platforms that enable shadow IT are changing development roles and processes. Here's why it's time to embrace this new reality.
-
News
13 Feb 2024
Alation launches benchmark tool to assess data maturity
The data catalog specialist's new tool examines four key criteria, including literacy and governance, in assessing an organization's business intelligence culture. Continue Reading
-
Tip
13 Feb 2024
Top 8 ERP implementation best practices
Deploying a new ERP system is a risky endeavor. Learn how to reduce the risk of failure and increase the odds for success with these eight tried-and-true best practices. Continue Reading
-
Opinion
13 Feb 2024
Data management and governance key to successful AI use
AI's effectiveness is limited by data quality. Building strong data management and governance programs are crucial to handling the challenges that AI presents to organizations. Continue Reading
-
Tip
13 Feb 2024
How to conduct a social engineering penetration test
Social engineering attacks are becoming more sophisticated and more damaging. Penetration testing is one of the best ways to learn how to safeguard your systems against attack. Continue Reading
-
Feature
13 Feb 2024
New media could bring fresh competition to tape archive market
Tape has had the archive media market cornered for years, but newcomers including those working in DNA and glass could change that just as demand is set to increase. Continue Reading
-
News
13 Feb 2024
New variants of Qakbot malware under development
Despite its infrastructure having been taken down by the FBI last year, someone appears to be actively working on a new and improved version of the infamous Qakbot malware Continue Reading
-
News
13 Feb 2024
Pega GenAI Blueprint aims at application design processes
While the vendor's use of the technology is similar to others in the low-code market, its focus on design differentiates it. The platform enables collaboration. Continue Reading
-
News
13 Feb 2024
Proofpoint: 'Hundreds' of Azure accounts compromised
Proofpoint researchers found that the attackers manipulated the MFA of compromised accounts, registering their own methods to maintain persistent access. Continue Reading
-
Guest Post
13 Feb 2024
How passwordless helps guard against AI-enhanced attacks
With all the potential of generative AI comes a major downfall: malicious actors using it in attacks. Shifting from password-based authentication can help solve the challenge. Continue Reading
-
Definition
13 Feb 2024
RMM software (remote monitoring and management software)
RMM software (remote monitoring and management software) is a type of application that information technology (IT) service providers and departments use to maintain their clients' and business organizations' IT assets, infrastructure and systems. Continue Reading
-
Feature
13 Feb 2024
Ransomware preparedness kicks off 2024 summit series
BrightTALK commenced the new year with ransomware readiness, giving viewers workable tips to prevent and recover from a devastating attack. Check out some highlights here. Continue Reading
-
Tip
13 Feb 2024
Top 6 marketing automation certifications and courses
With the right marketing automation certifications, SMBs and small marketing teams can gain the skills and expertise needed to compete with larger companies in their markets. Continue Reading
-
Tip
13 Feb 2024
4 long-term data backup options
Data backups ensure copies of critical data are available in the event of a crisis or failure. When backing up long-term data, cost and capacity are vital considerations. Continue Reading
-
Tutorial
13 Feb 2024
How to find and customize your PowerShell profile
PowerShell is integral for many admins, and any way to streamline how they use the scripting tool is key. A PowerShell profile is one way to tailor a more streamlined approach. Continue Reading
-
News
13 Feb 2024
MSB strengthens Sweden’s national critical network with 5G
Comms tech and service company becomes part of Sweden’s next-generation mission-critical network infrastructure, Rakel G2, whose 5G core network is designed to ensure fast and secure sharing of voice, data, images and video Continue Reading
-
News
13 Feb 2024
Hunter-killer malware volumes seen surging
Latest Picus Security report on malware tactics, techniques and procedures reveals an increasing focus on disabling security defences Continue Reading
-
News
13 Feb 2024
Telia Lithuania offers businesses country-wide 800 Gbps service
Leading Baltic supplier of telecom services uses coherent optics to bring customers faster speeds, more capacity and greater service reliability Continue Reading
-
News
13 Feb 2024
Ignition Technology and CMS Distribution add more security depth
Distributors add to portfolios, with vendor signings in network and mobile threat prevention areas Continue Reading
-
News
13 Feb 2024
Distology gearing up for growth with leadership shuffle
Security distributor makes some internal moves to ensure it has the right people in place ahead of its fiscal year starting in April Continue Reading
-
Feature
13 Feb 2024
Channel explainer: How to make money out of GenAI
It’s tipped as the most important technology for a generation, but how are customers using it, can the channel make revenues from it and what are the risks? Continue Reading
-
Definition
13 Feb 2024
data mining
Data mining is the process of sorting through large data sets to identify patterns and relationships that can help solve business problems through data analysis. Continue Reading
-
News
13 Feb 2024
Integration of AI, legacy IT opens partner opportunities
Core in-house applications running on client-server systems and mainframes are candidates for a generative AI update, according to IT service provider executives. Continue Reading
-
Definition
13 Feb 2024
disk array
A disk array, also called a storage array, is a data storage system used for block-based storage, file-based storage or object storage. Continue Reading
-
News
13 Feb 2024
B4RN brings gigabit fibre internet to Northern England
Specialist in advanced broadband to rural homes, small villages, farms and dispersed settlements inks deal with AI-native networking company to future-proof communities and deliver equal access to digital services Continue Reading
-
News
13 Feb 2024
Oracle cloud: Generating value with AI
Is Oracle’s Fusion GenAI leap a bandwagon move or will it add real power to boost customer happiness? Continue Reading
-
Opinion
13 Feb 2024
STIR/SHAKEN – a possible technology answer to spoof and spam calls?
