www.computerweekly.com Open in urlscan Pro
2606:4700::6812:1fc0  Public Scan

Submitted URL: http://www.computerweekly.com//
Effective URL: https://www.computerweekly.com//
Submission: On October 11 via api from US — Scanned from DE

Form analysis 2 forms found in the DOM

POST https://www.computerweekly.com/search

<form action="https://www.computerweekly.com/search" method="post" class="header-search">
  <label for="header-search-input" class="visuallyhidden">Search the TechTarget Network</label>
  <input class="header-search-input" id="header-search-input" type="text" placeholder="Search Computer Weekly">
  <button aria-label="Search" class="header-search-submit"><i class="icon" data-icon="g"></i></button>
  <ul class="ui-autocomplete ui-front ui-menu ui-widget ui-widget-content ui-corner-all" id="ui-id-1" tabindex="0" style="display: none;"></ul>
</form>

GET https://www.techtarget.com/whatis/search

<form action="https://www.techtarget.com/whatis/search" method="get" class="search-def-form">
  <label for="search-def-title" class="visuallyhidden">Search for definitions</label>
  <input class="search-def-title" type="text" name="q" placeholder="Search for definitions">
  <input type="hidden" name="type" value="definition">
  <input class="button blue-button search-def-form-btn" type="submit" value="Look it Up">
</form>

Text Content

Search the TechTarget Network
Join CW+
Login Register Cookies
 * News
 * In Depth
 * Blogs
 * Opinion
 * Videos
 * Photo Stories
 * Premium Content
 * Webinars
 * Download 2024 IT salary survey

RSS
 * IT Management
    * IT leadership & CW500
    * IT architecture
    * IT efficiency
    * Governance
    * Innovation
    * Legislation & regulation
    * Operations & support
    * Project management
    * Strategy
    * Supplier management
    * Business issues
    * Sponsored Communities

 * Industry Sectors
    * Healthcare IT
    * Charity IT
    * Business services IT
    * Financial services IT
    * Government & public sector IT
    * Leisure & hospitality IT
    * Manufacturing IT
    * Media & entertainment IT
    * Retail IT
    * SME IT
    * Telecoms & internet
    * Transport & travel IT
    * Utilities IT
    * IT suppliers

 * Technology Topics
   Datacentre View All
    * Clustering for high availability and HPC
    * Containers
    * Converged infrastructure
    * Datacentre backup power and power distribution
    * Datacentre capacity planning
    * Datacentre cooling infrastructure
    * Disaster recovery/security
    * Green IT
    * Performance, monitoring and optimisation
    * Systems management
    * DevOps
    * IaaS
    * Server and Operating Systems
    * PaaS
    * Virtualisation
    * SaaS
    * Desktop virtualisation platforms
   
   Enterprise software View All
    * AI and automation
    * Blockchain
    * Business applications
    * Business intelligence
    * Cloud applications
    * Collaboration
    * CRM
    * Database
    * ERP
    * Financial applications
    * HR software
    * Middleware
    * Microservices
    * Windows
    * Mobile
    * Open source
    * Operating systems
    * SOA
    * Software development
    * Software licensing
    * Virtualisation
    * Web software
   
   IT in Europe and Middle East View All
    * IT in France
    * IT in the Nordics
    * IT in Benelux
    * IT in Germany
    * IT in Italy
    * IT in Poland
    * IT in Russia
    * IT in Spain
    * IT in the Middle East
    * IT in Turkey
   
   Information Management View All
    * Big data
    * Business intelligence and analytics
    * BPM
    * Content management
    * Database management
    * Quality/governance
    * Data warehousing
    * MDM/Integration
   
   IT in Asia-Pacific View All
    * IT in ASEAN
    * IT in Australia & New Zealand
    * IT in India
   
   Internet View All
    * Cloud
    * E-commerce
    * Internet infrastructure
    * Social media
    * Web development
   
   IT skills View All
    * Diversity in IT
    * Training
    * Jobs
    * Management skills
    * Technical skills
   
   Hardware View All
    * Chips & processors
    * Printers
    * Storage
    * Data centre
    * Mobile
    * Networking
    * PC
    * Servers
   
   IT security View All
    * Antivirus
    * Secure Coding and Application Programming
    * Continuity
    * Cloud security
    * Data Breach Incident Management and Recovery
    * Endpoint and NAC Protection
    * Cybercrime
    * IAM
    * Risk management
    * Network Security Management
    * Data protection
    * Compliance Regulation and Standard Requirements
    * Security policy and user awareness
    * Web Application Security
   
