Topics Archive
Free guide to low-code & no-code platforms
Platforms that enable shadow IT are changing development roles and processes. Here's why it's time to embrace this new reality.
-
Blog Post
09 Jun 2025
Platform Engineering - GigaOm: It’s no quick fix, it’s a state of mind
This is a guest post for the Computer Weekly Developer Network written by Jon Collins in his capacity as VP of engagement and field CTO at GigaOm. Collins starts our platform engineering series (as ... Continue Reading
-
Blog Post
09 Jun 2025
Information overload needs more than AI — think collaboration and automation tech
This is a guest blogpost by John Bates, chief executive officer, the SER Group. In it he talks about why artificial intelligence is not the whole answer to handling vast swathes of corporate ... Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
News
09 Jun 2025
Starmer opens London Tech Week with £1bn AI boost
Prime Minister unveiled plans to boost UK’s high-performance compute capacity 20-fold, along with funding to bolster skills Continue Reading
By- Cliff Saran, Managing Editor
-
News
09 Jun 2025
Government to create online platform for public sector tech buyers
The National Digital Exchange will be a one-stop shop for public sector tech buying, allowing organisations to rate and review products and gain access to pre-approved tech deals Continue Reading
By -
Blog Post
09 Jun 2025
How to run a Jar file
How do you run a JAR file on Windows, Mac or Linux? Double click the JAR? Run the JAR at the command line? Several approaches will work if you have Java or the JDK installed. Continue Reading
By- Cameron McKenzie, TechTarget
-
News
09 Jun 2025
Barclays rolls out Microsoft Copilot to 100,000 employees as AI adoption gathers pace
Barclays is doubling down on its adoption of artificial intelligence tools by moving to embrace Microsoft Copilot with a large-scale roll-out of the technology to 100,000 staff Continue Reading
By- Caroline Donnelly, Senior Editor, UK
-
Feature
09 Jun 2025
What are the top 8 healthcare data and coding standards?
Data standards are the secret sauce that allow information to flow from one provider to another and enable providers to bill for specific procedures. Continue Reading
By- Brian T. Horowitz
-
Feature
09 Jun 2025
Local council devolution: Could it accelerate the pace of local government cloud adoption?
The UK government is on a mission to rationalise the number of local councils through its devolution agenda, which will see authorities gain autonomy over their budgets. We weigh up the impact this could have on cloud adoption in local councils Continue Reading
By- Caroline Donnelly, Senior Editor, UK
-
News
09 Jun 2025
US lawmakers say UK has ‘gone too far’ by attacking Apple’s encryption
US politicians are calling for Congress to rewrite the US Cloud Act to prevent the UK issuing orders to require US tech companies to introduce ‘backdoors’ in end-to-end encrypted messaging and storage Continue Reading
By- Bill Goodwin, Investigations Editor
-
Opinion
09 Jun 2025
An industrial strategy without tech is no strategy at all
Ahead of the delivery of the UK government’s Industrial Strategy white paper, TechUK sets out how the tech sector can drive growth, and the steps the government should take to harness it Continue Reading
By- Julian David, TechUK
-
Feature
09 Jun 2025
What happens if Silicon Valley’s AI investment bubble bursts?
