Topics Archive
Free guide to low-code & no-code platforms
Platforms that enable shadow IT are changing development roles and processes. Here's why it's time to embrace this new reality.
-
News
03 Apr 2024
Enterprise Kubernetes and container storage a work in progress
Containers and Kubernetes have entirely different storage and backup needs compared with traditional IT, industry experts say, requiring stakeholder input and new vendor offerings. Continue Reading
-
Opinion
03 Apr 2024
Security Think Tank: Banning ransomware payments is not so straightforward
In the wake of renewed calls for lawmakers to consider enacting legal bans on ransomware payments, the Computer Weekly Security Think Tank weighs in to share their thoughts on how to tackle the scourge for good. Continue Reading
-
News
03 Apr 2024
RDP abused in over 90% of cyber attacks, Sophos finds
Threat actors continue to see great success using simple, tried and tested methods, and many defenders are failing to do the basics Continue Reading
-
News
03 Apr 2024
Frontline worker jobs at risk from AI surge
Experts warn that AI's ascent could disproportionately affect frontline jobs, worsening mental health and deepening the skills divide. Some workers fear obsolescence due to AI. Continue Reading
-
Answer
03 Apr 2024
What is a SharePoint document conversation?
SharePoint's document conversation features have evolved from in-document chats to Viva Engage posts. Learn what a document conversation is and how it can engage employees. Continue Reading
-
Tip
03 Apr 2024
AI communications features key when assessing UC vendors
UC vendors are adding more AI capabilities with each software release. What's the best way to ensure vendors' capabilities align with your goals? Continue Reading
-
Tip
03 Apr 2024
How to conduct a data privacy audit, step by step
The vital importance of a data privacy audit can't be underestimated in today's climate of proliferating customer data, more stringent regulations and sophisticated cyber threats. Continue Reading
-
News
03 Apr 2024
Sophos: Ransomware present in 70% of IR investigations
Sophos' Active Adversary Report said securing remote desktop protocols and Active Directories and hardening credentials can help limit the influx of successful ransomware attacks. Continue Reading
-
News
03 Apr 2024
Ransomware kill switch may save 99% of files from encryption
MDR specialist Adlumin says its new features will help customers stop in-progress ransomware attacks before they can cause significant damage Continue Reading
-
Tip
03 Apr 2024
Vector vs. graph vs. relational database: Which to choose?
Vector databases enhance the use of generative AI. Organizations should consider how vector capabilities stack up vs. graph and relational databases before deciding which to use. Continue Reading
-
News
03 Apr 2024
Cato claims SASE speed record
Fast cars meet even faster networks as leading SASE provider doubles throughput to double-digit gigabits per second without any hardware upgrades, attributing the landmark as underscoring value of fully cloud-native platform Continue Reading
-
Blog Post
03 Apr 2024
OpenStack Caracal improves agility & delivers bite as VMware alternative
The OpenStack has released Caracal (pronounced:‘keh·ruh·kal’ and named after the  medium-sized wild cat native to Africa, the Middle East and Asia) marking the 29th version of this widely deployed ... Continue Reading
-
News
03 Apr 2024
Women in Data: MoD’s first chief data officer on overcoming imposter syndrome
At the recent Women In Data event, Caroline Bellamy outlined why the defence sector needs diversity of thinking when tackling threats Continue Reading
-
News
03 Apr 2024
Cyber Safety Review Board slams Microsoft security failures
The Department of Homeland Security's Cyber Safety Review Board said a 'cascade' of errors at Microsoft allowed nation-state hackers to access U.S. government emails last year. Continue Reading
-
Definition
03 Apr 2024
AI red teaming
AI red teaming is the practice of simulating attack scenarios on an artificial intelligence application to pinpoint weaknesses and plan preventative measures. Continue Reading
-
Definition
03 Apr 2024
data minimization
Data minimization aims to reduce the amount of collected data to only include necessary information for a specific purpose. Continue Reading
-
News
03 Apr 2024
AiP advances ‘pivotal’ for 5G, 6G evolution
