Topics Archive
Free guide to low-code & no-code platforms
Platforms that enable shadow IT are changing development roles and processes. Here's why it's time to embrace this new reality.
-
Podcast
28 Jan 2025
2025 predictions: GLP-1s, telehealth, AI, employer health plans
Healthcare leaders seeking to establish 2025 healthcare predictions must face many unknowns in policy, digital health, drug utilization and costs, telehealth utilization and more. Continue Reading
By- Kelsey Waddill, Managing Editor and Multimedia Manager
-
News
28 Jan 2025
Apple zero-day vulnerability under attack on iOS devices
Apple said the zero-day vulnerability, tracked as CVE-2025-24085, affects its CoreMedia framework and 'may have been actively exploited against versions of iOS before iOS 17.2.' Continue Reading
By- Rob Wright, Senior News Director, Dark Reading
-
Feature
28 Jan 2025
Where IT comes from: Behind the scenes at Pure Storage’s European R&D centre
We look inside Pure Storage’s Prague research and development centre, where multi-year projects parallel real lifecycles of deployed hardware and the complexities that arise over time Continue Reading
By- Antony Adshead, Computer Weekly
-
Feature
28 Jan 2025
Where IT comes from: Pure Storage’s lean Czech assembly
We look behind the scenes at Pure Storage’s Czechia assembly plant, where change is baked into processes to ensure products are built right and always improving Continue Reading
By- Antony Adshead, Computer Weekly
-
News
28 Jan 2025
AWS and Microsoft could face ‘targeted intervention’ from CMA over UK cloud competition concerns
The CMA has published provisional findings from its investigation into the UK cloud infrastructure market and is considering action against AWS and Microsoft over the competitive impact from their hold on the sector Continue Reading
By- Caroline Donnelly, Senior Editor, UK
-
Feature
28 Jan 2025
EU law could usher in transformative change to digital ecosystems
The EU’s Digital Fairness Act aims to end exploitative practices online and enhance consumer protection, but civil society groups say it must address the power and information asymmetries between users and tech firms Continue Reading
-
Opinion
28 Jan 2025
Your first steps to improve international compliance
The Computer Weekly Security Think Tank considers how security leaders should best navigate the multitude of new national and multinational regulations affecting their work, and ensure their organisations remain compliant and protected Continue Reading
By -
Definition
28 Jan 2025
What is a hardware security module?
A hardware security module (HSM) is a physical device that provides extra security for sensitive data. Continue Reading
By- Rahul Awati
- Elizabeth Davies
- Cameron McKenzie, TechTarget
-
News
28 Jan 2025
Juniper Networks encourages cross-selling with JPA enhancements
Networking player uses partner programme enhancements to encourage partners to sell a wider portfolio Continue Reading
By- Simon Quicke, Microscope Editor
-
News
28 Jan 2025
Concerns over Fujitsu billing application used at SSE Airtricity in Republic of Ireland
Under-scrutiny IT services firm has escalated fears over problems with one of its applications, used at a Republic of Ireland energy firm, to its headquarters in Japan Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
Definition
28 Jan 2025
What is spyware?
Spyware is a type of malicious software (malware) that is installed on a computing device without the end user's knowledge. Continue Reading
By- Katie Terrell Hanna
- Alexander S. Gillis, Technical Writer and Editor
- Kate Brush
-
News
28 Jan 2025
Managed service providers seen as ‘critical’ to SMEs
JumpCloud Q1 report reveals the extent to which customers are leaning on their channel partners Continue Reading
By- Simon Quicke, Microscope Editor
-
Podcast
28 Jan 2025
Cisco generative AI strategy hinges on CX and agents
The vendor's GenAI approach aims to boost the user and consumer experience. Continue Reading
By- Shaun Sutner, Senior News Director
- Esther Shittu, News Writer
-
News
28 Jan 2025
DeepSeek: Welcome to US artificial intelligence’s Sputnik moment
In spite of the US’s financial might, Russia’s Sputnik was the first satellite. Is something similar about to happen thanks to a new Chinese LLM? Continue Reading
By- Cliff Saran, Managing Editor
-
Blog Post
28 Jan 2025
Data engineering - Domino Data Lab: Adapting engineering practices for the AI era
This is a guest post for the Computer Weekly Developer Network written by Jarrod Vawdrey, field chief data scientist at Domino Data Lab. Vawdrey writes in full as follows... In 2023, data ... Continue Reading
-
News
28 Jan 2025
Has Pure got the first of its ‘HDD is doomed’ ducks in a row?
