Topics Archive
Free guide to low-code & no-code platforms
Platforms that enable shadow IT are changing development roles and processes. Here's why it's time to embrace this new reality.
-
News
03 Mar 2025
Channel moves: Who’s gone where?
Moves announced at Avanade, Eficode, Epson, Snom Technology and k-commerce Continue Reading
By- Simon Quicke, Microscope Editor
-
News
03 Mar 2025
CMA urged to expedite proposed ‘targeted interventions’ against AWS and Microsoft
AWS has doubled-down on its claim that subjecting it to targeted curbs to bolster competition in the UK cloud market is an unwarranted step, while its rivals call on the CMA to speed up the process Continue Reading
By- Caroline Donnelly, Senior Editor, UK
-
Definition
03 Mar 2025
What is IMAP (Internet Message Access Protocol)?
IMAP (Internet Message Access Protocol) is a standard retrieval protocol for receiving email. Continue Reading
By- Mary E. Shacklett, Transworld Data
- Rahul Awati
-
News
03 Mar 2025
MWC 2025: Operators account for 85% of mobile infrastructure investments
Research from global mobile trade association reveals operators alone contribute $109bn to infrastructure investments, far exceeding that made by content and application providers and cloud service providers Continue Reading
By- Joe O’Halloran, Computer Weekly
-
Feature
03 Mar 2025
How OhioHealth got through the Change Healthcare cyberattack
When the Change Healthcare cyberattack occurred, OhioHealth activated its cyber risk management playbook and adjusted its revenue cycle management strategies to reduce disruptions. Continue Reading
By- Jill Hughes, Associate Editor
-
Definition
03 Mar 2025
What is cyberstalking and how to prevent it?
Cyberstalking is a crime in which someone harasses or stalks a victim using electronic or digital means, such as social media, email, instant messaging (IM) or messages posted to a discussion group or forum. Continue Reading
-
News
03 Mar 2025
Alation unveils AI agents plus SDK for agentic development
The data catalog vendor's new agents for documentation and data quality monitoring represent innovation among metadata management vendors and could force competitors to respond. Continue Reading
By- Eric Avidon, Senior News Writer
-
News
03 Mar 2025
Amazon, Google, Microsoft race for first in quantum computing
Amazon, Google and Microsoft prioritize quantum computing reliability for future enterprise applications. Continue Reading
By- Antone Gonsalves, Editor at Large
-
News
03 Mar 2025
Teradata unveils vector store to fuel AI development
The longtime data management and analytics vendor's new feature will enable developers to discover the relevant data needed to train business-specific generative AI applications. Continue Reading
By- Eric Avidon, Senior News Writer
-
News
03 Mar 2025
MWC 2025: AI is the new mobile UI for Qualcomm
Connected processor and artificial intelligence company unveils AI-first modems for 5G networks, IoT and fixed wired access as artificial intelligence scales rapidly at the network edge to drive key business benefits Continue Reading
By- Joe O’Halloran, Computer Weekly
-
Blog Post
03 Mar 2025
Digital Disruption, the Future of Work, and the Evolving Role of Print
Digital disruption continues to reshape the business landscape, impacting how we work and the tools we use. Quocirca's "In the Spotlight Special Edition" series, featuring interviews with leading ... Continue Reading
By- Louella Fernandes, Quocirca
-
News
03 Mar 2025
Singapore’s HomeTeamNS hit by ransomware attack
The non-profit organisation suffered a ransomware attack that affected some servers containing employee and member data, prompting an investigation and enhanced security measures Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
02 Mar 2025
AWS boosts telco cloud offerings with new Outposts
Amazon Web Services debuts new Outposts racks and servers that extend its infrastructure to the edge to support network intensive workloads and cloud radio access applications Continue Reading
-
Blog Post
02 Mar 2025
Java double vs float: What's the difference?