US tech giants are burning through unprecedented amounts of capital to develop artificial superintelligence, but authoritarian regimes around the world could keep the pursuit of a techno-utopian future alive when the bubble subsides Continue Reading
By- Kyle Hiebert, Computer Weekly
-
News
09 Jun 2025
Orange, Eutelsat expand LEO satellite partnership
Multi-year agreement enhances access to the benefits of low Earth orbit satellite communications to telco’s enterprise and government customers, and supports mobile backhaul to meet global demand Continue Reading
By- Joe O’Halloran, Computer Weekly
-
Blog Post
08 Jun 2025
How chmod numbers work explained by example
Don't let yourself be intimidated by chmod numbers and permissions. Here's a quick and easy to understand explanation of how chmod permission numbers work in Linux. Continue Reading
By- Cameron McKenzie, TechTarget
-
Blog Post
08 Jun 2025
Fix the 'expected a step' Jenkins error
Have you encountered the 'expected a step' error in Jenkins? Are you using a declarative pipeline? Here's the most likely way to fix the 'expected a step' error in Jenkins. Continue Reading
By- Cameron McKenzie, TechTarget
-
Blog Post
08 Jun 2025
'Java Not Recognized' Error Fix
Here are three easy ways to fix the 'Java not recognized as an external or external command' error on both Windows and Linux machines. Continue Reading
By- Cameron McKenzie, TechTarget
-
Blog Post
07 Jun 2025
List and show Git config settings
If you are wondering how a variable is assigned a value in Git config use --list to inspect the gitconfig files. Continue Reading
By- Cameron McKenzie, TechTarget
-
Blog Post
07 Jun 2025
The best Jar file opener app
There are many Java JAR file openers available on the market today. Here are the top 5 JAR file openers for both Java developers and casual users to install on their Windows or Linux machines. Continue Reading
By- Cameron McKenzie, TechTarget
-
Blog Post
07 Jun 2025
How to open a JAR file
You can open JAR files with any ZIP utility. A JAR file is just a special type of ZIP file. And to run a Java JAR file, just install Java and either double-click it or run the JAR file at the ... Continue Reading
By- Cameron McKenzie, TechTarget
-
Blog Post
06 Jun 2025
How Java instance main methods and unnamed classes work
Say goodbye to the public static void main method in Java 21 with the unnamed classes and instance main methods preview features. Continue Reading
By- Cameron McKenzie, TechTarget
-
Tip
06 Jun 2025
Does AI-generated code violate open source licenses?
Unresolved questions about how open source licenses apply to AI models trained on public code are forcing users, vendors and open source developers to navigate legal gray areas. Continue Reading
By -
News
06 Jun 2025
FTC sends message with Synopsys, Ansys divestiture order
To prevent the creation of a monopoly in software tools used to design semiconductors, the FTC wants the two companies to divest assets before merging. Continue Reading
By- Makenzie Holland, Senior News Writer
-
News
06 Jun 2025
IBM launches Watsonx AI Labs, acquires Seek AI
The company said its new startup incubator will give AI developers access to tools and expertise to build enterprise AI applications. Continue Reading
By- Shane Snider, Senior News Writer
-
News
06 Jun 2025
News brief: CISA and partners face budget overhauls, cuts
Check out the latest security news from the Informa TechTarget team. Continue Reading
By -
Feature
06 Jun 2025
How to choose and set up a mobile VPN for an Android phone
A tailored approach to network security is crucial when managing smartphones in the enterprise. IT teams should consider Android VPN options for their organization. Continue Reading
-
Video
06 Jun 2025
Spring Boot auto-configuration
Ever wondered how Spring Boot knows how to automatically configure a MySQL database or Kafka queues? This quick tutorial on the @AutoConfiguration annotation explains how it works. Continue Reading
By- Cameron McKenzie, TechTarget
-
Definition
06 Jun 2025
What is a cookie?
A cookie is a text file carrying some information that a website places on a user's computer. Continue Reading
-
Definition
06 Jun 2025
What is app virtualization (application virtualization)?
App virtualization (application virtualization) is the installation of an application on one computer and enabling an end user's client computer to remotely access that application. Continue Reading
-
Feature
06 Jun 2025
Why identity is the new perimeter – and how to defend it
Identity has replaced network boundaries as today's security perimeter. Organizations must focus on protecting digital identities to safeguard their assets. Continue Reading
-
Opinion
06 Jun 2025
Why data platforms matter for AI agents and MCP success
AI agents and Model Context Protocol systems depend on fast, scalable access to diverse data. Modern data platforms deliver that access across fragmented enterprise environments. Continue Reading
By- Stephen Catanzano, Senior Analyst
-
Omdia
Intelligence and advice powered by decades of global expertise and comprehensive coverage of the tech markets.