Pure Storage predicted the end of spinning disk by 2028. Will its agreements with flash makers Micron and Kioxia, and an unnamed hyperscaler, be the first nails in the coffin for HDD? Continue Reading
By- Yann Serra, LeMagIT
- Antony Adshead, Computer Weekly
-
News
28 Jan 2025
Datafy promises to slash massive EBS overprovisioning costs
AWS Elastic Block Storage is often over-provisioned. Datafy virtualises EBS volumes to allow customers to scale capacity up and down, and says it will not charge customers if it doesn’t cut their costs Continue Reading
By- Antony Adshead, Computer Weekly
-
28 Jan 2025
Data sovereignty and security in the UK
We assess the impact of new regulations and government policy on the ability to use public cloud services. Continue Reading
-
28 Jan 2025
World Economic Forum: Digital supply chains at risk as world faces two years of turbulence
In its latest report on global risks, the WEF urges digital business leaders to build the resilience of supply chains, improve cyber defences and develop contingency plans for a range of possible outcomes. Continue Reading
-
E-Zine
28 Jan 2025
Turbulent times ahead for tech
In this week’s Computer Weekly, the World Economic Forum in Davos highlighted growing risks to digital supply chains – we examine the turbulence ahead. Data sovereignty is becoming a growing issue as companies move to the cloud – we look at the regulatory challenges. And we analyse the best practices in automated patch management. Read the issue now. Continue Reading
-
Definition
28 Jan 2025
What is the Semantic Web? Definition, history and timeline
The Semantic Web is a vision for linking data across webpages, applications and files. Continue Reading
By- Alexander S. Gillis, Technical Writer and Editor
- George Lawton
-
Tip
28 Jan 2025
GAN vs. transformer models: Comparing architectures and uses
Discover the differences between generative adversarial networks and transformers, plus how the two techniques might combine in the future to provide users with better results. Continue Reading
-
News
27 Jan 2025
Examining hype about Chinese AI startup DeepSeek
The vendor released a new reasoning model it claims it developed cheaply in part by not using as many Nvidia chips. It will likely face challenges in the U.S. market. Continue Reading
By- Esther Shittu, News Writer
-
Definition
27 Jan 2025
What is high-bandwidth memory (HBM)?
High-bandwidth memory is a type of computer memory that is optimized for fast data transfer and reduced power consumption. Continue Reading
-
News
27 Jan 2025
Trump DEI ban puts HR software, training in limbo
Trump's ban on DEI programs is forcing federal agencies and HR vendors to reevaluate diversity tools and training, with potential legal challenges ahead. Continue Reading
By- Patrick Thibodeau, Editor at Large
-
News
27 Jan 2025
Trusted data at the core of successful GenAI adoption
A new study finds that only a third of organizations are successfully developing GenAI tools. The problem preventing success is the quality of the underlying information. Continue Reading
By- Eric Avidon, Senior News Writer
-
Feature
27 Jan 2025
2025 Medicare, Medicaid trends to watch in spending, strategy
The new year brings many old challenges, such as high spending trends, but payers in Medicare and Medicaid will weather these difficulties through insightfulness and agility. Continue Reading
By- Kelsey Waddill, Managing Editor and Multimedia Manager
-
News
27 Jan 2025
Former CSRB members largely silent on dismissal
The Cyber Safety Review Board was investigating recent attacks by Chinese state-sponsored threat actor Salt Typhoon when DHS terminated all advisory board memberships. Continue Reading
By- Alexander Culafi, Senior News Writer, Dark Reading
-
Opinion
27 Jan 2025
Retailers' animosity toward AWS cloud appears to thaw
AWS still has a ways to go to woo some retailers, but it's clear the company's no longer excluded by all. Continue Reading
By- Don Fluckinger, Senior News Writer
-
News
27 Jan 2025
Change Healthcare data breach victim count rises to 190M
UnitedHealth Group previously said that the Change Healthcare data breach affected 100 million individuals, but new figures suggest the breach victim count has nearly doubled. Continue Reading
By- Jill Hughes, Associate Editor
-
News
27 Jan 2025
TCS to inject AI and quantum computing into aerospace through French delivery centre
Indian IT services giant opens IT delivery centre that will focus on technology that can address the challenges of the aerospace sector Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
Definition
27 Jan 2025
What are knowledge-based systems (KBSes)?