What's the difference between double vs float data types? In this quick tutorial we show how float and double Java types differ, along with guidance on how to choose one over the other. Continue Reading
By- Cameron McKenzie, TechTarget
-
News
01 Mar 2025
Ransomware: from REvil to Black Basta, what do we know about Tramp?
This key member of the Black Basta ransomware gang is wanted by the US justice system. He narrowly escaped extradition at the end of June 2024 - with the help of highly-placed contacts in Moscow, according to him Continue Reading
By- Valéry Rieß-Marchive, Rédacteur en chef
-
Tip
28 Feb 2025
What to include in an RFP for an OMS, with template
A request for proposal can help save software buying teams time because they receive most, if not all, of the data they'll need to make a vendor selection. Learn more. Continue Reading
By -
Tip
28 Feb 2025
Compare software-defined storage vs. storage virtualization
SDS and storage virtualization are two approaches that help storage teams efficiently and cost-effectively manage resources. Examine the differences between the two. Continue Reading
By -
Feature
28 Feb 2025
AI fatigue explained: What it is and how to combat it
With the rapid development of AI and the onset of generative AI, AI fatigue is becoming more common across businesses and negatively affecting the employee experience. Continue Reading
By- Rosa Heaton, Content Manager
-
News
28 Feb 2025
Telehealth does not boost low-value care, study finds
Telehealth was linked to lower use and spending on some low-value tests, suggesting it may help reduce unnecessary healthcare spending. Continue Reading
By- Anuja Vaidya, Senior Editor
-
Feature
28 Feb 2025
Six major tech lawsuits to keep tabs on in 2025
Tech giants will head to court to address antitrust cases, data privacy, content moderation and copyright. These cases may set key legal precedents for the future of tech. Continue Reading
-
Blog Post
28 Feb 2025
Speed and skills are essential for the UK to realise its AI ambitions
This is a guest blogpost by David Hogan, vice-president Enterprise, EMEA at NVIDIA. This summer, the Isambard AI supercomputer in Bristol will be fully operational, marking a significant step ... Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
Tip
28 Feb 2025
How to troubleshoot when Outlook is not working on Android
A few common issues can keep workers from accessing and using Outlook on mobile. Learn how to fix Outlook problems on an Android phone or tablet. Continue Reading
By -
Feature
28 Feb 2025
Once an underdog, Connecticut’s HIE network gains traction
While Connecticut was one of the last states to launch a statewide health data exchange, the HIE network has grown rapidly, adding 1,078 new locations over a 12-month period. Continue Reading
By- Hannah Nelson, Xtelligent/TechTarget
-
News
28 Feb 2025
France pushes for law enforcement access to Signal, WhatsApp and encrypted email
Proposals to be discussed in the French Parliament will require tech companies to hand over decrypted messages and email or face huge fines Continue Reading
By- Bill Goodwin, Investigations Editor
-
News
28 Feb 2025
OpenAI GPT-4.5, Alexa+ and the move to wiser AI systems
With GPT-4.5 and Alexa+, generative AI systems are moving beyond just being LLM chatbots. Instead, they incorporate better human understanding and can perform tasks for humans. Continue Reading
By- Esther Shittu, News Writer
-
News
28 Feb 2025
Storage vendors adding data management tools to meet AI needs
Storage vendors are now developing their own tools and capabilities related to data management tasks within their platforms, as interest in enterprise AI development increases. Continue Reading
By- Tim McCarthy, Former News Writer
-
News
28 Feb 2025
Microsoft targets AI deepfake cybercrime network in lawsuit
Microsoft alleges that defendants used stolen Azure OpenAI API keys and special software to bypass content guardrails and generate illicit AI deepfakes for payment. Continue Reading
By- Alexander Culafi, Senior News Writer, Dark Reading
-
News
28 Feb 2025
Channel catch-up: News in brief
Developments this week at Nebula, Everything Tech Group, Check Point, monday.com, Scality, Horizon3.ai, TD Synnex, DTP Group and CrowdStrike Continue Reading
By- Simon Quicke, Microscope Editor
-
Blog Post
28 Feb 2025
SLM series - DataStax: Inside the ‘moving parts’ of AI
This is a guest post for the Computer Weekly Developer Network written by Dom Couldwell in his capacity as head of field engineering EMEA, DataStax. Couldwell writes in full as follows… Building a ... Continue Reading
-
News
28 Feb 2025
Salesforce Agentforce AI update targets healthcare
Salesforce customizes Agentforce for clinical care, public health and pharmaceuticals. Continue Reading
By- Don Fluckinger, Senior News Writer
-
Definition
28 Feb 2025
What is multifactor authentication?