Research into antenna-in-package arena reveals how development in various substrate types and packaging methods can boost the roll-out of 5G mmWave networks and drive the forthcoming 6G market Continue Reading
-
Definition
03 Apr 2024
enterprise storage
Enterprise storage is a centralized repository for business information that provides common data management, protection and sharing functions through connections to computer systems. Continue Reading
-
Blog Post
03 Apr 2024
CodiumAI eyes ‘agentic future’ for AI-powered software developers
Every company is a data company. Now, of course, every company is an Artificial Intelligence (AI) company. Plus, logically every company must now think of itself as a generative AI company. But how ... Continue Reading
-
News
03 Apr 2024
Trend Micro: LockBit ransomware gang's comeback is failing
LockBit is struggling to resume operations in part due to the name-and-shame aspect of the international law enforcement operation responsible for the gang's disruption. Continue Reading
-
News
03 Apr 2024
Remanufactured bridging the gap between used and new tech
The CEO of Circular Computing explains how he got to the stage where he was operating a sizeable factory offering a fresh life to hardware Continue Reading
-
Blog Post
03 Apr 2024
Green coding - MinIO: An unlikely problem in 'modern' software environments
This is a guest post for the Computer Weekly Developer Network written by Keith Pijanowski in his role as subject matter expert (SME) for Artificial Intelligence & Machine Learning (AI/ML) at ... Continue Reading
-
Blog Post
03 Apr 2024
Logitech signature slim keyboard & comboÂ
There’s only one problem with Logitech. Spoiler alert, it’s a good problem, but it is an issue. I’ve not found a keyboard or mouse combination to rival it (okay, the PC mouse products from Razer ... Continue Reading
-
News
03 Apr 2024
Fujitsu staff instructed how to bid for government contracts during self-imposed ban
Leak reveals how Fujitsu advises staff to approach UK government customers during its self-imposed bidding pause, as well as details of a multimillion-pound project to protect its reputation Continue Reading
-
Feature
03 Apr 2024
Marketing in the metaverse: What marketers need to know
The key to marketing is to stay in front of the target audience. With the evolving metaverse, companies can learn new ways to market to customers in this immersive, digital world. Continue Reading
-
Feature
02 Apr 2024
Storage technology explained: Flash vs HDD
In this guide, we examine the differences between flash storage and HDD, the rise of NVMe and much denser formats such as QLC, and whether or not flash will vanquish HDD in the all-flash datacentre Continue Reading
-
Video
02 Apr 2024
Undo and revert pushed Git commits
If you want to undo a git push, you have one of two options: revert or reset. It's safest to revert a pushed commit, but a reset is only to permanently delete a pushed commit. Continue Reading
-
News
02 Apr 2024
GitHub Actions-hosted runners tie in Azure private networks
Private network support is also planned for AWS and Google Cloud Platform, but industry watchers see a power play for Microsoft Azure in GitHub Actions updates this week. Continue Reading
-
Definition
02 Apr 2024
serverless database
A serverless database is a type of cloud database that is fully managed for an organization by a cloud service provider and runs on demand as needed to support applications. Continue Reading
-
News
02 Apr 2024
Microsoft unbundles Teams, but change won't affect market
Microsoft's decision to separate out Teams from its Office 365 and Microsoft 365 products might satisfy regulators, but won't change adoption trends. Continue Reading
-
Tip
02 Apr 2024
Top 10 industry use cases for vector databases
Vector database popularity is rising as generative AI use increases across all industries. Here are 10 top use cases for vector databases that generate organizational value. Continue Reading
-
News
02 Apr 2024
Microsoft Copilot for Security brings GenAI to SOC teams
Microsoft's latest AI-powered tool, now generally available, has been beneficial for security teams regarding efficiency, but infosec experts see some room for improvements. Continue Reading
-
Feature
02 Apr 2024
Case study: Network Rail on the data-driven decisions keeping our railways safe
Network Rail discusses how it is using data to reduce the need for speed restrictions and lower the risk of delays for the nation's rail users Continue Reading
-
Opinion
02 Apr 2024
Security Think Tank: How to tackle the scourge of ransomware?
