www.computerweekly.com Open in urlscan Pro
2606:4700::6812:1cda  Public Scan

Submitted URL: http://www.computerweekly.com/Home/
Effective URL: https://www.computerweekly.com/
Submission: On July 28 via api from GB — Scanned from GB

Form analysis 2 forms found in the DOM

GET https://www.computerweekly.com/search/query

<form action="https://www.computerweekly.com/search/query" method="get" class="header-search">
  <label for="header-search-input" class="visuallyhidden">Search the TechTarget Network</label>
  <input class="header-search-input" id="header-search-input" type="text" name="q" placeholder="Search Computer Weekly">
  <button aria-label="Search" class="header-search-submit"><i class="icon" data-icon="g"></i></button>
  <ul class="ui-autocomplete ui-front ui-menu ui-widget ui-widget-content ui-corner-all" id="ui-id-1" tabindex="0" style="display: none;"></ul>
</form>

GET https://www.techtarget.com/whatis/search/query

<form action="https://www.techtarget.com/whatis/search/query" method="get" class="search-def-form">
  <label for="search-def-title" class="visuallyhidden">Search for definitions</label>
  <input class="search-def-title" type="text" name="q" placeholder="Search for definitions">
  <input type="hidden" name="type" value="definition">
  <input class="button blue-button search-def-form-btn" type="submit" value="Look it Up">
</form>

Text Content

Search the TechTarget Network
Join CW+
Login Register Cookies
 * News
 * In Depth
 * Blogs
 * Opinion
 * Videos
 * Photo Stories
 * Premium Content
 * Webinars
 * IT Salary Survey infographic

RSS
 * IT Management
    * IT leadership & CW500
    * IT architecture
    * IT efficiency
    * Governance
    * Innovation
    * Legislation & regulation
    * Operations & support
    * Project management
    * Strategy
    * Supplier management
    * Business issues
    * Sponsored Communities

 * Industry Sectors
    * Healthcare IT
    * Charity IT
    * Business services IT
    * Financial services IT
    * Government & public sector IT
    * Leisure & hospitality IT
    * Manufacturing IT
    * Media & entertainment IT
    * Retail IT
    * SME IT
    * Telecoms & internet
    * Transport & travel IT
    * Utilities IT
    * IT suppliers

 * Technology Topics
   Datacentre View All
    * Clustering for high availability and HPC
    * Containers
    * Converged infrastructure
    * Datacentre backup power and power distribution
    * Datacentre capacity planning
    * Datacentre cooling infrastructure
    * Disaster recovery/security
    * Green IT
    * Performance, monitoring and optimisation
    * Systems management
    * DevOps
    * IaaS
    * Server and Operating Systems
    * PaaS
    * Virtualisation
    * SaaS
    * Desktop virtualisation platforms
   
   Enterprise software View All
    * AI and automation
    * Blockchain
    * Business applications
    * Business intelligence
    * Cloud applications
    * Collaboration
    * CRM
    * Database
    * ERP
    * Financial applications
    * HR software
    * Middleware
    * Microservices
    * Windows
    * Mobile
    * Open source
    * Operating systems
    * SOA
    * Software development
    * Software licensing
    * Virtualisation
    * Web software
   
   IT in Europe and Middle East View All
    * IT in France
    * IT in the Nordics
    * IT in Benelux
    * IT in Germany
    * IT in Italy
    * IT in Poland
    * IT in Russia
    * IT in Spain
    * IT in the Middle East
    * IT in Turkey
   
   Information Management View All
    * Big data
    * Business intelligence and analytics
    * BPM
    * Content management
    * Database management
    * Quality/governance
    * Data warehousing
    * MDM/Integration
   
   IT in Asia-Pacific View All
    * IT in ASEAN
    * IT in Australia & New Zealand
    * IT in India
   
   Internet View All
    * Cloud
    * E-commerce
    * Internet infrastructure
    * Social media
    * Web development
   
   IT skills View All
    * Diversity in IT
    * Training
    * Jobs
    * Management skills
    * Technical skills
   
   Hardware View All
    * Chips & processors
    * Printers
    * Storage
    * Data centre
    * Mobile
    * Networking
    * PC
    * Servers
   
   IT security View All
    * Antivirus
    * Secure Coding and Application Programming
    * Continuity
    * Cloud security
    * Data Breach Incident Management and Recovery
    * Endpoint and NAC Protection
    * Cybercrime
    * IAM
    * Risk management
    * Network Security Management
    * Data protection
    * Compliance Regulation and Standard Requirements
    * Security policy and user awareness
    * Web Application Security
   
