ComputerWeekly ComputerWeekly TechTarget
    Join CW+
    Login Register Cookies
    • News
    • In Depth
    • Blogs
    • Opinion
    • Videos
    • Podcasts
    • Premium Content
    • Webinars
    • Post Office Scandal
    RSS
    • IT Management
      • IT leadership & CW500
      • IT architecture
      • IT efficiency
      • Governance
      • Innovation
      • Legislation & regulation
      • Operations & support
      • Project management
      • Strategy
      • Supplier management
      • Business issues
      • Sponsored Communities
    • Industry Sectors
      • Healthcare IT
      • Charity IT
      • Business services IT
      • Financial services IT
      • Government & public sector IT
      • Leisure & hospitality IT
      • Manufacturing IT
      • Media & entertainment IT
      • Retail IT
      • SME IT
      • Telecoms & internet
      • Transport & travel IT
      • Utilities IT
      • IT suppliers
    • Technology Topics
      Datacentre View All
      • Clustering for high availability and HPC
      • Containers
      • Converged infrastructure
      • Datacentre backup power and power distribution
      • Datacentre capacity planning
      • Datacentre cooling infrastructure
      • Disaster recovery/security
      • Green IT
      • Performance, monitoring and optimisation
      • Systems management
      • DevOps
      • IaaS
      • Server and Operating Systems
      • PaaS
      • Virtualisation
      • SaaS
      • Desktop virtualisation platforms
      Enterprise software View All
      • AI and automation
      • Blockchain
      • Business applications
      • Business intelligence
      • Cloud applications
      • Collaboration
      • CRM
      • Database
      • ERP
      • Financial applications
      • HR software
      • Middleware
      • Microservices
      • Windows
      • Mobile
      • Open source
      • Operating systems
      • SOA
      • Software development
      • Software licensing
      • Virtualisation
      • Web software
      IT in Europe and Middle East View All
      • IT in France
      • IT in the Nordics
      • IT in Benelux
      • IT in Germany
      • IT in Italy
      • IT in Poland
      • IT in Russia
      • IT in Spain
      • IT in the Middle East
      • IT in Turkey
      Information Management View All
      • Big data
      • Business intelligence and analytics
      • BPM
      • Content management
      • Database management
      • Quality/governance
      • Data warehousing
      • MDM/Integration
      IT in Asia-Pacific View All
      • IT in ASEAN
      • IT in Australia & New Zealand
      • IT in India
      Internet View All
      • Cloud
      • E-commerce
      • Internet infrastructure
      • Social media
      • Web development
      IT skills View All
      • Diversity in IT
      • Training
      • Jobs
      • Management skills
      • Technical skills
      Hardware View All
      • Chips & processors
      • Printers
      • Storage
      • Data centre
      • Mobile
      • Networking
      • PC
      • Servers
      IT security View All
      • Antivirus
      • Secure Coding and Application Programming
      • Continuity
      • Cloud security
      • Data Breach Incident Management and Recovery
      • Endpoint and NAC Protection
      • Cybercrime
      • IAM
      • Risk management
      • Network Security Management
      • Data protection
      • Compliance Regulation and Standard Requirements
      • Security policy and user awareness
      • Web Application Security
      IT services View All
      • Cloud
      • Consultancy
      • Outsourcing
      • Hosting
      • Offshore
      • Startups
      Mobile View All
      • Laptop
      • Mobile software
      • Mobile networking
      • Smartphone
      • Tablet
      Networking View All
      • Datacentre networking
      • Internet of Things
      • Mobile
      • Network hardware
      • Network monitoring and analysis
      • Network routing and switching
      • Network security strategy
      • Network software
      • Software-defined networking
      • Telecoms networks and broadband communications
      • Unified communications
      • VoIP
      • WAN performance and optimisation
      • Wireless
      Storage View All
      • AI and storage
      • Cloud storage
      • Containers and storage
      • Data management
      • Backup
      • Compliance and storage
      • Disaster recovery
      • Flash and SSDs
      • Hyper-convergence
      • Object storage
      • Disk systems
      • Software-defined storage
      • Storage switches
      • Storage management
      • Storage performance
      • Tape storage
      • Virtualisation and storage
      Please select a category
      • Datacentre
      • Enterprise software
      • IT in Europe and Middle East
      • Information Management
      • IT in Asia-Pacific
      • Internet
      • IT skills
      • Hardware
      • IT security
      • IT services
      • Mobile
      • Networking
      • Storage
    • Follow:
    • ComputerWeekly.com.br
    • ComputerWeekly.de
    • ComputerWeekly.es
    • LeMagIT.fr
    • MicroScope.co.uk

    Archive

    Browse the full archive of Computer Weekly online content - see our most recent articles listed below, or browse by year of publication.

