Topics Archive
Free guide to low-code & no-code platforms
Platforms that enable shadow IT are changing development roles and processes. Here's why it's time to embrace this new reality.
-
News
23 Apr 2025
Financially motivated cyber crime remains biggest threat source
Mandiant’s latest annual threat report reveals data on how financially motivated cyber criminals, such as ransomware gangs, dominate the cyber security landscape Continue Reading
By- Alex Scroxton, Security Editor
-
News
23 Apr 2025
Tariffs not likely to undermine Nvidia's AI dominance
Tariffs and restrictions on exports could mean more competition for the world's top AI hardware company. However, the vendor will still likely keep its lead in the AI chip market. Continue Reading
By -
Tip
23 Apr 2025
8 business use cases for ChatGPT in 2025
By the end of 2024, 76% of businesses worldwide were using ChatGPT. The real question is, how are they using it? Continue Reading
By- Kashyap Kompella, RPA2AI Research
-
News
23 Apr 2025
Datadog sees data observability join DevOps, adds Metaplane
Datadog has customers already bringing data science under DevOps and, with its latest acquisition, aims to create a unified tool set for the newly converged combo. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
23 Apr 2025
Blue Shield of California: Data of millions shared with Google
Blue Shield of California notified 4.7 million members of a breach, stating that Google Analytics was configured in a way that allowed member data to be shared with Google Ads for years. Continue Reading
By- Jill Hughes, Associate Editor
-
News
23 Apr 2025
Veeam data resilience strategy evolves beyond tech releases
Veeam's releases at its annual user conference included technology-specific backup products and a process-focused framework for increasing resilience. Continue Reading
By- Paul Crocetti, Editorial Director
-
Feature
23 Apr 2025
10 best practices for implementing AI in healthcare
To overcome hurdles and implement AI successfully, healthcare professionals must institute strong governance, routinely monitor progress, and develop secure and ethical models. Continue Reading
-
Definition
23 Apr 2025
What is a stored procedure?
A stored procedure is a set of Structured Query Language (SQL) statements that multiple programs can reuse and share to perform specific tasks. Continue Reading
-
News
23 Apr 2025
Medical misinformation rises as U.S. faces measles outbreak
Explore KFF data outlining the rise of medical misinformation related to the measles vaccine, set in the context of the nation's measles outbreak. Continue Reading
By- Sara Heath, Executive Editor
-
Tip
23 Apr 2025
9 Azure Virtual Desktop best practices for management
When an organization runs Azure Virtual Desktop, it needs to evaluate its internal processes and follow these best practices to deliver an efficient environment to end users. Continue Reading
By- Marius Sandbu, Sopra Steria
-
News
23 Apr 2025
Verizon DBIR: System intrusion is top healthcare breach cause
System intrusion, including ransomware, overtook miscellaneous errors as the top healthcare breach cause, according to the 2025 Verizon DBIR, or Data Breach Investigations Report. Continue Reading
By- Jill Hughes, Associate Editor
-
News
23 Apr 2025
Telenor IoT unveils ‘future-proof’ eSIM solution
Internet of things division of leading Nordic telco becomes latest in glut of providers to launch solution in flourishing embedded subscriber identity module market with standardised SGP.32 product Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
23 Apr 2025
Intel accelerates software-defined vehicles with SoC first
Automotive technology arm of chip giant Intel unveils product and customer development that it says marks a step forward in software-defined vehicle strategy Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
23 Apr 2025
Gutting ACA no-cost coverage to affect millions, mostly women
Nearly 1 in 3 adults with employer-sponsored health insurance received ACA no-cost coverage of preventive services threatened by a pending legal challenge, according to a study. Continue Reading
By- Jacqueline LaPointe, Executive Editor
-
News
23 Apr 2025
AvePoint event underlines partner progress
Efforts to educate and support the channel over the past year help deliver well-attended event and revenue growth Continue Reading
By- Simon Quicke, Microscope Editor
-
News
23 Apr 2025
UK acquisitions fuel Advania growth
Channel player shares numbers for FY ’24, with the business set up to repeat that performance again this year Continue Reading
By- Simon Quicke, Microscope Editor
-
News
23 Apr 2025
Avaya's Infinity rollout bolsters cloud, on-prem options
After acquiring Edify CCaaS, Avaya gives users more hybrid cloud options. Continue Reading
By- Don Fluckinger, Senior News Writer
-
Definition
23 Apr 2025
What is network availability?