   IT services View All
    * Cloud
    * Consultancy
    * Outsourcing
    * Hosting
    * Offshore
    * Startups
   
   Mobile View All
    * Laptop
    * Mobile software
    * Mobile networking
    * Smartphone
    * Tablet
   
   Networking View All
    * Datacentre networking
    * Internet of Things
    * Mobile
    * Network hardware
    * Network monitoring and analysis
    * Network routing and switching
    * Network security strategy
    * Network software
    * Software-defined networking
    * Telecoms networks and broadband communications
    * Unified communications
    * VoIP
    * WAN performance and optimisation
    * Wireless
   
   Storage View All
    * Cloud storage
    * Containers and storage
    * Backup
    * Compliance and storage
    * Disaster recovery
    * Flash and SSDs
    * Hyper-convergence
    * Object storage
    * Disk systems
    * Software-defined storage
    * Storage switches
    * Storage management
    * Storage performance
    * Virtualisation and storage
   
   Please select a category
    * Datacentre
    * Enterprise software
    * IT in Europe and Middle East
    * Information Management
    * IT in Asia-Pacific
    * Internet
    * IT skills
    * Hardware
    * IT security
    * IT services
    * Mobile
    * Networking
    * Storage

 * Follow:
 * 
 * 
 * 

 * ComputerWeekly.com.br
 * ComputerWeekly.de
 * ComputerWeekly.es
 * LeMagIT.fr
 * MicroScope.co.uk





TOP STORIES

RISKS OF OPENING UP AI

Meta has annouced that its Llama 2 large language model will be freely available
under a community licence with certain restrictions

Rawf8 - stock.adobe.com

SCOTTISH UNIVERSITY HIT BY RHYSIDA RANSOMWARE GANG

Data allegedly stolen from the University of Western Scotland has been put up
for sale on the dark web by a ransomware gang going by the name Rhysida

CHURCH OF ENGLAND GIVES BLESSING TO VODAFONE OPEN RAN

Leading UK operator joins hands with church to improve 4G mobile coverage in
rural UK locations

Atstock Productions - stock.adob

NOMINATE: MOST INFLUENTIAL WOMEN IN UK TECHNOLOGY 2023

Tell us who you think should be included in Computer Weekly’s 2023 list of the
top 50 most influential women in UK technology

View All Stories


E-HANDBOOKS



A COMPUTER WEEKLY BUYER’S GUIDE TO NETWORK COST AND BANDWIDTH OPTIMISATION

View All E-Handbooks



LATEST NEWS

 * agsandrew - stock.adobe.com
   
   LANCASTER UNI LENDS CYBER SUPPORT TO NUCLEAR DECOMMISSIONING BODY
   
   Lancaster University’s cyber team has joined with the Nuclear Decommissioning
   Authority to help support and protect its 300-year mission, while enhancing
   its own capabilities in the process

 * RISKS OF OPENING UP AI
   
   Meta has annouced that its Llama 2 large language model will be freely
   available under a community licence with certain restrictions

 * Rawf8 - stock.adobe.com
   
   SCOTTISH UNIVERSITY HIT BY RHYSIDA RANSOMWARE GANG
   
   Data allegedly stolen from the University of Western Scotland has been put up
   for sale on the dark web by a ransomware gang going by the name Rhysida

 * ServiceNow
   
   SERVICENOW Q2 2023: 23% YEAR-ON-YEAR GROWTH WITH GENAI TO FORE
   
   ServiceNow has announced second-quarter 2023 revenue of $2.15bn, up 23% on
   the same quarter in 2022. The digital workflows automation supplier stressed
   GenAI developments and partnerships

 * FIBRE GROWTH DRIVES REVENUE UPTICK BUT BT SEES Q1 SUBS LOSSES
   
   BT posts first-quarter 2024 results vindicating strategy of focus on core
   networks and benefit of inflation-linked price rises, but broadband division
   sees overall fall in customers

 * CHURCH OF ENGLAND GIVES BLESSING TO VODAFONE OPEN RAN
   
   Leading UK operator joins hands with church to improve 4G mobile coverage in
   rural UK locations


DOWNLOAD COMPUTER WEEKLY

In The Current Issue:
 * CDO interview: Robert Michael, group head of data, DFS
 * One month after MOVEit: New vulnerabilities found as more victims are named