Multifactor authentication (MFA) is an IT security technology that requires multiple sources of unique information from independent categories of credentials to verify a user's identity for a login or other transaction. Continue Reading
By- Stephen J. Bigelow, Senior Technology Editor
- Kinza Yasar, Technical Writer
- Mary E. Shacklett, Transworld Data
-
Tip
28 Feb 2025
ATS vs. CRM: What's the difference?
While ATSes and CRMs are both part of the recruiting process, each system focuses on different parts of the candidate journey. Learn more about the differences between the two. Continue Reading
By -
Definition
28 Feb 2025
What is a watering hole attack?
A watering hole attack is a security exploit in which the attacker seeks to compromise a specific group of end users by infecting websites that members of the group are known to visit. Continue Reading
By- Mary E. Shacklett, Transworld Data
- Gavin Wright
- Madelyn Bacon, TechTarget
-
Tip
28 Feb 2025
Why and how to create Azure service principals
Service principals are a convenient and secure way to protect Azure resources. Follow this step-by-step guide to create a service principal that defends vital Azure workloads. Continue Reading
By -
Definition
28 Feb 2025
What is FCAPS (fault, configuration, accounting, performance and security)?
FCAPS (fault, configuration, accounting, performance and security) is a network management framework and model created by the International Organization for Standardization (ISO). Continue Reading
By- Alexander S. Gillis, Technical Writer and Editor
- Andrew Zola
-
Definition
28 Feb 2025
What is the NSA and how does it work?
The National Security Agency (NSA) is a federal government surveillance and intelligence agency that's part of the U.S. Department of Defense and is managed under the authority of the director of national intelligence (DNI). Continue Reading
-
Tip
28 Feb 2025
4 phases to build a network automation architecture
The implementation of a network automation architecture involves several elements, including a core orchestration engine, assorted databases and proper network testing. Continue Reading
By- Charles Uneze
- Terry Slattery, NetCraftsmen
-
News
28 Feb 2025
Post Office makes first official apology to Capture users
The Post Office has written to former Capture user Ken Tooby to apologise for its failings which devastated his family’s lives Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
28 Feb 2025
Major UK banks hit by payday digital banking problems again
A month after Barclays suffered online banking problems, customers at multiple banks report further issues Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
28 Feb 2025
NHS staff lack confidence in health service cyber measures
NHS staff understand their role in protecting the health service from cyber threats and the public backs them in this aim, but legacy tech and a lack of training are hindering efforts, according to BT Continue Reading
By- Alex Scroxton, Security Editor
-
Tip
28 Feb 2025
Gemini vs. ChatGPT: What's the difference?
ChatGPT took the early lead among AI-generated chatbots before Google answered with Gemini. While ChatGPT and Gemini perform similar tasks, there are differences. Continue Reading
-
Tip
27 Feb 2025
Understanding Windows kernel structure and why it matters
The kernel is key to Windows desktops, and when something goes wrong with it, the whole OS can break. Learn how the kernel functions to inform the ways to fix any issues. Continue Reading
By -
Tip
27 Feb 2025
How to start a FinOps career in cloud
FinOps is an integral part of many organizations' cloud strategy. Do you have what it takes to land a FinOps job? Explore the benefits and requirements to help jump-start your career. Continue Reading
By- Stephen J. Bigelow, Senior Technology Editor
-
Tip
27 Feb 2025
The top AIOps tools and platforms to consider in 2025
As AIOps approaches become more common among IT teams, the AIOps tools and platforms market has expanded. Compare leading options to decide which fits your needs. Continue Reading
By -
News
27 Feb 2025
What are the implications of Medicaid per capita caps?
