Topics Archive
Free guide to low-code & no-code platforms
Platforms that enable shadow IT are changing development roles and processes. Here's why it's time to embrace this new reality.
-
E-Zine
30 Jan 2024
Tech companies warn EU over encryption plans
In this week’s Computer Weekly, tech companies are calling on the European Commission to rethink plans to weaken internet encryption – we explore the issues. We talk to credit rating agency Moody’s about why it thinks now is the time to start investing in quantum computing. And we examine how a different approach to recruitment could ease the datacentre sector skills gap. Read the issue now. Continue Reading
-
Definition
30 Jan 2024
API management
API management is the process by which an organization creates, oversees and controls application programming interfaces (APIs) in a secure, scalable environment. Continue Reading
-
Definition
30 Jan 2024
What is incident response? A complete guide
Incident response is an organized, strategic approach to detecting and managing cyberattacks in ways that minimize damage, recovery time and total costs. Continue Reading
-
Definition
29 Jan 2024
turbine
A turbine is a machine that plays a key role in transforming fluid or air energy into usable work or electricity. Continue Reading
-
News
29 Jan 2024
ServiceNow, IBM set partner programs for AI transformation
Technology providers reach out to service providers that can help them deliver business change, digital workflows and emerging technologies to enterprise customers. Continue Reading
-
News
29 Jan 2024
Citizen Lab details ongoing battle against spyware vendors
At the SANS Cyber Threat Intelligence Summit, Citizen Lab researcher Bill Marczak discusses spyware proliferation from commercial vendors such as NSO Group, Cytrox and Quadream. Continue Reading
-
Tip
29 Jan 2024
Compare the top 10 marketing automation software
With the right marketing automation software, marketers can streamline their workflows and focus more on creative tasks. This list compares the top vendors in this space. Continue Reading
-
Feature
29 Jan 2024
7 talent acquisition strategies for better hiring in 2024
Learn some talent acquisition strategies for hiring in a still-challenging recruiting market, including promoting company initiatives and establishing an employer brand. Continue Reading
-
Answer
29 Jan 2024
Do-While vs. Do-Until in PowerShell: What's the difference?
PowerShell scripts have several loop options to make automation easy. Learn the difference between Do-While and Do-Until loops and choose which one works best for you. Continue Reading
-
News
29 Jan 2024
Juniper adds data center networks to Mist AI
Juniper's Mist AI update will include using the Marvis virtual network assistant to obtain information on data center cabling, configurations and connectivity issues. Continue Reading
-
Opinion
29 Jan 2024
Juniper goes AI-native with its networking platform
Juniper Networks' recent announcements point to its overarching plans to provide end-to-end network context and support GenAI strategies with its networking platform. Continue Reading
-
Definition
29 Jan 2024
conduct risk
Conduct risk refers to the potential for a company's actions or behavior to harm its customers, stakeholders or broader market integrity. Continue Reading
-
Video
29 Jan 2024
How to create and deploy AWS Lambda functions with Terraform
Deploying AWS Lambda functions with Terraform can save time and reduce risk. In this video tutorial, learn the proper deployment steps. Continue Reading
-
Tip
29 Jan 2024
Best practices for a strong disaster recovery testing strategy
Testing is a critical part of the disaster recovery planning process. Without proper testing, IT teams might miss crucial updates or make avoidable missteps in a recovery. Continue Reading
-
Definition
29 Jan 2024
indicators of compromise (IOC)
Indicators of compromise are unusual activities on a system or network that imply the presence of a malicious actor. Continue Reading
-
Tip
29 Jan 2024
Top 4 incident response certifications to consider in 2024
Cybersecurity professionals pursuing an incident response track should consider the following certifications to bolster their knowledge and advance their career. Continue Reading
-
News
29 Jan 2024
In Congress, remote work policy debate hides facts
U.S. House Republicans criticize the Interior Department's remote work policy, saying it lowers productivity. Selective omissions of data challenge these claims. Continue Reading
-
Tip
29 Jan 2024
What is attack surface management and why is it necessary?