Justin Hamilton-Martin, director of product strategy, Enreach for Service Providers , looks at how those annoying robocalls can be reduced Continue Reading
-
News
13 Feb 2024
DSIT pumps £100m into biotech projects
The funding will be given to six engineering biology mission hubs, aiming to pioneer new technologies and address global challenges Continue Reading
-
Podcast
13 Feb 2024
Podcast: What are snapshots? Can they replace backup?
We talk to Shawn Meyers, field CTO at Tintri, who defines snapshots, why they are no substitute for backups, and the effect on recovery of snapshot granularity Continue Reading
-
News
13 Feb 2024
NHS England awards £1m for wireless tech trials
The funding is split between seven trusts, which will be running wireless technology pilots aimed at improving patient care and improving connectivity Continue Reading
-
News
13 Feb 2024
What will result from Cohesity’s Veritas acquisition?
The $7bn backup giant will leverage huge assets in enterprise customer base, compliance and governance intelligence, AI, R&D, and Kubernetes backup and storage Continue Reading
-
News
13 Feb 2024
Cisco delivers 800Gbps on Amitié transatlantic cable
Looking to enable rapid growth of cloud and artificial intelligence services, tech giant reveals transatlantic communications cable successfully transmits data at very high speed on 6,234km route from US to France Continue Reading
-
News
13 Feb 2024
Lack of tech skills making hiring more competitive, says Morgan McKinley
A lack of skilled workers is forcing hiring managers to use salary and benefits such as flexibility to compete for talent, according to research from global recruiter Morgan McKinley Continue Reading
-
E-Zine
13 Feb 2024
Intelligent defence – the role of data in the military
In this week’s Computer Weekly, we examine the role of data in tying together military operations across ground, air, sea and cyber. Has SAP finally convinced customers to migrate to cloud ERP? We assess the trends. And we talk to the CIO helping to set up the UK’s fastest supercomputer. Read the issue now. Continue Reading
-
Definition
13 Feb 2024
Risk Management Framework (RMF)
The Risk Management Framework (RMF) is a template and guideline used by companies to identify, eliminate and minimize risks. Continue Reading
-
Feature
13 Feb 2024
10 enterprise cloud backup services to consider in 2024
Cloud backup is a huge category of the data protection market today. With so many providers to choose from, businesses must prioritize the features they need. Continue Reading
-
Tip
13 Feb 2024
How to develop a business process in 8 steps
Well-designed business processes help organizations achieve their goals faster, but they require planning and effort. Follow these steps to develop processes that deliver value. Continue Reading
-
Tip
13 Feb 2024
How to improve and optimize a business process, step by step
The processes that form the backbone of modern business operations require continuous improvement to stay effective and efficient. Here is a method for improving them. Continue Reading
-
12 Feb 2024
Is SAP on the rise with cloud ERP?
