Latest News
-
Google Cloud expands European presence with new Madrid region
Public cloud giant Google is continuing to build out its datacentre footprint across Europe with the opening of its latest region in Madrid, Spain
-
Nokia and T-Mobile team to build private 5G networks
US operator and comms tech provider unite to deliver 5G private mobile networks that use telco cloud and 5G hybrid mobile networks in bid to allow enterprise customers to access an extra level of reliability, control and security to enable their ...
-
Three UK aims for medium-sized firms with business comms offer
Marking a significant moment in its growth strategy, UK operator targets business market with service that puts firms with 25-250 staff in control of their monthly spend
-
ICO orders facial recognition firm Clearview AI to delete UK data
UK data watchdog fines facial recognition company Clearview AI £7.5m for multiple privacy breaches. The firm, which offers services to law enforcement, faces growing pressure from regulators and legal action around the world
-
Ransomware volumes grew faster than ever in 2021
Verizon’s annual DBIR assessment of the security landscape highlights an unprecedented boom in ransomware volumes, to the surprise of nobody
-
Durham University upgrades supercomputer with Rockport Networks
Researchers working within the Institute for Computational Cosmology at Durham University are set to reap the benefits of a network upgrade in one of its core supercomputers
In Depth
-
The rise of the always-on mobile user and implications for customer service and retention
The way we use our mobile phones and the level of service we expect from operators have drastically changed over the past few years. With mobile connectivity fundamental to the lives of millions of people and thousands of businesses across the UK, ...
-
Evolution of unified comms services
Post-pandemic ways of working are forcing organisations to rethink their comms – we look at the growth in cloud-based services to support hybrid working
-
The limits and risks of backup as ransomware protection
Backups can provide a sound means of recovery from ransomware infection, but they are not 100% certain to foil attackers. We look at the limits and risks of depending on backups
-
E-Zine | May 2022
Set innovation free and make great ideas a reality
Download -
E-Zine | May 2022
CW APAC: Trend Watch: Datacentres
Download -
E-Handbook | May 2022
Headline: Royal Holloway: Attack mapping for the internet of things
Download -
E-Handbook | May 2022
Data backup failure: Top 5 causes and tips for prevention Infographic
Download -
E-Handbook | May 2022
A Computer Weekly buyer’s guide to edge datacentres
Download
Blogs
-
The electric vehicle revolution will need better software to keep it running- Green Tech
The climate crisis is already here – and electric mobility is a vital piece of the puzzle; but too rarely discussed is the need for better software to manage electric vehicles, says Aidan McClean, ... Continue Reading
-
Like a teenager, Kubernetes looks almost grown-up, yet still a bit awkward and confused- Write side up - by Freeform Dynamics
Platform: that’s the key word that sprung to mind after attending Kubecon-CloudNativeCon Europe 2022, hosted by the Cloud Native Computing Foundation (CNCF) in Valencia last week. As in, Kubernetes ... Continue Reading
-
Sourcery COO: Let's make refactoring code continuously great - CW Developer Network
This is a guest post for the Computer Weekly Developer Network written by Timothy Gilboy in his capacity as co-founder & COO of Sourcery – a company known for work focused on refactoring ... Continue Reading
-
GitLab 15 drops slops on DIY DevOps flops & muttonchops - Open Source Insider
Provider of The One DevOps Platform GitLab Inc has announced the launch of its next major iteration, GitLab 15, starting with its first release version, 15.0, bringing forward new DevOps ... Continue Reading
Opinion
-
How to leverage the artificial intelligence solar system
With great excitement around artificial intelligence, organisations should be aware that for successful implementation, AI must be approached specifically and strategically, as part of the technology universe
-
Understanding attack paths is a question of training
The modern-day abundance of platforms, apps and IT tools presents malicious actors with a web of interconnection that is easily exploited to move rapidly through the network to compromise critical assets. Security teams need to understand these ...
-
Yes, zero trust can help you understand attack pathways
The modern-day abundance of platforms, apps and IT tools presents malicious actors with a web of interconnection that is easily exploited to move rapidly through the network to compromise critical assets. Security teams need to understand these ...
Videos
-
The rise and rise of blockchain technology
-
How Twilio is empowering women in tech
-
Lifelong learning critical for tech’s future – Jacqueline de Rojas
-
Inclusion, tech and the pandemic – Bev White
-
Tech talent is critical - Amali de Alwis
-
Diversity and inclusion in tech: has gender been left behind?
Search thousands of tech definitions
- mobile computing
- What is desktop management and how does it work?
- e-business (electronic business)
- business resilience