Attack surface management approaches security from the attacker's perspective. Learn how ASM can help better secure your organization's assets and resources. Continue Reading
-
News
29 Jan 2024
Credit Karma preps 'Zero-touch' Argo Rollouts
The Intuit subsidiary is in the process of moving to a homegrown event-driven progressive delivery platform and has already contributed some related code upstream. Continue Reading
-
Definition
29 Jan 2024
content analytics
Content analytics, also known as content intelligence, is the process of measuring and analyzing how users interact and engage with digital content. Continue Reading
-
News
29 Jan 2024
Russian IT sector still under serious pressure
Russian IT sector faces challenges on multiple fronts as Western sanctions widen Continue Reading
-
Definition
29 Jan 2024
competitive differentiation
Competitive differentiation is a strategic positioning tactic an organization can undertake to set its products, services and brands apart from those of its competitors. Continue Reading
-
Feature
29 Jan 2024
French TV giant sticks with Dell NAS for channel upgrade
TF1 has the biggest market share in French TV, but plans for more. It has upgraded from Isilon to PowerScale scale-out NAS and saved 42% in energy costs, halving rackspace use Continue Reading
-
News
29 Jan 2024
Proposed changes to investment thresholds highlights lack of funding diversity
The government is introducing a law to raise the income threshold for potential angel investors, potentially making it harder for people from underrepresented groups to fund startups Continue Reading
-
News
29 Jan 2024
Channel must be able to support cloud repatriation shift
Citrix shines a light on a growing trend as strategies are reconsidered in the face of security and cost concerns Continue Reading
-
Feature
29 Jan 2024
Top 10 types of information security threats for IT teams
Know thine enemy -- and the common security threats that can bring an unprepared organization to its knees. Learn what these threats are and how to prevent them. Continue Reading
-
Tip
29 Jan 2024
Cybersecurity skills gap: Why it exists and how to address it
The cybersecurity skills shortage is putting enterprises at risk. Worse, it shows no sign of abating. Here is why it's happening and what employers can do to mitigate the problem. Continue Reading
-
Tip
29 Jan 2024
10 top talent management software systems in 2024
Learn the top talent management software vendors and the advantages and disadvantages of each as well as important talent management software implementation considerations. Continue Reading
-
Tip
29 Jan 2024
How to rank and prioritize security vulnerabilities in 3 steps
Vulnerability management programs gather massive amounts of data on security weaknesses. Security teams should learn how to rank vulnerabilities to quickly fix the biggest issues. Continue Reading
-
News
29 Jan 2024
Podcast: Sama responds to AI data labeling criticism
The data annotation and labeling vendor, which has faced criticism for its practices in Africa despite its social good mission, is out with a new platform to reduce model failure. Continue Reading
-
News
29 Jan 2024
CityFibre hits £100m revenue milestone in 2023
Trading update shows UK’s largest independent fibre network reaps benefit from adding one million ready-for-service (RFS) homes in 2023, taking total RFS premises to over 3.2 million Continue Reading
-
News
29 Jan 2024
Channel roundup: Who's gone where?
Plenty of senior appointments being announced in the past working week, including SecurityBridge, Panzura, F5, UiPath, Delinea and Jetbuilt Continue Reading
-
News
29 Jan 2024
Google Cloud teams up with Singapore government on AI initiatives
Over 100 generative AI use cases have been tested through the AI Trailblazers programme, among other initiatives to spur AI adoption and build AI talent in the city-state Continue Reading
-
News
29 Jan 2024
73% of Digital Health Companies Use Standards-Based EHR APIs
While most digital health companies use standards-based EHR APIs for EHR integration, nearly the same number of companies reported the use of proprietary EHR APIs. Continue Reading
-
News
29 Jan 2024
Lords question legality of police facial recognition
Lords committee ‘deeply concerned’ about the rapid expansion of live facial recognition by UK police, which it says is progressing without any real oversight or accountability Continue Reading
-
News
29 Jan 2024
MP demands answers from government minister over second faulty Post Office IT system
Kevan Jones MP highlighted evidence of injustices caused by a computer system used in Post Office branches prior to the introduction of the controversial Horizon system. Continue Reading
-
Feature
29 Jan 2024
What developers need to know about LLMs in the enterprise
We look at the main areas enterprise developers need to consider when building, testing and deploying enterprise applications powered by large language models Continue Reading
-
Tip
29 Jan 2024
Metaverse privacy concerns and how to address them
Data privacy in the metaverse is a moving target. Learn about the main privacy issues and risk for businesses and users -- and how best to address them. Continue Reading