In the wake of renewed calls for lawmakers to consider enacting legal bans on ransomware payments, the Computer Weekly Security Think Tank weighs in to share their thoughts on how to tackle the scourge for good. Continue Reading
-
News
02 Apr 2024
Neos Networks, Instant On IT deliver connectivity to hold up in court
Critical network infrastructure provider partners with bespoke IT services provider to deliver reliable and secure connectivity for legal chambers Continue Reading
-
Tutorial
02 Apr 2024
Configure Kubernetes garbage collection to get rid of waste
Kubernetes garbage collection is an important task for cluster health. Learn how to configure garbage collections to your own preference to effectively manage deployments. Continue Reading
-
Blog Post
02 Apr 2024
Green coding - KX: Going green in preparation for the year of the AI agent
This is a guest post for the Computer Weekly Developer Network written by Conor Twomey in his position as head of customer success at KX. KX describes itself as a global leader in vector and ... Continue Reading
-
News
02 Apr 2024
AI assistant from Tableau targets efficiency, deep analysis
The analytics vendor's copilot can recommend questions that might lead to otherwise undiscovered insights as well as understand follow-up questions that result in deep analysis. Continue Reading
-
News
02 Apr 2024
Microsoft pushes Teams out of M365 and O365 bundle globally
Microsoft claims Teams push out of bundle will simplify pricing, with enterprise IT buyers possibly better off Continue Reading
-
News
02 Apr 2024
Edge AI startup reveals GenAI accelerator, $120M fundraise
The startup introduced a new GenAI accelerator for PCs and smart vehicles. The vendor's growth highlights the shift to training GenAI workloads from the cloud to the edge. Continue Reading
-
News
02 Apr 2024
Security and AI occupy SME thoughts
Digital workspace player Espria shares the themes it uncovered at its recent discussion around technology that delivers users peace of mind Continue Reading
-
News
02 Apr 2024
Risks and rewards of AI in HCM
Research from Citi Commercial Bank warns of the risks associated with overusing AI in human capital management Continue Reading
-
Definition
02 Apr 2024
Peripheral Component Interconnect Express (PCIe, PCI-E)
Peripheral Component Interconnect Express (PCIe or PCI-E) is a serial expansion bus standard for connecting a computer to one or more peripheral devices. Continue Reading
-
Tip
02 Apr 2024
Cloud computing forensics techniques for evidence acquisition
With the proper tools and methodologies, security teams can provide analysts with the critical pieces required to complete cloud computing forensics investigations. Continue Reading
-
Tip
02 Apr 2024
What are the pros and cons of Microsoft Universal Print?
The modernization of many organizations revolves around the cloud and newer user devices, and a Microsoft offering could help bridge the gap with legacy printing infrastructure. Continue Reading
-
Feature
02 Apr 2024
SASE vs. SD-WAN: What's the difference?
SASE and SD-WAN are two similar architectures administrators use to provide secure network access, but they differ in terms of deployment, security, connectivity and more. Continue Reading
-
News
02 Apr 2024
North America leads charge as global 5G connections surge
A 66% increase in 2023 sees 7.6 billion 5G global connections at the end of the year, driven by strong North American market, with total set to rise to 7.9 billion by 2028 Continue Reading
-
News
02 Apr 2024
Flash storage prices rise by 25% as manufacturers chase profitability
Analysis of 30,000-plus drive prices shows cost of flash drives per gigabyte rose sharply since October 2023, as memory manufacturers limit supplies and increase prices Continue Reading
-
News
02 Apr 2024
Finnish industrial groups launch AI and robotics ventures
Industrial companies across a broad range of sectors in Finland are applying artificial intelligence to their operation Continue Reading
-
News
02 Apr 2024
Huawei hit the accelerator in 2023
Chinese tech giant posts annual results showing solid ICT infrastructure business, consumer business meeting expectations, steady growth in cloud computing and digital power businesses Continue Reading
-
News
02 Apr 2024
US and UK agree AI safety collaboration
The UK and US governments have signed an agreement to forge close ties between their respective AI Safety Institutes Continue Reading
-
Definition
02 Apr 2024
data analytics (DA)
Data analytics (DA) is the process of examining data sets to find trends and draw conclusions about the information they contain. Continue Reading
-
Definition
02 Apr 2024
Google Search Generative Experience (SGE)
Google Search Generative Experience (SGE) is a set of search and interface capabilities that integrates generative AI-powered results into Google search engine query responses. Continue Reading
-
Feature
01 Apr 2024
6 business benefits of data protection and GDPR compliance
Complying with GDPR and avoiding severe fines is a primary goal of businesses, but the data governing principles and security tools to achieve compliance yield systemic benefits. Continue Reading
-
Tip
01 Apr 2024
Top 4 mobile security threats and challenges for businesses
Mobile devices are a target for hackers, with several ways to steal data. These threats -- from network spoofing to phishing texts -- endanger organizations as much as individuals. Continue Reading
-
News
01 Apr 2024
Vector search and storage key to AWS' database strategy
The tech giant is prioritizing vector search and storage, adding the capabilities to its data storage tools so customers can use them with language models to build AI applications. Continue Reading