Knowledge-based systems (KBSes) are computer programs that use a centralized repository of data known as a knowledge base to provide problem-solving. Continue Reading
By- Alexander S. Gillis, Technical Writer and Editor
- John Moore, Industry Editor
-
Blog Post
27 Jan 2025
Everywoman announces 2025 tech awards finalists
The finalists for the 2025 Bupa Everywoman in Technology Awards have been announced prior to the awards ceremony in March. This year is the 15th year the women’s professional network has run its ... Continue Reading
By- Clare McDonald, Business Editor
-
News
27 Jan 2025
Three sentenced over OTP.Agency MFA fraud service
Three men have been sentenced over their role in a cyber criminal subscription service that offered access to online accounts using illicitly obtained one-time passcodes Continue Reading
By- Alex Scroxton, Security Editor
-
News
27 Jan 2025
FullFibre, Zzoomm merge to gain scale in UK altnet broadband
UK independent broadband providers merge to form one of the UK’s largest altnets, with 600,000 properties ready for service Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
27 Jan 2025
Freshwave deploys all-operator 4G in-building connectivity to City of London
Connectivity infrastructure-as-a-service provider fits out in-building mobile connectivity from all the UK mobile operators to 8 Bishopsgate location, with sixteen occupiers already signing up to the service Continue Reading
By- Joe O’Halloran, Computer Weekly
-
Feature
27 Jan 2025
Communication tips for patients taking unapproved GLP-1s
With unapproved GLP-1s seeping into the market, healthcare providers should consider communication strategies to support patients taking them. Continue Reading
By- Sara Heath, Executive Editor
-
News
27 Jan 2025
Cyber incident that closed British Museum was inside job
An IT incident that disrupted visitor access to the British Museum last week was the work of a disgruntled contractor who had been let go Continue Reading
By- Alex Scroxton, Security Editor
-
News
27 Jan 2025
Interview: Feryal Clark, AI and digital government minister, DSIT
Computer Weekly talks to the parliamentary under-secretary about digital identity, the importance of trust and utilising the power of artificial intelligence Continue Reading
By -
Tip
27 Jan 2025
How to change the password of an RDP session
Password expiration policies are key to maintaining data security, so users need easy access to a password change utility whether they are on a local PC or a remote desktop. Continue Reading
By- Chris Twiest, RawWorks
-
News
27 Jan 2025
Insulin prices fall amid growing competition, legislative action
Generics, biosimilars, pricing strategies and regulatory policies are driving a decline in insulin prices, creating affordability and improved access for patients. Continue Reading
By- Alivia Kaylor, MSc, Senior Editor
-
News
27 Jan 2025
Cohesity exec: Gaia will 'unlock' data for AI applications
In this Q&A, Cohesity's Greg Statton explains how the Gaia offering connects data and AI services, with more capabilities coming following the acquisition of Veritas last year. Continue Reading
By- Tim McCarthy, Former News Writer
-
News
27 Jan 2025
Oxford-Cambridge Arc gets government support
Labour aims to capitalise on the growth potential of the cluster of businesses and academic institutes around Oxford, Cambridge and Milton Keynes Continue Reading
By- Cliff Saran, Managing Editor
-
Definition
27 Jan 2025
What is cloud orchestration (cloud orchestrator)?