-
Feature
06 Jun 2025
The demands of AI on network as a service
An expert panel at ONUG's AI Networking Summit Spring 2025 gave insight into the future of AI in networking, particularly in NaaS environments. Continue Reading
By- Nicole Viera, Assistant Site Editor
-
News
06 Jun 2025
Channel catch-up: News in brief
Developments this week at Infinigate Group, Assured Data protection, Diliko, N-able, Coro and Quantum Dice Continue Reading
By- Simon Quicke, Microscope Editor
-
Tip
06 Jun 2025
8 benefits of AI as a service
Some businesses lack the resources to build and train their own AI models. Can AIaaS level the playing field for smaller organizations to remain nimble? Continue Reading
By -
Feature
06 Jun 2025
In conflict: Putting Russia’s datacentre market under the microscope
Russia’s war with Ukraine has created a whole host of problems for the growth of the country’s datacentre market Continue Reading
By- Computer Weekly correspondent
-
News
06 Jun 2025
CSC, Surf and Nokia achieve 1.2 Tbps data transfer in supercomputer trial
Trial designed to help research networks prep for high-performance computing clusters and AI factories handling high-intensity workloads, confirming feasibility of multi-domain, high-capacity data transfers across multiple domains Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
06 Jun 2025
More reasoning, interoperability key to future of agentic AI
As agents evolve from hype to reality, research and industry must collaborate to improve agents' recall and ability to work together so that they can realize their full potential. Continue Reading
By- Eric Avidon, Senior News Writer
-
Tip
06 Jun 2025
How to navigate the Windows Hello for Business requirements
While Windows Hello is easy to set up on the user level, Windows Hello for Business needs a bit more back-end legwork to meet the infrastructure and licensing requirements. Continue Reading
By -
News
06 Jun 2025
Healthcare wearable intervention cuts alcohol use, boosts sleep
A digital health program that included self-monitoring via a mobile diary and healthcare wearables helped reduce alcohol intake and improve sleep health among young adults. Continue Reading
By- Anuja Vaidya, Senior Editor
-
News
06 Jun 2025
InfoSec distribution panel: The value of expertise
At security industry show InfoSec, executives from a number of distributors shared their views on the benefits they offer to partners and vendors Continue Reading
By- Simon Quicke, Microscope Editor
-
Definition
06 Jun 2025
What is bit (binary digit) in computing?
A bit (binary digit) is the smallest unit of data that a computer can process and store. It can have only one of two values: 0 or 1. Continue Reading
-
Definition
06 Jun 2025
What is binary and how is it used in computing?
Binary describes a numbering scheme in which there are only two possible values for each digit -- 0 or 1 -- and is the basis for all binary code used in computing systems. Continue Reading
By -
Definition
06 Jun 2025
What is cyber extortion?
