ComputerWeekly ComputerWeekly TechTarget
    Join CW+
    Login Register Cookies
    Informa TechTarget Explore the Network
    • MicroscopeUK
    • TechTarget
    • Dark Reading
    • CIO Dive
    An Informa TechTarget Publication Explore our brands
    • News
    • In Depth
    • Blogs
    • Opinion
    • Videos
    • Podcasts
    • Premium Content
    • Webinars
    • Post Office Scandal
    RSS
    • IT Management
      • IT leadership & CW500
      • IT architecture
      • IT efficiency
      • Governance
      • Innovation
      • Legislation & regulation
      • Operations & support
      • Project management
      • Strategy
      • Supplier management
      • Business issues
      • Sponsored Communities
    • Industry Sectors
      • Healthcare IT
      • Charity IT
      • Business services IT
      • Financial services IT
      • Government & public sector IT
      • Leisure & hospitality IT
      • Manufacturing IT
      • Media & entertainment IT
      • Retail IT
      • SME IT
      • Telecoms & internet
      • Transport & travel IT
      • Utilities IT
      • IT suppliers
    • Technology Topics
      Datacentre View All
      • Clustering for high availability and HPC
      • Containers
      • Converged infrastructure
      • Datacentre backup power and power distribution
      • Datacentre capacity planning
      • Datacentre cooling infrastructure
      • Disaster recovery/security
      • Green IT
      • Performance, monitoring and optimisation
      • Systems management
      • DevOps
      • IaaS
      • Server and Operating Systems
      • PaaS
      • Virtualisation
      • SaaS
      • Desktop virtualisation platforms
      Enterprise software View All
      • AI and automation
      • Blockchain
      • Business applications
      • Business intelligence
      • Cloud applications
      • Collaboration
      • CRM
      • Database
      • ERP
      • Financial applications
      • HR software
      • Middleware
      • Microservices
      • Windows
      • Mobile
      • Open source
      • Operating systems
      • SOA
      • Software development
      • Software licensing
      • Virtualisation
      • Web software
      IT in Europe and Middle East View All
      • IT in France
      • IT in the Nordics
      • IT in Benelux
      • IT in Germany
      • IT in Italy
      • IT in Poland
      • IT in Russia
      • IT in Spain
      • IT in the Middle East
      • IT in Turkey
      Information Management View All
      • Big data
      • Business intelligence and analytics
      • BPM
      • Content management
      • Database management
      • Quality/governance
      • Data warehousing
      • MDM/Integration
      IT in Asia-Pacific View All
      • IT in ASEAN
      • IT in Australia & New Zealand
      • IT in India
      Internet View All
      • Cloud
      • E-commerce
      • Internet infrastructure
      • Social media
      • Web development
      IT skills View All
      • Diversity in IT
      • Training
      • Jobs
      • Management skills
      • Technical skills
      Hardware View All
      • Chips & processors
      • Printers
      • Storage
      • Data centre
      • Mobile
      • Networking
      • PC
      • Servers
      IT security View All
      • Antivirus
      • Secure Coding and Application Programming
      • Continuity
      • Cloud security
      • Data Breach Incident Management and Recovery
      • Endpoint and NAC Protection
      • Cybercrime
      • IAM
      • Risk management
      • Network Security Management
      • Data protection
      • Compliance Regulation and Standard Requirements
      • Security policy and user awareness
      • Web Application Security
      IT services View All
      • Cloud
      • Consultancy
      • Outsourcing
      • Hosting
      • Offshore
      • Startups
      Mobile View All
      • Laptop
      • Mobile software
      • Mobile networking
      • Smartphone
      • Tablet
      Networking View All
      • Datacentre networking
      • Internet of Things
      • Mobile
      • Network hardware
      • Network monitoring and analysis
      • Network routing and switching
      • Network security strategy
      • Network software
      • Software-defined networking
      • Telecoms networks and broadband communications
      • Unified communications
      • VoIP
      • WAN performance and optimisation
      • Wireless
      Storage View All
      • AI and storage
      • Cloud storage
      • Containers and storage
      • Data management
      • Backup
      • Compliance and storage
      • Disaster recovery
      • Flash and SSDs
      • Hyper-convergence
      • Object storage
      • Disk systems
      • Software-defined storage
      • Storage switches
      • Storage management
      • Storage performance
      • Tape storage
      • Virtualisation and storage
      Please select a category
      • Datacentre
      • Enterprise software
      • IT in Europe and Middle East
      • Information Management
      • IT in Asia-Pacific
      • Internet
      • IT skills
      • Hardware
      • IT security
      • IT services
      • Mobile
      • Networking
      • Storage
    • Follow:
    • ComputerWeekly.com.br
    • ComputerWeekly.de
    • ComputerWeekly.es
    • LeMagIT.fr
    • MicroScope.co.uk

    Archive

    Browse the full archive of Computer Weekly online content - see our most recent articles listed below, or browse by year of publication.