Medicaid per capita caps would decrease federal spending, creating a choice between increased state spending and enrollee coverage. Continue Reading
By- Sara Heath, Executive Editor
-
Blog Post
27 Feb 2025
F5 AppWorld 2025: Day #2 keynote & live show report
The Computer Weekly Developer Network team is at F5 AppWorld 2025. News emanating from the show that we have not yet covered includes several new solutions and capabilities that the company says ... Continue Reading
-
News
27 Feb 2025
FBI: Lazarus Group behind $1.5 billion Bybit heist
Researchers say the heist, in which North Korean state-sponsored hackers stole funds from a cold wallet, is the biggest theft in the history of the cryptocurrency industry. Continue Reading
By- Arielle Waldman, Features Writer, Dark Reading
-
Tip
27 Feb 2025
How data centers can help balance the electrical grid
Data centers consume 1% of global electricity. To ease grid pressure, data centers should use renewable energy, partner with power companies and manage demand during peak times. Continue Reading
By -
News
27 Feb 2025
Lexmark looking to partners to gain A3 market share
Print player Lexmark has armed its channel with a range of options as it looks to enter the low-page volume end of the market Continue Reading
By- Simon Quicke, Microscope Editor
-
Feature
27 Feb 2025
Hospital-at-home lags in rural settings. Is that a problem?
The federal AHCAH waiver has spurred hospital-at-home growth, but adoption is uneven between urban and rural hospitals, raising concerns about equity and access. Continue Reading
By- Anuja Vaidya, Senior Editor
-
News
27 Feb 2025
'Positive steps' in redress for Post Office Capture victims
Lawyers say progress has been made in efforts to provide financial redress and justice for former users of the Post Office's flawed Capture system Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
27 Feb 2025
MPs grill X, TikTok and Meta about online misinformation
Representatives from the social media firms said that while the scale of their platforms makes content moderation difficult, they are effectively dealing with the vast majority of misinformation Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Feature
27 Feb 2025
Key features of healthcare case management software
Healthcare case management software needs the ability to integrate with other technologies, including the EHR and patient engagement platforms. Continue Reading
By- Sara Heath, Executive Editor
-
Definition
27 Feb 2025
What is quantum in physics and computing?
A quantum, the singular form of quanta, is the smallest discrete unit of any physical entity. For example, a quantum of light is a photon, and a quantum of electricity is an electron. Continue Reading
By- Mary E. Shacklett, Transworld Data
- Gavin Wright
-
News
27 Feb 2025
Peer demands Fujitsu cough up £300m interim payment towards Post Office scandal bill
Kevan Jones tells fellow peers in the House of Lords that Fujitsu should also be barred from bidding for public sector contracts Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
27 Feb 2025
Data, training complexities make DIY AI agents difficult
Agentic AI is complex, so choose your development path carefully. Continue Reading
By- Don Fluckinger, Senior News Writer
-
Feature
27 Feb 2025
How companies find solutions to employer GLP-1 coverage
Employer GLP-1 coverage has serious cost barriers, but some companies are turning to technology vendors to provide a comprehensive approach to access. Continue Reading
By- Kelsey Waddill, Managing Editor and Multimedia Manager
- Sara Heath, Executive Editor
-
News
27 Feb 2025
Nvidia CEO claims reasoning models will boost GPU demand
The availability of the DeepSeek-R1 model resulted in a big drop in Nvidia’s share price, but CEO Jensen Huang believes this is just a blip Continue Reading