Cyber extortion is a crime involving an attack or threat of an attack, coupled with a demand for money or some other response, in return for stopping an attack or preventing one from happening. Continue Reading
By- Alexander S. Gillis, Technical Writer and Editor
- Kinza Yasar, Technical Writer
-
News
06 Jun 2025
AI plays key role in NWN-InterVision IT services M&A deal
NWN's acquisition of InterVision will combine generative AI services with contact center, cybersecurity and cloud offerings. It also opens cross-selling opportunities. Continue Reading
By- John Moore, Industry Editor
-
News
06 Jun 2025
UK ICO publishes AI and biometrics strategy
The UK data regulator has outlined how it will approach the regulation of artificial intelligence and biometric technologies, which will focus in particular on automated decision-making systems and police facial recognition Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Blog Post
06 Jun 2025
How to setup a Docker Nginx reverse proxy server example
The ability to put an Nginx reverse proxy in a Docker container greatly simplifies enterprise architectures. Here's how easy it is to setup and configure an Nginx reverse proxy Docker image and ... Continue Reading
By- Cameron McKenzie, TechTarget
-
News
06 Jun 2025
‘Severe’ network outages costing $160bn globally
Research reveals costly impact of outages and spotlights a critical turning point in enterprise network architecture changing how IT leaders think about the network, such as what it is, what it enables and how it protects organisations Continue Reading
By- Joe O’Halloran, Computer Weekly
-
Opinion
06 Jun 2025
How to increase business value with AI agents
To overcome the complexity of deploying agentic AI at scale, organisations must mix and match capabilities, understand key limitations, and take an agile approach to implementation Continue Reading
By- Ben Yan
-
News
06 Jun 2025
CISOs must translate cyber threats into business risk
To manage risk effectively and secure board-level buy-in, CISOs must stop talking about technology and start speaking the language of business, according to a senior Check Point executive Continue Reading
-
Definition
06 Jun 2025
What is automated reasoning? How is it used in AI?
Automated reasoning is the area of computer science concerned with applying reasoning in the form of logic to computing systems. Continue Reading
By- Scott Robinson, New Era Technology
- Alexander S. Gillis, Technical Writer and Editor
-
News
05 Jun 2025
FairPrice taps Google Cloud for AI-powered store
The supermarket chain will leverage generative AI and cloud technologies to enhance customer experience and streamline in-store operations, starting with its upcoming Punggol Digital District outlet Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
05 Jun 2025
Whitehall fails to recognise digital procurement challenge, says PAC
Committee concerned that Government Commercial Function doesn’t understand the scale of reform needed to address long-standing digital procurement issues, including lack of skills and leadership Continue Reading
By -
News
05 Jun 2025
UK backdoor order to Apple raises bipartisan concerns
U.S. officials fear that gaps in existing law may enable countries to target U.S. companies with data access requests that harm user privacy and security. Continue Reading
By- Makenzie Holland, Senior News Writer
-
News
05 Jun 2025
Rubrik expands cloud databases and Oracle Cloud protection
Backup vendor Rubrik will protect numerous new workloads in the platform this year, but cybersecurity experts warn customers to continue prepping for threats. Continue Reading
By- Tim McCarthy, Former News Writer
-
Definition
05 Jun 2025
What is third-party risk management (TPRM)?
Third-party risk management (TPRM) is a comprehensive framework for identifying, assessing, and mitigating risks associated with using external vendors, suppliers, partners and service providers. Continue Reading
By- Kinza Yasar, Technical Writer
-
News
05 Jun 2025
House bill would lead to provider revenue problems: Analysis
An analysis estimates more than $770 billion in provider revenue losses and substantially higher uncompensated care costs over the next decade under the House reconciliation bill. Continue Reading
By- Jacqueline LaPointe, Executive Editor
-
Blog Post
05 Jun 2025
How do I 'docker copy' a file from container to host?
Here's a quick example of how to copy a file inside a Docker container to the local filesystem of the host machine. With the ID or name of the container in hand, a Docker file copy operation is an ... Continue Reading
By- Cameron McKenzie, TechTarget
-
Feature
05 Jun 2025
What is vendor risk management (VRM)? A guide for businesses
Vendor risk management identifies, assesses and mitigates risks from third-party vendors to protect companies from data breaches, operational disruptions and compliance violations. Continue Reading
-
News
05 Jun 2025
HMRC phishing breach wholly avoidable, but hard to stop
A breach at HMRC saw innocent taxpayers tricked into letting scammers impersonate them through simple phishing attacks leading to account takeover. Such attacks are avoidable, but hard to stop Continue Reading
By- Alex Scroxton, Security Editor
-
Definition
05 Jun 2025
What is the Department of Health and Human Services (HHS)?
