www.computerweekly.com
Open in
urlscan Pro
2606:4700::6812:1dda
Public Scan
Submitted URL: https://go.techtarget.com/r/270680383/46210689
Effective URL: https://www.computerweekly.com/?utm_campaign=20230626_MLP-English&utm_medium=email&utm_source=MLPEN&src=15002229&asrc=EM_MLPEN_...
Submission: On June 27 via api from GB — Scanned from GB
Effective URL: https://www.computerweekly.com/?utm_campaign=20230626_MLP-English&utm_medium=email&utm_source=MLPEN&src=15002229&asrc=EM_MLPEN_...
Submission: On June 27 via api from GB — Scanned from GB
Form analysis
2 forms found in the DOMGET https://www.computerweekly.com/search/query
<form action="https://www.computerweekly.com/search/query" method="get" class="header-search">
<label for="header-search-input" class="visuallyhidden">Search the TechTarget Network</label>
<input class="header-search-input" id="header-search-input" type="text" name="q" placeholder="Search Computer Weekly">
<button aria-label="Search" class="header-search-submit"><i class="icon" data-icon="g"></i></button>
<ul class="ui-autocomplete ui-front ui-menu ui-widget ui-widget-content ui-corner-all" id="ui-id-1" tabindex="0" style="display: none;"></ul>
</form>
GET https://www.techtarget.com/whatis/search/query
<form action="https://www.techtarget.com/whatis/search/query" method="get" class="search-def-form">
<label for="search-def-title" class="visuallyhidden">Search for definitions</label>
<input class="search-def-title" type="text" name="q" placeholder="Search for definitions">
<input type="hidden" name="type" value="definition">
<input class="button blue-button search-def-form-btn" type="submit" value="Look it Up">
</form>
Text Content
Search the TechTarget Network Join CW+ Login Register Cookies * News * In Depth * Blogs * Opinion * Videos * Photo Stories * Premium Content * Webinars * IT Salary Survey infographic RSS * IT Management * IT leadership & CW500 * IT architecture * IT efficiency * Governance * Innovation * Legislation & regulation * Operations & support * Project management * Strategy * Supplier management * Business issues * Sponsored Communities * Industry Sectors * Healthcare IT * Charity IT * Business services IT * Financial services IT * Government & public sector IT * Leisure & hospitality IT * Manufacturing IT * Media & entertainment IT * Retail IT * SME IT * Telecoms & internet * Transport & travel IT * Utilities IT * IT suppliers * Technology Topics Datacentre View All * Clustering for high availability and HPC * Containers * Converged infrastructure * Datacentre backup power and power distribution * Datacentre capacity planning * Datacentre cooling infrastructure * Disaster recovery/security * Green IT * Performance, monitoring and optimisation * Systems management * DevOps * IaaS * Server and Operating Systems * PaaS * Virtualisation * SaaS * Desktop virtualisation platforms Enterprise software View All * AI and automation * Blockchain * Business applications * Business intelligence * Cloud applications * Collaboration * CRM * Database * ERP * Financial applications * HR software * Middleware * Microservices * Windows * Mobile * Open source * Operating systems * SOA * Software development * Software licensing * Virtualisation * Web software IT in Europe and Middle East View All * IT in France * IT in the Nordics * IT in Benelux * IT in Germany * IT in Italy * IT in Poland * IT in Russia * IT in Spain * IT in the Middle East * IT in Turkey Information Management View All * Big data * Business intelligence and analytics * BPM * Content management * Database management * Quality/governance * Data warehousing * MDM/Integration IT in Asia-Pacific View All * IT in ASEAN * IT in Australia & New Zealand * IT in India Internet View All * Cloud * E-commerce * Internet infrastructure * Social media * Web development IT skills View All * Diversity in IT * Training * Jobs * Management skills * Technical skills Hardware View All * Chips & processors * Printers * Storage * Data centre * Mobile * Networking * PC * Servers IT security View All * Antivirus * Secure Coding and Application Programming * Continuity * Cloud security * Data Breach Incident Management and Recovery * Endpoint and NAC Protection * Cybercrime * IAM * Risk management * Network Security Management * Data protection * Compliance Regulation and Standard Requirements * Security policy and user awareness * Web Application Security IT services View All * Cloud * Consultancy * Outsourcing * Hosting * Offshore * Startups Mobile View All * Laptop * Mobile software * Mobile networking * Smartphone * Tablet Networking View All * Datacentre networking * Internet of Things * Mobile * Network hardware * Network monitoring and analysis * Network routing and switching * Network security strategy * Network software * Software-defined networking * Telecoms networks and broadband communications * Unified communications * VoIP * WAN performance and optimisation * Wireless Storage View All * Cloud storage * Containers and storage * Backup * Compliance and storage * Disaster recovery * Flash and SSDs * Hyper-convergence * Object storage * Disk systems * Software-defined storage * Storage switches * Storage management * Storage performance * Virtualisation and storage Please select a category * Datacentre * Enterprise software * IT in Europe and Middle East * Information Management * IT in Asia-Pacific * Internet * IT skills * Hardware * IT security * IT services * Mobile * Networking * Storage * Follow: * * * * ComputerWeekly.com.br * ComputerWeekly.de * ComputerWeekly.es * LeMagIT.fr * MicroScope.co.uk TOP STORIES Getty Images/iStockphoto WHY AN ECOSYSTEM HELPS IT PROJECTS MOVE FORWARD It used to be the case that IT departments would build or buy, but now there’s an alternative to help organisations integrate different data sources SePp - stock.adobe.com 3,600 POTENTIAL CYBER SECURITY EXPERTS APPLY TO GOVERNMENT SCHEME The UK government’s Upskill in Cyber programme is reporting great success just a month after launch, with almost half of applicants women Daniel - stock.adobe.com GOV.UK ONE LOGIN ID CHECK APPS DOWNLOADED OVER TWO MILLION TIMES The One Login digital identity system is being used by eight government services, and GDS has issued more than 1.5 million verified identities since summer 2022, while its ID check apps are proving popular teeraphan - stock.adobe.com HOW IKEA IS DRIVING DIGITAL CUSTOMER EXPERIENCE Ikea franchisee in four Southeast Asian markets and Mexico taps chatbots, conversations commerce and remote planning, among other capabilities, to drive digital customer experience View All Stories E-HANDBOOKS A COMPUTER WEEKLY BUYER’S GUIDE TO AUTOMATION AND AUTONOMOUS CONTROL View All E-Handbooks LATEST NEWS * hywards - stock.adobe.com ORACLE SHIFTS DATABASE SUPPORT GOALPOST Oracle has updated its maintenance and support across its relational database family – we explore the implications * Victoria - Fotolia ALKIRA INTRODUCES EXTRANET AS A SERVICE Provider of cloud networking as a service unveils infrastructure designed to enable third parties to securely connect to critical business applications * Getty Images/iStockphoto WHY AN ECOSYSTEM HELPS IT PROJECTS MOVE FORWARD It used to be the case that IT departments would build or buy, but now there’s an alternative to help organisations integrate different data sources * Intelsat INTELSAT AND LINTASARTA EXPAND INDONESIAN CONNECTIVITY Nearly 400 remote sites in the world’s largest archipelago have received first ever connectivity through deal between local telco and satellite operator * putilov_denis - stock.adobe.com UK AI PLANS OFFER ‘INADEQUATE’ HUMAN RIGHTS PROTECTION, SAYS EHRC The UK’s equality watchdog says the government must properly consider human rights when implementing rules to regulate artificial intelligence, as current plan offers little protection * Daniel - stock.adobe.com GOV.UK ONE LOGIN ID CHECK APPS DOWNLOADED OVER TWO