Download Current Issue
View All The Latest News


IN DEPTH

 * GENERATIVE AI: AUTOMATING STORAGE AND BACKUP MANAGEMENT
   
   We look at how generative artificial intelligence is being deployed to
   automate monitoring of repetitive tasks and report on enterprise storage and
   backup, but also the limits to its implementation

 * Fotolia
   
   HR SOFTWARE AND STRATEGIES TO COMBAT STAFF ATTRITION
   
   While there is no simple technological solution to the problem of staff
   attrition, a combination of management strategies and business applications
   can improve engagement and retention

 * sakkmesterke - stock.adobe.com
   
   HANDBOOK HELPS DUTCH ORGANISATIONS MIGRATE TO QUANTUM-SAFE COMMUNICATION
   
   Organisations must start implementing new cryptography standards – as
   migration is a lengthy process


View All In Depth Articles


CW+ DOWNLOADS

View All


 * E-HANDBOOK | JULY 2023
   
   A COMPUTER WEEKLY BUYER’S GUIDE TO NETWORK COST AND BANDWIDTH OPTIMISATION
   
   Download


 * E-ZINE | JULY 2023
   
   GETTING COMFORTABLE WITH DATA
   
   Download


 * E-ZINE | JULY 2023
   
   CW APAC – TECH CAREER GUIDE: ARTIFICIAL INTELLIGENCE
   
   Download


 * E-ZINE | JULY 2023
   
   COMPUTER WEEKLY: SOARING AHEAD WITH DATA AT ROLLS-ROYCE
   
   Download


 * E-ZINE | JULY 2023
   
   CW EMEA: CAN WE TRUST AI?
   
   Download


BLOGS

 * CWDN SERIES: DEVEX – COUCHBASE: 1 SIZE FITS ONE, PERSONALISATION MATTERS- CW
   DEVELOPER NETWORK
   
   This is a guest post for the Computer Weekly Developer Network written by
   Perry Krug in his capacity as head of developer experience at Couchbase. Krug
   describes himself as a ‘very’ technical ... Continue Reading

 * CWDN SERIES: DEVEX – PENPOT: FOR GOOD FRONT-ENDS, BUILD BRIDGES WITH DESIGN-
   CW DEVELOPER NETWORK
   
   This is a guest post for the Computer Weekly Developer Network written by
   Alonso Torres in his role as a software engineer at Kaleidos working on
   Penpot. Penpot is an open source design-to-code ... Continue Reading

 * HOW THE HIGH STREET GAINS FROM ADVANCED DATA ANALYTICS- DATA MATTERS
   
   This is a guest blog post by Phillip Sewell, CEO at Predyktable. The high
   street is finally back in business, with customers flocking back to stores,
   restaurants and pubs. To fuel and sustain this ... Continue Reading

 * CWDN SERIES: DEV-EXPERIENCE – SNORKEL AI: PROGRAMMATIC LABELLING LEADS TO
   BETTER COLLABORATION- CW DEVELOPER NETWORK
   
   This is a guest post for the Computer Weekly Developer Network written by
   Aparna Lakshmiratan, VP of Product at Snorkel AI - a company known for its
   technology that equips enterprises to build or ... Continue Reading


BLOGROLL

 * CW Developer Network
 * Data Matters
 * Open Source Insider
 * Write side up - by Freeform Dynamics
 * Cliff Saran's Enterprise blog
 * Networks Generation
 * When IT Meets Politics
 * Inspect-a-Gadget
 * Computer Weekly Editors Blog
 * Ahead in the Clouds

View All Computer Weekly Blogs


OPINION

 * THINK TANK: RECRUITMENT AND THE REGULATORY LANDSCAPE
   
   There is an ever-growing list of rules and regulations for enterprises to get
   their heads around when it comes to sustainability, but what can they do to
   keep on top of things?

 * Maksim Kabakou - Fotolia
   
   DOES AI HAVE A FUTURE IN CYBER? YES, BUT ONLY IF IT WORKS WITH US
   
   Do AI and ML hold the promise of helping cyber pros achieving the holy grail
   of operating quicker, cheaper, and with higher efficiency? We shouldn’t hold
   our breath, says Nominet’s Paul Lewis

 * Maksim Kabakou - Fotolia
   
   AI-ENHANCED CYBER HAS POTENTIAL, BUT WATCH OUT FOR MARKETING HYPE
   
   As AI is a hot topic right now, it is no surprise there are some cyber
   solutions coming to market that have been thrown together in haste, but that
   said, genuine AI-powered security products do exist and their abilities could
   yet prove ...