The U.S. Department of Health and Human Services (HHS) is a cabinet-level agency in the executive branch of the federal government, tasked with protecting the health and well-being of all Americans. Continue Reading
By- Katie Terrell Hanna
- Kristen Lee, News Writer
-
News
05 Jun 2025
Citigroup cuts thousands of staff at China-based tech centres
Financial services giant Citigroup is drastically reducing headcount in its Chinese tech delivery centres as it restructures its technology operation Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
Blog Post
05 Jun 2025
Vast Data & Cisco team up to twist turnkey for enterprise AI
Vast Data Cisco have expanded their collaborative partnership. The two firms say they are focused on creating a validated AI infrastructure stack that spans compute, networking, storage and ... Continue Reading
-
Feature
05 Jun 2025
How a FQHC balances innovations in health IT with budget
Mountain Laurel Medical Center operates with a limited budget, but the federally qualified health center still invests in innovations in health IT, such as interoperability and AI. Continue Reading
By- Jacqueline LaPointe, Executive Editor
-
Opinion
05 Jun 2025
CISOs: Don't block AI, but adopt it with eyes wide open
The Security Think Tank considers how CISOs can best plan to facilitate the secure running of AI and Gen AI-based initiatives and ensure employees do not inadvertently leak data or make bad decisions. Continue Reading
By- Mike Gillespie and Ellie Hurst, Advent IM
-
News
05 Jun 2025
SXSW: An immersive experience is the future of AI
OpenAI’s recent acquisition heralds a new direction for generative AI, away from the screen-based user experience Continue Reading
By- Cliff Saran, Managing Editor
-
Tip
05 Jun 2025
Compliance stakeholders and how to work with them
Stakeholders' involvement can strengthen an organization's compliance program. Learn best practices for engaging key stakeholders in compliance initiatives. Continue Reading
By -
News
05 Jun 2025
CyberSentriq and Netgear both courting MSPs
Arrival of fresh brand in the security market and an acquisition move by networking player should provide managed service providers with options Continue Reading
By- Simon Quicke, Microscope Editor
-
Feature
05 Jun 2025
Customers pleased with Snowflake plans for AI
Features including a multimodal data ingestion and integration service that enables access to unstructured data demonstrate the vendor's move toward enabling app development. Continue Reading
By- Eric Avidon, Senior News Writer
-
News
05 Jun 2025
Paula M. Stannard appointed as OCR director
Paula M. Stannard will serve as the new OCR director, leading federal enforcement of HIPAA and civil rights laws within HHS. Continue Reading
By- Jill Hughes, Associate Editor
-
News
05 Jun 2025
UK’s error-prone eVisa system is ‘anxiety-inducing’
People experiencing technical errors with the Home Office’s electronic visa system explain the psychological toll of not being able to reliably prove their immigration status in the face of a hostile and unresponsive bureaucracy Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
05 Jun 2025
CCS and Servium contribute to Advania UK growth
Channel player reveals how acquisitions contributed to its 2024 performance and how it has grown in the region Continue Reading
By- Simon Quicke, Microscope Editor
-
News
05 Jun 2025
Verizon Business opens availability for V2X connected-driving platform
Integrated mobile network vehicle-to-everything communication platform allows connected vehicles to talk to each other, road users and infrastructure Continue Reading
By- Joe O’Halloran, Computer Weekly
-
Definition
05 Jun 2025
What is a storage filer?
A storage filer is a type of file server designed and programmed for high-volume data storage, backup or archiving. Continue Reading
-
Definition
05 Jun 2025
What is Microsoft Windows 10?
Windows 10 is a Microsoft operating system (OS) for PCs, tablets and some internet of things devices. Continue Reading
By- Rahul Awati
- Stephen J. Bigelow, Senior Technology Editor
-
Feature
05 Jun 2025
How an FQHC is using ambient AI to reduce clinician burden
Neighborhood Healthcare expanded ambient AI technology across its clinics after a successful pilot where the tool helped reduce clinical documentation burden. Continue Reading
By- Anuja Vaidya, Senior Editor
-
Opinion
05 Jun 2025
Container-native infrastructure: The missing link between DevOps and enterprise scale
Configuration drift breaks containers in production. RHEL 10 image mode applies container principles to Linux systems for uniform OS environments across fleets with minimal risk. Continue Reading
By- Torsten Volk, Principal Analyst
-
Omdia
Intelligence and advice powered by decades of global expertise and comprehensive coverage of the tech markets.