-
Definition
26 Jan 2024
private 5G
Private 5G is a wireless network technology that delivers 5G cellular connectivity for private network use cases. Continue Reading
-
News
26 Jan 2024
Microsoft: Legacy account hacked by Russian APT had no MFA
Microsoft has begun notifying other organizations that have been targeted in recent attacks by Midnight Blizzard, a Russian nation-state actor also known as Cozy Bear and APT29. Continue Reading
-
Definition
26 Jan 2024
Docker Swarm
Docker Swarm is a container orchestration tool for clustering and scheduling Docker containers. Continue Reading
-
Feature
26 Jan 2024
Rise of generative AI heightens need for data quality
Good information has always been key to fuel good decisions, but with LLMs prone to hallucinations, it's critical that the models be trained with intelligence that can be trusted. Continue Reading
-
Tip
26 Jan 2024
How to deploy Office productivity apps on Chromebooks
Web app versions of the Microsoft Office productivity suite lack some features, so IT teams should learn how to deliver the full versions of the apps to systems such as ChromeOS. Continue Reading
-
Definition
26 Jan 2024
reshoring
Reshoring is the process of bringing back manufacturing or production operations to their country of origin or a nearby region. Continue Reading
-
Video
26 Jan 2024
Video guide to generative AI
Generative AI has the potential to revolutionize technology. Learn about popular interfaces such as ChatGPT, the future of generative AI and its effects on businesses. Continue Reading
-
News
26 Jan 2024
GenAI tools ‘could not exist’ if firms are made to pay copyright
AI firm Anthropic hits out at copyright lawsuit filed by music publishers, claiming the content ingested into its models falls under ‘fair use’ and that any licensing regime would be too complex and costly Continue Reading
-
News
26 Jan 2024
SAP puts the focus on AI, but cloud is still the key
ERP giant wants to boost its AI capabilities, but there remains work to be done persuading customers to shift to its cloud offerings Continue Reading
-
Video
26 Jan 2024
What is Cloud Computing? An Introduction
This short video explains the essentials of cloud computing and its three major types. Learn the difference between public and private cloud and the top benefits. Continue Reading
-
News
26 Jan 2024
8x8 enhances experience communications as a service suite
XCaaS platform to now include capabilities such as AI-generated post-meeting smart summaries and action items, omnichannel experiences, global workforce support, and deeper technology partner integrations Continue Reading
-
Feature
26 Jan 2024
Automation, cloud drive network and security convergence
Network and security teams are unifying due to automation, cloud and SASE. Successful unified teams receive insights that support management, monitoring and troubleshooting. Continue Reading
-
News
26 Jan 2024
M247 shares PTSN switch-off pitch advice
Managed service player M247 has one eye firmly on next year’s PTSN switch-off and is encouraging fellow channel partners to help customers to take migration steps Continue Reading
-
Opinion
26 Jan 2024
Security Think Tank: Expect more from GenAI in 2024
But 2024 also feels slightly different; the past 12 months have seen generative AI burst on to the scene, and this year its impact will continue to be felt, says Turnkey Consulting's Harshini Carey. Continue Reading
-
Opinion
26 Jan 2024
Quantum, AI and geopolitical conflict: '24 will be a big year for cyber
With big trends like quantum, generative AI and geopolitical conflict, 2024 looks set to be a big year in security, but defenders have an unparalleled opportunity to harness these trends for good, says Quorum's Federico Charosky Continue Reading
-
News
26 Jan 2024
AWS introduces SME partner competency
Cloud player reacts to small and medium customer requirements for dedicated support with the launch of a targeted option Continue Reading
-
Tip
26 Jan 2024
5 important inventory management software features: A list
Some of the most important inventory management software features are inventory tracking and reports and analytics capabilities. Here's the full list. Continue Reading
-
Tip
26 Jan 2024
On-premises vs. cloud vs. hybrid UC deployment models
When deploying unified communications, organizations need to carefully consider the benefits and drawbacks of on-premises, cloud and hybrid deployment models. Continue Reading
-
Definition
26 Jan 2024
digital forensics and incident response (DFIR)
Digital forensics and incident response (DFIR) is a combined set of cybersecurity operations that incident response teams use to detect, investigate and respond to cybersecurity events. Continue Reading
-
News
26 Jan 2024
Ford Pro accelerates vehicle insights and control
Commercial division of Ford gasses up connected car offer by expanding suite of telematics productivity solutions to give commercial customers more insight and control over their fleet vehicles Continue Reading
-
News
26 Jan 2024
Akira ransomware gang claims Lush cyber attack
The Akira ransomware gang claims to have stolen over 100GB of data from cosmetics manufacturer and retailer Lush Continue Reading
-
