Latest News
- 
				
				Europe turns to open source secure messaging servicesEuropean governments are rolling out decentralised secure messaging and collaboration services as they seek to reduce their reliance on Big Tech companies 
- 
				
				Cyber agencies co-sign Exchange Server security guideUS and allied cyber agencies team up to try to nudge users to pay more attention to securing Microsoft Exchange Server 
- 
				
				OpenUK works with UKRI on open source guidance for public sectorCollaboration aims to boost awareness of open source initiatives, community development and the procurement process 
- 
				
				Capgemini and Siemens combine to make AI industrial techSiemens and Capgemini are expanding their partnership to create AI-based industrial technologies, said to boost efficiency, sustainability and innovation in manufacturing sectors 
- 
				
				Vodafone goes for Dell in major Open RAN network modernisationEuropean operator selects global IT giant to power regional strategic five-year RAN infrastructure programme to improve connectivity across Europe 
- 
				
				Investigator warns Post Office inquiry about Horizon defectForensic investigator who helped expose Horizon scandal described defect ‘sufficiently serious’ to inform public inquiry 
In Depth
- 
			
			Tape storage: Four key reasons why tape is key to storage strategyWe look at tape storage and examine its benefits in capacity, throughput, suitability for certain media types and workloads, as well as its cost and security advantages 
- 
			
			Pulling the plug: A way to halt a cyber attacker in your network?Rumours of an organisation taking its systems offline during a cyber attack spurred conversation on the consequences of simply pulling the power, or internet access, to stop intruders. We consider the ethics and practicality 
- 
			
			Interview: Lenovo’s Mary Jacques on combining environmental sustainability with circularityThe Hong Kong-headquartered hardware supplier remains serious about tackling climate change – and achieving results, including Scope 3 emissions reduction 
- 
					
					E-Zine | October 2025A feast for the sensorsDownload
- 
					
					E-Zine | October 2025CW EMEA: Tech that buys timeDownload
- 
					
					E-Zine | October 2025End of supportDownload
- 
					
					E-Zine | October 2025Is the UK’s digital ID scheme doomed to fail?Download
- 
					
					E-Zine | September 2025Unbuckling of the green beltDownload
Blogs
- 
						Is it time, for real-time (data)?- CW Developer NetworkThe Computer Weekly Developer Network reported on streaming real-time data specialist Confluent in line with its open source user and practitioner symposium this week. Alongside the company's ... Continue Reading 
- 
						Streaming specialist Confluent aims to drive rise of ‘contextual AI’- CW Developer NetworkConfluent, Inc. used its annual data practitioner convention this month to detail Confluent Intelligence, a service designed to build context-rich real-time artificial intelligence (AI). Built on ... Continue Reading 
- 
						Astronomer: Why data pipelines control the flow of AI- CW Developer NetworkAI ‘eats’ data. We all know the garbage-in-garbage-out analogy and we understand why AI intelligence itself is inherently artificial by virtue of the fact that it only knows what we tell it, ... Continue Reading 
- 
						Far more ‘reasonable’, Confluent extends AI agent strategy- CW Developer NetworkAgentic artificial intelligence has superseded its predictive and generative cousins wth even more hype and hyperbole than expected. But as these services now start to come online and impact real ... Continue Reading 
Opinion
- 
				  Ransomware resilience: It’s time to be ‘more Bruce Lee’The growing threat of ransomware attacks requires cyber to evolve from a defensive posture to being increasingly proactive. Building threat intel can enable this, helping better predict, prioritise and prevent ransomware attacks. 
- 
				  You can’t defend what you can’t see: why asset visibility mattersIndustrial organisations face rising operational security cyber threats. Asset visibility is vital for defence - without knowing what’s connected, organisations are risk blind 
- 
				  Use second-layer tools for AI safetyWhile some enterprises find it difficult to adopt AI, they can now use second-layer AI tools that enable businesses to implement the technology safely 
Videos
- 
			
			Diversity in tech 2023: Bev White, Nash Squared
- 
			
			Suki Fuller, most influential woman in UK tech 2023, winner’s speech
- 
			
			Diversity in tech 2022: Explaining employee resource groups
- 
			
			Diversity in tech 2022: Mehdi Mobayen-Rahni, Tyl by NatWest
- 
			
			Diversity in tech 2022: Kerensa Jennings, BT
- 
			
			Diversity in tech 2022: Joel Gujral, Myndup
Search thousands of tech definitions
- What is Linux distros (Linux distribution)?
- What is a chief data officer (CDO)?
- What is customer data integration (CDI)?
- What is counterintelligence?

 
		 
	

