-
News
05 Jun 2025
Australia’s CommBank completes migration of data to AWS in AI drive
Putting all of its data in AWS cloud will support bank’s use of artificial intelligence to offer customers more personalised services Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
05 Jun 2025
Real AI use cases emerge for SDVs but readiness gaps persist
Research finds nearly two-thirds of global automakers believe artificial intelligence use cases – such as predictive maintenance, over-the-air optimisation and personalisation – will drive software-defined vehicle adoption Continue Reading
By- Joe O’Halloran, Computer Weekly
-
Opinion
05 Jun 2025
Building the foundations: A national roadmap for digital identity and sovereign data
Now the UK government has offered some clarity on the future of private and public sector digital identity services, it's time to work together to put the essential foundations in place to make digital ID work for everyone Continue Reading
By- David Crack, Association of Digital Verification Professionals
-
News
05 Jun 2025
How GitLab is tapping AI in DevSecOps
GitLab CISO Josh Lemos explains how the company is weaving AI, through its Duo tool, into the entire software development lifecycle to enhance efficiency and automate incident response Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
05 Jun 2025
Istres deploys private 5G network to bolster smart city safety
Southern French city establishes dedicated mobile infrastructure to improve coordination and emergency rapid response capabilities, and support fixed and mobile video surveillance and encrypted communications Continue Reading
By- Joe O’Halloran, Computer Weekly
-
Opinion
05 Jun 2025
Diversity Think Tank: Inclusion matters – here’s why you should care
Even without recent news in the US, diversity, equity and inclusion (DEI) initiatives were dialled back in UK businesses last year due to tight budgets and economic uncertainty. Is it the end of the DEI push as we know it, or just a momentary blip in the fight for a diverse tech workforce? Continue Reading
By- Gill Cooke
-
Blog Post
05 Jun 2025
How to setup an Nginx load balancer example
Nginx is among the most popular load balancers and reverse proxy servers for enterprises. Here's how to quickly setup Nginx as a load balancer and configure weighted nodes and sticky sessions. Continue Reading
By- Cameron McKenzie, TechTarget
-
Definition
05 Jun 2025
What is the WannaCry ransomware attack?
WannaCry ransomware is a cyberattack that spread by exploiting vulnerabilities in earlier and unpatched versions of the Windows operating system (OS). Continue Reading
By- Alexander S. Gillis, Technical Writer and Editor
- Linda Rosencrance
-
Feature
05 Jun 2025
Top 5 steps in the risk management process
Implementing an effective risk management process is a key part of managing business risks. Follow these five steps to ensure a successful process. Continue Reading
By- Greg Witte, Palydin LLC
-
Blog Post
04 Jun 2025
How to install Docker and docker compose on Ubuntu
Modern day development happens in containers. Which is why it's imperative that you know how to setup and install Docker and docker compose on your local Ubuntu workstation. In this tutorial, we'll ... Continue Reading
By- Cameron McKenzie, TechTarget
-
Definition
04 Jun 2025
What is VR locomotion (virtual reality locomotion)?
VR locomotion refers to the techniques and technologies that allow users to move within a virtual reality (VR) environment. Continue Reading
-
News
04 Jun 2025
Amazon to launch $10B data center upgrade in North Carolina
As Amazon races to compete with Big Tech rivals for AI dominance, its Tar Heel State investment is part of a $100 billion capital expenditure effort slated for 2025. Continue Reading
By- Shane Snider, Senior News Writer
-
Tip
04 Jun 2025
A guide to risk registers: Benefits and examples
Risk registers document, prioritize and track an organization's risks, providing a holistic view of the risks and a ready way to communicate risk strategies. Continue Reading
-
Opinion
04 Jun 2025
Agentic AI for networking: Catalyst or distraction?
