Latest News
-
Europe turns to open source secure messaging services
European governments are rolling out decentralised secure messaging and collaboration services as they seek to reduce their reliance on Big Tech companies
-
Cyber agencies co-sign Exchange Server security guide
US and allied cyber agencies team up to try to nudge users to pay more attention to securing Microsoft Exchange Server
-
OpenUK works with UKRI on open source guidance for public sector
Collaboration aims to boost awareness of open source initiatives, community development and the procurement process
-
Capgemini and Siemens combine to make AI industrial tech
Siemens and Capgemini are expanding their partnership to create AI-based industrial technologies, said to boost efficiency, sustainability and innovation in manufacturing sectors
-
Vodafone goes for Dell in major Open RAN network modernisation
European operator selects global IT giant to power regional strategic five-year RAN infrastructure programme to improve connectivity across Europe
-
Investigator warns Post Office inquiry about Horizon defect
Forensic investigator who helped expose Horizon scandal described defect ‘sufficiently serious’ to inform public inquiry
In Depth
-
Tape storage: Four key reasons why tape is key to storage strategy
We look at tape storage and examine its benefits in capacity, throughput, suitability for certain media types and workloads, as well as its cost and security advantages
-
Pulling the plug: A way to halt a cyber attacker in your network?
Rumours of an organisation taking its systems offline during a cyber attack spurred conversation on the consequences of simply pulling the power, or internet access, to stop intruders. We consider the ethics and practicality
-
Interview: Lenovo’s Mary Jacques on combining environmental sustainability with circularity
The Hong Kong-headquartered hardware supplier remains serious about tackling climate change – and achieving results, including Scope 3 emissions reduction
-
E-Zine | October 2025
A feast for the sensors
Download -
E-Zine | October 2025
CW EMEA: Tech that buys time
Download -
E-Zine | October 2025
End of support
Download -
E-Zine | October 2025
Is the UK’s digital ID scheme doomed to fail?
Download -
E-Zine | September 2025
Unbuckling of the green belt
Download
Blogs
-
Is it time, for real-time (data)?- CW Developer Network
The Computer Weekly Developer Network reported on streaming real-time data specialist Confluent in line with its open source user and practitioner symposium this week. Alongside the company's ... Continue Reading
-
Streaming specialist Confluent aims to drive rise of ‘contextual AI’- CW Developer Network
Confluent, Inc. used its annual data practitioner convention this month to detail Confluent Intelligence, a service designed to build context-rich real-time artificial intelligence (AI). Built on ... Continue Reading
-
Astronomer: Why data pipelines control the flow of AI- CW Developer Network
AI ‘eats’ data. We all know the garbage-in-garbage-out analogy and we understand why AI intelligence itself is inherently artificial by virtue of the fact that it only knows what we tell it, ... Continue Reading
-
Far more ‘reasonable’, Confluent extends AI agent strategy- CW Developer Network
Agentic artificial intelligence has superseded its predictive and generative cousins wth even more hype and hyperbole than expected. But as these services now start to come online and impact real ... Continue Reading
Opinion
-
Ransomware resilience: It’s time to be ‘more Bruce Lee’
The growing threat of ransomware attacks requires cyber to evolve from a defensive posture to being increasingly proactive. Building threat intel can enable this, helping better predict, prioritise and prevent ransomware attacks.
-
You can’t defend what you can’t see: why asset visibility matters
Industrial organisations face rising operational security cyber threats. Asset visibility is vital for defence - without knowing what’s connected, organisations are risk blind
-
Use second-layer tools for AI safety
While some enterprises find it difficult to adopt AI, they can now use second-layer AI tools that enable businesses to implement the technology safely
Videos
-
Diversity in tech 2023: Bev White, Nash Squared
-
Suki Fuller, most influential woman in UK tech 2023, winner’s speech
-
Diversity in tech 2022: Explaining employee resource groups
-
Diversity in tech 2022: Mehdi Mobayen-Rahni, Tyl by NatWest
-
Diversity in tech 2022: Kerensa Jennings, BT
-
Diversity in tech 2022: Joel Gujral, Myndup
Search thousands of tech definitions
- What is Linux distros (Linux distribution)?
- What is a chief data officer (CDO)?
- What is customer data integration (CDI)?
- What is counterintelligence?



