View All Opinion Articles


VIDEOS

 * DIVERSITY IN TECH 2022: EXPLAINING EMPLOYEE RESOURCE GROUPS

 * DIVERSITY IN TECH 2022: MEHDI MOBAYEN-RAHNI, TYL BY NATWEST

 * DIVERSITY IN TECH 2022: KERENSA JENNINGS, BT

 * DIVERSITY IN TECH 2022: JOEL GUJRAL, MYNDUP

 * DIVERSITY IN TECH 2022: JEN TIPPIN, NATWEST GROUP

 * DIVERSITY IN TECH 2022: BEV WHITE, NASH SQUARED

View all Videos


SEARCH THOUSANDS OF TECH DEFINITIONS

Search for definitions
 * compliance audit
 * artificial intelligence of things (AIoT)
 * ACID (atomicity, consistency, isolation, and durability)
 * Twitter

View All Definitions


Latest TechTarget resources
 * CIO
 * Security
 * Networking
 * Data Center
 * Data Management

CIO
 * Explaining risk maturity models and how they work
   
   Explore risk maturity models and assessment tools for enhancing enterprise
   risk management. Improve ERM programs to mitigate risk...

 * U.S. senators sharpen focus on AI regulations
   
   Licensing AI systems, creating a federal AI agency, and establishing
   third-party testing and auditing regimes are just some of ...

 * Lack of agreement on AI rules in U.S., EU gives China a leg up
   
   While the EU and China have proposed AI rules, the U.S. is continuing a
   hands-off regulatory approach, which could affect its ...

Security
 * Google: 41 zero-day vulnerabilities exploited in 2022
   
   While attackers increasingly exploited zero-day flaws last year, one of the
   most notable findings from the report emphasized how ...

 * Security hygiene and posture management: A work in progress
   
   Security hygiene and posture management may be the bedrock of cybersecurity,
   but new research shows it is still decentralized and...

 * How to avoid LinkedIn phishing attacks in the enterprise
   
   Organizations and users need to be vigilant about spotting LinkedIn phishing
   attacks by bad actors on the large business social ...

Networking
 * Reasons to build and buy network automation tools
   
   Most enterprises are building and buying network automation tools, and the
   reasons for both approaches are abundant. Find out why...

 * An introduction to Git for network engineers
   
   Git can be a useful tool for network engineers who manage complex
   infrastructure, especially as networking increasingly overlaps ...

 * Automation, orchestration software fuel network modernization
   
   In some ways, network modernization means cutting manual configuration errors
   and relying on automation and orchestration to ...

Data Center
 * Data center heat reuse: How to make the most of excess heat
   
   Data center heat doesn't need to go to waste. As part of a sustainability
   strategy, explore ways to put the heat your data center...

 * RHEL users question Red Hat's reliance on CentOS Stream
   
   Despite criticism from developers, Red Hat continues its commitment to CentOS
   as the delivery vehicle for RHEL, believing it ...

 * 8 benefits of data center virtualization
   
   Organizations with virtualized data center components can save on hardware,
   comply easier with regulations and increase speed. ...

Data Management
 * Beyond generative AI, data quality a data management trend
   
   Vendors and users have mostly focused on generative AI so far in 2023, but
   observability to ensure quality and governance also ...

 * Oracle targets speed with launch of MySQL HeatWave Lakehouse
   
   The tech giant's new lakehouse enables users of its database management suite
   to combine structured and unstructured data to ...

 * Lakehouse architecture the best fit for modern data needs
   
   While data warehouses and data lakes each excel at handling certain types of
   data, a hybrid of the two is the best means of ...

 * About Us
 * Editorial Ethics Policy
 * Meet The Editors
 * Contact Us
 * Our Use of Cookies
 * Advertisers
 * Business Partners
 * Media Kit

 * Corporate Site
 * Contributors
 * Reprints
 * Answers
 * E-Products
 * Events
 * In Depth
 * Guides

 * Opinions
 * Quizzes
 * Photo Stories
 * Tips
 * Tutorials
 * Videos
 * Computer Weekly Topics

All Rights Reserved, Copyright 2000 - 2023, TechTarget

Privacy Policy
Cookie Preferences
Cookie Preferences
Do Not Sell or Share My Personal Information


Close