Topics Archive
Free guide to low-code & no-code platforms
Platforms that enable shadow IT are changing development roles and processes. Here's why it's time to embrace this new reality.
-
News
18 Mar 2025
AI pushes data storage need but UK firms struggle to manage it
The rise of AI means potentially almost any corporate data could be useful, but has led to ballooning data volumes and organisations spending more on storage and energy Continue Reading
By- Antony Adshead, Computer Weekly
-
E-Zine
18 Mar 2025
UK under-prepared for catastrophic cyber attack
In this week’s Computer Weekly, MPs have been told the UK is under-prepared to cope with a catastrophic cyber attack – we find out where the problems lie. Our new buyer’s guide assesses the challenges of datacentre capacity planning. And one of the UK’s most successful businessmen, Sir Martin Sorrell, gives his view on the risks and opportunities of AI. Read the issue now. Continue Reading
-
News
18 Mar 2025
Seaco charts course for unified security strategy
Shipping container leasing giant consolidates security tools onto a single platform, leveraging AI and extended detection and response to improve security operations Continue Reading
By- Aaron Tan, Informa TechTarget
-
Tip
18 Mar 2025
Kubernetes automation: Use cases and tools to know
Kubernetes automation simplifies the configuration, deployment and management of prepackaged container components supporting business apps, but it's not recommended in all cases. Continue Reading
-
News
17 Mar 2025
Baidu's low-priced new AI models bring questions about cost
The Chinese tech vendor said its reasoning model matches DeepSeek's performance, at half the price. It's unclear how much the vendor spent to build it. Continue Reading
By- Esther Shittu, News Writer
-
News
17 Mar 2025
GitHub Actions supply chain attack spotlights CI/CD risks
Experts say a GitHub Actions vulnerability should renew enterprises' attention to securing build pipelines the same way they secure production environments. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
17 Mar 2025
Cisco makes Webex AI updates widely available
The Cisco AI Assistant in Webex Contact Center and the Webex AI Agent for self-service customer support are now generally available. More AI features are coming. Continue Reading
By- Antone Gonsalves, Editor at Large
-
Tip
17 Mar 2025
5 fundamental strategies for REST API authentication
Implementing an effective REST API authentication strategy can help protect users and their data while maintaining a seamless data exchange across boundaries. Continue Reading
By- Priyank Gupta, Sahaj Software
-
Feature
17 Mar 2025
8 service desk automation examples to enhance IT support
NLP-powered chatbots, escalation algorithms, data insights, onboarding, SLA monitoring and faster response times are service desk automation examples boosting IT support. Continue Reading
-
Tip
17 Mar 2025
How to avoid and prevent social engineering attacks
Organizations and employees must both do their part to prevent and avoid social engineering attacks. A combination of security controls, policies, procedures and training is necessary. Continue Reading
By -
Tip
17 Mar 2025
Quantum computer vs. supercomputer: Key differences
Quantum computers could someday outperform supercomputers by orders of magnitude. Compare speeds, capabilities and specialties, and get a look into a future that combines the two. Continue Reading
-
News
17 Mar 2025
PSNI’s ‘ridiculous’ withholding of evidence in spying operation delayed court hearings
Landmark ruling by the Investigatory Powers Tribunal will decide whether the surveillance court can award costs against government bodies accused of unreasonable behaviour Continue Reading
By- Bill Goodwin, Investigations Editor
- Cormac Kehoe
-
Tip
17 Mar 2025
IT automation vs. orchestration: Key differences
As complementary technologies, automation defines each repetitive task to be performed, while orchestration assembles arrays of individual tasks to accomplish complex workflows. Continue Reading
By- Stephen J. Bigelow, Senior Technology Editor
-
Definition
17 Mar 2025
What is data curation?