Though many networking platforms claim to be agentic, few truly are. Here's how to determine whether a platform is agentic and what this AI wave means for IT. Continue Reading
By- Jim Frey, Principal Analyst
-
Omdia
Intelligence and advice powered by decades of global expertise and comprehensive coverage of the tech markets.
-
Blog Post
04 Jun 2025
A quick look at inferred types and the Java var keyword
Here's a quick look at the Java var keyword and what it looks like when you use inferred types in your code. Continue Reading
By- Cameron McKenzie, TechTarget
-
News
04 Jun 2025
Health insurance coverage costs soar 6% in 2025
Spikes in health insurance coverage costs could raise questions about how much employers and employees will shoulder these expenses moving forward. Continue Reading
By- Sara Heath, Executive Editor
-
Tip
04 Jun 2025
Learn how to harness strategic risk and improve your operations
Organizations face factors beyond their control that can prevent them from meeting their long-term goals. Learn about the building blocks behind a cohesive strategic risk strategy. Continue Reading
By- Stephen J. Bigelow, Senior Technology Editor
-
Blog Post
04 Jun 2025
Platform Engineering Series: Editorial brief & scope
DevOps is dead, they say. The end is nigh for DevOps because platform engineering is about to take over as the “new” way to coordinate software application development and its corresponding ... Continue Reading
-
News
04 Jun 2025
Put ROCs before SOCs, Qualys tells public sector
Putting risk operations before security operations may help government agencies and other public sector bodies better manage the myriad threats they face, and make better decisions for the security of all Continue Reading
By- Alex Scroxton, Security Editor
-
News
04 Jun 2025
NCSC sets out how to build cyber safe cultures
The UK’s National Cyber Security Centre has published guidance for security teams and leaders on how to foster accessible and appropriate cyber security cultures in their organisations Continue Reading
By- Alex Scroxton, Security Editor
-
News
04 Jun 2025
Investigatory powers: Guidelines for police and spies could also help businesses with AI
Computer Weekly talks to Muffy Calder, technology advisor to the UK’s investigatory powers commissioner, about privacy, intrusion and artificial intelligence Continue Reading
By- Bill Goodwin, Investigations Editor
-
News
04 Jun 2025
CBO: Tax bill would strip health insurance from 11 million people
The Congressional Budget Office projected that nearly 11 million people would lose health insurance coverage under Trump's tax bill, which House Republicans narrowly passed in May. Continue Reading
By- Jill Hughes, Associate Editor
-
News
04 Jun 2025
Legends ASM taps Boldyn to enhance fans’ entertainment experience
Leading UK neutral host provider boosts connectivity at first direct bank arena, laying groundwork for all UK mobile operators to provide uninterrupted, high-speed 5G coverage at the venue Continue Reading
By- Joe O’Halloran, Computer Weekly
-
Definition
04 Jun 2025
What is a SIM card and how does it work?
A SIM card, also known as a subscriber identity module, is a smart card that stores the information necessary for a smartphone to connect to a mobile network. Continue Reading
By- Scott Robinson, New Era Technology
- Alexander S. Gillis, Technical Writer and Editor
-
Blog Post
04 Jun 2025
FinOps X Foundation: FinOps for AI comes 'before' AI for FinOps
The Computer Weekly Developer Network followed the FinOps Foundation to San Diego this month for just about the last technology conference before the summer recess, this was FinOps X 2025 and it ... Continue Reading
-
News
04 Jun 2025
SXSW London: Risk of AI removing choice
The modern era, where AI speeds up day-to-day chores, is undermining creativity and the ability to make choices Continue Reading
By- Cliff Saran, Managing Editor