This year represents a tipping point for SAP to convince cagey customers of the value of cloud enterprise resource planning. Continue Reading
-
12 Feb 2024
Data: the golden thread of military defence
Information is the lifeblood of warfare. From frontline fighters to logistics, manufacturing, R&D, and recruitment, data remains crucial. Continue Reading
-
Opinion
12 Feb 2024
AI news highlights: Gemini Ultra, Cisco-Nvidia partnership
Explore last week's AI highlights with analyst Mike Leone's roundup of top news headlines, including updates to Google's Gemini Ultra and strategic acquisitions and partnerships. Continue Reading
-
News
12 Feb 2024
Observe ties in Snowflake to slash observability costs
The emerging competitor to Dynatrace, Datadog and Splunk shuns AIOps, and its approach to data management and price tag intrigued one experienced customer. Continue Reading
-
News
12 Feb 2024
CISA warns Fortinet zero-day vulnerability under attack
CISA alerted federal agencies that a critical zero-day vulnerability in FortiOS is being actively exploited, though Fortinet has yet to confirm reports. Continue Reading
-
Feature
12 Feb 2024
Explore real-world use cases for multimodal generative AI
Multimodal generative AI can integrate and interpret multiple data types within a single model, offering enterprises a new way to improve everyday business processes. Continue Reading
-
Tip
12 Feb 2024
Benefits and challenges of managed cloud security services
The rapid drive to hybrid and multi-cloud environments has organizations scrambling to get proper protections into place. For many, external security support is critical. Continue Reading
-
Definition
12 Feb 2024
crisis management plan (CMP)
A crisis management plan (CMP) outlines how an organization should respond to a critical situation that if left unaddressed, could negatively affect its profitability, reputation or ability to operate. Continue Reading
-
Tip
12 Feb 2024
How to deploy and force updates with gpupdate
Group Policy can be a helpful tool during the troubleshooting process. Further, refreshing a system's Group Policy settings with gpupdate can solve plenty of issues. Continue Reading
-
Tip
12 Feb 2024
Mobile unified communications: Everything you need to know
Mobile unified communications is becoming an increasingly important strategy for businesses of all types and sizes. Here's everything you need to know about mobile UC. Continue Reading
-
News
12 Feb 2024
HPE's GreenLake for Block Storage goes GA
The third version of HPE block storage on the Alletra MP brings higher capacity and performance as well as an easier way for customers to scale out as needs change. Continue Reading
-
Definition
12 Feb 2024
password spraying
Password spraying is a cyberattack tactic that involves a hacker using a single password to try and break into multiple target accounts. Continue Reading
-
News
12 Feb 2024
Ericsson intros AI-powered premium 5G intent-based operations
Leading comms technology and service provider deploys artificial intelligence and automation use case libraries to simplify network operations by managing conflicting intents to meet desired business outcomes Continue Reading
-
Definition
12 Feb 2024
robotic process automation (RPA)
Robotic process automation (RPA) is a technology that mimics the way humans interact with software to perform high-volume, repeatable tasks. Continue Reading
-
News
12 Feb 2024
Channel roundup: Who's gone where?
Personnel moves this week at TD Synnex, Apogee, Sharp NEC Display Solutions, Logpoint, and Concurrent Technologies Continue Reading
-
News
12 Feb 2024
Channel can make money from generative AI
Generative artificial intelligence has gone from hype to use cases to become a growing channel opportunity Continue Reading
-
Opinion
12 Feb 2024
Why AI will push enterprises to eliminate the silos that slow innovation
Generative AI offers a way to transform developer productivity, by expediting a cultural shift in the way enterprises organise themselves Continue Reading
-
Tip
12 Feb 2024
How quantum networking and UC intersect
Quantum networking and unified communications might seem a long way off, but it's not too early to see how it might reshape UC. For one thing, hacking will be a lot more challenging. Continue Reading
-
News
12 Feb 2024
Jersey Telecom, RoamsysNext claim IoT game changer
Telco teams with development partner to introduce internet of things certification manager and solve network congestion and performance issues caused by uncertified IoT devices Continue Reading
-
News
12 Feb 2024
HHS, ONC Designate Additional QHINs for TEFCA Health Data Exchange
As QHINs, CommonWell Health Alliance and Kno2 can immediately begin supporting health data exchange under the Trusted Exchange Framework and Common Agreement (TEFCA). Continue Reading
-
Feature
12 Feb 2024
10 marketing trends to watch for in 2024
Marketers in 2024 must embrace AI, voice search, chatbots, personalized marketing, video, social commerce, influencers, VR, sustainability and big data for a competitive edge. Continue Reading
-
News
12 Feb 2024
Businesses brace for FCC's ban on AI robocalls
The FCC's ban on AI-generated robocalls comes in response to growing concern about bad actors using AI to mimic someone's likeness and voice to spread misinformation. Continue Reading