Network availability is how long a network system is in uptime over a specific time interval. Continue Reading
By- Alexander S. Gillis, Technical Writer and Editor
-
Definition
23 Apr 2025
What is NFV MANO (network functions virtualization management and orchestration)?
NFV MANO (network functions virtualization management and orchestration), or just MANO, is an architectural framework used to manage and orchestrate virtual network functions (VNFs) and other software components. Continue Reading
By- Jennifer English, Editorial Director
-
Definition
23 Apr 2025
What is Amazon? Definition and company history of Amazon.com
Amazon (Amazon.com) is the world's largest online retailer and one of the largest providers of cloud services. Continue Reading
By- Rahul Awati
- Kinza Yasar, Technical Writer
-
Feature
23 Apr 2025
Enterprise strategies for API management
Application programming interfaces are the connective tissue of the modern enterprise, driving innovation and integration. But managing them effectively requires enterprises to consider governance, security and lifecycle management while preparing for emerging threats and technologies like AI Continue Reading
By- Aaron Tan, Informa TechTarget
-
Blog Post
23 Apr 2025
OpenUK details ‘state’ of Kubernetes
Kubernetes we know, UKubernetes (or perhaps it should be uKubernetes) we don’t know so much i.e. the state of the wildly popularised open source container orchestration platform in the UK in terms ... Continue Reading
-
News
23 Apr 2025
Amid uncertainty, Armis becomes newest CVE numbering authority
Amid an uncertain future for vulnerability research, exposure management company Armis has been given the authority to assign CVE IDs to newly discovered vulnerabilities Continue Reading
By- Alex Scroxton, Security Editor
-
News
23 Apr 2025
Vodafone, A1, Ericsson unveil first 5G Standalone international roaming
Global comms tech provider teams with operators in Germany and Bulgaria to confirm feasibility of cross-border 5G SA roaming to enhance responsiveness and reliability of services Continue Reading
By- Joe O’Halloran, Computer Weekly
-
Feature
23 Apr 2025
Hitachi Vantara: VSP One leads revamped storage portfolio
Storage supplier profile: Block, file and object as part of full-stack IT offer for hybrid cloud and containerised applications comes via VSP One arrays and EverFlex as-a-service options Continue Reading
By- Antony Adshead, Computer Weekly
-
Podcast
23 Apr 2025
Podcast: Quantum lacks profitability but it will come, says CEO
Computer Weekly talks to Quantum CEO Jamie Lerner about the company’s expertise in massive volumes of data and a roadmap that includes Myriad, a new file system for forever flash in the AI era Continue Reading
By- Antony Adshead, Computer Weekly
-
News
23 Apr 2025
Qualys goes to bat for US cricket side San Francisco Unicorns
Cloud security specialist Qualys partners with US T20 cricket squad San Francisco Unicorns and its Sparkle Army fanclub as the team prepares for its summer 2025 campaign Continue Reading
By- Alex Scroxton, Security Editor
-
News
23 Apr 2025
Digital ID sector calls for changes to government data legislation
Suppliers urge technology secretary to work more collaboratively with private sector over concerns government’s digital wallet will gain a monopoly in the market Continue Reading
By- Bryan Glick, Editor in chief
-
Opinion
23 Apr 2025
The tech investment gap: bridging the divide for underrepresented entrepreneurs
The figures for funding of female-led startups are shocking - and the same applies to most underrepresented groups. Tech leaders need to take action or risk missing out on new innovations and opportunities Continue Reading
By -
Definition
23 Apr 2025
What is ransomware? Definition and complete guide
Ransomware is malware that locks and encrypts a victim's data, files, devices or systems, rendering them inaccessible and unusable until the attacker receives a ransom payment. Continue Reading
By- Sharon Shea, Executive Editor
- Alissa Irei, Senior Site Editor
-
Tip
23 Apr 2025
Classical vs. quantum computing: What are the differences?
Classical and quantum computers differ in their computing capabilities, how they operate and the resources they need. Know the differences to plan for a quantum future. Continue Reading
By- Ryan Arel, Former Associate Site Editor
-
Feature
23 Apr 2025
Explore the impact of quantum computing on cryptography
When quantum computers become more widely available, lots of encryption types will be vulnerable. Learn why, plus solutions and how to navigate a post-quantum cryptography world. Continue Reading
By- Ryan Arel, Former Associate Site Editor
-
News
22 Apr 2025
Fujitsu targets private AI with Japanese LLM on Nutanix
Fujitsu’s Takane large language model, optimised for Japanese language and business use, is aimed at supporting private AI deployments Continue Reading
By- Aaron Tan, Informa TechTarget
-
Definition
22 Apr 2025
What is business transformation?