    View By Year
    • Latest Stories
    • 2026
    • 2025
    • 2024
    • 2023
    • 2022
    • 2021
    • 2020
    • 2019
    • 2018
    • 2017
    • 2016
    • 2015
    • 2014
    • 2013
    • 2012
    • 2011
    • 2010
    • 2009
    • 2008
    • 2007
    • 2006
    • 2005
    • 2004
    • 2003
    • 2002
    • 2001
    • 2000
    View Previous Years +

    2001 Stories

    Latest TechTarget resources
    • CIO
    • Security
    • Networking
    • Data Center
    • Data Management
    Search CIO
    • AI is fundamentally transforming organizations

      AI veteran Peter Day discusses why enterprise AI transformation struggles: It's an organizational change problem, not a ...

    • 6 ways to improve the CIO-CISO relationship in 2026

      CIOs and CISOs need to work together for the benefit of the whole organization. To break the mold of hostility, C-suite leaders ...

    • Weekly news roundup: Googlebook announced, WhatsApp Incognito, Altman under fire and Foxconn breach

      Stay up to date with the latest U.S. tech news, IPOs and executive moves shaping the industry each week.

    Search Security
    • Transform SIEM rules with behavior-based threat detection

      Outdated SIEM rules can hamstring enterprises as they try to safeguard their operations. Use a proactive, strategic approach ...

    • CISO's guide: How to test an incident response plan

      Creating an incident response plan is only the beginning. Regular testing will help ensure it doesn't fall apart during a real ...

    • How to implement zero trust for AI

      As organizations embed AI into business systems, they also expand the attack surface. Applying zero trust to AI can help mitigate...

    Search Networking
    • Cisco Live 2026 conference coverage and analysis

      Informa TechTarget's updating guide to Cisco Live 2026 covers the latest trends, emerging technologies and product announcements ...

    • 10 AI-driven network management tasks

      AI can automate key network operations tasks, such as anomaly detection, event correlation and ticketing. This shifts network ...

    • Network built for champions keeps the Derby on track

      The Kentucky Derby is known for speed, and needs a network to keep the tech running as smoothly as the horses. Look behind the ...

    Search Data Center
    • Quantum moves from promise to practice at IBM Think 2026

      Quantum computing is becoming a reality at major companies, from Boeing to Allstate. Quantum -- especially when paired with AI --...

    • Balancing automation with human oversight in AI data centers

      AI enhances data center operations through automation but requires human governance to manage risks, ensure ethical use and ...

    • AI capacity planning: Balancing flexibility, performance and risk

      AI is transforming capacity planning, introducing unpredictable demand patterns. IT leaders must adopt new models to optimize ...

    Search Data Management
    • Understanding data contracts for AI projects

      AI models fail silently when upstream data shifts. Data contracts prevent this by making schema, semantics and quality a binding ...

    • Power-constrained data architecture curbing AI ambitions

      Rising power demands and grid interconnection delays are hampering enterprise AI efforts and altering data strategies, workload ...

    • Top 10 vector database use cases across industries

      Vector databases have become the standard infrastructure for enterprise AI work. These 10 use cases for vector databases show ...

    • About Us
    • Editorial Ethics Policy
    • Meet The Editors
    • Contact Us
    • Our Use of Cookies
    • Advertisers
    • Business Partners
    • Media Kit
    • Corporate Site
    • Contributors
    • Reprints
    • Answers
    • E-Products
    • Events
    • In Depth
    • Guides
    • Opinions
    • Quizzes
    • Photo Stories
    • Tips
    • Tutorials
    • Videos
    • Computer Weekly Topics

    ©2026 TechTarget, Inc. d/b/a Informa TechTarget. All Rights Reserved.

    Privacy Policy
    Cookie Preferences
    Cookie Preferences
    Do Not Sell or Share My Personal Information

    Close