Cloud orchestration (cloud orchestrator) is the use of programming technology to manage the interconnections and interactions among workloads on public and private cloud infrastructure. Continue Reading
By- Kinza Yasar, Technical Writer
- Alan R. Earls
-
News
27 Jan 2025
Red Hat adds more distributor and ISV support
Red Hat’s partner programme enhancements look to add to improvements and modular structure that was introduced in 2024 Continue Reading
By- Simon Quicke, Microscope Editor
-
Definition
27 Jan 2025
What is SCADA (supervisory control and data acquisition)?
SCADA (supervisory control and data acquisition) is a category of industrial control systems (ICS) that remotely gathers data in real time from industrial processes in order to supervise and control equipment and conditions. Continue Reading
By- Rahul Awati
- Peter Loshin, Former Senior Technology Editor
-
Definition
27 Jan 2025
What is GPT-3? Everything you need to know
GPT-3, or the third-generation Generative Pre-trained Transformer, is a neural network machine learning model trained using internet data to generate any type of text. Continue Reading
By- Nick Barney, Technology Writer
- Ben Lutkevich, Site Editor
- Ron Schmelzer, Scalebrate and Exponential Scale
-
Tip
27 Jan 2025
Explore 7 future potential quantum computing uses
Quantum computing development can benefit data centers. Potential quantum computing uses include improving supply chains, financial modeling, and AI and machine learning optimization. Continue Reading
By -
Tip
27 Jan 2025
How to enable RDP remotely with several different methods
Desktop administrators may need to enable remote access to a Windows desktop for an end user without physical access to the desktop. Learn how to approach this scenario. Continue Reading
By- Chris Twiest, RawWorks
-
Feature
27 Jan 2025
LGE gains mileage in smart automotive
In part two of our look at how LGE plans to take its accumulated wealth of knowledge in its traditional business lines to the business sector, we explore the firm’s moves in the automotive sector Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
27 Jan 2025
Softcat: Customers want innovation and resilience
Channel player’s latest annual insights into customer priorities underlines the need for the channel to recognise the budgetary challenges most users are under Continue Reading
By- Simon Quicke, Microscope Editor
-
News
27 Jan 2025
Channel moves: Who’s gone where?
Personnel promotions and moves this week at Nutanix, Intelliworx, ITS, Myriad360 and Abnormal Security Continue Reading
By- Simon Quicke, Microscope Editor
-
News
27 Jan 2025
Boldyn Networks boosts private 5G with Smart Mobile Labs acquisition
UK shared network infrastructure provider furthers business expansion with strategic purchase of German private 5G network and turnkey applications company Continue Reading
By- Joe O’Halloran, Computer Weekly
-
Feature
27 Jan 2025
VMware backup: Key decision points if you migrate away from VMware
VMware’s pricing changes have spurred some organisations to move to new virtualisation environments, but they’ll need backing up. We look at the key points to consider Continue Reading
-
News
27 Jan 2025
Inside CyberArk’s security strategy
CyberArk CIO Omer Grossman talks up the company’s security-first ethos, the importance of an assumed breach mentality and how the company is addressing threats from the growing use of AI Continue Reading
By- Aaron Tan, Informa TechTarget
-
Feature
27 Jan 2025
Public cloud: Data sovereignty and data security in the UK
We assess the impact of new regulations and government policy on the ability to use public cloud services Continue Reading
-
Blog Post
27 Jan 2025
Data engineering - Cloudera: Counting the cost of data integration tax
This is a guest post for the Computer Weekly Developer Network written by Wim Stoop, senior director of product marketing at Cloudera. Styled as the ‘hybrid data company’, Cloudera is known for its ... Continue Reading
-
Definition
27 Jan 2025
What is the spiral model and how is it used?
