www.computerweekly.com
Open in
urlscan Pro
2606:4700::6812:1cda
Public Scan
Submitted URL: http://www.computerweekly.com/Home/
Effective URL: https://www.computerweekly.com/
Submission: On July 28 via api from GB — Scanned from GB
Effective URL: https://www.computerweekly.com/
Submission: On July 28 via api from GB — Scanned from GB
Form analysis
2 forms found in the DOMGET https://www.computerweekly.com/search/query
<form action="https://www.computerweekly.com/search/query" method="get" class="header-search">
<label for="header-search-input" class="visuallyhidden">Search the TechTarget Network</label>
<input class="header-search-input" id="header-search-input" type="text" name="q" placeholder="Search Computer Weekly">
<button aria-label="Search" class="header-search-submit"><i class="icon" data-icon="g"></i></button>
<ul class="ui-autocomplete ui-front ui-menu ui-widget ui-widget-content ui-corner-all" id="ui-id-1" tabindex="0" style="display: none;"></ul>
</form>
GET https://www.techtarget.com/whatis/search/query
<form action="https://www.techtarget.com/whatis/search/query" method="get" class="search-def-form">
<label for="search-def-title" class="visuallyhidden">Search for definitions</label>
<input class="search-def-title" type="text" name="q" placeholder="Search for definitions">
<input type="hidden" name="type" value="definition">
<input class="button blue-button search-def-form-btn" type="submit" value="Look it Up">
</form>
Text Content
Search the TechTarget Network Join CW+ Login Register Cookies * News * In Depth * Blogs * Opinion * Videos * Photo Stories * Premium Content * Webinars * IT Salary Survey infographic RSS * IT Management * IT leadership & CW500 * IT architecture * IT efficiency * Governance * Innovation * Legislation & regulation * Operations & support * Project management * Strategy * Supplier management * Business issues * Sponsored Communities * Industry Sectors * Healthcare IT * Charity IT * Business services IT * Financial services IT * Government & public sector IT * Leisure & hospitality IT * Manufacturing IT * Media & entertainment IT * Retail IT * SME IT * Telecoms & internet * Transport & travel IT * Utilities IT * IT suppliers * Technology Topics Datacentre View All * Clustering for high availability and HPC * Containers * Converged infrastructure * Datacentre backup power and power distribution * Datacentre capacity planning * Datacentre cooling infrastructure * Disaster recovery/security * Green IT * Performance, monitoring and optimisation * Systems management * DevOps * IaaS * Server and Operating Systems * PaaS * Virtualisation * SaaS * Desktop virtualisation platforms Enterprise software View All * AI and automation * Blockchain * Business applications * Business intelligence * Cloud applications * Collaboration * CRM * Database * ERP * Financial applications * HR software * Middleware * Microservices * Windows * Mobile * Open source * Operating systems * SOA * Software development * Software licensing * Virtualisation * Web software IT in Europe and Middle East View All * IT in France * IT in the Nordics * IT in Benelux * IT in Germany * IT in Italy * IT in Poland * IT in Russia * IT in Spain * IT in the Middle East * IT in Turkey Information Management View All * Big data * Business intelligence and analytics * BPM * Content management * Database management * Quality/governance * Data warehousing * MDM/Integration IT in Asia-Pacific View All * IT in ASEAN * IT in Australia & New Zealand * IT in India Internet View All * Cloud * E-commerce * Internet infrastructure * Social media * Web development IT skills View All * Diversity in IT * Training * Jobs * Management skills * Technical skills Hardware View All * Chips & processors * Printers * Storage * Data centre * Mobile * Networking * PC * Servers IT security View All * Antivirus * Secure Coding and Application Programming * Continuity * Cloud security * Data Breach Incident Management and Recovery * Endpoint and NAC Protection * Cybercrime * IAM * Risk management * Network Security Management * Data protection * Compliance Regulation and Standard Requirements * Security policy and user awareness * Web Application Security IT services View All * Cloud * Consultancy * Outsourcing * Hosting * Offshore * Startups Mobile View All * Laptop * Mobile software * Mobile networking * Smartphone * Tablet Networking View All * Datacentre networking * Internet of Things * Mobile * Network hardware * Network monitoring and analysis * Network routing and switching * Network security strategy * Network software * Software-defined networking * Telecoms networks and broadband communications * Unified communications * VoIP * WAN performance and optimisation * Wireless Storage View All * Cloud storage * Containers and storage * Backup * Compliance and storage * Disaster recovery * Flash and SSDs * Hyper-convergence * Object storage * Disk systems * Software-defined storage * Storage switches * Storage management * Storage performance * Virtualisation and storage Please select a category * Datacentre * Enterprise software * IT in Europe and Middle East * Information Management * IT in Asia-Pacific * Internet * IT skills * Hardware * IT security * IT services * Mobile * Networking * Storage * Follow: * * * * ComputerWeekly.com.br * ComputerWeekly.de * ComputerWeekly.es * LeMagIT.fr * MicroScope.co.uk TOP STORIES RISKS OF OPENING UP AI Meta has annouced that its Llama 2 large language model will be freely available under a community licence with certain restrictions Rawf8 - stock.adobe.com SCOTTISH UNIVERSITY HIT BY RHYSIDA RANSOMWARE GANG Data allegedly stolen from the University of Western Scotland has been put up for sale on the dark web by a ransomware gang going by the name Rhysida CHURCH OF ENGLAND GIVES BLESSING TO VODAFONE OPEN RAN Leading UK operator joins hands with church to improve 4G mobile coverage in rural UK locations Atstock Productions - stock.adob NOMINATE: MOST INFLUENTIAL WOMEN IN UK TECHNOLOGY 2023 Tell us who you think should be included in Computer Weekly’s 2023 list of the top 50 most influential women in UK technology View All Stories E-HANDBOOKS A COMPUTER WEEKLY BUYER’S GUIDE TO NETWORK COST AND BANDWIDTH OPTIMISATION View All E-Handbooks LATEST NEWS * agsandrew - stock.adobe.com LANCASTER UNI LENDS CYBER SUPPORT TO NUCLEAR DECOMMISSIONING BODY Lancaster University’s cyber team has joined with the Nuclear Decommissioning Authority to help support and protect its 300-year mission, while enhancing its own capabilities in the process * RISKS OF OPENING UP AI Meta has annouced that its Llama 2 large language model will be freely available under a community licence with certain restrictions * Rawf8 - stock.adobe.com SCOTTISH UNIVERSITY HIT BY RHYSIDA RANSOMWARE GANG Data allegedly stolen from the University of Western Scotland has been put up for sale on the dark web by a ransomware gang going by the name Rhysida * ServiceNow SERVICENOW Q2 2023: 23% YEAR-ON-YEAR GROWTH WITH GENAI TO FORE ServiceNow has announced second-quarter 2023 revenue of $2.15bn, up 23% on the same quarter in 2022. The digital workflows automation supplier stressed GenAI developments and partnerships * FIBRE GROWTH DRIVES REVENUE UPTICK BUT BT SEES Q1 SUBS LOSSES BT posts first-quarter 2024 results vindicating strategy of focus on core networks and benefit of inflation-linked price rises, but broadband division sees overall fall in customers * CHURCH OF ENGLAND GIVES BLESSING TO VODAFONE OPEN RAN Leading UK operator joins hands with church to improve 4G mobile coverage in rural UK locations DOWNLOAD COMPUTER WEEKLY In The Current Issue: * CDO interview: Robert Michael, group head of data, DFS * One month after MOVEit: New vulnerabilities found as more victims are named Download Current Issue View All The Latest News IN DEPTH * GENERATIVE AI: AUTOMATING STORAGE AND BACKUP MANAGEMENT We look at how generative artificial intelligence is being deployed to automate monitoring of repetitive tasks and report on enterprise storage and backup, but also the limits to its implementation * Fotolia HR SOFTWARE AND STRATEGIES TO COMBAT STAFF ATTRITION While there is no simple technological solution to the problem of staff attrition, a combination of management strategies and business applications can improve engagement and retention * sakkmesterke - stock.adobe.com HANDBOOK HELPS DUTCH ORGANISATIONS MIGRATE TO QUANTUM-SAFE COMMUNICATION Organisations must start implementing new cryptography standards – as migration is a lengthy process View All In Depth Articles CW+ DOWNLOADS View All * E-HANDBOOK | JULY 2023 A COMPUTER WEEKLY BUYER’S GUIDE TO NETWORK COST AND BANDWIDTH OPTIMISATION Download * E-ZINE | JULY 2023 GETTING COMFORTABLE WITH DATA Download * E-ZINE | JULY 2023 CW APAC – TECH CAREER GUIDE: ARTIFICIAL INTELLIGENCE Download * E-ZINE | JULY 2023 COMPUTER WEEKLY: SOARING AHEAD WITH DATA AT ROLLS-ROYCE Download * E-ZINE | JULY 2023 CW EMEA: CAN WE TRUST AI? Download BLOGS * CWDN SERIES: DEVEX – COUCHBASE: 1 SIZE FITS ONE, PERSONALISATION MATTERS- CW DEVELOPER NETWORK This is a guest post for the Computer Weekly Developer Network written by Perry Krug in his capacity as head of developer experience at Couchbase. Krug describes himself as a ‘very’ technical ... Continue Reading * CWDN SERIES: DEVEX – PENPOT: FOR GOOD FRONT-ENDS, BUILD BRIDGES WITH DESIGN- CW DEVELOPER NETWORK This is a guest post for the Computer Weekly Developer Network written by Alonso Torres in his role as a software engineer at Kaleidos working on Penpot. Penpot is an open source design-to-code ... Continue Reading * HOW THE HIGH STREET GAINS FROM ADVANCED DATA ANALYTICS- DATA MATTERS This is a guest blog post by Phillip Sewell, CEO at Predyktable. The high street is finally back in business, with customers flocking back to stores, restaurants and pubs. To fuel and sustain this ... Continue Reading * CWDN SERIES: DEV-EXPERIENCE – SNORKEL AI: PROGRAMMATIC LABELLING LEADS TO BETTER COLLABORATION- CW DEVELOPER NETWORK This is a guest post for the Computer Weekly Developer Network written by Aparna Lakshmiratan, VP of Product at Snorkel AI - a company known for its technology that equips enterprises to build or ... Continue Reading BLOGROLL * CW Developer Network * Data Matters * Open Source Insider * Write side up - by Freeform Dynamics * Cliff Saran's Enterprise blog * Networks Generation * When IT Meets Politics * Inspect-a-Gadget * Computer Weekly Editors Blog * Ahead in the Clouds View All Computer Weekly Blogs OPINION * THINK TANK: RECRUITMENT AND THE REGULATORY LANDSCAPE There is an ever-growing list of rules and regulations for enterprises to get their heads around when it comes to sustainability, but what can they do to keep on top of things? * Maksim Kabakou - Fotolia DOES AI HAVE A FUTURE IN CYBER? YES, BUT ONLY IF IT WORKS WITH US Do AI and ML hold the promise of helping cyber pros achieving the holy grail of operating quicker, cheaper, and with higher efficiency? We shouldn’t hold our breath, says Nominet’s Paul Lewis * Maksim Kabakou - Fotolia AI-ENHANCED CYBER HAS POTENTIAL, BUT WATCH OUT FOR MARKETING HYPE As AI is a hot topic right now, it is no surprise there are some cyber solutions coming to market that have been thrown together in haste, but that said, genuine AI-powered security products do exist and their abilities could yet prove ... View All Opinion Articles VIDEOS * DIVERSITY IN TECH 2022: EXPLAINING EMPLOYEE RESOURCE GROUPS * DIVERSITY IN TECH 2022: MEHDI MOBAYEN-RAHNI, TYL BY NATWEST * DIVERSITY IN TECH 2022: KERENSA JENNINGS, BT * DIVERSITY IN TECH 2022: JOEL GUJRAL, MYNDUP * DIVERSITY IN TECH 2022: JEN TIPPIN, NATWEST GROUP * DIVERSITY IN TECH 2022: BEV WHITE, NASH SQUARED View all Videos SEARCH THOUSANDS OF TECH DEFINITIONS Search for definitions * compliance audit * artificial intelligence of things (AIoT) * ACID (atomicity, consistency, isolation, and durability) * Twitter View All Definitions Latest TechTarget resources * CIO * Security * Networking * Data Center * Data Management CIO * Explaining risk maturity models and how they work Explore risk maturity models and assessment tools for enhancing enterprise risk management. Improve ERM programs to mitigate risk... * U.S. senators sharpen focus on AI regulations Licensing AI systems, creating a federal AI agency, and establishing third-party testing and auditing regimes are just some of ... * Lack of agreement on AI rules in U.S., EU gives China a leg up While the EU and China have proposed AI rules, the U.S. is continuing a hands-off regulatory approach, which could affect its ... Security * Google: 41 zero-day vulnerabilities exploited in 2022 While attackers increasingly exploited zero-day flaws last year, one of the most notable findings from the report emphasized how ... * Security hygiene and posture management: A work in progress Security hygiene and posture management may be the bedrock of cybersecurity, but new research shows it is still decentralized and... * How to avoid LinkedIn phishing attacks in the enterprise Organizations and users need to be vigilant about spotting LinkedIn phishing attacks by bad actors on the large business social ... Networking * Reasons to build and buy network automation tools Most enterprises are building and buying network automation tools, and the reasons for both approaches are abundant. Find out why... * An introduction to Git for network engineers Git can be a useful tool for network engineers who manage complex infrastructure, especially as networking increasingly overlaps ... * Automation, orchestration software fuel network modernization In some ways, network modernization means cutting manual configuration errors and relying on automation and orchestration to ... Data Center * Data center heat reuse: How to make the most of excess heat Data center heat doesn't need to go to waste. As part of a sustainability strategy, explore ways to put the heat your data center... * RHEL users question Red Hat's reliance on CentOS Stream Despite criticism from developers, Red Hat continues its commitment to CentOS as the delivery vehicle for RHEL, believing it ... * 8 benefits of data center virtualization Organizations with virtualized data center components can save on hardware, comply easier with regulations and increase speed. ... Data Management * Beyond generative AI, data quality a data management trend Vendors and users have mostly focused on generative AI so far in 2023, but observability to ensure quality and governance also ... * Oracle targets speed with launch of MySQL HeatWave Lakehouse The tech giant's new lakehouse enables users of its database management suite to combine structured and unstructured data to ... * Lakehouse architecture the best fit for modern data needs While data warehouses and data lakes each excel at handling certain types of data, a hybrid of the two is the best means of ... * About Us * Editorial Ethics Policy * Meet The Editors * Contact Us * Our Use of Cookies * Advertisers * Business Partners * Media Kit * Corporate Site * Contributors * Reprints * Answers * E-Products * Events * In Depth * Guides * Opinions * Quizzes * Photo Stories * Tips * Tutorials * Videos * Computer Weekly Topics All Rights Reserved, Copyright 2000 - 2023, TechTarget Privacy Policy Cookie Preferences Cookie Preferences Do Not Sell or Share My Personal Information Close