Data curation is the process of creating, organizing and maintaining data sets so people looking for information can access and use them. Continue Reading
By- Kinza Yasar, Technical Writer
- Mary K. Pratt
-
News
17 Mar 2025
Microsoft takes Teams Phone to Dynamics 365 Contact Center
Microsoft's updates for Teams Phone include Dynamics 365 Contact Center integration and Copilot features to improve customer service. Continue Reading
By- Antone Gonsalves, Editor at Large
-
Tip
17 Mar 2025
Top 16 technical skills for HR professionals
Today's HR departments are increasingly reliant on a range of technologies. That means human resources professionals must get tech-savvy -- and do so quickly. Continue Reading
By -
Opinion
17 Mar 2025
Data protection and AI: what to know about new UK cyber standard
A strategic governmental steer on AI, putting guidance above rigid legislation offers the adaptability needed to innovate responsibly, contends Kiteworks executive John Lynch Continue Reading
By- John Lynch
-
News
17 Mar 2025
Zoom advances AI Companion with agentic AI
Zoom's AI Companion improvements include automated tasks, better action item detection and real-time note taking. The new features will be launched in stages through mid-2025. Continue Reading
By- Antone Gonsalves, Editor at Large
-
News
17 Mar 2025
Online Safety Act measures come into effect
Regulator Ofcom is now able to take enforcement action against platforms under the Online Safety Act if they fail to proactively safeguard against content such as terrorist or child sexual abuse material Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Definition
17 Mar 2025
What is mobile device management (MDM)?
Mobile device management (MDM) software enables IT administrators to control, secure and enforce policies on smartphones, tablets and other endpoints. Continue Reading
By- Mary E. Shacklett, Transworld Data
- Will Kelly
- Erica Mixon
-
Blog Post
17 Mar 2025
What on earth is data lineage?
This is a guest blogpost by Steve Neat, general manager, EMEA, Solidatus Perhaps you’ve heard someone mention “data lineage” in a meeting. You might have nodded along while secretly wondering what ... Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
Definition
17 Mar 2025
What is pipelining?
Pipelining is the process of a computer processor executing computer instructions as separate stages. Continue Reading
-
Video
17 Mar 2025
Story points and hours of effort in Scrum
Story points and hours help Agile teams calculate the amount of work and time estimated to complete tasks. Here's how these systems are different. Continue Reading
By- Darcy DeClute, Scrumtuous Inc.
-
News
17 Mar 2025
Physicians lose the most from provider credentialing delays
With average provider credentialing delays of 90-120 days, healthcare professionals are losing substantial revenue, based on data from the U.S. Bureau of Labor Statistics. Continue Reading
By- Jacqueline LaPointe, Executive Editor
-
Feature
17 Mar 2025
How payers, providers can unify around patient-centered care
Value-based care models and innovative contracting can help payers and providers align on patient-centered care. Continue Reading
By- Sara Heath, Executive Editor
-
Definition
17 Mar 2025
What is a buffer overflow? How do these types of attacks work?
A buffer overflow occurs when a program or process attempts to write more data to a fixed-length block of memory, or buffer, than the buffer is allocated to hold. Continue Reading
-
News
17 Mar 2025
Qualtrics releases employee, customer service AI agents
Qualtrics joins the agentic AI free-for-all in CX. Continue Reading
By- Don Fluckinger, Senior News Writer
-
Definition
17 Mar 2025
What is the Server Message Block (SMB) protocol? How does it work?
The Server Message Block (SMB) protocol is a client-server communication protocol used for sharing access to files, printers, serial ports and other resources on a network. Continue Reading
-
Definition
17 Mar 2025
What is User Datagram Protocol (UDP)?
User Datagram Protocol (UDP) is a communications protocol primarily used to establish low-latency and loss-tolerating connections between applications on the internet. Continue Reading
By- Scott Robinson, New Era Technology
- Linda Rosencrance
- George Lawton
-
News
17 Mar 2025
Who takes responsibility? Birmingham’s ERP extraordinary meeting
Council members took the opportunity to raise their concerns during the Birmingham City Council ERP meeting, which took place on 11 March Continue Reading
By- Cliff Saran, Managing Editor
-
News
17 Mar 2025
Private cellular network market projected to grow 114% by 2028
Global private cellular network revenue will reach $12.2bn by 2028, a significant increase from $5.7bn in 2025, but 5G tech sales are not taking off as quickly as expected Continue Reading
By- Joe O’Halloran, Computer Weekly
-
Feature
17 Mar 2025