By- Cliff Saran, Managing Editor
-
Opinion
27 Feb 2025
Secure software: Third-party suppliers your first-party risk
Outgoing CISA chief Jen Easterly called on buyers to demand better security standards from their software suppliers. The Security Think Tank considers what better means, and what best practice for secure software procurement looks like in 2025 Continue Reading
By- Ejona Preci, Lindal Group
-
Opinion
27 Feb 2025
AI's appetite for data is changing data requirements
AI relies on high-quality real-time data. Companies that fail to modernize their data strategies risk falling behind, while those that adapt unlock AI's competitive advantage. Continue Reading
By- Stephen Catanzano, Senior Analyst
-
Blog Post
27 Feb 2025
F5 details multi-Terabit VELOS hardware to power AI workloads
The Computer Weekly Developer Network team is at AppWorld with F5. As part of the conference’s central newsreel, we learn that the company has announced new additions to the F5 VELOS product line. ... Continue Reading
-
News
27 Feb 2025
Private equity exits lead to physician turnover at practices
Private equity exits drive higher physician turnover, impacting retention, care access and market stability, as doctors shift to larger practices post-exit. Continue Reading
By- Jacqueline LaPointe, Executive Editor
-
Blog Post
27 Feb 2025
Spotlight on an indulgent tech sector
We often hear of senior tech industry execs drawing an analogy between the tech sector and automotive manufacturing. Basically, if car development followed the same rules as the tech sector, by now ... Continue Reading
By- Cliff Saran, Managing Editor
-
News
27 Feb 2025
CVE volumes head towards 50,000 in 2025, analysts claim
Many trends, notably a big shift to open source tools, are behind an expected boom in the number of disclosed vulnerabilities Continue Reading
By- Alex Scroxton, Security Editor
-
Tip
27 Feb 2025
Top 10 loyalty program management software options
Loyalty programs have come a long way from the days of pasting green stamps into booklets and redeeming them for rewards. These 10 tools can bring these programs into modern day. Continue Reading
By- Christine Campbell, The Alpha Content Company
-
Definition
27 Feb 2025
What is a DMZ in networking?
In computer networks, a DMZ, or demilitarized zone, is a physical or logical subnet that separates a local area network (LAN) from other untrusted networks -- usually, the public internet. DMZs are also known as perimeter networks or screened subnetworks. Continue Reading
By- Nick Barney, Technology Writer
- Ben Lutkevich, Site Editor
-
Definition
27 Feb 2025
What is the Agile test automation pyramid?
The Agile test automation pyramid is a graphical strategy guide for implementing automated software testing. Continue Reading
By -
Definition
27 Feb 2025
What is domain generation algorithm (DGA)?
A domain generation algorithm (DGA) is a program that generates a large list of domain names. DGAs provide malware with new domains to evade security countermeasures. Continue Reading
By- Nick Barney, Technology Writer
- Alexander S. Gillis, Technical Writer and Editor
- Sharon Shea, Executive Editor
-
Definition
27 Feb 2025
What is network analytics?
Network analytics is the application of big data principles and tools to the data used to manage and secure data networks. Continue Reading
By- Rahul Awati
- John Burke, Nemertes Research
-
Feature
27 Feb 2025
15 common network protocols and their functions explained
Networking makes the internet work, but it needs several key protocols. These common network protocols make communication and connection across the internet possible. Continue Reading
By- Kinza Yasar, Technical Writer
- Michaela Goss, Senior Site Editor
-
Definition
27 Feb 2025
What is a domain controller?