News
26 Jan 2024
Lawyers carry on Post Office appeals amid uncertainty over government plan to overturn en masse
Lawyers supporting former subpostmasters said they will continue appealing convictions as normal despite government plan to exonerate hundreds in one go Continue Reading
-
News
26 Jan 2024
UK government consults on age verification tech in alcohol sales
The government has said it wants to allow the use of digital identities and various age-verification technologies in alcohol sales Continue Reading
-
Blog Post
26 Jan 2024
LLM series - DoiT International: Prompt engineering, not for dummies
This is a guest post for the Computer Weekly Developer Network written by Sascha Heyer in his capacity as senior machine learning (ML) engineer at DoiT International and oversees machine learning ... Continue Reading
-
News
26 Jan 2024
Wi-Fi HaLow begins real-world commercial IoT deployments
New Wi-Fi standard to address wide range of IoT applications and offer support for use cases including smart home, smart city, building automation, smart retail, industrial IoT and agriculture technology Continue Reading
-
Opinion
26 Jan 2024
Security Think Tank: What to expect in cyber this year
Risk arising from insecure generative AI, an explosion in mainstream acceptance of zero-trust, and increasingly tight cyber insurance policies will all be high on the agenda in 2024, writes Forrester senior analyst Alla Valente Continue Reading
-
News
26 Jan 2024
Expert IT witness outsmarted an ‘aggressive’ Post Office to get to truth after inspection ‘madness’
The Post Office’s attempts to protect the Horizon system are well known, in light of the public inquiry and a recent TV drama, but Computer Weekly can reveal how an IT expert was treated during his investigation of Horizon Continue Reading
-
Opinion
26 Jan 2024
Bulk sender authentication: More vital than ever
With new guidelines from Google and Yahoo governing bulk emails coming into force in February 2024, here's what you need to know to keep your sales and marketing lists compliant Continue Reading
-
Feature
26 Jan 2024
The ultimate guide to cybersecurity planning for businesses
This in-depth cybersecurity planning guide provides information and advice to help organizations develop a successful strategy to protect their IT systems from attacks. Continue Reading
-
Definition
25 Jan 2024
NFVi (network functions virtualization infrastructure)
NFVi (network functions virtualization infrastructure) encompasses all of the networking hardware and software needed to support and connect virtual network functions in carrier networks. Continue Reading
-
News
25 Jan 2024
FTC launches inquiry into generative AI partnerships
The FTC has announced that it's looking into the relationships between big tech companies and generative AI companies and their impact on the market. Continue Reading
-
Feature
25 Jan 2024
What does generative AI mean for the legal sector?
Generative AI tools such as ChatGPT are entering law practices, promising more efficiency and less time spent on rote tasks. But risks remain around accuracy, ethics and privacy. Continue Reading
-
News
25 Jan 2024
Panzura board appoints Waldschmidt as CEO
Dan Waldschmidt replaces Jill Stelfox at the SaaS storage vendor. Stelfox led the company since 2020 and says she's 'actively choosing to be silent right now.' Continue Reading
-
Definition
25 Jan 2024
in-memory analytics
In-memory analytics is an approach to querying data residing in a computer's random access memory (RAM) as opposed to querying data stored on physical drives. Continue Reading
-
News
25 Jan 2024
Google and Hugging Face unveil AI partnership
The partnership reflects the cloud provider's support of open source and aims to appeal to enterprises looking to move from ideation to implementation of generative AI workloads. Continue Reading
-
25 Jan 2024
The most important skills a server engineer needs
Server engineers are highly valued by cloud service providers and earn high salaries. These roles require a combination of hard and soft skills to succeed. Continue Reading
-
News
25 Jan 2024
HPE breached by Russian APT behind Microsoft hack
HPE suspects that Cozy Bear, a Russian state-sponsored threat actor also known as Midnight Blizzard and Nobelium, breached its network twice in 2020. Continue Reading
-
Tutorial
25 Jan 2024
Using Microsoft AD Explorer for common admin tasks
The utility makes it easier to navigate the Active Directory database and features snapshot capabilities with a comparison function to detect where a change caused a problem. Continue Reading
-
Definition
25 Jan 2024
Google Bigtable
Google Bigtable is a distributed, column-oriented data store created by Google Inc. to handle very large amounts of structured data associated with the company's Internet search and Web services operations. Continue Reading
-
Tip
25 Jan 2024
The future of AI: What to expect in the next 5 years
AI's impact in the next five years? Human life will speed up, behaviors will change and industries will be transformed -- and that's what can be predicted with certainty. Continue Reading
-
Definition
25 Jan 2024
cognitive diversity