-
Definition
12 Feb 2024
Microsoft Copilot
Microsoft Copilot is an AI-powered tool that is primarily meant to support Microsoft 365 users with automation features for Word, Excel, PowerPoint, Outlook and Teams. Continue Reading
-
Definition
12 Feb 2024
Google Transfer Appliance
Google Transfer Appliance is a high-capacity storage server that enables enterprises to transport large volumes of data to Google Cloud Storage. Continue Reading
-
Definition
12 Feb 2024
guest operating system (guest OS)
A guest operating system is the operating system installed on either a virtual machine (VM) or partitioned disk. It is usually different from the host operating system. Continue Reading
-
News
12 Feb 2024
US works to develop AI standards while California legislates
California has proposed AI regulation as the U.S. works to develop AI standards by bringing together companies such as Apple, Amazon, Google and Microsoft. Continue Reading
-
Podcast
12 Feb 2024
Podcast: AI, hiring and the need for humans in the loop
An HR expert joins the 'Targeting AI' podcast to explain the need for humans in recruiting along with tech to help prevent algorithmic bias and why some laws don't go far enough. Continue Reading
-
News
12 Feb 2024
More than 1,000 subpostmasters could have used second faulty Post Office system
More than 1,000 subpostmasters could have used a previous faulty computer system in their branches as more people come forward with information following Post Office scandal TV drama Continue Reading
-
Opinion
12 Feb 2024
Executives must face down state-sponsored hacking groups targeting firmware
State-backed groups have ratcheted up the pressure for cyber security professionals and executives. But that’s not an excuse to cede them the territory. Continue Reading
-
News
12 Feb 2024
Virgin Media O2 switches on 2Gbps broadband, symmetrical speed options
XGS-PON technology-based Gig2 becomes first residential 2Gbps service from UK provider to go live for sale, designed to help power future technologies from AI to immersive and cloud gaming Continue Reading
-
Opinion
12 Feb 2024
A decade after breaking HMRC’s Aspire deal, the Post Office scandal exposes glaring similarities
HM Revenue & Customs finally broke from its £800m a year Aspire contract in 2016 - and the reasons have parallels with the Post Office scandal. Will government ever learn? Continue Reading
-
Feature
12 Feb 2024
Trends driving cyber security in 2024
While cyber security breaches are not going away, emerging threats are driving new and innovative approaches to IT security Continue Reading
-
Definition
12 Feb 2024
What is risk mitigation?
Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business. Continue Reading
-
Definition
12 Feb 2024
spatial computing
Spatial computing broadly characterizes the processes and tools used to capture, process and interact with three-dimensional (3D) data. Continue Reading
-
Tip
12 Feb 2024
Top metaverse cybersecurity challenges: How to address them
As the metaverse takes shape, companies must consider a slew of new cybersecurity challenges and how to deal with them. Continue Reading
-
Feature
12 Feb 2024
34 AI content generators to explore in 2024
Artificially generated media continues to progress. Learn about the different types of media and content generators to check out in 2024. Continue Reading
-
Blog Post
11 Feb 2024
The UK PSTI Act and its implications for the print market
The UK Product Security and Telecommunications Infrastructure (PSTI) Act will come into effect on 29 April 2024. The product security aspect of this act stipulates a new regulatory scheme to make ... Continue Reading
-
Feature
09 Feb 2024
Building for ESG now will help with future regulations
To keep pace with evolving ESG regulations, companies will need to coordinate with and gather data from all parts of the business. And laying the groundwork now will pay off. Continue Reading
-
News
09 Feb 2024
DigitalOcean now offers daily backup capability for VMs
The latest feature for IaaS cloud provider DigitalOcean enables daily backups and faster recoveries, but enterprises still require more for mission-critical workloads. Continue Reading
-
Feature
09 Feb 2024
Manufacturing group uses AI for EHS safety compliance
To pinpoint risky and dangerous incidents in workplace environments without having to sift through thousands of data points, a manufacturing group turned to Benchmark Gensuite. Continue Reading
-
Tip
09 Feb 2024
Upskill your cloud team for success
An investment in people is an investment in the company. See how a trained and upskilled staff can have a positive impact on productivity and profits. Continue Reading
-
Opinion
09 Feb 2024
11 more alternative desktop and app virtualization vendors
Many organizations turn to the biggest desktop virtualization vendors for size and scale reasons, but smaller vendors that occupy a niche are worth knowing as well. Continue Reading
-
Feature
09 Feb 2024
A who's who of cybercrime investigators
Cybercrime investigations are more than just first response. Learn about the patchwork of organizations that work together to combat international cybercrime. Continue Reading
-
Tip
09 Feb 2024
Microsoft Dynamics 365 vs. Salesforce: How do they differ?