-
News
01 Apr 2024
XZ backdoor discovery reveals Linux supply chain attack
A maintainer for XZ, a popular open source compression library for Linux distributions, compromised the open source project over the course of two years. Continue Reading
-
Definition
01 Apr 2024
double materiality
Double materiality extends the traditional accounting principle of materiality beyond financial information to include environmental, social and governance factors. Continue Reading
-
Video
01 Apr 2024
How to use Git's 'set upstream push' command
Need to fix the 'no upstream branch' error message? Then you need to run the 'git set upstream push' command. Here's how. Continue Reading
-
News
01 Apr 2024
AWS, Google release contact center GenAI tools
AWS releases contact center workforce management features and post-call summaries powered by GenAI; Google previews its own for Contact Center AI Platform. Continue Reading
-
Tip
01 Apr 2024
How to find the customer journey moments of truth
A moment of truth can turn a potentially positive experience into a negative one, and vice versa. Understanding moments of truth requires a complete knowledge of the customer journey. Continue Reading
-
Feature
01 Apr 2024
Tech sector layoffs explained: What you need to know
Large tech layoffs continue through 2024 with headlines showing thousands of people losing their jobs. Here is why the economy, interest rates and pandemic hiring are to blame. Continue Reading
-
Tip
01 Apr 2024
Best practices for cloud storage optimization vs. repatriation
While cloud storage repatriation grabs headlines, it's not for everyone. Sometimes, it's better to improve an organization's platform rather than make a wholesale change. Continue Reading
-
Feature
01 Apr 2024
Creating equity for women in communications and technology
Creating a more equitable workplace starts at the top. Female IT leaders at Enterprise Connect explain how to create a culture that supports women in communications. Continue Reading
-
News
01 Apr 2024
Open source alert over intentionally placed backdoor
A backdoor in the open source XZ Utils data compression library could have led to widespread compromise across the Linux ecosystem - and the community is on the trail of a developer who seems to be behind it Continue Reading
-
Feature
01 Apr 2024
6 social media conferences to attend in 2024
Social media is changing how businesses market products, interact with customers and build awareness. Here are events where businesses can learn to make the most of social media. Continue Reading
-
Tip
01 Apr 2024
Infrastructure requirements for Kubernetes cluster networking
A well-architected network infrastructure is vital for Kubernetes cluster networking, providing seamless communication and resource orchestration across containerized workloads. Continue Reading
-
Opinion
01 Apr 2024
Security Think Tank: Ransomware lessons from the armed forces
In the wake of renewed calls for lawmakers to consider enacting legal bans on ransomware payments, the Computer Weekly Security Think Tank weighs in to share their thoughts on how to tackle the scourge for good. Continue Reading
-
Definition
01 Apr 2024
warm site
A warm site is a type of facility an organization uses to recover its technology infrastructure when its primary data center goes down. A warm site features an equipped data center but no customer data. Continue Reading
-
Definition
01 Apr 2024
employee retention
Employee retention is the organizational goal of keeping productive and talented workers and reducing turnover by fostering a positive work atmosphere to promote engagement. Continue Reading
-
Feature
01 Apr 2024
Generational values in the workplace explained
Baby boomers and Gen X, Y and Z make up the modern workforce, bringing various skills to the table. Effective teamwork requires understanding the values each generation holds. Continue Reading
-
News
29 Mar 2024
Typosquatting campaign, malicious packages slam PyPI
Threat actors used automated typosquatting attacks to lead victims to malicious python packages in yet another campaign targeting the open-source software supply chain. Continue Reading
-
Feature
29 Mar 2024
How to pick the best thin client OS for an organization
Organizations that need thin clients may want to deploy thin client OSes to make management and local apps easier. Find out how to pick the right thin client OS. Continue Reading
-
News
29 Mar 2024
What role does CXL play in AI? Depends on who you ask
CXL has struggled to find its place in AI, given competing Nvidia components. But some argue the interconnect could help companies get the most out of their GPUs. Continue Reading
-
Tip
29 Mar 2024
How to get started with machine learning
Machine learning roles are rapidly evolving and require a diverse range of skills. Looking to join the field? Start by exploring job responsibilities and required experience. Continue Reading
-
Feature
29 Mar 2024
6 industrial metaverse use cases for manufacturing
Industrial metaverse use cases for manufacturing include facility design and employee training, though adoption of the technology is still in its early stages. Learn more. Continue Reading
-
News
29 Mar 2024
Organisations getting better at spotting identity fraud
As the barriers to committing identity fraud continue to drop, organisations should consider more sophisticated technical measures to successfully up their game, according to a report Continue Reading
-
Tip
29 Mar 2024
5 tips for building a cybersecurity culture at your company
As a company's cyber-risks evolve, so must its culture. Here are five tips for creating a cybersecurity culture that protects the business and is meaningful for employees. Continue Reading