    View By Year
    • Latest Stories
    • 2026
    • 2025
    • 2024
    • 2023
    • 2022
    • 2021
    • 2020
    • 2019
    • 2018
    • 2017
    • 2016
    • 2015
    • 2014
    • 2013
    • 2012
    • 2011
    • 2010
    • 2009
    • 2008
    • 2007
    • 2006
    • 2005
    • 2004
    • 2003
    • 2002
    • 2001
    • 2000
    View Previous Years +

    2001 Stories

    Latest TechTarget resources
    • CIO
    • Security
    • Networking
    • Data Center
    • Data Management
    Search CIO
    • AI transformation is inevitable but requires change management

      Enterprises are split on AI adoption speed. While some take an aggressive workforce overhaul, others preach more careful ...

    • 12 top business process management tools for 2026

      BPM platforms are becoming a business transformation engine as vendors infuse their tools with powerful AI and automation ...

    • What Big Tech's AI spending means for your IT budget

      Hyperscalers are spending billions on AI. CIOs can't match that scale -- but they can adopt smarter budgeting strategies to ...

    Search Security
    • News brief: Attackers gain speed in cybersecurity race

      Check out the latest security news from the Informa TechTarget team

    • CISO decisions: Weighing costs, benefits of dark web monitoring

      Forewarned is forearmed, and dark web monitoring can alert organizations when they're in attacker crosshairs. But for many, the ...

    • Counter third-party risk with continuous vendor monitoring

      Assessing a vendor's security posture is not a box that gets checked. The risk of a third-party attack requires the kind of ...

    Search Networking
    • 5 principles of change management in networking

      Network change management includes five principles, including risk analysis and peer review. These best practices can help ...

    • How network efficiency advances ESG goals

      From SDN to green electricity, network optimization plays a critical role in helping enterprises reduce emissions, cut costs and ...

    • How to build a private 5G network architecture

      A private 5G network can provide organizations with a powerful new option for their wireless environments. Here are the major ...

    Search Data Center
    • Guide to understanding the various types of data centers

      IT leaders must assess the types of data centers and align infrastructure with their business priorities, factoring in ...

    • Does your data center need a smart PDU?

      A smart PDU can help you monitor and manage power flow more efficiently than a traditional PDU. Here's what you should consider ...

    • Micro-cloud data centers: IT's new work front

      Edge IT, micro-cloud data centers, containerization and autonomous operations are spreading through enterprises. IT leaders must ...

    Search Data Management
    • Confluent adds A2A support to fuel multi-agent AI networks

      Including the open protocol enables users to build an orchestrated network of collaborative agents and could help the vendor ...

    • 18 top big data tools and technologies to know about in 2026

      Numerous tools are available to use in big data applications. Here are 18 popular open source big data technologies, with details...

    • Real-time data streaming for AI: invest where it matters

      Don't let batch processing lead to missed opportunities. Build AI systems for continuous data flows that deliver instant ...

    • About Us
    • Editorial Ethics Policy
    • Meet The Editors
    • Contact Us
    • Our Use of Cookies
    • Advertisers
    • Business Partners
    • Media Kit
    • Corporate Site
    • Contributors
    • Reprints
    • Answers
    • E-Products
    • Events
    • In Depth
    • Guides
    • Opinions
    • Quizzes
    • Photo Stories
    • Tips
    • Tutorials
    • Videos
    • Computer Weekly Topics

    ©2025 TechTarget, Inc. d/b/a Informa TechTarget. All Rights Reserved.

    Privacy Policy
    Cookie Preferences
    Cookie Preferences
    Do Not Sell or Share My Personal Information

    Close