Cognitive diversity is the inclusion of people who have different styles of problem-solving and can offer unique perspectives because they think differently, have divergent perspectives and come from varied backgrounds. Continue Reading
-
Feature
25 Jan 2024
The definitive guide to enterprise IT monitoring
This comprehensive IT monitoring guide examines strategies to track systems, from servers to software UIs, and how to choose tools for every monitoring need. Continue Reading
-
25 Jan 2024
15 server and networking interview questions and answers
When interviewing for server and networking job positions, most interviewers look for knowledge in three main areas: servers, systems design and networking. Continue Reading
-
Definition
25 Jan 2024
vector embeddings
Vector embeddings are numerical representations that capture the relationships and meaning of words, phrases and other data types. Continue Reading
-
Tip
25 Jan 2024
From distributed to true edge: 4 edge computing examples
The optimal applications for edge computing remain in contention as the technology evolves. These examples highlight a shift from distributed computing to true edge environments. Continue Reading
-
Tip
25 Jan 2024
What you need to know about Microsoft Azure Spot VMs
The cost of spot prices can be a risk-and-reward kind of strategy. Better understand the risks that come with Azure Spot VMs so your enterprise can reap the rewards. Continue Reading
-
News
25 Jan 2024
Datacentres set to consume third of Ireland’s energy by 2026
Forecast data from International Energy Agency shines light on how booming demand for datacentres is affecting energy usage levels in different geographies Continue Reading
-
News
25 Jan 2024
Telefónica, Nova Labs launch helium mobile hotspots in Mexico
Telco’s customer coverage extended in Mexico City and Oaxaca by using existing SIMs to offload mobile data to dedicated extended network Continue Reading
-
News
25 Jan 2024
Additional spectrum needed for 5G-Advanced, 6G networks
With more advanced mobile infrastructures set to be introduced over the next five years, report suggests wireless industry needs access to more spectrum to support applications such as XR, connected cars and metaverse Continue Reading
-
Definition
25 Jan 2024
white hat link building
White hat link building is a search engine optimization (SEO) technique for increasing the number of high-quality backlinks to a webpage. Continue Reading
-
Definition
25 Jan 2024
DevOps engineer
A DevOps engineer is an IT professional who works with software developers, systems operators and other production IT staff to oversee code releases and deployments. Continue Reading
-
Opinion
25 Jan 2024
The race to regulate AI: 2024 unpacked
EU’s AI Act is set to become ‘gold standard’ of AI regulation. Will other countries adopt the same high standards or like the UK opt for a light touch in favour of growth and investment? Continue Reading
-
Blog Post
25 Jan 2024
Job losses may hinder enterprise AI success
A swathe of recent research shows many believe the rollout of artificial intelligence (AI) will result in job losses and industry disruption.In a new blog Kristalina Georgieva, managing director of ... Continue Reading
-
Definition
25 Jan 2024
shared services
Shared services is a delivery model organizations use to consolidate similar business functions into a single unit that supports the entire organization. Continue Reading
-
Definition
25 Jan 2024
QR code phishing
QR code phishing, or 'quishing,' is a social engineering phishing attack that intentionally deceives its recipient into scanning a QR code, redirecting the person to a bogus website. Continue Reading
-
Definition
25 Jan 2024
Java
Java is a widely used programming language expressly designed for coding applications and services used in the distributed environment of the internet. Continue Reading
-
Blog Post
25 Jan 2024
How to find and use a GitHub URL by example
This example shows you how you can find and use the GitHub URL. Clone, fetch, push and pull to your remote repo easily with the GitHub URL at your disposal. Continue Reading
-
News
25 Jan 2024
Pennsylvania HIEs, Health IT Vendor Partner on SDOH Referral Tool
Health IT vendor findhelp and Pennsylvania's Consortium of HIEs are creating a platform called PA Navigate that aims to improve SDOH referrals and drive health equity across the state. Continue Reading
-
Definition
25 Jan 2024
masked language models (MLMs)
Masked language models (MLMs) are used in natural language processing (NLP) tasks for training language models. Continue Reading
-
Feature
25 Jan 2024
10 top AI jobs in 2024
The AI revolution is changing many jobs and creating some new ones. Learn the top skills, industries and jobs that AI is making its mark on. Continue Reading
-
Feature
25 Jan 2024
Top benefits and challenges of SOAR tools
To ensure successful adoption, IT leaders need to understand the benefits of SOAR tools, as well as potential disadvantages. Explore pros, cons and how to measure SOAR success. Continue Reading
-
Definition
25 Jan 2024
Chaos Monkey
Chaos Monkey is a software tool Netflix engineers developed to test the resiliency and recoverability of their Amazon Web Services (AWS) infrastructure. Continue Reading