Topics Archive
Free guide to low-code & no-code platforms
Platforms that enable shadow IT are changing development roles and processes. Here's why it's time to embrace this new reality.
-
News
21 Feb 2025
IRA fate will affect U.S. renewable energy projects
Companies have invested in renewable energy projects from solar to geothermal. The Trump administration's focus on oil and gas could slow renewable energy research and advancement. Continue Reading
By- Makenzie Holland, Senior News Writer
-
Definition
21 Feb 2025
What is an autoregressive model?
An autoregressive model is a category of machine learning models in which algorithms predict future data based on a series of their own past data. Continue Reading
-
News
21 Feb 2025
Palo Alto Networks vulnerabilities exploited in chained attack
The cybersecurity vendor urges customers to take immediate action to mitigate recently disclosed vulnerabilities that are being actively exploited in the wild. Continue Reading
By- Arielle Waldman, Features Writer, Dark Reading
-
Definition
21 Feb 2025
What is continuous deployment (CD)?
Continuous deployment (CD) is a strategy for software development and releases in which every code change is automatically run through a pipeline of tests and inspections before being pushed into production. Continue Reading
By- Stephen J. Bigelow, Senior Technology Editor
- Kinza Yasar, Technical Writer
-
Tip
21 Feb 2025
How to fix Outlook when it's not syncing on an iPhone
Some of the most common issues users encounter with Outlook on iOS relate to syncing. Learn how to troubleshoot when the iPhone Outlook app is not syncing. Continue Reading
-
News
21 Feb 2025
Block storage and Kafka events come to Vast Data Platform
A new Apache Kafka API-compatible service enables customers to move their data management services closer to storage using the Vast Data Platform, which now offers block storage. Continue Reading
By- Tim McCarthy, Former News Writer
-
News
21 Feb 2025
Apple withdraws encrypted iCloud storage from UK after government demands ‘backdoor’ access
After the Home Office issued a secret order for Apple to open up a backdoor in its encrypted storage, the tech company has instead chosen to withdraw the service from the UK Continue Reading
By- Bill Goodwin, Investigations Editor
-
Tip
21 Feb 2025
How to manage and mitigate reputational risk
Believe it or not, there are actually several reasons for a business to care about its reputation. Continue Reading
By -
Tip
21 Feb 2025
Why use JavaFX in 2025?
As a modern GUI framework, JavaFX is alive and kicking with a very broad community and many active projects. Here are some resources to deepen your knowledge and spark inspiration. Continue Reading
By- Frank Delporte, Azul Systems
-
News
21 Feb 2025
Auditor: 2026 till Birmingham recovers from botched Oracle project
Grant Thornton’s report into a botched Oracle Fusion implementation at Birmingham City Council finds governance and risk comprehension failures to be at the heart of the fiasco Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
Definition
21 Feb 2025
What is a batch file?
A batch file is a script file that stores commands to be executed in a serial order. Continue Reading
By -
News
21 Feb 2025
Electronic frailty index predicts risk of adverse outcomes
Mass General Brigham's electronic frailty index analyzes EHR data to assess patient frailty, helping predict adverse outcomes and improve care for older adults. Continue Reading
By- Hannah Nelson, Xtelligent/TechTarget
-
News
21 Feb 2025
Non-English speakers face multiple barriers to video visits
Patients primarily speaking Spanish or Cantonese were less likely to participate in video visits due to various technical and communication challenges. Continue Reading
By- Anuja Vaidya, Senior Editor
-
News
21 Feb 2025
Understanding intersectionality: Inclusion and employees’ whole life experience
While businesses increasingly understand how gender, ethnicity or sexuality may impact a person’s experience in the tech sector, many don’t take into account how some will have an overlap of these experiences Continue Reading
By- Clare McDonald, Business Editor
-
Definition
21 Feb 2025
What is application allowlisting?
