ComputerWeekly ComputerWeekly TechTarget
    Join CW+
    Login Register Cookies
    Informa TechTarget Explore the Network
    • MicroscopeUK
    • TechTarget
    • Dark Reading
    • CIO Dive
    An Informa TechTarget Publication Explore our brands
    • News
    • In Depth
    • Blogs
    • Opinion
    • Videos
    • Podcasts
    • Premium Content
    • Webinars
    • Post Office Scandal
    RSS
    • IT Management
      • IT leadership & CW500
      • IT architecture
      • IT efficiency
      • Governance
      • Innovation
      • Legislation & regulation
      • Operations & support
      • Project management
      • Strategy
      • Supplier management
      • Business issues
      • Sponsored Communities
    • Industry Sectors
      • Healthcare IT
      • Charity IT
      • Business services IT
      • Financial services IT
      • Government & public sector IT
      • Leisure & hospitality IT
      • Manufacturing IT
      • Media & entertainment IT
      • Retail IT
      • SME IT
      • Telecoms & internet
      • Transport & travel IT
      • Utilities IT
      • IT suppliers
    • Technology Topics
      Datacentre View All
      • Clustering for high availability and HPC
      • Containers
      • Converged infrastructure
      • Datacentre backup power and power distribution
      • Datacentre capacity planning
      • Datacentre cooling infrastructure
      • Disaster recovery/security
      • Green IT
      • Performance, monitoring and optimisation
      • Systems management
      • DevOps
      • IaaS
      • Server and Operating Systems
      • PaaS
      • Virtualisation
      • SaaS
      • Desktop virtualisation platforms
      Enterprise software View All
      • AI and automation
      • Blockchain
      • Business applications
      • Business intelligence
      • Cloud applications
      • Collaboration
      • CRM
      • Database
      • ERP
      • Financial applications
      • HR software
      • Middleware
      • Microservices
      • Windows
      • Mobile
      • Open source
      • Operating systems
      • SOA
      • Software development
      • Software licensing
      • Virtualisation
      • Web software
      IT in Europe and Middle East View All
      • IT in France
      • IT in the Nordics
      • IT in Benelux
      • IT in Germany
      • IT in Italy
      • IT in Poland
      • IT in Russia
      • IT in Spain
      • IT in the Middle East
      • IT in Turkey
      Information Management View All
      • Big data
      • Business intelligence and analytics
      • BPM
      • Content management
      • Database management
      • Quality/governance
      • Data warehousing
      • MDM/Integration
      IT in Asia-Pacific View All
      • IT in ASEAN
      • IT in Australia & New Zealand
      • IT in India
      Internet View All
      • Cloud
      • E-commerce
      • Internet infrastructure
      • Social media
      • Web development
      IT skills View All
      • Diversity in IT
      • Training
      • Jobs
      • Management skills
      • Technical skills
      Hardware View All
      • Chips & processors
      • Printers
      • Storage
      • Data centre
      • Mobile
      • Networking
      • PC
      • Servers
      IT security View All
      • Antivirus
      • Secure Coding and Application Programming
      • Continuity
      • Cloud security
      • Data Breach Incident Management and Recovery
      • Endpoint and NAC Protection
      • Cybercrime
      • IAM
      • Risk management
      • Network Security Management
      • Data protection
      • Compliance Regulation and Standard Requirements
      • Security policy and user awareness
      • Web Application Security
      IT services View All
      • Cloud
      • Consultancy
      • Outsourcing
      • Hosting
      • Offshore
      • Startups
      Mobile View All
      • Laptop
      • Mobile software
      • Mobile networking
      • Smartphone
      • Tablet
      Networking View All
      • Datacentre networking
      • Internet of Things
      • Mobile
      • Network hardware
      • Network monitoring and analysis
      • Network routing and switching
      • Network security strategy
      • Network software
      • Software-defined networking
      • Telecoms networks and broadband communications
      • Unified communications
      • VoIP
      • WAN performance and optimisation
      • Wireless
      Storage View All
      • AI and storage
      • Cloud storage
      • Containers and storage
      • Data management
      • Backup
      • Compliance and storage
      • Disaster recovery
      • Flash and SSDs
      • Hyper-convergence
      • Object storage
      • Disk systems
      • Software-defined storage
      • Storage switches
      • Storage management
      • Storage performance
      • Tape storage
      • Virtualisation and storage
      Please select a category
      • Datacentre
      • Enterprise software
      • IT in Europe and Middle East
      • Information Management
      • IT in Asia-Pacific
      • Internet
      • IT skills
      • Hardware
      • IT security
      • IT services
      • Mobile
      • Networking
      • Storage
    • Follow:
    • ComputerWeekly.com.br
    • ComputerWeekly.de
    • ComputerWeekly.es
    • LeMagIT.fr
    • MicroScope.co.uk

    Archive

    Browse the full archive of Computer Weekly online content - see our most recent articles listed below, or browse by year of publication.