A domain controller is a server that processes requests for authentication from users and computers within a computer domain. Continue Reading
By- Gavin Wright
- Peter Loshin, Former Senior Technology Editor
-
News
27 Feb 2025
Nvidia reports strong Q4, prepares for new AI GPUs
Nvidia's revenue soared 78% to $39.3 billon, driven by strong AI GPU demand. With Blackwell's success, a more powerful variant launches later this year. Continue Reading
By- Antone Gonsalves, Editor at Large
-
News
27 Feb 2025
Verizon claims to ‘shatter’ US 5G upload speed record
Leading comms provider reveals 5G trial results with record-breaking uplink speed through use of technologies including TDD carrier component aggregation with C-band spectrum and uplink MIMO Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
27 Feb 2025
CrowdStrike: China hacking has reached 'inflection point'
In its 2025 Global Threat Report, CrowdStrike observed an increase in China's cyber capabilities, with a focus on espionage and 'pre-positioning' itself in critical environments. Continue Reading
By- Alexander Culafi, Senior News Writer, Dark Reading
-
Opinion
27 Feb 2025
Money wasted on cloud inhibiting growth
Australian firms are pouring billions into cloud services, but a lack of visibility is leading to significant wasted spending as AI adoption grows Continue Reading
By- Siti Chen
-
Definition
27 Feb 2025
What is federated identity management (FIM)? How does it work?
Federated identity management (FIM) is an arrangement between multiple enterprises or domains that enables their users to use the same identification data (digital identity) to access all their networks. Continue Reading
By- Alexander S. Gillis, Technical Writer and Editor
- Rahul Awati
- Linda Rosencrance
-
Feature
27 Feb 2025
Enterprise AI strategy surges in importance for IT buyers
Organizations have sharply elevated the business importance of AI and machine learning technologies, according to Informa TechTarget's survey on 2025 IT spending plans. Continue Reading
By- John Moore, Industry Editor
-
News
26 Feb 2025
Alibaba Cloud open sources video foundation models
The Chinese tech giant releases Tongyi Wanxiang 2.1 family of video foundation models as open source, including a smaller version enabling video creation on standard laptops Continue Reading
By- Aaron Tan, Informa TechTarget
-
News
26 Feb 2025
US intelligence chief Tulsi Gabbard probes UK demand for Apple’s encrypted data
A secret order issued by the UK against Apple would be a ‘clear and egregious violation’ if it provides back door access to Americans’ encrypted data, says US director of national intelligence Continue Reading
By- Bill Goodwin, Investigations Editor
-
News
26 Feb 2025
Snowflake adds OpenAI models with Microsoft integration
In a move that adds more model choices for AI developers, models including GPT-4o are now natively available in Cortex AI alongside models from Anthropic, Meta, Mistral and others. Continue Reading
By- Eric Avidon, Senior News Writer
-
News
26 Feb 2025
Cisco, Nvidia expand AI infrastructure partnership
The broader Nvidia-Cisco partnership includes Cisco building systems that combine its OS with Nvidia's Ethernet technologies for optimized AI performance. Continue Reading
By- Antone Gonsalves, Editor at Large
-
News
26 Feb 2025
Study: Workers will trade 25% of pay for remote, hybrid jobs
Tech workers would take a pay cut for hybrid or remote jobs, but employers aren't lowering wages, suggesting that high demand isn't driving pay down. Continue Reading
By- Patrick Thibodeau, Editor at Large
-
Tip
26 Feb 2025
How to improve third-party API integration security
External API integrations are critical, but so is managing third-party API risks to maintain customer trust, remain compliant and ensure long-term operational resilience. Continue Reading
By- Jerald Murphy, Nemertes Research
-
Blog Post
26 Feb 2025
F5 AppWorld 2025: Day #1 keynote & live show report
F5 kicked off its AppWorld 2025 conference this week in Las Vegas with a keynote introduced and delivered by François Locoh-Donou, president and CEO of F5. Talking about the demands of building ... Continue Reading
-
Tip
26 Feb 2025
How much energy do data centers consume?