The spiral model is a systems development lifecycle (SDLC) method used for risk management that combines the iterative development process model with elements of the Waterfall model. Continue Reading
By- Cameron Hashemi-Pour, Former Site Editor
-
News
24 Jan 2025
Trump's shift in climate policy alters business strategies
Business strategies on climate and environmental goals will change during the next four years, under the Trump administration. Continue Reading
By- Makenzie Holland, Senior News Writer
-
News
24 Jan 2025
Gartner tech spending forecast tempered by price hikes
The global IT market is projected to grow 9.8% in 2025, but an expected increase in the prices of vendor products and services will eat into CIOs' tech budgets. Continue Reading
By- John Moore, Industry Editor
-
News
24 Jan 2025
DOJ indicts 5 individuals in North Korea IT worker scam
An unsealed indictment revealed threat actors working for North Korea tricked at least 64 U.S. businesses into hiring fake IT workers for financial and propriety data gains. Continue Reading
By- Arielle Waldman, Features Writer, Dark Reading
-
Definition
24 Jan 2025
What is ASCII (American Standard Code for Information Interchange)?
ASCII (American Standard Code for Information Interchange) is the most common character encoding format for text data in computers and on the internet. Continue Reading
By- Rahul Awati
- Peter Loshin, Former Senior Technology Editor
-
Tip
24 Jan 2025
Data sovereignty compliance challenges and best practices
Organizations that use the cloud face stiff challenges in complying with data sovereignty laws and regulations. The first step: Understand which laws apply. Continue Reading
By- Damon Garn, Cogspinner Coaction
-
Definition
24 Jan 2025
What is network automation?
Network automation is a process that uses intelligent software to automate the management, configuration, deployment, testing and operation of both physical and virtual devices. Continue Reading
By- Kinza Yasar, Technical Writer
- Andrew Froehlich, West Gate Networks
- Jessica Scarpati
-
News
24 Jan 2025
AMD processor vulnerability inadvertently leaked early
The flaw was revealed when hardware manufacturer Asus published a patch for an 'AMD Microcode Signature Verification Vulnerability' to a gaming motherboard update page. Continue Reading
By- Alexander Culafi, Senior News Writer, Dark Reading
-
News
24 Jan 2025
DC01UK’s plan to build ‘Europe’s biggest AI datacentre’ wins local council approval
Plans to build a hyperscale datacentre to host artificial intelligence and cloud workloads on green belt land in Hertfordshire have been waved through by local planning officials Continue Reading
By- Caroline Donnelly, Senior Editor, UK
-
Feature
24 Jan 2025
3 things to know about proposed HIPAA Security Rule updates
New processes, cost of implementation and whether the proposed updates to the HIPAA Security Rule will stick are top-of-mind for industry experts. Continue Reading
By- Jill Hughes, Associate Editor
-
Definition
24 Jan 2025
What is read-only memory (ROM)?