-
Definition
29 Mar 2024
RFM analysis (recency, frequency, monetary)
RFM analysis is a marketing technique used to quantitatively rank and group customers based on the recency, frequency and monetary total of their recent transactions to identify the best customers and perform targeted marketing campaigns. Continue Reading
-
Definition
29 Mar 2024
REST (REpresentational State Transfer)
REST (REpresentational State Transfer) is an architectural style for developing web services and systems that can easily communicate with each other. Continue Reading
-
Definition
28 Mar 2024
retina scan
Retina scanning is a biometric authentication technology that uses an image of an individual's retinal blood vessel pattern as a unique identifying trait for access to secure installations. Continue Reading
-
Definition
28 Mar 2024
sensitive information
Sensitive information is data that must be protected from unauthorized access to safeguard the privacy or security of an individual or organization. Continue Reading
-
Feature
28 Mar 2024
AI a top trend for supply chain, but experts urge caution
AI is being adopted for company supply chains, but organizations should guard against hype and assess the business value and feasibility of these applications. Continue Reading
-
Opinion
28 Mar 2024
5 areas to help secure your cyber-risk management program
To meet the challenges of managing cyber-risk, organizations need to have a cyber-risk management plan in place. Look at five areas to better secure your organization's assets. Continue Reading
-
Opinion
28 Mar 2024
IT leaders curb GenAI enthusiasm at Enterprise Connect
IT leaders at Enterprise Connect expressed enthusiasm for GenAI experimentation in customer experience as well as circumspection that vendors should take on board. Continue Reading
-
News
28 Mar 2024
Microsoft intros new responsible AI tools in Azure Studio
The new tools address one of the barriers of adoption for enterprises looking to use generative AI technologies. They show Microsoft's thought process on government regulations. Continue Reading
-
Video
28 Mar 2024
Simple git stash example
The 'git stash' command is a powerful tool, but few developers know how to use it. Here's an example of how to create a Git stash and pop it back later. Continue Reading
-
Feature
28 Mar 2024
11 core elements of a successful data protection strategy
Your organization's data protection strategy might not include all 11 core elements and associated activities, but the important thing is to have a comprehensive strategy in place. Continue Reading
-
News
28 Mar 2024
US AI policy for federal agencies requires transparency
The OMB's new policy calls for federal agencies to be transparent about AI use and designate chief AI officers to coordinate efforts. Continue Reading
-
Feature
28 Mar 2024
What BYOD trends will take hold in the business world?
As employees and organizations come to expect greater mobility, BYOD is an important consideration in the successful planning and execution of the remote and hybrid workplace. Continue Reading
-
Tip
28 Mar 2024
Microsoft Teams phishing attacks and how to prevent them
Users who think phishing happens only over email should think again. Learn about recent Microsoft Teams phishing attacks and how to defend against them. Continue Reading
-
News
28 Mar 2024
Hybrid work drives demand for SASE, zero-trust networking
Aryaka report finds five key trends with 70% of CISOs seeking secure access service edge and software-defined WAN convergence for simplified infrastructure management Continue Reading
-
Tip
28 Mar 2024
How to handle environmental regulations and green networking
Green networking is achievable if network managers ensure devices and supporting systems are energy-efficient and comply with established environmental regulations. Continue Reading
-
Feature
28 Mar 2024
How Software-Enabled Flash could aid SSD management
A new development in flash storage could be a flexible option for any large-scale installation, as well as systems with custom software that's tuned for optimum performance. Continue Reading
-
News
28 Mar 2024
Avaya simplifies contact center line, inks Zoom partnership
Zoom to work natively in Avaya hardware-software work collaboration environments; Avaya revamps contact center lineup to reflect changing CX landscape. Continue Reading
-
News
28 Mar 2024
Government lifts chip strategy with a bit more cash
Unlike the EU and US, the UK government appears to be taking its time on providing a large cash injection to build out the UK semiconductor sector Continue Reading
-
Feature
28 Mar 2024
FTX scam explained: Everything you need to know
Cryptocurrency values rose in 2021 but started to decline in 2022, causing some exchange platforms to fold. FTX appeared to stay strong -- until news broke of an elaborate scam. Continue Reading
-
News
28 Mar 2024
UK plc going backwards on cyber maturity, Cisco report claims
Fewer UK organisations believe their cyber security postures have reached a mature level than did so 12 months ago, as they struggle to keep up with new challenges and a fast-evolving threat landscape Continue Reading
-
Definition
28 Mar 2024
HR automation
Human resources automation (HR automation) is a method of using software to automate and streamline repetitive and laborious HR tasks. Continue Reading
-
News
28 Mar 2024
Sellafield to be prosecuted over alleged cyber compliance failure
Sellafield Ltd, the organisation responsible for cleaning up and decommissioning the UK's largest nuclear waste site, is to be prosecuted over alleged cyber security failings dating back to 2019 Continue Reading