Optimizing prior authorization with AI-driven efficiency
As prior authorization poses a hurdle in healthcare, AI-driven solutions are reshaping the process by reducing delays, improving efficiency and minimizing administrative burdens. Continue Reading
By- Alivia Kaylor, MSc, Senior Editor
-
News
17 Mar 2025
Genesys, Google add to contact center generative AI services
Genesys and Google roll out their next wave of AI tools for customer service. Continue Reading
By- Don Fluckinger, Senior News Writer
-
News
17 Mar 2025
Hetzner enhances datacentre core network infrastructure
Hosting company taps tech provider to futureproof datacentre and core network infrastructure to support growing digital demands with architecture supporting 400G and 800G interconnectivity Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
17 Mar 2025
Satellite technology to provide broadband to remote areas of Buckinghamshire
Buckinghamshire Council harnesses low Earth orbit technology to serve the most remote areas of the county with ultrafast broadband Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
Blog Post
17 Mar 2025
The importance of taking time to get IT right
The dust has yet to settle on the 67-page auditor’s report looking into what went so badly wrong at Birmingham City Council with its enterprise resource planning (ERP) project to replace SAP with ... Continue Reading
By- Cliff Saran, Managing Editor
-
News
17 Mar 2025
Tech career interest higher among SEND pupils
Research by EngineeringUK and The Royal Society has found that students with special educational needs have more interest in tech careers than other pupils Continue Reading
By- Clare McDonald, Business Editor
-
Feature
17 Mar 2025
Space and power constrain datacentre planning
The government needs to tackle the resource issues that act as roadblocks to building out UK datacentre capacity Continue Reading
By -
Opinion
17 Mar 2025
UK tech growth is vibrant - now scale it to the world
The UK has proved its credentials for creating innovative tech startups - but has more to do when it comes to supporting those companies in scaling up their business to global success Continue Reading
By- Russ Shaw, Tech London Advocates and Global Tech Advocates
-
News
17 Mar 2025
How Oracle is using AI to combat financial crime
The tech giant is leveraging artificial intelligence to surface fraudulent financial transactions and improve the efficiency of financial crime investigations, offering relief to banks battling high costs and alert fatigue Continue Reading
By- Aaron Tan, Informa TechTarget
-
Definition
17 Mar 2025
What is elliptical curve cryptography (ECC)?
Elliptical curve cryptography (ECC) is a public key encryption technique based on elliptic curve theory that can be used to create faster, smaller and more efficient cryptographic keys. Continue Reading
By- Rahul Awati
- Andrew Froehlich, West Gate Networks
-
16 Mar 2025
Space and power constrain datacentre planning
The government needs to tackle the resource issues that act as roadblocks to building out UK datacentre capacity. Continue Reading
-
16 Mar 2025
UK government under-prepared for catastrophic cyber attack, hears PAC
The Commons Public Accounts Committee heard government IT leaders respond to recent National Audit Office findings that the government’s cyber resilience is under par Continue Reading
-
Feature
14 Mar 2025
Data preparation in machine learning: 4 key steps
Data preparation for ML is key to accurate model results. Clean and structure raw data to boost accuracy, improve efficiency, and reduce overfitting for more reliable predictions. Continue Reading
By- Donald Farmer, TreeHive Strategy
-
Tip
14 Mar 2025
How to choose the right CRM software for your organization
Choosing the right CRM software can be daunting for organizations. These seven steps and best practices ensure the search, adoption and deployment processes go smoothly. Continue Reading
By- Robert Peledie, 365Knowledge Ltd.
- Kurt Marko, MarkoInsights
-
News
14 Mar 2025
AI in the workplace: Businesses brace for new rules
States are tightening rules on AI in the workplace, while the federal government pushes for deregulation, setting up a battle over hiring and bias laws. Continue Reading
By- Patrick Thibodeau, Editor at Large
-
Tip
14 Mar 2025
APM best practices: 9 strategies to adopt
Teams responsible for APM must develop a clear strategy to identify performance risks, reduce APM costs and secure sensitive data collected as part of their initiatives. Continue Reading
By -
Opinion
14 Mar 2025
MWC 2025: Enterprise networking in a jungle of mobility
The latest private 5G, FWA and several DAS/neutral host choices were on display at this year's Mobile World Congress event. Continue Reading
By- Jim Frey, Principal Analyst
-
Omdia
Intelligence and advice powered by decades of global expertise and comprehensive coverage of the tech markets.