Application allowlisting, previously known as 'application whitelisting,' is the practice of specifying an index of approved software applications or executable files that are permitted to be present and active on a computer system. Continue Reading
By- Mary E. Shacklett, Transworld Data
- Brien Posey
- Peter Loshin, Former Senior Technology Editor
-
Definition
21 Feb 2025
What is a network packet?
A network packet is a basic unit of data that is transferred over a computer network, typically a packet-switched network, such as the internet. Continue Reading
By- Rahul Awati
- Kinza Yasar, Technical Writer
- Andrew Zola
-
Tip
21 Feb 2025
3 ways to retool UC platform security architecture models
Hybrid workers moving between home and office environments create a UC security gap. But adopting modern tools to augment traditional security policies can mitigate risks. Continue Reading
By- Andrew Froehlich, West Gate Networks
-
Feature
21 Feb 2025
XFS vs. ext4: Which Linux file system maximizes storage?
Storage devices require a file system to organize data. Make the best choice -- XFS or ext4 -- for your Linux server's anticipated data storage workload. Continue Reading
By- Damon Garn, Cogspinner Coaction
-
Feature
21 Feb 2025
10 best entry-level tech jobs in 2025
There are tech jobs for people with all backgrounds and experience levels. The technology field is changing, and there are several career paths to consider. Continue Reading
By- Andy Patrizio
- Amanda Hetler, Senior Editor
-
News
21 Feb 2025
UK police forces ‘supercharging racism’ with predictive policing
Amnesty International says predictive policing systems are ‘supercharging racism’ in the UK by taking historically biased data to further target poor and racialised communities Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
21 Feb 2025
A landscape forever altered? The LockBit takedown one year on
The NCA-led takedown of the LockBit ransomware gang in February 2024 heralded a transformative year in the fight against cyber crime. One year on, we look back at Operation Cronos and its impact Continue Reading
By- Alex Scroxton, Security Editor
-
News
21 Feb 2025
Fujitsu’s £600m-plus prize with His Majesty’s ‘cash cow’ in 2025
Controversial supplier continues to reap the rewards of government IT contracts despite its participation in ‘ghastly fraud’ Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
Tip
21 Feb 2025
3 häufige Probleme mit Microsoft Teams unter Android beheben
Für Microsoft Teams auf Android-Geräten muss die IT-Abteilnug wissen, wie Leistungsprobleme behoben werden. Häufige Probleme: Authentifizierung, Anrufqualität, App-Stabilität. Continue Reading
By -
Feature
21 Feb 2025
How to build an effective IAM architecture
Identity and access management is changing and so must strategies for managing it. Read up on IAM architecture approaches and how to select the best for your organization. Continue Reading
By- Ed Moyle, SecurityCurve
-
Definition
20 Feb 2025
What is social media marketing (SMM)?
Social media marketing (SMM) is a form of internet marketing that uses social media apps as a marketing tool. Continue Reading
By- Katie Terrell Hanna
- Griffin LaFleur, Swing Education
-
Video
20 Feb 2025
How to use the Spring Boot application.properties file
Need to externalize database configuration? Want to customize how Spring autoconfiguration works? The key to it all is Spring's application.properties file. Here's how to use it. Continue Reading
By- Cameron McKenzie, TechTarget
-
Feature
20 Feb 2025
6 IT automation trends to watch in 2025 and the future
Trends reshaping IT automation include the convergence of formerly distinct platforms, the role of generative AI as automation glue and the stepwise expansion of agentic AI. Continue Reading
By- John Moore, Industry Editor
-
News
20 Feb 2025
Sitecore, Adobe update customer data platforms