Business transformation refers to fundamental changes in an organization’s operations, strategy or structure to improve efficiency, competitiveness and financial performance. Continue Reading
-
Opinion
22 Apr 2025
3 EUC security topics I'll be looking for at RSAC 2025
There will be a ton of security topics that RSA Conference-goers can check out, but IT admins should be aware of three common themes surrounding email and endpoints. Continue Reading
By- Gabe Knuth, Principal Analyst
-
Omdia
Intelligence and advice powered by decades of global expertise and comprehensive coverage of the tech markets.
-
Definition
22 Apr 2025
What is crypto ransomware?
Crypto ransomware is a form of ransomware that uses cryptography to encrypt computer files so that the victim cannot access them. In exchange for the demanded ransom, the attacker claims it will tell the victimized business how to regain access to the stolen data. Continue Reading
By- Karen Kent, Trusted Cyber Annex
-
Tip
22 Apr 2025
A look at low Earth orbit use cases
LEO offers an alternative to traditional connectivity, especially in remote or underserved areas. While it has some limitations, it's quickly becoming an option in enterprise WAN. Continue Reading
By- John Burke, Nemertes Research
-
Video
22 Apr 2025
An explanation of data science and data scientist jobs
Data science uses advanced analytics techniques to gain insights, especially for business use cases. Continue Reading
By- Sabrina Polin, Managing Editor
-
Definition
22 Apr 2025
What is Bluesky?
Bluesky is an open source social media platform -- similar to X, formerly Twitter -- allowing users to create posts with a 300-character limit, which can include text, photos or videos. Continue Reading
-
Podcast
22 Apr 2025
Dynatrace strategist favors SLMs for AIOps
Specialized small language models will be necessary to automate revisions to production code for incident response, according to a longtime industry expert. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
22 Apr 2025
Docker plans Model Context Protocol security boost
Docker said it plans new tools integrating the emerging agentic AI standard protocol into existing workflows, including security controls. Continue Reading
By- Beth Pariseau, Senior News Writer
-
Tip
22 Apr 2025
Top 10 document management software in 2025
Many organizations require document management software that can automate workflows, support remote access and maintain compliance. Top systems include Box and SharePoint Online. Continue Reading
By- Christine Campbell, The Alpha Content Company
-
News
22 Apr 2025
Cyber attack downs systems at Marks & Spencer
A cyber attack at Marks & Spencer has caused significant disruption to customers, leaving them unable to make contactless payments or use click-and-collect services Continue Reading
By- Alex Scroxton, Security Editor
-
News
22 Apr 2025
Virgin Media O2 cuts carbon emissions 56% against its 2020 baseline
Virgin Media O2 reveals that it is on track to achieve net zero across its operations, products and supply chain by the end of 2040, 10 years ahead of UK’s net-zero goal Continue Reading
By- Joe O’Halloran, Computer Weekly
-
Definition
22 Apr 2025
What is orchestration in IT?