-
Tip
14 Mar 2025
Compare SaaS data retention policies from 5 major providers
How long is your SaaS platform keeping your data? Learn how these five popular vendors handle data retention. Continue Reading
-
Tip
14 Mar 2025
How to secure AI infrastructure: Best practices
AI tools are creating an even greater attack surface for malicious hackers to penetrate. But there are steps you can take to ensure your organization's AI foundation remains safe. Continue Reading
By- Jerald Murphy, Nemertes Research
-
News
14 Mar 2025
Apple encryption legal challenge heard behind closed doors despite calls for public hearing
Investigatory Powers Tribunal hearing held behind closed doors as press and civil society groups argue for open hearings Continue Reading
By- Bill Goodwin, Investigations Editor
-
News
14 Mar 2025
AI Action Summit review: Differing views cast doubt on AI’s ability to benefit whole of society
Governments, companies and civil society groups gathered at the third global AI summit to discuss how the technology can work for the benefit of everyone in society, but experts say competing imperatives mean there is no guarantee these visions will win out Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Definition
14 Mar 2025
What is Clinical Document Architecture (CDA)?
Clinical Document Architecture (CDA) is a popular, flexible markup standard developed by Health Level Seven International (HL7). CDA defines the structure of certain medical records, such as discharge summaries and progress notes, as a way to better exchange this information between providers and patients. Continue Reading
By- Nick Barney, Technology Writer
- Scott Wallask
-
News
14 Mar 2025
Lawmakers reintroduce MATCH IT Act for patient matching
The bipartisan Match IT Act of 2025 aims to establish patient matching standards to enhance patient safety and reduce healthcare costs associated with duplicate medical records. Continue Reading
By- Hannah Nelson, Xtelligent/TechTarget
-
Definition
14 Mar 2025
What is unstructured data?
Unstructured data is information, in many different forms, that doesn't follow conventional data models, making it difficult to store and manage in a mainstream relational database. Continue Reading
By- Nick Barney, Technology Writer
- Katie Terrell Hanna
- Craig Stedman, Industry Editor
-
Feature
14 Mar 2025
Understanding persistent vs. nonpersistent VDI
Should you go with persistent or nonpersistent VDI? The choice often comes down to storage. Continue Reading
By- Alyssa Provazza, Editorial Director
-
News
14 Mar 2025
Sigma Computing launches Data Apps to boost analytics
The vendor's new application development feature enables users to create custom apps that combine data collection, insight generation and process automation to improve analysis. Continue Reading
By- Eric Avidon, Senior News Writer
-
Feature
14 Mar 2025
Partner's Apple Watch referee app lets NHL stripes keep focus
Presidio designed the NHL Watch Comms App to sync with a hockey arena's game and penalty clocks and use haptic notifications to help officials keep their eyes on the game. Continue Reading
By- John Moore, Industry Editor
-
Video
14 Mar 2025
Camel case vs. pascal case vs. snake case vs. kebab case
Want to know the differences between common code naming conventions like camel case, pascal case, snake case and kebab case? This quick tutorial has all the answers. Continue Reading
By- Cameron McKenzie, TechTarget
-
News
14 Mar 2025
New ML tool enables more equitable genomic research
A new machine learning tool could help reduce ancestral bias in genetic data, improving equity in genomic research and personalizing care across diverse populations. Continue Reading
By- Anuja Vaidya, Senior Editor
-
News
14 Mar 2025
Digital connectivity becomes catalyst for thriving farming in Wales
Investments in in high-speed broadband in rural communities across Carmarthenshire, Neath Port Talbot, Pembrokeshire and Swansea enables introduction of internet of things technology to benefit businesses, including farms Continue Reading
By- Joe O’Halloran, Computer Weekly
-
Definition
14 Mar 2025
What is pharming?
Pharming is a scamming practice in which malicious code is installed on a PC or server, misdirecting users to fraudulent websites without their knowledge or consent. Continue Reading
By- Nick Barney, Technology Writer
-
News
14 Mar 2025
Can a future digital NHS survive another change?
Computer Weekly looks at the prime minister’s decision to abolish NHS England and the potential impact on the progress of digitising the NHS Continue Reading
By -
News
14 Mar 2025
Amazon exec: New AWS S3 capabilities highly adopted by users
AWS Storage VP Andrew Warfield talks about how customers are using the latest feature launches from the Amazon S3 team as part of the vendor's Pi Day 2025 conference. Continue Reading
By- Tim McCarthy, Former News Writer
-
Definition
14 Mar 2025
What is Gemma? Google's open sourced AI model explained
Gemma is a collection of lightweight open source generative AI models designed mainly for developers and researchers. Continue Reading
-
Blog Post
14 Mar 2025
SLM series - Domino Data Lab: Distillation brings LLM power to SLMs
This is a guest post for the Computer Weekly Developer Network written by Jarrod Vawdrey in his capacity as field chief data scientist at Domino Data Lab. Vawdrey writes in full as follows… Small ... Continue Reading
-
News
14 Mar 2025
Microsoft, DE-CIX plot MAPS for SaaS enterprise connectivity
Noting that 82% of enterprises underestimate the lagging effect of packet loss on the performance of SaaS applications, global internet exchange operator and IT behemoth partner to optimise cloud connectivity Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
14 Mar 2025
Will Whitehall withstand Starmer’s AI revolution?