Adobe and Sitecore refresh CDPs for generative AI. Continue Reading
By- Don Fluckinger, Senior News Writer
-
News
20 Feb 2025
Goldberg: Practical value key for AI in NetSuite ERP
In this Q&A, Evan Goldberg discusses the company's position as a SaaS ERP provider for SMBs, highlighting emerging AI features and collaboration with Oracle. Continue Reading
By- Jim O'Donnell, News Director
-
News
20 Feb 2025
OCR: Warby Parker to pay $1.5M penalty for violating HIPAA
Warby Parker faces a $1.5 million penalty for violating HIPAA, OCR determined after launching an investigation into a 2018 credential stuffing cyberattack against the eyewear retailer. Continue Reading
By- Jill Hughes, Associate Editor
-
Podcast
20 Feb 2025
Risk & Repeat: Salt Typhoon hasn't stopped hacking
Although the Salt Typhoon telecom breaches from last year appear to have been remediated, the Chinese state-sponsored threat group continues to target critical organizations. Continue Reading
By- Alexander Culafi, Senior News Writer, Dark Reading
-
News
20 Feb 2025
CISA, FBI warn of Ghost/Cring ransomware attacks
Ghost is a China-based financially motivated ransomware group that has launched attacks against organizations in more than 70 countries -- including its own. Continue Reading
By- Alexander Culafi, Senior News Writer, Dark Reading
-
News
20 Feb 2025
FDA approves Merilog, first NovoLog biosimilar for diabetes
The FDA approved Merilog (insulin-aspart-szjj), the first biosimilar to NovoLog, enhancing insulin accessibility and competition while potentially lowering costs. Continue Reading
By- Alivia Kaylor, MSc, Senior Editor
-
News
20 Feb 2025
Ambient scribing reduces cognitive burden of documentation
While ambient scribing shows promise for clinical documentation efficiency, the technology may be more suitable for certain specialties or workflows than others. Continue Reading
By- Hannah Nelson, Xtelligent/TechTarget
-
Tip
20 Feb 2025
Top 13 cloud certifications for 2025
Cloud certifications are available for all levels of cloud expertise. Use this guide to evaluate basic, topic-specific, high-level and vendor-neutral certifications. Continue Reading
By- Damon Garn, Cogspinner Coaction
-
News
20 Feb 2025
Zero-CVE Chainguard Images gain customization option
Chainguard opens its container image builder factory to let users mix and match hardened container components while preserving a zero-vulnerability SLA. Continue Reading
By- Beth Pariseau, Senior News Writer
-
Answer
20 Feb 2025
CRM vs. CDP vs. DMP: What's the difference?
Sales and marketing terms are like alphabet soup, and the different acronyms can get confusing. Learn about the differences among three major platforms: CRM, CDP and DMP. Continue Reading
By- Michaela Goss, Senior Site Editor
- Scott Robinson, New Era Technology
-
Definition
20 Feb 2025
What is a Kolmogorov-Arnold Network?
A Kolmogorov-Arnold Network (KAN) is a neural network architecture that dramatically improves the performance and explainability of physics, mathematics and analytics models. Continue Reading
-
Feature
20 Feb 2025
What DEA's special registrations mean for telehealth prescribing
The DEA's proposed special registrations for telehealth prescribing of controlled substances could add to provider burdens and costs but will likely not be passed as proposed. Continue Reading
By- Anuja Vaidya, Senior Editor
-
Video
20 Feb 2025
Get started with Bluesky API and Python API
Discouraged by Twitter's $42,000 monthly price tag for access to their enterprise APIs? Why not try Bluesky Social's SDK? It's free and it's easy to use. Continue Reading
By- Cameron McKenzie, TechTarget
-
Definition
20 Feb 2025
What is network visibility?
Network visibility is an awareness of the components and data within an enterprise computer network. Continue Reading
By- Cameron Hashemi-Pour, Former Site Editor
- Ben Lutkevich, Site Editor
-
Definition
20 Feb 2025
What is hexadecimal numbering?
