Latest News
-
Most CFOs being left out of ransomware conversations
Barely a tenth of CFOs are actively involved in planning for cyber attacks, according to a report
-
Dutch companies struggle to fill tech jobs
There are plenty of IT job vacancies in the Netherlands, but a shortage of IT professionals
-
The barristers that helped expose Post Office’s lies
Computer Weekly spoke to the barristers at Henderson Chambers that fought the Post Office in the High Court to expose the widest miscarriage of justice in UK history
-
Amdocs acquires MYCOM OSI to monetise 5G intelligent services
Acquisition of UK SaaS-based cloud network and service assurance company designed to expand comms software and services provider’s network service assurance and monetisation offering
-
SoftIron readies Sydney manufacturing facility
Software-defined storage supplier SoftIron is making hardware appliances in Australia to improve supply chain resilience and address security concerns of government customers
-
PAC report blames HMRC for 'widespread non-compliance' with IR35
The Public Accounts Committee has shared the findings of its report into the after-effects of the IR35 reforms coming into force in the public sector back in April 2017
In Depth
-
Tech companies join UK four-day work week trial
Computer Weekly speaks with tech companies taking part in the UK’s upcoming four-day work week trial, which will measure the impact of shorter working weeks on productivity, wellbeing and the environment
-
The rise of the always-on mobile user and implications for customer service and retention
The way we use our mobile phones and the level of service we expect have drastically changed. With mobile connectivity fundamental to businesses, problems are magnified for users and customer service teams alike
-
Evolution of unified comms services
Post-pandemic ways of working are forcing organisations to rethink their comms – we look at the growth in cloud-based services to support hybrid working
-
E-Zine | May 2022
CW Nordics: How the Estonian government created a digital assistant to support citizens
Download -
E-Zine | May 2022
Set innovation free and make great ideas a reality
Download -
E-Zine | May 2022
CW APAC: Trend Watch: Datacentres
Download -
E-Handbook | May 2022
Headline: Royal Holloway: Attack mapping for the internet of things
Download -
E-Handbook | May 2022
Data backup failure: Top 5 causes and tips for prevention Infographic
Download
Blogs
-
Proof is in the pasty- Cliff Saran's Enterprise blog
With the opening of the new Elizabeth Line there was always going to be questions about value for money. At a cost of £25bn, will it deliver value, 13 years after the project to build it began? The ... Continue Reading
-
The electric vehicle revolution will need better software to keep it running- Green Tech
The climate crisis is already here – and electric mobility is a vital piece of the puzzle; but too rarely discussed is the need for better software to manage electric vehicles, says Aidan McClean, ... Continue Reading
-
Like a teenager, Kubernetes looks almost grown-up, yet still a bit awkward and confused- Write side up - by Freeform Dynamics
Platform: that’s the key word that sprung to mind after attending Kubecon-CloudNativeCon Europe 2022, hosted by the Cloud Native Computing Foundation (CNCF) in Valencia last week. As in, Kubernetes ... Continue Reading
-
Sourcery COO: Let's make refactoring code continuously great - CW Developer Network
This is a guest post for the Computer Weekly Developer Network written by Timothy Gilboy in his capacity as co-founder & COO of Sourcery – a company known for work focused on refactoring ... Continue Reading
Opinion
-
How to leverage the artificial intelligence solar system
With great excitement around artificial intelligence, organisations should be aware that for successful implementation, AI must be approached specifically and strategically, as part of the technology universe
-
Understanding attack paths is a question of training
The modern-day abundance of platforms, apps and IT tools presents malicious actors with a web of interconnection that is easily exploited to move rapidly through the network to compromise critical assets. Security teams need to understand these ...
-
Yes, zero trust can help you understand attack pathways
The modern-day abundance of platforms, apps and IT tools presents malicious actors with a web of interconnection that is easily exploited to move rapidly through the network to compromise critical assets. Security teams need to understand these ...
Videos
-
The rise and rise of blockchain technology
-
How Twilio is empowering women in tech
-
Lifelong learning critical for tech’s future – Jacqueline de Rojas
-
Inclusion, tech and the pandemic – Bev White
-
Tech talent is critical - Amali de Alwis
-
Diversity and inclusion in tech: has gender been left behind?