As the prime minister sets out plans for the use of artificial intelligence to take over civil service tasks, Computer Weekly looks at potential challenges and concerns around the decision Continue Reading
By -
Opinion
14 Mar 2025
How CISOs can counter the threat of nation state espionage
The rise of DeepSeek has prompted the usual well-documented concerns around AI, but also raised worries about its potential links to the Chinese state. The Security Think Tank considers the steps security leaders can take to counter threats posed by nation state industrial espionage? Continue Reading
By- Elisabeth Mackay, PA Consulting
-
Feature
14 Mar 2025
6 sustainability tech stack components for greener enterprises
Learn what a sustainability tech stack is, how it can support business goals and which components are most essential. Continue Reading
By- Kashyap Kompella, RPA2AI Research
-
Opinion
14 Mar 2025
Where next for cloud market regulation in Europe?
Competition in the cloud market is a hot topic, but are things heading in the right direction? Continue Reading
-
News
14 Mar 2025
AWS unifies analytics and AI development in SageMaker
In a move that brings previously disparate analytics and AI development tasks together in one environment with data management, Unified Studio is now generally available. Continue Reading
By- Eric Avidon, Senior News Writer
-
News
14 Mar 2025
Minister asks for evidence of Post Office ECCO+ system problems
Subpostmaster federation is calling on former Post Office crown branch staff to come forward if they experienced problems with ECCO+ Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
14 Mar 2025
Qualcomm and Palantir extend AI to the edge for industrial IoT
Qualcomm Technologies teams with Palantir to run artificial intelligence capabilities on advanced edge computing platforms enabling real-time insights and data-driven decisions in industrial use cases Continue Reading
By- Joe O’Halloran, Computer Weekly
-
Blog Post
14 Mar 2025
The pros and cons of enterprise refurbished tech use
Refurbished tech won’t solve the e-waste epidemic, only better business planning and hardware management will, according to Leo Poggiali, Founder and CEO of IT leasing firm Ooodles, in this guest ... Continue Reading
-
News
14 Mar 2025
Channel catch-up: News in brief
Developments this week at Exertis Supplies, Softcat, Konica Minolta Business Solutions, Fivetran, SUSE and Centreon Continue Reading
By- Simon Quicke, Microscope Editor
-
Feature
14 Mar 2025
How to design an employee journey map (with template)
Creating an employee journey map is an important step to improve the employee experience. Learn how HR and business leaders can use these maps to better understand the needs of different segments and personas. Continue Reading
By- Lynda Spiegel, Rising Star Resumes
- Rachel Meltzer
-
News
13 Mar 2025
Chinese espionage group UNC3886 targets Juniper routers
Advanced persistent threat group UNC3886 deployed custom backdoors on end-of-life Juniper Networks routers, underscoring the need for timely patching and advanced security monitoring Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
13 Mar 2025
Medical device report delays raise safety concerns
A BMJ study finds nearly one-third of medical device makers submit adverse event reports late, with 54.8% linked to 3 manufacturers and 13 devices, raising safety concerns. Continue Reading
By- Alivia Kaylor, MSc, Senior Editor
-
Definition
13 Mar 2025
What is quality of experience (QoE or QoX)?
Quality of experience (QoE or QoX) is a measure of the overall level of a customer's satisfaction and experience with a product or service and the vendor that's providing that product or service. Continue Reading
-
Tip
13 Mar 2025
10 benefits of RFID in supply chain management and logistics
RFID can help companies in their supply chain operations by assisting with product tracking and potentially improving product availability. Learn some of RFID's other benefits. Continue Reading
By- Paul Maplesden, Freelance Editorial Services
-
Definition
13 Mar 2025
What are managed network services?