Hexadecimal is a numbering system that uses a base-16 representation for numeric values. It can be used to represent large numbers with fewer digits. Continue Reading
By- Mary E. Shacklett, Transworld Data
- Rahul Awati
-
News
20 Feb 2025
Maîtrisez mieux vos technologies IT : le plaidoyer du DSI de l’Insee
Pour prévenir les risques de dépendance technologique et les boîtes noires néfastes à la sécurité, Jean-Séverin Lair, DSI de l’Insee, plaide pour une stratégie IT axée sur la maîtrise IT. Une ligne qu’il a suivie sur le collaboratif, le cloud et à présent sur la Data Science – en se séparant de SAS. Continue Reading
By- Christophe Auffray, LeMagIT
-
News
20 Feb 2025
State of U.S. rural hospitals: No margin, no mission
Highlighting financial struggles, a new study reveals nearly half of U.S. rural hospitals face closures, service cuts and declining healthcare access for communities. Continue Reading
By- Jacqueline LaPointe, Executive Editor
-
Blog Post
20 Feb 2025
Challenges faced by women in the datacentre industry and how to overcome them
In this guest post, Sarah Draper, general counsel and chief risk officer at colocation giant Telehouse Europe, opens up about the challenges women face in the workplace when fighting to get their ... Continue Reading
-
News
20 Feb 2025
Volvo to roll out second software-defined electric car
Nvidia hardware accelerates AI-powered safety features, built using its Superset tech stack Continue Reading
By- Cliff Saran, Managing Editor
-
Feature
20 Feb 2025
How to use IoT for marketing
IoT devices can track people's fitness routines and monitor manufacturing equipment, but they also offer valuable customer data for personalized outreach. Continue Reading
By- Kogan Page
- Tim Murphy, Site editor
-
News
20 Feb 2025
Watchdog approves Sellafield physical security, but warns about cyber
The Office for Nuclear Regulation has taken Sellafield out of special measures for physical security, but harbours cyber security concerns Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
Feature
20 Feb 2025
What does member experience mean for health payers?
A better member experience is key for health payers working to improve consumer loyalty and support their financial bottom lines. Continue Reading
By- Sara Heath, Executive Editor
-
E-Zine
20 Feb 2025
CW APAC – Trend Watch: CIO trends 2025
It will be no surprise to see artificial intelligence high on the agenda for 2025. In this handbook, focused on CIO trends in the Asia-Pacific region, Computer Weekly looks at how banks are navigating technology, the continued importance of cyber security, and how enterprises can cement their AI future. Continue Reading
-
20 Feb 2025
India’s fintechs find fortune in underserved segments
Indian fintech companies are leveraging artificial intelligence and blockchain to address underserved customer segments, unearth hidden revenue opportunities and create innovative products. Continue Reading
-
20 Feb 2025
Inside Grab’s platform strategy
Grab’s group CTO tells Aaron Tan all about the super app’s platform strategy, architecture and organisational structure behind its growth across diverse Southeast Asian markets. Continue Reading
-
20 Feb 2025
How banks are navigating the AI landscape
Industry experts discuss the transformative potential of artificial intelligence in banking, while addressing the challenges and governance implications of integrating AI into financial services. Continue Reading
-
News
20 Feb 2025
Microsoft overcomes quantum barrier with new particle
It has taken 20 years of development, but researchers now have a device that can scale to millions of qubits without errors rising exponentially Continue Reading
By- Cliff Saran, Managing Editor
-
News
20 Feb 2025
Cube semantic layer eases data access from Power BI, Excel
New integrations aim to better enable Microsoft users to directly access data in cloud data warehouses, which has been problematic given how different query languages interact. Continue Reading
By- Eric Avidon, Senior News Writer
-
Opinion
20 Feb 2025
Privacy at a crossroads in the age of AI and quantum
The confluence of artificial intelligence and quantum computing magnifies the risk to privacy, data security and trust, says Gartner's Bart Willemsen Continue Reading
By- Bart Willemsen, Gartner
-
Definition
20 Feb 2025
What is TLS (Transport Layer Security)? Definition & Uses
Transport Layer Security (TLS) is an Internet Engineering Task Force (IETF) standard protocol that provides authentication, privacy and data integrity between two communicating computer applications. Continue Reading
By- Scott Robinson, New Era Technology
- Andrew Froehlich, West Gate Networks
- Kevin Beaver, Principle Logic, LLC
-
Guest Post
20 Feb 2025
Zero-trust strategies leave networks open to lateral threats
Zero trust assumes a network is already compromised. However, new EMA research shows enterprises are more concerned with securing remote access than internal lateral threats. Continue Reading
By- Shamus McGillicuddy, Enterprise Management Associates
-
Definition
20 Feb 2025
What is a cloud-native network function (CNF)?