MILLION TIMES The One Login digital identity system is being used by eight government services, and GDS has issued more than 1.5 million verified identities since summer 2022, while its ID check apps are proving popular DOWNLOAD COMPUTER WEEKLY In The Current Issue: * Rishi Sunak calls for urgency in building out UK tech * Keir Starmer calls for AI job loss discussion * CTO interview: Europe benefits from energy gains in AMD chips Download Current Issue View All The Latest News IN DEPTH * wachiwit - stock.adobe.com COULD SOCIAL MEDIA REVOLUTIONISE WAR CRIMES TRIALS? Computer Weekly speaks with open source investigators about how they use social media to gather evidence of war crimes, and the trouble with using such evidence in legal proceedings * Patrick Daxenbichler - Fotolia GENERATIVE AI: DATA PRIVACY, BACKUP AND COMPLIANCE We look at generative AI and the risks it poses to data privacy for the enterprise, implications for backup, and potentially dangerous impacts on compliance * Sergey Nivens - Fotolia WHY LOW CODE/NO CODE OPENS DOORS BUT NO PANACEA FOR SKILLS SHORTAGES Citizen development is not without risk but it has a bright future in the enterprise, especially as a way to handle skills gaps View All In Depth Articles CW+ DOWNLOADS View All * E-ZINE | JUNE 2023 THE POLITICS OF AI Download * E-ZINE | JUNE 2023 HOW TO KEEP NETWORK COSTS AFFORDABLE Download * E-ZINE | JUNE 2023 CW APAC: TREND WATCH – ARTIFICIAL INTELLIGENCE Download * E-ZINE | JUNE 2023 UKTECH50 2023: THE MOST INFLUENTIAL PEOPLE IN UK TECHNOLOGY Download * E-ZINE | JUNE 2023 CW EMEA: IT BUDGETS BUCK ECONOMIC TRENDS Download BLOGS * DOING MUCH MORE, WITH EVEN LESS TO SPEND- CLIFF SARAN'S ENTERPRISE BLOG The nature of IT means that there are numerous ways to achieve more-or-less the same result.Some options are technically superior; others may be lower cost or simpler to manage. With so much choice ... Continue Reading * HOLY OPEN SOURCE BATMAN, ROBIN AI WHACKS CODE REVIEWS INTO SHAPE- OPEN SOURCE INSIDER Data privacy automation company Integral has announced the company’s first open source project, Robin AI. This is a technology that reviews code changes and provides constructive feedback, helping ... Continue Reading * MONGODB DEVELOPER CAPABILITIES TARGET ‘OPERATIONAL OVERHEAD’- CW DEVELOPER NETWORK Project lead: Let’s build some data-centric apps! Developers: Hmm, you sound too keen - and anyway, how screwy is the requirements-gathering process and what crazy requests have we got from the ... Continue Reading * AN INCONVENIENT TRUTH: CHANGING THE STATE OF SUSTAINABILITY IN IT- GREEN TECH In this guest post, Kumaravel Ramakrishnan, technology director at application management software maker ManageEngine, shares an extract from a recent company report from and ten independent IT ... Continue Reading BLOGROLL * Cliff Saran's Enterprise blog * Open Source Insider * CW Developer Network * Green Tech * Eyes on APAC * Data Matters * Networks Generation * When IT Meets Politics * Ahead in the Clouds * Write side up - by Freeform Dynamics View All Computer Weekly Blogs OPINION * IT SUSTAINABILITY THINK TANK: THE CHANGING REGULATORY LANDSCAPE There is an ever-growing list of rules and regulations for enterprises to get their heads around when it comes to sustainability, but what can they do to keep on top of things? * emiliau - Fotolia POST OFFICE SCANDAL INQUIRY PHASE FOUR: HERE COME THE LAWYERS… The Post Office scandal was triggered by computer errors, but the cover-up and miscarriages of justice implicate the Post Office, government and lawyers, as professor of law and ethics Richard Moorhead explains * Maksim Kabakou - Fotolia CHATGPT’S PHISHING ‘PROBLEM’ MAY NOT BE OVERSTATED Some data now suggests that threat actors are indeed using ChatGPT to craft malicious phishing emails, but the industry is doing its best to get out in front of this trend, according to the threat intelligence team at Egress View All Opinion Articles