High energy consumption continues to be an issue for data centers with the rise in AI use, but organizations are moving to energy-efficient systems to manage their power usage. Continue Reading
-
Opinion
26 Feb 2025
Small language models are taking the spotlight
An industry analyst shares his perspective on why larger models aren't always better for enterprises. Continue Reading
By- Stephen Catanzano, Senior Analyst
-
Omdia
Intelligence and advice powered by decades of global expertise and comprehensive coverage of the tech markets.
-
Feature
26 Feb 2025
How health systems are building clinician trust in AI
Mayo Clinic, Vanderbilt University Medical Center and Duke Health leaders highlighted strategies to foster trust in AI tools and support successful implementation efforts. Continue Reading
By- Anuja Vaidya, Senior Editor
-
Feature
26 Feb 2025
VMware vSAN Max: What you need to know
We look at VMware vSAN Max storage – its best use cases, how to deploy it and on what hardware, the alternatives, and considerations in light of VMware’s Broadcom takeover Continue Reading
-
News
26 Feb 2025
Trump to expand, enforce healthcare price transparency
A new executive order aims to strengthen healthcare price transparency requirements issued during President Trump's first term and increase enforcement of noncompliance. Continue Reading
By- Jacqueline LaPointe, Executive Editor
-
News
26 Feb 2025
Channel education needed to support more successful AI adoption
Research from WalkMe underlines the dangers of rolling out artificial intelligence tools and software without preparing users Continue Reading
By- Simon Quicke, Microscope Editor
-
News
26 Feb 2025
Apple and Dassault Systèmes join forces for digital twin Vision
Leading connected engineering software provider teams with CE giant to take advantage of state-of-the-art immersive viewing to realise digital twin-based product design and manufacturing platform Continue Reading
By- Joe O’Halloran, Computer Weekly
-
Tip
26 Feb 2025
Mapping how digital twin technology can work with UC
Digital twin technology can help organizations more accurately plot the effectiveness of their UC infrastructure. But there is still a lot to learn about the concept. Continue Reading
By -
News
26 Feb 2025
WWT and Kyndryl expand customer support centres
Firms invest in more logistics and enablement capability to increase the assistance they can offer those users looking for help with digital transformation and artificial intelligence Continue Reading
By- Simon Quicke, Microscope Editor
-
Video
26 Feb 2025
Host your own Bluesky Personal Data Server (PDS) tutorial
Want to really understand how the decentralized Bluesky network works? Connect your own Bluesky PDS to the network. Here's how to do it. Continue Reading
By- Cameron McKenzie, TechTarget
-
News
26 Feb 2025
Google boosts AlloyDB with added vector search capabilities
New features address the accuracy and performance of the in-database vector searches that discover relevant data for feeding and training AI models and applications. Continue Reading
By- Eric Avidon, Senior News Writer
-
Tip
26 Feb 2025
How to fix software bugs: Guide and best practices
'An ounce of prevention is worth a pound of cure.' -- Benjamin Franklin, 1736. The original quote pertained to fire safety, but it still applies to software bug prevention today. Continue Reading
By -
News
26 Feb 2025
CISOs spending more on insider risk
Insider risk management budgets have more than doubled in the past 12 months and look set to grow further still in 2025, according to a report Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
26 Feb 2025
Everything, everywhere, all at once: automated decision-making in public services
Despite the UK government's fervent embrace of artificial intelligence, there is still little meaningful transparency around the scope of the technology's deployment throughout public services Continue Reading
By- Jasleen Chaggar, Big Brother Watch
-
Podcast
26 Feb 2025
Podcast: How to ensure data quality for AI
We talk to Cody David of Syniti about how to ensure data quality in datasets for AI, why a ‘data-first’ attitude is key, and the quick wins an organisation can gain in data quality Continue Reading
By- Antony Adshead, Computer Weekly
-
News
26 Feb 2025
Dragonwing take flight to boost Qualcomm industrial, embedded IoT offer
Connected processor and artificial intelligence company establishes brand for suite of industrial and embedded IoT, enterprise and networking solutions Continue Reading
By- Joe O’Halloran, Computer Weekly