Microsoft Dynamics 365 and Salesforce both help organizations streamline sales, service and marketing processes. Yet, they differ in architecture and integration capabilities. Continue Reading
-
News
09 Feb 2024
The outlook for open source? Growing, but there are challenges
While more companies are using open source technologies, not everyone may realise it Continue Reading
-
News
09 Feb 2024
Amazon defends facial-recognition tech sale to FBI despite moratorium
The FBI has confirmed it is using Amazon’s Rekognition image and video analysis software, but Amazon says it is ‘false’ to suggest this violates the company’s self-imposed moratorium on selling facial-recognition technology to US police Continue Reading
-
Tip
09 Feb 2024
Understand the pros and cons of enterprise password managers
Almost half of breaches occur because of compromised credentials. Using a password manager to control how users create their IDs may be a good step to protect enterprise assets. Continue Reading
-
News
09 Feb 2024
Distributors play key role in sustainability
Given its position as a supplier of products and services, and its trusted relationship with vendors, disties are in a pivotal position Continue Reading
-
News
09 Feb 2024
HSBC and Google Cloud partner up for climate tech startup growth push
Banking giant HSBC will work with Google Cloud-affiliated climate tech startups to help them access funding to support their future growth Continue Reading
-
Opinion
09 Feb 2024
What the drive for sustainability means for IT distributors
Howard Davies, CEO & co-founder of Context, shares his thoughts about what the push towards net zero by vendors means for the channel Continue Reading
-
News
09 Feb 2024
MoD ethical hacking programme expands after initial success
The Ministry of Defence has expanded the scope of its defensive security partnership with HackerOne Continue Reading
-
Definition
09 Feb 2024
OpenStack
OpenStack is a collection of open source software modules and tools that provides organizations with a framework to create and manage both public cloud and private cloud infrastructure. Continue Reading
-
Tip
09 Feb 2024
Top 7 data loss prevention tools for 2024
Data loss prevention software is a necessity for most companies. Our guide gives you a quick overview of seven top DLP providers and tells you what works -- and what doesn't. Continue Reading
-
Tip
09 Feb 2024
14 edge platforms to consider for a hybrid cloud enterprise
Edge platforms can benefit organizations by bringing resources closer to the user, leading to real-time decision-making, improved response times and increased efficiency. Continue Reading
-
Definition
09 Feb 2024
cyberterrorism
Cyberterrorism is usually defined as any premeditated, politically motivated attack against information systems, programs, and data that threatens violence or results in violence. Continue Reading
-
Feature
09 Feb 2024
Cloud ERP vs. on-premises ERP: Key differences
Understanding the differences between on-premises ERP and cloud ERP, especially multi-tenant SaaS, is critical in buying decisions. Here's how they compare in 12 important areas. Continue Reading
-
Guest Post
09 Feb 2024
Cybersecurity governance: A path to cyber maturity
Organizations need cybersecurity governance programs that make every employee aware of the cybersecurity mitigation efforts required to reduce cyber-risks. Continue Reading
-
Definition
09 Feb 2024
mobile security (wireless security)
Mobile security, also known as wireless security, refers to the measures taken to protect smartphones, tablets, laptops, smartwatches and other portable computing devices and the networks they connect to, from threats and vulnerabilities associated with wireless computing. Continue Reading
-
News
09 Feb 2024
Cohesity pitches Veritas buy as channel positive
Deal will give combined channel base opportunity to sell more cloud, security and AI products Continue Reading
-
Feature
09 Feb 2024
The rising prominence of hybrid cloud in the Nordics
Many Nordic organisations have opted for hybrid cloud environments, subscribing to the newest services without giving up what they already have. Best practices are beginning to emerge for managing the heterogenous environment Continue Reading
-
News
09 Feb 2024
Digital experience becomes new boardroom metric
Networking technology and services giant outlines new paradigm in experience economy, where next generation of chief digital officers demand unified understanding of every component of networked applications Continue Reading
-
News
09 Feb 2024
Europe carves out niche in quantum computing
As the US, China and Europe accelerate investment in quantum computing, Europe is beginning to develop its own unique position in the fledgling global ecosystem Continue Reading
-
News
08 Feb 2024
Google turns Bard AI into Gemini, launches Gemini Advanced
The tech giant gave Bard a new name and introduced users to Ultra 1.0 through a new mobile app. It revealed changes to Duet AI and Cloud. Continue Reading