A cloud-native network function (CNF) is a service that performs network duties in software, as opposed to purpose-built hardware. Continue Reading
By- Andrew Froehlich, West Gate Networks
-
Tip
20 Feb 2025
Penetration testing vs. vulnerability scanning: What's the difference?
Confused by the distinctions between penetration testing and vulnerability scanning? You're not alone. Learn the key differences between the two and when to use each. Continue Reading
By- Kyle Johnson, Technology Editor
- Andrew Froehlich, West Gate Networks
-
Definition
20 Feb 2025
What is a checksum?
A checksum is a value that represents the number of bits in a transmission message. IT professionals use it to detect high-level errors within data transmissions. Continue Reading
By- Rahul Awati
- Kinza Yasar, Technical Writer
- Laura Fitzgibbons
-
Definition
20 Feb 2025
What is IBM Cloud?
IBM Cloud is a suite of cloud computing services from IBM that offers software as a service (SaaS), platform as a service (PaaS) and infrastructure as a service (IaaS) models. Continue Reading
By- Cameron Hashemi-Pour, Former Site Editor
- Kathleen Casey, Site Editor
- Brien Posey
-
Definition
20 Feb 2025
What is Simple Network Management Protocol (SNMP)?
Simple Network Management Protocol (SNMP) is an application-layer protocol for monitoring and managing network devices on a local area network or wide area network. Continue Reading
By- Cameron Hashemi-Pour, Former Site Editor
- Jessica Scarpati
-
Definition
20 Feb 2025
What is a wireless mesh network (mesh WiFi)?
A wireless mesh network (WMN) is a mesh network created through the connection of wireless access point (wireless AP) nodes installed at each network user's location. Continue Reading
By- Mary E. Shacklett, Transworld Data
- Wesley Chai
- David Jacobs, The Jacobs Group
-
News
20 Feb 2025
Microsoft unveils quantum chip Majorana 1 for future advances
Microsoft unveils Majorana 1, a quantum chip with 8 qubits, aiming for 1 million. It focuses on scalability for breakthroughs in various fields despite current challenges. Continue Reading
By- Antone Gonsalves, Editor at Large
-
Feature
20 Feb 2025
Kubernetes: Navigating the pitfalls and pathways to success
Nutanix’s APAC chief technology officer outlines the lessons learned by enterprises adopting Kubernetes, from avoiding cloud lock-in to mastering lifecycle management, and bridging the gap between legacy and cloud-native skillsets Continue Reading
-
Feature
20 Feb 2025
The many ways AI can empower XR
There is an almost ‘irresistible’ marriage between artificial intelligence and extended reality, yet while their combination will create benefits, there will also be some downsides Continue Reading
By- Martin Schwirn, Computer Weekly
-
Blog Post
20 Feb 2025
SLM series - InFlux Technologies: It's a question of specialisation, especially
This is a guest post for the Computer Weekly Developer Network written by Alex Perritaz in his role as chief architect at InFlux Technologies. InFlux Technologies is a technology company ... Continue Reading
-
News
20 Feb 2025
How organisations can secure AI agents
Dan Karpati, Check Point Software’s vice-president of AI, discusses the unique challenges and potential ways to secure AI agents Continue Reading
By- Aaron Tan, Informa TechTarget
-
Definition
20 Feb 2025
What is function as a service (FaaS)?