Read-only memory, or ROM, is a type of computer storage containing non-volatile, permanent data that normally can only be read, not written to. Continue Reading
By- Cameron Hashemi-Pour, Former Site Editor
- Kate Brush
-
News
24 Jan 2025
MPs and peers start inquiry into Russian and Chinese sabotage threats to subsea internet cables
MPs and Lords on the Joint Committee on the National Security Strategy have begun an inquiry into the resilience of UK internet cables, following heightened threats of Russian and Chinese sabotage Continue Reading
By- Bill Goodwin, Investigations Editor
-
News
24 Jan 2025
SITA takes off with Cathay Pacific to expand global network connectivity
Air transport IT provider to enhance airline’s operations with high-speed connectivity across 51 airports worldwide, optimising access to cloud technology Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
24 Jan 2025
Loan Charge under review: MPs brand latest independent inquiry into controversial policy ‘a farce’
Details of the government’s highly anticipated independent review into the loan charge have emerged, and MPs claim it falls way short of what is needed to resolve the financial and mental health damage the policy has caused to those in-scope of it Continue Reading
By- Caroline Donnelly, Senior Editor, UK
-
News
24 Jan 2025
US indicts five in fake North Korean IT contractor scandal
The US authorities have accused five men, including two American citizens, of involvement in a scheme which saw companies duped into hiring fake North Korean IT contractors Continue Reading
By- Alex Scroxton, Security Editor
-
Podcast
24 Jan 2025
Why healthcare needs a patient-centered approach to AI use
Incorporating AI into clinical decision support tools could empower efforts to achieve patient-centered care if health systems know how to integrate these technologies effectively. Continue Reading
By- Kelsey Waddill, Managing Editor and Multimedia Manager
-
News
24 Jan 2025
Businesses warned of scale of e-waste problem
With the focus on recycling, remanufacturing and disposing of hardware sustainably, there is a chance for the channel to share solutions to the challenge Continue Reading
By- Simon Quicke, Microscope Editor
-
Opinion
24 Jan 2025
The critical role of data in building an AI agent
Data quality, modern tooling and AI governance are key to building successful AI agents that meet user expectations, writes industry analyst Stephen Catanzano. Continue Reading
By- Stephen Catanzano, Senior Analyst
-
Omdia
Intelligence and advice powered by decades of global expertise and comprehensive coverage of the tech markets.
-
Definition
24 Jan 2025
What is an analytics database (analytical database)?
An analytics database, also called an analytical database, is a read-only system that stores historical data on business metrics such as sales performance and inventory levels. Continue Reading
By -
News
24 Jan 2025
StarHub, Nokia partner on network APIs to drive 5G, 4G application development
Telco and comms tech provider target new applications for enterprises in use cases such as banking, finance, ports and online streaming through Network as Code platform developer portal Continue Reading
By- Joe O’Halloran, Computer Weekly
-
Definition
24 Jan 2025
What is ISO 50001 (International Organization for Standardization 50001)?
ISO 50001 (International Organization for Standardization 50001) is a voluntary standard for designing, implementing and maintaining an energy management system. Continue Reading
By- Stephen J. Bigelow, Senior Technology Editor
-
Definition
24 Jan 2025
What is CAD (computer-aided design)?
CAD (computer-aided design) is the use of computer-based software to aid in design processes by creating simulations of real-world objects. Continue Reading
-
News
24 Jan 2025
Fibre broadband network reaches half of Scotland
UK’s leading broadband provider says research shows gigabit digital upgrade could generate £4bn for Scottish economy and help to reverse depopulation Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
24 Jan 2025
Labour’s first digital government strategy: Is it déjà vu or something new?
Labour won the 2024 general election on a platform of change – and its technology cheerleader insists the new digital government strategy is all about change. Have we heard it all before or is this time really different? Continue Reading
By- Bryan Glick, Editor in chief
-
News
24 Jan 2025
IOWN sets focus on go-to-market, proof of concept optical in 2025
Next-gen networking project reveals focus for 2025, including early adoption use cases, go-to-market activities and wider industry collaboration Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
24 Jan 2025
Assured Data Protection sets sights on European growth
Data backup and resilience specialist is looking to expand its reach and work with more channel partners Continue Reading
By- Simon Quicke, Microscope Editor
-
News
24 Jan 2025
Review of legal rule on computer evidence long overdue, say Post Office scandal victims
Computer Weekly talks to people who suffered miscarriages of justice at the hands of flawed computer evidence, as well as to experts in law and IT, as the government commits to review the legal presumption that computers work all the time Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
24 Jan 2025
High Court: Sky Betting ‘parasitic’ in targeting problem gambler
UK High Court rules that Sky Betting acted unlawfully after breaching a customer’s data protection rights when it obtained his personal data through cookies and used it to profile him for the purposes of direct marketing, despite his ‘impaired’ ability to provide meaningful consent Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
24 Jan 2025
Teachers to use AI for lesson planning and marking
Speaking at the Bett Show this year, the UK’s education secretary outlined the ways in which teachers will be using technologies such as AI in the future, including planning lessons and marking work Continue Reading
By- Clare McDonald, Business Editor
-
News
24 Jan 2025
CISOs boost board presence by 77% over two years
A global research study, from Splunk and Oxford Economics, into how chief information security officers interact with boards finds greater participation but enduring gaps Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
Blog Post
24 Jan 2025
A Galaxy of AI opportunities
Looking back at the 1980s, one of the hot items that everyone seemed to want was the Filofax. This glorified leather diary was regarded as the must-have accessory for busy people, or those who ... Continue Reading
By- Cliff Saran, Managing Editor
-
Opinion
24 Jan 2025
Low-code and AI challenge the reign of SaaS
Software-as-a-service applications have long been the go-to for businesses seeking quick IT fixes, but a new wave of low-code platforms powered by AI and automation is empowering organisations to ditch pre-packaged solutions and build their own custom tools Continue Reading
By- Keith Payne
-
Definition
24 Jan 2025
What is SAML (Security Assertion Markup Language)?