   IT services View All
    * Cloud
    * Consultancy
    * Outsourcing
    * Hosting
    * Offshore
    * Startups
   
   Mobile View All
    * Laptop
    * Mobile software
    * Mobile networking
    * Smartphone
    * Tablet
   
   Networking View All
    * Datacentre networking
    * Internet of Things
    * Mobile
    * Network hardware
    * Network monitoring and analysis
    * Network routing and switching
    * Network security strategy
    * Network software
    * Software-defined networking
    * Telecoms networks and broadband communications
    * Unified communications
    * VoIP
    * WAN performance and optimisation
    * Wireless
   
   Storage View All
    * AI and storage
    * Cloud storage
    * Containers and storage
    * Data management
    * Backup
    * Compliance and storage
    * Disaster recovery
    * Flash and SSDs
    * Hyper-convergence
    * Object storage
    * Disk systems
    * Software-defined storage
    * Storage switches
    * Storage management
    * Storage performance
    * Tape storage
    * Virtualisation and storage
   
   Please select a category
    * Datacentre
    * Enterprise software
    * IT in Europe and Middle East
    * Information Management
    * IT in Asia-Pacific
    * Internet
    * IT skills
    * Hardware
    * IT security
    * IT services
    * Mobile
    * Networking
    * Storage

 * Follow:
 * 
 * 
 * 

 * ComputerWeekly.com.br
 * ComputerWeekly.de
 * ComputerWeekly.es
 * LeMagIT.fr
 * MicroScope.co.uk





TOP STORIES

horizon - stock.adobe.com

PLANNING REFORMS: WHAT THE DATACENTRE INDUSTRY WOULD LIKE TO SEE

How can datacentre policy and planning reform better reflect the criticality of
both energy and data?

Delphotostock - stock.adobe.com

INTERVIEW: BRUNO MARIE-ROSE, CIO, PARIS 2024 OLYMPICS

The technology chief reflects on a successful Olympic and Paralympic Games – and
how what he learned as a former Olympic medallist helped him be a better IT
leader

clrcrmck

POST OFFICE DRAGGING ITS FEET GETTING RID OF TAINTED STAFF

Former minister gave Post Office ‘green light’ to take robust action against
existing staff with links to Post Office scandal wrongdoing

Atstock Productions - stock.adob

VOTE: WHO SHOULD BE THE 2024 MOST INFLUENTIAL WOMAN IN UK TECH?

Each year, we ask our audience who should be named the most influential woman in
UK technology. Tell us what you think – the deadline for voting is 18 October

View All Stories


E-HANDBOOKS



CROWDSTRIKE OUTAGE EXPLAINED: WHAT HAPPENED AND WHAT CAN WE LEARN?

View All E-Handbooks



LATEST NEWS

 * apichon_tee - stock.adobe.com
   
   GARTNER: AI CAN BE CATALYST FOR NEW BUSINESS MODELS
   
   Gartner expert Nicholle Lindner explains how companies like Klarna are
   leveraging AI to drive new revenue and what businesses need to consider when
   embracing the technology

 * Lubos Chlubny - stock.adobe.com
   
   NCSC ISSUES FRESH ALERT OVER WAVE OF COZY BEAR ACTIVITY
   
   The NCSC, FBI and NSA publish updated warning about Cozy Bear’s activities,
   highlighting a range of vulnerabilities the threat actor is using to set up
   its cyber attacks

 * Maksim Kabakou - stock.adobe.com
   
   GOVERNMENT LAUNCHES CYBER STANDARD FOR LOCAL AUTHORITIES
   
   Local government bodies are being invited to take advantage of a new
   NCSC-derived Cyber Assessment Framework to help enhance their resilience and
   ward off cyber attacks

 * Nelos - stock.adobe.com
   
   UK AND US PLEDGE CLOSER WORKING ON CHILDREN’S ONLINE SAFETY
   
   In their first agreement on the subject of children’s online safety, the UK
   and US governments have said they will create a new working group to boost
   cooperation

 * FiledIMAGE - Fotolia
   
   AUSTRALIA BOLSTERS CYBER DEFENCES WITH SECURITY BILL
   
   Legislation tackles IoT security and establishes a Cyber Incident Review
   Board to bolster Australia’s cyber resilience