In IT, orchestration is a commonly used term for the automated coordination and management of different processes, systems and tasks. Continue Reading
By- Alexander S. Gillis, Technical Writer and Editor
-
News
22 Apr 2025
Cyber ‘agony aunts’ launch guidebook for women in security
Cyber ‘agony aunts’ Amelia Hewitt and Rebecca Taylor are launching a book aimed at empowering women in their cyber security careers Continue Reading
By- Alex Scroxton, Security Editor
-
News
22 Apr 2025
Secure Future Initiative reveals Microsoft staff focus
IT security is now a metric in the Microsoft employee appraisal process Continue Reading
By- Cliff Saran, Managing Editor
-
News
22 Apr 2025
Indirect billing by APCs common for office-based care
A study shows indirect billing by advanced practice clinicians (APCs) occurred for 39% of all office-based encounters with Medicare patients in 2022, highlighting the role of APCs. Continue Reading
By- Jacqueline LaPointe, Executive Editor
-
News
22 Apr 2025
HyperFiber scales with Render to boost broadband efficiency
Network workflow automation and productivity optimisation firm’s services deployed to scale fibre deployment across multiple expanding markets in key areas across US Continue Reading
By- Joe O’Halloran, Computer Weekly
-
Tip
22 Apr 2025
How to set up and use Azure Virtual Desktop
Azure Virtual Desktop helps organizations deliver virtual desktops and applications to users, while keeping management within the Microsoft ecosystem. Learn how to get started. Continue Reading
By- Marius Sandbu, Sopra Steria
-
News
22 Apr 2025
Digital member experience, app use low among health plans
Digital member experience trails other service sectors as health plan beneficiaries flag problems like poor navigation and information access. Continue Reading
By- Sara Heath, Executive Editor
-
Tip
22 Apr 2025
The ultimate guide to backup deduplication
Backup deduplication can reduce active storage space consumption, decrease backup job times and increase the overall efficiency of a storage infrastructure. Continue Reading
By- Damon Garn, Cogspinner Coaction
-
News
22 Apr 2025
Automotive OEMs accelerate AI integration for in-cabin mobility
Research note highlights how upcoming regulatory requirements are shaping the future of smart mobility with technology, playing a crucial role in improving safety, convenience and experiences Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
22 Apr 2025
Acer arms partners with reliability pledge
Hardware player Acer launches reliability promise to make its channel stand out in a crowded market Continue Reading
By- Simon Quicke, Microscope Editor
-
Feature
22 Apr 2025
GPT-4.1 explained: Everything you need to know
OpenAI released a new family of general-purpose models on April 14, 2025. The GPT-4.1 series includes three models with a developer focus – GPT-4.1, GPT-4.1 mini and GPT-4.1 nano. Continue Reading
-
Definition
22 Apr 2025
What is Microsoft Windows Assessment and Deployment Kit (Windows ADK)?
The Microsoft Windows Assessment and Deployment Kit (Windows ADK) is a set of tools that IT professionals can combine to prepare, assess and launch image-based Windows deployments. Continue Reading
By- Rahul Awati
- Eddie Lockhart, Site Editor
-
Opinion
22 Apr 2025
Beyond baselines - getting real about security and resilience
In an increasingly contested world, the UK government needs a security certification that goes beyond baseline measures. Continue Reading
By- Neil Ashdown and Tash Buckley
-
Definition
22 Apr 2025
What is traffic shaping (packet shaping)?
Traffic shaping, also known as packet shaping, is a congestion management method that regulates network data transfer by delaying the flow of less important or less desired packets. Continue Reading
By- Andrew Froehlich, West Gate Networks
-
Answer
22 Apr 2025
How to record Zoom breakout rooms
Zoom doesn't make it easy to record a breakout room, but it can be done with a few extra tweaks. Learn the steps to enable breakout room recording and boost the meeting experience. Continue Reading
By -
Feature
22 Apr 2025
How to prevent medical gaslighting from harming patient safety
Preventing patient safety issues and promoting patient trust will require health systems to learn how to prevent medical gaslighting in patient encounters. Continue Reading
By- Sara Heath, Executive Editor
-
Podcast
22 Apr 2025
The AI market does not understand AI safety
Responsible AI is often misunderstood as a way to make sure that a model is safe. However, AI safety examines whether harmful content is being produced or not. Continue Reading
By- Esther Shittu, News Writer
- Shaun Sutner, Senior News Director
-
News
22 Apr 2025
Ofcom bans leasing of Global Titles to crackdown on spoofing
Telco regulator Ofcom is cracking down on a loophole being exploited by cyber criminals to access sensitive mobile data Continue Reading
By- Cliff Saran, Managing Editor
-
Opinion
22 Apr 2025
Making the sustainability case for refurbished tech
Now is the time to think differently about hardware options argues Peter Miller, sales manager at ETB Technologies Continue Reading
By- Peter Miller, sales manager at ETB Technologies
-
News
22 Apr 2025
Government tests experimental AI for housing
The AI tool will be used to turn handwritten notes and scanned documents into high-quality data, aiming to improve efficiency in planning decisions for housing Continue Reading
By -
News
22 Apr 2025
AI-powered APIs proving highly vulnerable to attack
The growth of AI is proving a double-edged sword for API security, presenting opportunities for defenders to enhance their resilience, but also more risks from AI-powered attacks, according to report Continue Reading
By- Alex Scroxton, Security Editor
-
News
22 Apr 2025
Investigatory Powers Tribunal has no power to award costs against PSNI over evidence failures
Investigatory Powers Tribunal judges have called for the Home Secretary to step in after finding they have no powers to award costs against government bodies that fail to disclose evidence Continue Reading
By- Bill Goodwin, Investigations Editor
-
Opinion
22 Apr 2025
VMware licensing changes and the road ahead
VMware's new subscription fees: will enterprises pay up, walk away or explore a smarter third option? Continue Reading
By- Holland Barry
-
Definition
22 Apr 2025
What is APM? Application performance monitoring guide
Application performance monitoring is a technology-driven process to ensure business applications perform as expected through real-time performance tracking and trend analysis. Continue Reading
By- Craig Stedman, Industry Editor
- Stephen J. Bigelow, Senior Technology Editor
-
Feature
22 Apr 2025
9 quantum computing challenges IT leaders should know
While the theory of quantum mechanics is complex, the technology might offer practical uses for organizations. Learn about the challenges and opportunities of quantum computing. Continue Reading
-
News
21 Apr 2025
Unethical practices in telecoms channel called out
Hidden fees, lengthy contracts and a lack of transparency should inspire government action, argues one industry player Continue Reading
By- Simon Quicke, Microscope Editor
-
Opinion
21 Apr 2025
Canva: The business productivity app flying under IT's radar
Don't know what Canva is? Your employees do -- and they probably use it for work. Continue Reading
By- Gabe Knuth, Principal Analyst
-
Omdia
Intelligence and advice powered by decades of global expertise and comprehensive coverage of the tech markets.