Security Assertion Markup Language (SAML) is an open standard for sharing security information about identity, authentication and authorization across different systems. Continue Reading
By- Kinza Yasar, Technical Writer
- Peter Loshin, Former Senior Technology Editor
-
Answer
24 Jan 2025
Cloud networking vs. cloud computing: What's the difference?
Businesses might see cloud computing and cloud networking as interchangeable due to similarities, but the two strategies dictate different processes and fulfill different goals. Continue Reading
By- John Burke, Nemertes Research
-
Definition
24 Jan 2025
What is a variational autoencoder (VAE)?
A variational autoencoder (VAE) is one of several generative models that use deep learning to generate new content, detect anomalies and remove noise. Continue Reading
By- Stephen J. Bigelow, Senior Technology Editor
- George Lawton
-
News
23 Jan 2025
EU, U.S. at odds on AI safety regulations
The U.S. under the new Trump administration changes course on AI safety, in contrast with the EU, as uncertainty lingers about other Biden-era federal cybersecurity efforts. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
23 Jan 2025
Trump takes issue with EU actions against U.S. big tech
President Donald Trump spoke against significant EU fines on big tech companies and said the U.S. has some 'very big complaints with the EU.' Continue Reading
By- Makenzie Holland, Senior News Writer
-
Definition
23 Jan 2025
What is threat modeling?
Threat modeling is the systematic process of identifying threats to and vulnerabilities in software applications, and then defining countermeasures to mitigate those threats and vulnerabilities to better protect business processes, networks, systems and data. Continue Reading
-
Feature
23 Jan 2025
20 real-world GenAI applications across leading industries
Generative AI is predicted to add up to $16 trillion to the global economy by 2030. Learn how 20 industries, from finance and legal to healthcare and manufacturing, are using it. Continue Reading
-
Definition
23 Jan 2025
What is cognitive bias?
Cognitive bias is a systematic thought process caused by the tendency of the human brain to simplify information processing through a filter of personal experience and preferences. Continue Reading
By- Stephen J. Bigelow, Senior Technology Editor
- Alexander S. Gillis, Technical Writer and Editor
- Corinne Bernstein
-
News
23 Jan 2025
Zero-day vulnerability in SonicWall SMA series under attack
SonicWall released a hotfix for a critical pre-authentication remote code execution vulnerability in Secure Mobile Access 1000 products amidst reports of zero-day exploitation. Continue Reading
By- Arielle Waldman, Features Writer, Dark Reading
-
Tutorial
23 Jan 2025
JavaScript, React and object-oriented programming
This tutorial ties together JavaScript, React and object-oriented programming to show developers how to use the React framework's powerful and flexible features and functions. Continue Reading
By- Bob Reselman, CogArtTech
-
Feature
23 Jan 2025
As Medicare ACOs grow, key model improvements emerge
Medicare ACO models drive value-based care growth, improving cost, quality and relationships, but face challenges in benchmarking and payments, needing innovation and flexibility. Continue Reading
By- Jacqueline LaPointe, Executive Editor