 * clrcrmck
   
   POST OFFICE DRAGGING ITS FEET GETTING RID OF TAINTED STAFF
   
   Former minister gave Post Office ‘green light’ to take robust action against
   existing staff with links to Post Office scandal wrongdoing


DOWNLOAD COMPUTER WEEKLY

In The Current Issue:
 * Government digital transformation will be challenged by the new era of
   austerity
 * AI disempowers logistics workers while intensifying their work

Download Current Issue
View All The Latest News


IN DEPTH

 * horizon - stock.adobe.com
   
   WHAT THE DATACENTRE INDUSTRY WOULD LIKE TO SEE FROM THE GOVERNMENT'S PLANNING
   REFORMS
   
   How can datacentre policy and planning reform better reflect the criticality
   of both energy and data?

 * bizio_ti - stock.adobe.com
   
   DATACENTRE POWER PURCHASE AGREEMENTS: ARE THEY THE RIGHT WAY TO LOWER
   EMISSIONS?
   
   Could datacentre energy procurement do even more to green the grid,
   accelerating the rise in renewables?

 * jijomathai - stock.adobe.com
   
   HOW DATACENTRES CAN TURN THE TIDE ON CARBON EMISSIONS
   
   Operators have revealed troubling increases in their carbon emissions of
   late, but could these have been prevented?


View All In Depth Articles


CW+ DOWNLOADS

View All


 * E-ZINE | OCTOBER 2024
   
   DIGITAL GOVERNMENT ON A BUDGET
   
   Download


 * E-ZINE | OCTOBER 2024
   
   AI ADVANCES IN CANCER CARE
   
   Download


 * E-ZINE | SEPTEMBER 2024
   
   POWERING BRITAIN’S ECONOMY – DATACENTRES GAIN IN STATUS
   
   Download


 * E-ZINE | SEPTEMBER 2024
   
   THE PILLARS OF AI STRATEGY
   
   Download


 * E-ZINE | SEPTEMBER 2024
   
   THE FLIGHT TO DATA SUCCESS
   
   Download


BLOGS

 * THE COMPLEXITIES OF REINVENTING THE MAINFRAME “EASY LIFE”- NETWORKS
   GENERATION
   
   Just got back from a Commvault event in London (where I saw more people in 10
   seconds than I do in a month in Devon!) which also gave me the opp to
   catch-up with old PR mate Ben Ralph. In between ... Continue Reading

 * QUALYS QSC AMERICAS DAY #1: ROCKING RISK REALITIES WITH ROC- CW DEVELOPER
   NETWORK
   
   Qualys staged the North American sector of its Qualys Security Conference
   (QSC) practitioner conference this month under the sometimes-foggy skies of
   an autumnal San Diego.  Gathering the great and ... Continue Reading

 * GREEN CODING - NUTANIX REPORT: ENERGY EFFICIENT DATACENTRES COULD SAVE
   BILLIONS- CW DEVELOPER NETWORK
   
   The green coding imperative is real and it stems from the ground up (i.e. the
   command line) and from the cloud down. As we continue to pursue initiatives
   in this space, it’s worth reflecting upon ... Continue Reading

 * OPENSTACK DALMATIAN KNOCKS SPOTS OFF AI WORKLOAD DOGHOUSE- OPEN SOURCE
   INSIDER
   
   As the world of enterprise open source solidifies, an increasing number of
   developments are being laid down to take open platform technologies into more
   expansive mission-critical and quite frankly ... Continue Reading


BLOGROLL

 * Networks Generation
 * CW Developer Network
 * Open Source Insider
 * Computer Weekly Editors Blog
 * Green Tech
 * Cliff Saran's Enterprise blog
 * WITsend
 * Inspect-a-Gadget
 * Ahead in the Clouds
 * When IT Meets Politics

View All Computer Weekly Blogs


OPINION

 * freshidea - stock.adobe.com
   
   RISE OF THE CYBER CLONES: WHEN SEEING ISN’T BELIEVING
   
   It is frighteningly easy to clone someone else's identity using
   readily-available artificial intelligence tools

 * Fotolia
   
   HOW TO MAKE THE CMO YOUR BEST FRIEND
   
   Chief marketing officers are more reliant than ever on their CIO colleagues -
   but it's a relationship that can, and should, work to their mutual benefit