-
Definition
21 Apr 2025
What are customer service and support?
Customer service is the support organizations offer to customers before, during and after purchasing a product or service. Continue Reading
By- Katie Terrell Hanna
- Sarah Amsler, Senior Managing Editor
- Michaela Goss, Senior Site Editor
-
Tutorial
21 Apr 2025
Get started with Java and AI: A guide to LLM integration
Want to unlock the power of AI in your Java applications? This walkthrough guides you on how to use OpenAI and Java with large language models to unlock powerful new capabilities. Continue Reading
By- A N M Bazlur Rahman, DNAStack
-
Tip
21 Apr 2025
Business continuity roles and responsibilities
Business continuity is a vital part of an organization's recovery strategy. Make sure that these BC roles and responsibilities are accounted for when crisis strikes. Continue Reading
By -
Definition
21 Apr 2025
What is talent management? Definition, basics and strategy
Talent management is a strategic approach organizations use to attract, develop, retain, and optimize employees. Continue Reading
-
News
21 Apr 2025
ERP customers seek answers to AI questions before investing
ERP customers say yes to AI investments, as long as they can realize efficiency and productivity gains. Continue Reading
By- Jim O'Donnell, News Director
-
News
21 Apr 2025
Digital health use growing in underserved counties
A new study reveals that use of digital health services was higher in counties with high social vulnerability, indicating a promising increase among underserved communities. Continue Reading
By- Anuja Vaidya, Senior Editor
-
Definition
21 Apr 2025
What is a mobile VPN?
A mobile virtual private network (mobile VPN) is a type of VPN specifically designed to maintain a stable and secure connection while a user moves across different networks. Continue Reading
By- Alexander S. Gillis, Technical Writer and Editor
-
Feature
21 Apr 2025
How Trump's pharma tariffs disrupt drug supply chains
With Trump's tariffs and global retaliation looming, pharmaceutical companies face financial risk, regulatory hurdles and pressure to quickly localize drug supply chains. Continue Reading
By- Alivia Kaylor, MSc, Senior Editor
-
Tip
21 Apr 2025
How AI personalization creates customized user experiences
Businesses can drive revenue and boost user engagement with AI personalization techniques -- if they also ensure transparency and data privacy. Continue Reading
By- Donald Farmer, TreeHive Strategy
-
Feature
21 Apr 2025
The 2 types of climate risk and how DR teams can prepare
Understanding the two types of climate risk and how to plan for them can help organizations better prepare for disasters and improve their impact on the environment. Continue Reading
By -
Definition
21 Apr 2025
What is quantum machine learning? How it works
Quantum machine learning (QML), also called quantum-enhanced machine learning, blends the computing power of quantum systems with the increasing computing demands of evolving machine learning models. Continue Reading
By- Stephen J. Bigelow, Senior Technology Editor
-
Feature
21 Apr 2025
Navigating HIPAA's reproductive healthcare data privacy rule
Compliance with a final rule to support reproductive healthcare data privacy can help entities mitigate risk despite the rule’s various legal challenges. Continue Reading
By- Jill Hughes, Associate Editor
-
Definition
21 Apr 2025
What is a brute-force attack?