VIDEOS * DIVERSITY IN TECH 2022: EXPLAINING EMPLOYEE RESOURCE GROUPS * DIVERSITY IN TECH 2022: MEHDI MOBAYEN-RAHNI, TYL BY NATWEST * DIVERSITY IN TECH 2022: KERENSA JENNINGS, BT * DIVERSITY IN TECH 2022: JOEL GUJRAL, MYNDUP * DIVERSITY IN TECH 2022: JEN TIPPIN, NATWEST GROUP * DIVERSITY IN TECH 2022: BEV WHITE, NASH SQUARED View all Videos SEARCH THOUSANDS OF TECH DEFINITIONS Search for definitions * Occupational Safety and Health Administration (OSHA) * What is patch management? Lifecycle, benefits and best practices * pseudocode * git stash View All Definitions Latest TechTarget resources * CIO * Security * Networking * Data Center * Data Management CIO * Ultimate guide to digital transformation for enterprise leaders This in-depth guide explains what digital transformation is, why it is important and how enterprises can successfully transition ... * How to become a smart contract developer Blockchain fundamentals, programming knowledge, security awareness, and experience in testing and debugging are among the major ... * Blockchain for businesses: The ultimate enterprise guide Despite the scary crypto headlines, enterprise blockchain is becoming more practical. Use our in-depth guide to help manage the ... Security * The ultimate guide to cybersecurity planning for businesses This in-depth cybersecurity planning guide provides information and advice to help organizations develop a successful strategy to... * The complete guide to ransomware Organizations in every industry can be targets of cybercrime for profit. Get expert advice on ransomware prevention, detection ... * How API gateways improve API security API gateways keep APIs secure by providing rate limiting, DDoS protection and more. Learn more about these benefits, along with ... Networking * What's shaping the future of wireless networking technology? Cloud-managed Wi-Fi, radio spectrum expansion and the hybrid workplace are some of the converging developments that are ... * Cisco acquires Accedian for Network Assurance portfolio Cisco expects Accedian to bolster its Network Assurance portfolio for service providers. The product line provides network ... * Evaluate top 5G fixed wireless access benefits Fixed wireless access, when enabled by 5G, makes wireless network connectivity accessible to users at affordable rates. Learn the... Data Center * Reimaging, innovating, securing cloud-native at SUSECON 2023 At SUSECON 2023, SUSE announced cloud-native AI-based observability with Opni and alluded to more announcements this year. ... * Data center tiers and why they matter for uptime Organizations should consider data center tiers of colocation providers or for their own data centers based on their uptime needs... * Explore Red Hat's bring-your-own-subscription model for RHEL Many organizations use pay-as-you-go models with public cloud providers to run their Red Hat products in the cloud. Explore how ... Data Management * Use knowledge graphs with databases to uncover new insights Knowledge graphs work with graph databases to offer different data storage options than a traditional database, particularly in ... * MongoDB unveils new AI, migration tools for database The vendor, with its latest slate of new and updated capabilities, is adding generative AI with its partnership with Google Cloud... * Starburst Galaxy update targets governance, data access The vendor's latest update includes the public preview of Gravity, a centralized access and governance layer that enables users ... * About Us * Editorial Ethics Policy * Meet The Editors * Contact Us * Our Use of Cookies * Advertisers * Business Partners * Media Kit * Corporate Site * Contributors * Reprints * Answers * E-Products * Events * In Depth * Guides * Opinions * Quizzes * Photo Stories * Tips * Tutorials * Videos * Computer Weekly Topics All Rights Reserved, Copyright 2000 - 2023, TechTarget Privacy Policy Cookie Preferences Do Not Sell or Share My Personal Information Close