    View By Year
    • Latest Stories
    • 2026
    • 2025
    • 2024
    • 2023
    • 2022
    • 2021
    • 2020
    • 2019
    • 2018
    • 2017
    • 2016
    • 2015
    • 2014
    • 2013
    • 2012
    • 2011
    • 2010
    • 2009
    • 2008
    • 2007
    • 2006
    • 2005
    • 2004
    • 2003
    • 2002
    • 2001
    • 2000
    View Previous Years +

    2003 Stories

    Latest TechTarget resources
    • CIO
    • Security
    • Networking
    • Data Center
    • Data Management
    Search CIO
    • The incident response mistake 73% of leaders make

      Having an incident response plan doesn't mean you're ready. Nearly three-quarters of security leaders say their organizations ...

    • Startup founder says trust is biggest barrier to AI agents

      Despite rapid progress in agentic AI, enterprises still face major concerns around control, cost and reliability.

    • AI is fundamentally transforming organizations

      AI veteran Peter Day discusses why enterprise AI transformation struggles: It's an organizational change problem, not a ...

    Search Security
    • SOC vs. MDR: What CISOs need to consider

      Security operations centers and managed detection and response providers differ in how they manage threats. What's the best way ...

    • Instructure cyberattack reignites ransom payment debate

      Instructure struck a deal to recover its stolen data -- likely paying a hefty ransom. For CISOs, deciding whether to negotiate ...

    • Transform SIEM rules with behavior-based threat detection

      Outdated SIEM rules can hamstring enterprises as they try to safeguard their operations. Use a proactive, strategic approach ...

    Search Networking
    • Cisco Live 2026 conference coverage and analysis

      Informa TechTarget's updating guide to Cisco Live 2026 covers the latest trends, emerging technologies and product announcements ...

    • 10 AI-driven network management tasks

      AI can automate key network operations tasks, such as anomaly detection, event correlation and ticketing. This shifts network ...

    • Network built for champions keeps the Derby on track

      The Kentucky Derby is known for speed, and needs a network to keep the tech running as smoothly as the horses. Look behind the ...

    Search Data Center
    • Soma Energy launches to optimize AI data center energy use

      Soma Energy, led by CEO Ath Caramanolis, launches an AI-driven platform to optimize energy use for data centers, addressing ...

    • Quantum moves from promise to practice at IBM Think 2026

      Quantum computing is becoming a reality at major companies, from Boeing to Allstate. Quantum -- especially when paired with AI --...

    • Balancing automation with human oversight in AI data centers

      AI enhances data center operations through automation but requires human governance to manage risks, ensure ethical use and ...

    Search Data Management
    • Tracing data lineage in AI systems

      Data lineage records how data moves through AI pipelines, turning model debugging, impact analysis and audits into queries rather...

    • Data sovereignty expands beyond compliance boundaries

      Geopolitical conflict and outages can upend assumptions about where data is controlled and accessed, pushing leaders to plan for ...

    • Understanding data contracts for AI projects

      AI models fail silently when upstream data shifts. Data contracts prevent this by making schema, semantics and quality a binding ...

    • About Us
    • Editorial Ethics Policy
    • Meet The Editors
    • Contact Us
    • Our Use of Cookies
    • Advertisers
    • Business Partners
    • Media Kit
    • Corporate Site
    • Contributors
    • Reprints
    • Answers
    • E-Products
    • Events
    • In Depth
    • Guides
    • Opinions
    • Quizzes
    • Photo Stories
    • Tips
    • Tutorials
    • Videos
    • Computer Weekly Topics

    ©2026 TechTarget, Inc. d/b/a Informa TechTarget. All Rights Reserved.

    Privacy Policy
    Cookie Preferences
    Cookie Preferences
    Do Not Sell or Share My Personal Information

    Close