Function as a service (FaaS) is a cloud computing model that enables cloud customers to develop applications and deploy functionalities and only be charged when the functionality executes. Continue Reading
By- Cameron Hashemi-Pour, Former Site Editor
- Stephen J. Bigelow, Senior Technology Editor
- Sarah Lewis
-
Feature
19 Feb 2025
What to expect at HIMSS25: AI, cybersecurity and more
The HIMSS25 conference will feature new perspectives on artificial intelligence, health equity, cybersecurity and more, with preconference forums and a pavilion for new vendors. Continue Reading
By- Kelsey Waddill, Managing Editor and Multimedia Manager
-
News
19 Feb 2025
Microsoft unveils world AI model for video games
The new type of foundation model is similar to Nvidia Cosmos. While it makes for a better gaming experience, it's also applicable to enterprises. Continue Reading
By- Esther Shittu, News Writer
-
News
19 Feb 2025
Healthcare cyberattacks continue to escalate in 2025
Healthcare cyberattacks, third-party data breaches and supply chain attacks remain top concerns for healthcare security professionals in 2025, Health-ISAC found. Continue Reading
By- Jill Hughes, Associate Editor
-
News
19 Feb 2025
Most patients do not trust health systems to use AI responsibly
Trust in health systems to use AI responsibility and protect them from AI harm is low among patients, indicating the need to improve health system trustworthiness. Continue Reading
By- Anuja Vaidya, Senior Editor
-
Tip
19 Feb 2025
How do you plan an iteration in Agile software development?
Iterative planning in Agile helps teams to plan and adapt, collaborate, gather feedback and deliver to customers. Follow these tips to keep product development efforts on track. Continue Reading
By- Ashok P. Singh, agreatpm.com
-
News
19 Feb 2025
Abortion bans affect access in states without restrictions
A new study showed that a Texas abortion ban led to care delays for everyone accessing the procedure in Colorado, a state without restrictions. Continue Reading
By- Sara Heath, Executive Editor
-
Tip
19 Feb 2025
9 tips for migrating between managed SOC providers
Switching between managed SOCs can be daunting, but with proper planning, organizations can successfully navigate it. One important tip: Document everything. Continue Reading
By- Jerald Murphy, Nemertes Research
-
Definition
19 Feb 2025
What is an attack vector?
An attack vector is a path or means by which an attacker or hacker can gain access to a computer or network server to deliver a payload or malicious outcome. Continue Reading
By- Scott Robinson, New Era Technology
- Mary E. Shacklett, Transworld Data
-
News
19 Feb 2025
CaixaBank outlines artificial intelligence intentions in €5bn plan
Spanish bank announces Cosmos, an investment in its processes and technology that sits within its €5bn strategic plan Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
Blog Post
19 Feb 2025
Budget flexibility for on-prem AI
Consider an organisation that, understandably, wants to ensure its customer data and intellectual property is kept as safe as possible, assessing how to “do AI”. It is easy to assume everyone is ... Continue Reading
By- Cliff Saran, Managing Editor
-
News
19 Feb 2025
Kaseya boss looks back on his time at the helm
As he moves into a vice-chairman position, the boss at the managed service provider tools specialist reviews the progress made under his leadership Continue Reading
By- Simon Quicke, Microscope Editor
-
News
19 Feb 2025
TD Synnex hands Andy Brown responsibility for driving AI programme
Distributor continues to put muscle behind data, analytics and artificial intelligence with latest senior appointment Continue Reading
By- Simon Quicke, Microscope Editor
-
Definition
19 Feb 2025
What is open source and how does it work?
The term 'open source' refers to any program whose source code is made available for use or modification as users or other developers see fit. Continue Reading
-
Answer
19 Feb 2025
How to record Zoom meetings with OBS
By using Open Broadcaster Software to record Zoom meetings, companies can take advantage of more advanced features, such as live editing and live streaming. Continue Reading
By -
Tutorial
19 Feb 2025
How to troubleshoot IP settings with Windows ipconfig
Ipconfig is a vital tool for network troubleshooting. It displays key network information to help administrators diagnose and fix connectivity issues efficiently. Continue Reading
By- Damon Garn, Cogspinner Coaction
-
Tip
19 Feb 2025
The 5 essential HTTP methods in RESTful API development
While HTTP methods aren't inherently complex, developers still need to understand the core RESTful API HTTP methods and why they matter. Continue Reading
By- Tom Nolle, Andover Intel
-
Definition
19 Feb 2025
What is email spoofing?