A brute-force attack is a trial-and-error hacking method cybercriminals use to decode login information and encryption keys to gain unauthorized access to systems. Continue Reading
By- Mary E. Shacklett, Transworld Data
- Katie Terrell Hanna
-
Tip
21 Apr 2025
How to create a CBOM for quantum readiness
Quantum is on the horizon -- is your organization ready to migrate to post-quantum cryptographic algorithms? Make a CBOM to understand where risky encryption algorithms are used. Continue Reading
By -
News
21 Apr 2025
Top APAC firms recognised at innovation awards
Citic Telecom, CapitaLand Investment and DBS Bank were among the region’s top industry innovators recognised for their digital transformation efforts at the Computer Weekly Innovation Awards APAC 2025 Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
21 Apr 2025
CW Innovation Awards: Finding revenue gains from parked cars
Singapore real estate investment firm CapitaLand Investment taps machine learning models to optimise space utilisation across 23 commercial buildings and business parks Continue Reading
By- Eileen Yu
-
News
21 Apr 2025
CW Innovation Awards: M1 aims to become digital-native telco
The digital-first telco is running all its back-end systems on the cloud, enabling it to speed up decision-making and enhance customer service Continue Reading
By- Eileen Yu
-
News
21 Apr 2025
CW Innovation Awards: Transforming cyber security with AI
Facing rising cyber threats and a shortage of experts, Citic Telecom International CPC developed an AI-powered penetration testing tool to automate security audits and reduce costs Continue Reading
By -
News
21 Apr 2025
CW Innovation Awards: Taking the big bang approach to reporting
A company-wide SAP revamp has transformed Bosch Global Software Technologies’ financial and HR processes, delivering granular insights and streamlined operations Continue Reading
By -
News
21 Apr 2025
CW Innovation Awards: DBS AI assistant slashes call times and boosts productivity
The bank’s in-house generative AI tool is streamlining customer service, reducing manual work and speeding up response times, improving both employee and customer experience Continue Reading
By- Aaron Tan, Informa TechTarget
-
Definition
21 Apr 2025
What is dynamic and static?
In general, dynamic means 'energetic or forceful,' while static means 'stationary.' Continue Reading
By -
Tip
21 Apr 2025
5 key issues in performance management
Problems with the performance management process can lead to consequences such as discrimination or retaliation claims against a company. HR staff should learn about key issues. Continue Reading
By- Lynda Spiegel, Rising Star Resumes
-
Tip
21 Apr 2025
Top 5 ransomware attack vectors and how to avoid them
Protecting your organization against ransomware attack entryways could mean the difference between staying safe or falling victim to a devastating breach. Continue Reading
By- Ed Moyle, SecurityCurve
- Diana Kelley, SecurityCurve
-
Blog Post
20 Apr 2025
Java, JDBC and the HSQLDB database tutorial
Here's a quick JDBC with HSQLDB tutorial to get you up and running with Java database connectivity and the popular HyperSQL database. Continue Reading
By- Cameron McKenzie, TechTarget
-
Blog Post
20 Apr 2025
SLM series - Agiloft: Language models in contract lifecycle management
This is a guest post for the Computer Weekly Developer Network written by Thomas Levi in his role as senior director of AI and ML at Agiloft. Agiloft is customisable, no-code business process ... Continue Reading
-
Blog Post
19 Apr 2025
User input and Java's JOptionPane example
For new Java programmers, the JOptionPane class is a great visual and user-friendly introduction to user input and Swing-based programming. Here's how to get started. Continue Reading
By- Cameron McKenzie, TechTarget
-
News
18 Apr 2025
Google, Meta antitrust cases could set legal precedents
The courts dealt Google a blow this week, deciding it operates an illegal monopoly in digital ad tech. Meta's antitrust trial over Instagram and WhatsApp also began this week. Continue Reading
By- Makenzie Holland, Senior News Writer
-
Definition
18 Apr 2025
What is data profiling?
Data profiling refers to the process of examining, analyzing, reviewing and summarizing data sets to gain insight into the quality of data. Continue Reading
By- Alexander S. Gillis, Technical Writer and Editor
- Mary K. Pratt
- Sarah Lewis
-
Feature
18 Apr 2025
How do cybercriminals steal credit card information?
Cybercriminals have various methods at their disposal to hack and exploit credit card information. Learn what they are, how to prevent them and what to do when hacked. Continue Reading
By- Stephen J. Bigelow, Senior Technology Editor