Latest News
-
Cato Networks beefs up SASE with Marseilles point of presence
Point of presence in South of France port city joins SASE provider’s global private network of more than 70 PoPs worldwide, extending converged security and networking to the region while expanding in-country resiliency across key territory
-
Etisalat takes stake as Vodafone reports ‘good’ fiscal year
In the wake of major MENA provider buying 9% share, global operator claims satisfactory fiscal year with continued growth in both Europe and Africa
-
Scottish Post Office scandal hearings raise further questions
Victims of the Post Office Horizon scandal in Scotland raise further questions about Post Office and government conduct
-
(ISC)² to train 100,000 cyber pros in UK
Security association (ISC)² unveils ambitious UK training programme
-
Investment in UK’s ‘cleantech’ sector hit new high in 2021
Investment in companies that make technologies designed to help society more sustainable is on the rise across Europe, and in the UK, too
-
Video FX firm cuts costs by 20% and goes hybrid with Hammerspace
Jellyfish Pictures saves on rising power and office space costs, as well as Brexit difficulties, by using Hammerspace to allow access to large files from any geographic location
In Depth
-
Evolution of unified comms services
Post-pandemic ways of working are forcing organisations to rethink their comms – we look at the growth in cloud-based services to support hybrid working
-
The limits and risks of backup as ransomware protection
Backups can provide a sound means of recovery from ransomware infection, but they are not 100% certain to foil attackers. We look at the limits and risks of depending on backups
-
CPaaS – a technology for the future
There is a received wisdom that as businesses flock towards the cloud, they are looking for a single platform on which to manage all their communication needs, leading to boom times ahead for communications platform as a service
-
E-Handbook | May 2022
Data backup failure: Top 5 causes and tips for prevention Infographic
Download -
E-Handbook | May 2022
A Computer Weekly buyer’s guide to edge datacentres
Download -
E-Zine | May 2022
Digitally transforming UK power networks for renewable energy
Download -
E-Handbook | May 2022
India 2022 Salary Survey Results
Download -
E-Handbook | May 2022
ASEAN 2022 Salary Survey Results
Download
Blogs
-
Percona CEO Zaitsev: Our 15-years in ‘pure’ open source- CW Developer Network
The Computer Weekly Developer Network attended Percona Live 2022 in Austin, Texas from May 16-18. Percona is company known as a provider of enterprise-class support, consulting, managed services, ... Continue Reading
-
OpenUK CEO: What open source really means today- Open Source Insider
Listening to OpenUK CEO Amanda Brock speaking at Percona Live 2022, the Computer Weekly Open Source Insider team noted the following thoughts from her keynote… “If you were wondering what a nice ... Continue Reading
-
How Web3 applications are transforming the agricultural sector- Green Tech
In this guest post, Robin Saluoks, co-founder and CEO of climate tech-focused startup eAgronom, sets out how Web3 applications are helping the agriculture sector green up its act. Technological ... Continue Reading
-
What to expect from Snowflake Summit 2022- CW Developer Network
It doesn’t snow too often in Las Vegas - and when it does, it’s usually on top of nearby Mount Charleston, sitting up majestically at some 12,000 feet as it does. Looking for ice particles at a ... Continue Reading
Opinion
-
Security Think Tank: Your path to understanding attack paths
The modern-day abundance of platforms, apps and IT tools presents malicious actors with a web of interconnection that is easily exploited to move rapidly through the network to compromise critical assets. Security teams need to understand these ...
-
Identify, assess and monitor to understand attack paths
The modern-day abundance of platforms, apps and IT tools presents malicious actors with a web of interconnection that is easily exploited to move rapidly through the network to compromise critical assets. Security teams need to understand these ...
-
How tech leaders can learn from Alphabet and Meta
Why tech leaders should think about the changing needs of their customers
Videos
-
The rise and rise of blockchain technology
-
How Twilio is empowering women in tech
-
Lifelong learning critical for tech’s future – Jacqueline de Rojas
-
Inclusion, tech and the pandemic – Bev White
-
Tech talent is critical - Amali de Alwis
-
Diversity and inclusion in tech: has gender been left behind?
Search thousands of tech definitions
- chief procurement officer (CPO)
- replenishment
- man in the browser (MitB)
- ampere hour (Ah or amp hour)