In Depth
In Depth
Web software
-
The one problem with AI content moderation? It doesn’t work
The use of artificial intelligence for content moderation is likely to become more pronounced with the passage of the Online Safety Bill, but practitioners and experts question the efficacy of this approach Continue Reading
-
Legislation and certification of XR applications: challenges to adoption and diffusion
Virtual and augmented reality may be changing the game, but such cutting-edge applications run ahead of many regulatory issues. How can the metaverse avoid uncertainties that could slow the adoption of XR and related enabling technologies? Continue Reading
-
How AI and automation drive better customer service
Forrester analysts explore the benefits of combining artificial intelligence with automation Continue Reading
-
A history of cloud computing
The history of cloud computing starts way back in the 1960s, when an “intergalactic computer network” was first suggested, and in recent years the technology has served to shake-up both the enterprise IT and supplier landscape. Continue Reading
-
Key choices in Docker container storage deployment
Containers often need persistent storage, but how do you achieve that? We look at the key options, including Docker volumes versus bind mounts, and Docker Volume Plugins Continue Reading
-
Blockchain and the promise of cooperative cloud storage
Blockchain technology allows distributed retention of encrypted data and is at the heart of cooperative cloud storage Continue Reading
-
What are containers and microservices?
Independently deployable bits of code can be used to build agile applications. We look at some of the main players Continue Reading
-
Divide and conquer in software architecture
Applications built out of independently deployable modules are the future of flexible solution development Continue Reading
-
Interview: James Bamford on surveillance, Snowden and technology companies
Investigative journalist and documentary maker James Bamford was among the first to uncover the secrets of the US National Security Agency and its global surveillance Continue Reading
-
Case study: Philips takes agile approach to building bridges between business and IT
Dutch technology giant talks up the success of its attempts to embrace agile IT delivery methods, and how it's shaping future customer engagements Continue Reading
-
Why Pegasystems' CEO, Alan Trefler, has learned to think smaller
Pegasystems has made its name supplying CRM, analytics and case management software to the world's largest companies. Now CEO Alan Trefler plans to use cloud computing to broaden Pega's appeal Continue Reading
-
Case study: Open University uses Microsoft Azure to create course content clearance hub
The Open University recently scooped the award for Best Cloud Project at the CW European User Awards, and here's why Continue Reading
-
Better user acceptance testing through log management
Application log management provides insight into application behaviour, which can be used to build better software and gain a better hold of user acceptance testing Continue Reading
-
In-store retail experience evolves with the demands of tech-savvy shoppers
The increasing demands of today's "always-connected" shoppers are redefining the in-store buying experience Continue Reading
-
How the development of standards will affect the internet of things
As the internet of things (IoT) grows, so will the number of applications developed to control internet-connected devices and objects Continue Reading
-
Choice and ease of use: key elements of a good app store
Companies need to focus on individual user requirements and make sure their app store delivers the right tools for the right job Continue Reading
-
A guide to smart home automation
Unless it is a new build, the challenge in creating a smart home is that technology must work irrespective of the age of the property Continue Reading
-
Why agile development races ahead of traditional testing
Traditional testing practices optimise large, centralised testing but struggle to support the rapid delivery of agile development. Continue Reading
-
High street stores embrace digital to entice customers
Customers are using technology in favour of the high street, but some stores are fighting fire with fire. Continue Reading
-
A guide to WebRTC
Real-time communications standards aim to help more users speak with ease over the internet. Computer Weekly looks at how the systems work Continue Reading
-
VPNs: The past, present and future
We give you a rundown of all you need to know about virtual private networks and how the cloud is changing their future Continue Reading
-
Windows XP end of support: What to do next
CIOs may not wish to carry on running a 12-year-old desktop OS, but thousands of incompatible applications leave many with no choice Continue Reading
-
GE uses big data to power machine services business
GE, one of the UK's largest manufacturers, is using big data analytics with data generated from machine sensors to predict maintenance needs Continue Reading
-
The limitations of traditional SaaS integration approaches
Time and budget constraints are forcing many organisations to rethink their integration strategy and find a well-aligned solution Continue Reading
-
Gathering retail intelligence
Learning their customers’ habits through business intelligence is vital for bricks-and-mortar retailers to stay competitive Continue Reading
-
Interview: From Apollo Mission to agility manifesto
One of the 17 original authors of the agile manifesto was Jim Highsmith who, after a previous tenure at NASA, now works as an executive consultant at ThoughtWorks. Continue Reading
-
Case study: Nokia rethinks HR with web portal
Mobile phone manufacturer Nokia has reduced its HR costs by between 20% to 30% after rolling out a web-based HR portal for its 60,000 employees. Continue Reading
-
RightNow: Oracle and next-generation CRM
In his opening keynote presentation at the RightNow Summit 2011 in Newport, Greg Gianforte, RightNow founder and chief executive officer, presented his view of device-aware CRM. Continue Reading
-
Data migration product specifications
Part of the Tiered Storage Buying guide focusing on product specifications for data migration tools. Continue Reading
-
Web applications tangle security researchers, attract attackers
Web application security researchers are finding that some of their work could land them on the wrong side of the law. As a result, Web applications are more vulnerable to attack. Continue Reading
-
MySpace, YouTube successes open door to Web 2.0 dangers
Web 2.0, and Ajax in particular, are introducing new threats to life on the Web. Many people are rushing to add interactive features to their Web applications using Ajax, but as columnist Mike Cobb explains, security has often been overlooked. Continue Reading
-
Web services represent security's next battlefront
The evolution and mainstream use of Web services has placed the nascent technology in the crosshairs of attackers, and one firm in particular says it can mitigate the threats. Continue Reading
-
XML Security Learning Guide
Securing XML is an essential element in keeping Web services secure. This SearchSecurity.com Learning Guide is a compilation of resources that review different types of XML security standards and approaches for keeping your XML Web services secure. Continue Reading