Email spoofing is a form of cyber attack in which a hacker sends an email that has been manipulated to seem as if it originated from a trusted source. Continue Reading
By- Scott Robinson, New Era Technology
- Peter Loshin, Former Senior Technology Editor
-
Definition
19 Feb 2025
What is personal cloud storage (PCS)?
Personal cloud storage (PCS) is a local network-attached storage (NAS) device that lets users store data, photos, music, videos and other files and is optimized for media streaming. Continue Reading
By- Paul Kirvan
- Stacey Peterson, Senior Managing Editor
- Kim Hefner, Former Executive Managing Editor
-
News
19 Feb 2025
ARM and Meta: Plotting a path to dilute GPU capacity
Meta wants to make artificial intelligence available to everyone who uses its platforms, but scaling AI to over one billion people is not going to be cheap Continue Reading
By- Cliff Saran, Managing Editor
-
News
19 Feb 2025
European and African tech skills programme could increase economic ties
Africa is a continent on the up, and if Europe wants to form lucrative relationships with its nations, it must have something to trade. IT skills and knowledge exchanges unlock opportunities Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
Feature
19 Feb 2025
Quantum computing in cyber security: A double-edged sword
Scepticism still abounds, but quantum computing stocks have boomed this year. In the world of cyber, however, quantum brings both unprecedented capabilities and significant threats, demanding careful attention Continue Reading
By -
News
19 Feb 2025
Warning over privacy of encrypted messages as Russia targets Signal Messenger
Russia is using phishing attacks to compromise encrypted Signal Messenger services used by targets in the Ukraine. Experts warn that other encrypted app users are at risk Continue Reading
By- Bill Goodwin, Investigations Editor
-
Blog Post
19 Feb 2025
SLM series - Finastra: Counting clever to cost an AI model
This is a guest post for the Computer Weekly Developer Network written by Adam Lieberman in his role as chief AI officer at Finastra. Finastra is a global financial software company that provides ... Continue Reading
-
Opinion
19 Feb 2025
Balancing act: Managing business needs alongside digital transformation and innovation
How can IT leaders deliver on the challenging balancing act between innovation, cost control, and managing corporate expectations? One startup CTO in a highly established industry shares his experiences Continue Reading
By- Chris Gray, Inshur
-
Definition
19 Feb 2025
What is challenge-response authentication?
In computer security, challenge-response authentication is a set of protocols used to protect digital assets and services from unauthorized users, programs and activities. Continue Reading
By- Cameron Hashemi-Pour, Former Site Editor
- Linda Rosencrance
-
News
18 Feb 2025
Singapore pledges S$150m to boost enterprise AI capabilities
The Enterprise Compute initiative will provide local enterprises with access to AI tools and expertise in a bid to spur AI adoption Continue Reading
By- Aaron Tan, Informa TechTarget
-
Tutorial
18 Feb 2025
Deploy a read-only domain controller for security, speed
A read-only domain controller requires a fair amount of work for a proper deployment, but it can be a great option for quicker logins for users in branch offices. Continue Reading
By- Damon Garn, Cogspinner Coaction
-
News
18 Feb 2025
XAI's Grok-3 highlights openness and transparency concerns
The AI startup's new Grok model has 10 times more compute power than the previous generation. XAI also introduced reasoning capabilities that it says surpass reasoning models. Continue Reading
By- Esther Shittu, News Writer
-
Video
18 Feb 2025
Run Llama LLMs on your laptop with Hugging Face and Python
How hard is it to run a large language model within a Python program? With a little help from PyTorch and the Hugging Face API, it's not hard at all. Continue Reading
By- Cameron McKenzie, TechTarget
-
Definition
18 Feb 2025
What are COTS, MOTS, GOTS and NOTS?
COTS, MOTS, GOTS and NOTS are abbreviations that describe prepackaged software or -- less commonly -- hardware purchase alternatives. The four acronyms denote different classifications of software and hardware, each with its own unique characteristics and usage scenarios. Continue Reading