Managed network services are networking applications, functions and services that a managed service provider (MSP) remotely operates, monitors and maintains for an enterprise. Continue Reading
By- Jennifer English, Editorial Director
-
Tip
13 Mar 2025
Compare Google Vertex AI vs. Amazon SageMaker vs. Azure ML
What should your organization consider when choosing a platform for machine learning development and deployment? Continue Reading
By -
Feature
13 Mar 2025
10 biggest data breaches in history, and how to prevent them
Did you know the biggest data breach in history exposed a whopping 3 billion user records? Don't make the same mistakes these companies did in the largest data breaches in history. Continue Reading
By- Sharon Shea, Executive Editor
-
Tip
13 Mar 2025
How to fix 7 common remote desktop connection problems
When the connection between a desktop and its host fails, it's time to do some remote desktop troubleshooting. Check firewalls, security certificates and more if a remote desktop is not working. Continue Reading
By -
News
13 Mar 2025
US Congress demands UK lifts gag on Apple encryption order
Apple and Google have told US lawmakers that they cannot tell Congress whether they have received technical capability notices from the UK Continue Reading
By- Bill Goodwin, Investigations Editor
- Duncan Campbell , 2QQ Ltd, Sussex University
-
Blog Post
13 Mar 2025
SLM series - Cloudinary: The role of SLMs in visual media
This is a guest post for the Computer Weekly Developer Network written by Yaron Vaxman, senior director of deep learning at Cloudinary. Vaxman writes in full as follows… There are many complex, ... Continue Reading
-
News
13 Mar 2025
Sky Business finds louder voice for collaboration
Business-to-business division of media and entertainment company announces communications platform to help UK firms boost productivity and collaboration by integrating advanced features like video conferencing Continue Reading
By- Joe O’Halloran, Computer Weekly
-
Definition
13 Mar 2025
What is taxonomy in computing?
Taxonomy is the science of classification according to a predetermined system, with the resulting catalog used to provide a conceptual framework for discussion, analysis or information retrieval. Continue Reading
-
Feature
13 Mar 2025
The Great Detachment explained: Everything you need to know
During the Great Detachment, employees emotionally detach from their roles but do not leave them, which can harm businesses. Continue Reading
By- Rosa Heaton, Content Manager
-
News
13 Mar 2025
Channel express concerns over lack of cloud skills
The pressure is on to meet customer demand for hosted services, but some resellers lack the cloud skills to meet that need Continue Reading
By- Simon Quicke, Microscope Editor
-
Tip
13 Mar 2025
How to build an application security program
A well-defined application security program that includes multilayer software testing, SBOMs, and documentation and standards is vital to protect apps from threat actors. Continue Reading
-
News
13 Mar 2025
YouFibre takes 400G connectivity option at Manchester internet exchange
Independent full-fibre broadband provider becomes first ISP to take a 400G port at the London Internet Exchange’s regional interconnection hub in Manchester Continue Reading
By- Joe O’Halloran, Computer Weekly
-
Feature
13 Mar 2025
Exploring emerging health tech at HIMSS25
HIMSS25 showcased rapid advancements in health tech, including tools like agentic AI to ease workflow challenges and VR for mental healthcare. Continue Reading
By- Anuja Vaidya, Senior Editor
-
Tip
13 Mar 2025
Application performance monitoring vs. management
Explore the nuances between application performance monitoring and application performance management, especially in enhancing application efficiency and the user experience. Continue Reading
By -
News
13 Mar 2025
Study: ML mortality prediction misses 66% of severe injuries
When given test cases with different injury levels, ML mortality prediction models gave inconsistent risk scores, overestimating moderate injuries and underestimating severe ones. Continue Reading
By- Hannah Nelson, Xtelligent/TechTarget
-
News
13 Mar 2025
SuperBlack ransomware may have ties to LockBit
Forescout researchers report on a new ransomware gang that appears to be keeping the legacy of the notorious LockBit crew alive Continue Reading
By- Alex Scroxton, Security Editor
-
News
13 Mar 2025
HMRC looks to upgrade SOC with advanced SIEM tech
HMRC issues a request for information notice ahead of opening up bids for a new security information and event management project that aims to reinforce its ability to respond to cyber threats Continue Reading
By- Alex Scroxton, Security Editor
-
News
13 Mar 2025
SCC steps up sustainability efforts
Channel player SCC works to share more emissions data with customers and provide asset disposal for those looking to upgrade devices to Windows 11 Continue Reading
By- Simon Quicke, Microscope Editor
-
News
13 Mar 2025
Starmer to send AI tech teams into government departments
In his plans to reform the state, the prime minister is pushing for artificial intelligence to take on tasks for civil servants and calling time on NHS England Continue Reading
By