 * Maksim Kabakou - Fotolia
   
   THE CYBER INDUSTRY NEEDS TO ACCEPT IT CAN'T ELIMINATE RISK
   
   The Computer Weekly Security Think Tank panel considers incident response in
   the wake of the July CrowdStrike incident, sharing their views on what
   CrowdStrike got wrong, what it did right, and next steps

View All Opinion Articles


VIDEOS

 * DIVERSITY IN TECH 2023: BEV WHITE, NASH SQUARED

 * SUKI FULLER, MOST INFLUENTIAL WOMAN IN UK TECH 2023, WINNER’S SPEECH

 * DIVERSITY IN TECH 2022: EXPLAINING EMPLOYEE RESOURCE GROUPS

 * DIVERSITY IN TECH 2022: MEHDI MOBAYEN-RAHNI, TYL BY NATWEST

 * DIVERSITY IN TECH 2022: KERENSA JENNINGS, BT

 * DIVERSITY IN TECH 2022: JOEL GUJRAL, MYNDUP

View all Videos


SEARCH THOUSANDS OF TECH DEFINITIONS

Search for definitions
 * What is a third-party cookie?
 * What is threat intelligence?
 * What is Salesforce Journey Builder?
 * What is extended detection and response (XDR)?

View All Definitions


Latest TechTarget resources
 * CIO
 * Security
 * Networking
 * Data Center
 * Data Management

CIO
 * DOJ focuses on AI in search, weighs Google breakup
   
   While the DOJ assesses remedies for Google's illegal control over online
   search, it's also heavily focused on AI and the future.

 * Key technical debt reduction strategies
   
   Suboptimal software fixes cost time and money as well as strain departments
   throughout the organization. Here's how to develop ...

 * Generative AI energy consumption grows, but ROI role unclear
   
   The energy costs of generative AI aren't front and center in enterprises'
   financial calculations. But industry consultants ...

Security
 * FTC orders Marriott to pay $52M and enhance security practices
   
   The Federal Trade Commission said an investigation revealed that poor
   security practices led to three data breaches at Marriott ...

 * OpenAI details how threat actors are abusing ChatGPT
   
   While threat actors are using generative AI tools like ChatGPT to run
   election influence operations and develop malware, OpenAI ...

 * Coalition: Ransomware severity up 68% in first half of 2024
   
   The cyber insurance carrier examined claims trends for the first half of
   2024, which showed policyholders experienced disruptive ...

Networking
 * What AI capabilities do network tools need?
   
   AI networking tools have many beneficial capabilities. When evaluating AI
   tools, engineers should prioritize the specific ...

 * The future of Wi-Fi 7 adoption in enterprises
   
   Wi-Fi 7 promises faster speeds and better performance, but complexities in
   deployment and limited device compatibility have ...

 * The push to make network engineering cool again
   
   What does it mean to make networking cool again? To most network engineers,
   it means building awareness about networking and ...

Data Center
 * Data center providers design for severe weather surge
   
   Data center providers are investing in resilient infrastructure and redundant
   power to prevent extreme weather-related outages ...

 * Dell expands AI Factory with new AMD servers
   
   Dell adds to its AI Factory, extending its services and hardware to cover new
   AMD-based servers in its push to provide ways to ...

 * HCL vs. JSON: Configuration language uses, pros and cons
   
   HCL and JSON are similar configuration languages. These languages are meant
   for specific IaC scenarios, so companies should ...

Data Management
 * Snowflake the engine for fintech firm's AI transformation
   
   Specialist TS Imagine is using the data platform vendor's Cortex capabilities
   to extract value from unstructured data and become ...

 * Alation launches AI governance suite to meet rising need
   
   With interest in generative AI increasing, the vendor's new suite aims to
   help enterprises both mitigate risks as well as ...

 * Top 5 metadata management best practices
   
   Organizations must craft a strategy, assemble a team and adopt standards to
   develop a strong metadata management strategy and ...

 * About Us
 * Editorial Ethics Policy
 * Meet The Editors
 * Contact Us
 * Our Use of Cookies
 * Advertisers
 * Business Partners
 * Media Kit

 * Corporate Site
 * Contributors
 * Reprints
 * Answers
 * E-Products
 * Events
 * In Depth
 * Guides

 * Opinions
 * Quizzes
 * Photo Stories
 * Tips
 * Tutorials
 * Videos
 * Computer Weekly Topics

All Rights Reserved, Copyright 2000 - 2024, TechTarget

Privacy Policy
Cookie Preferences
Cookie Preferences
Do Not Sell or Share My Personal Information


Close