ComputerWeekly ComputerWeekly TechTarget
    Join CW+
    Login Register Cookies
    Informa TechTarget Explore the Network
    • MicroscopeUK
    • TechTarget
    • Dark Reading
    • CIO Dive
    An Informa TechTarget Publication Explore our brands
    • News
    • In Depth
    • Blogs
    • Opinion
    • Videos
    • Podcasts
    • Premium Content
    • Webinars
    • Post Office Scandal
    RSS
    • IT Management
      • IT leadership & CW500
      • IT architecture
      • IT efficiency
      • Governance
      • Innovation
      • Legislation & regulation
      • Operations & support
      • Project management
      • Strategy
      • Supplier management
      • Business issues
      • Sponsored Communities
    • Industry Sectors
      • Healthcare IT
      • Charity IT
      • Business services IT
      • Financial services IT
      • Government & public sector IT
      • Leisure & hospitality IT
      • Manufacturing IT
      • Media & entertainment IT
      • Retail IT
      • SME IT
      • Telecoms & internet
      • Transport & travel IT
      • Utilities IT
      • IT suppliers
    • Technology Topics
      Datacentre View All
      • Clustering for high availability and HPC
      • Containers
      • Converged infrastructure
      • Datacentre backup power and power distribution
      • Datacentre capacity planning
      • Datacentre cooling infrastructure
      • Disaster recovery/security
      • Green IT
      • Performance, monitoring and optimisation
      • Systems management
      • DevOps
      • IaaS
      • Server and Operating Systems
      • PaaS
      • Virtualisation
      • SaaS
      • Desktop virtualisation platforms
      Enterprise software View All
      • AI and automation
      • Blockchain
      • Business applications
      • Business intelligence
      • Cloud applications
      • Collaboration
      • CRM
      • Database
      • ERP
      • Financial applications
      • HR software
      • Middleware
      • Microservices
      • Windows
      • Mobile
      • Open source
      • Operating systems
      • SOA
      • Software development
      • Software licensing
      • Virtualisation
      • Web software
      IT in Europe and Middle East View All
      • IT in France
      • IT in the Nordics
      • IT in Benelux
      • IT in Germany
      • IT in Italy
      • IT in Poland
      • IT in Russia
      • IT in Spain
      • IT in the Middle East
      • IT in Turkey
      Information Management View All
      • Big data
      • Business intelligence and analytics
      • BPM
      • Content management
      • Database management
      • Quality/governance
      • Data warehousing
      • MDM/Integration
      IT in Asia-Pacific View All
      • IT in ASEAN
      • IT in Australia & New Zealand
      • IT in India
      Internet View All
      • Cloud
      • E-commerce
      • Internet infrastructure
      • Social media
      • Web development
      IT skills View All
      • Diversity in IT
      • Training
      • Jobs
      • Management skills
      • Technical skills
      Hardware View All
      • Chips & processors
      • Printers
      • Storage
      • Data centre
      • Mobile
      • Networking
      • PC
      • Servers
      IT security View All
      • Antivirus
      • Secure Coding and Application Programming
      • Continuity
      • Cloud security
      • Data Breach Incident Management and Recovery
      • Endpoint and NAC Protection
      • Cybercrime
      • IAM
      • Risk management
      • Network Security Management
      • Data protection
      • Compliance Regulation and Standard Requirements
      • Security policy and user awareness
      • Web Application Security
      IT services View All
      • Cloud
      • Consultancy
      • Outsourcing
      • Hosting
      • Offshore
      • Startups
      Mobile View All
      • Laptop
      • Mobile software
      • Mobile networking
      • Smartphone
      • Tablet
      Networking View All
      • Datacentre networking
      • Internet of Things
      • Mobile
      • Network hardware
      • Network monitoring and analysis
      • Network routing and switching
      • Network security strategy
      • Network software
      • Software-defined networking
      • Telecoms networks and broadband communications
      • Unified communications
      • VoIP
      • WAN performance and optimisation
      • Wireless
      Storage View All
      • AI and storage
      • Cloud storage
      • Containers and storage
      • Data management
      • Backup
      • Compliance and storage
      • Disaster recovery
      • Flash and SSDs
      • Hyper-convergence
      • Object storage
      • Disk systems
      • Software-defined storage
      • Storage switches
      • Storage management
      • Storage performance
      • Tape storage
      • Virtualisation and storage
      Please select a category
      • Datacentre
      • Enterprise software
      • IT in Europe and Middle East
      • Information Management
      • IT in Asia-Pacific
      • Internet
      • IT skills
      • Hardware
      • IT security
      • IT services
      • Mobile
      • Networking
      • Storage
    • Follow:
    • ComputerWeekly.com.br
    • ComputerWeekly.de
    • ComputerWeekly.es
    • LeMagIT.fr
    • MicroScope.co.uk

    Archive

    Browse the full archive of Computer Weekly online content - see our most recent articles listed below, or browse by year of publication.

    View By Year
    • Latest Stories
    • 2026
    • 2025
    • 2024
    • 2023
    • 2022
    • 2021
    • 2020
    • 2019
    • 2018
    • 2017
    • 2016
    • 2015
    • 2014
    • 2013
    • 2012
    • 2011
    • 2010
    • 2009
    • 2008
    • 2007
    • 2006
    • 2005
    • 2004
    • 2003
    • 2002
    • 2001
    • 2000
    View Previous Years +

    2007 Stories

    • 1
    • 2
    • 3
    • 4
    • 5
    • 6
    • 7
    • 8
    • 9
    Latest TechTarget resources
    • CIO
    • Security
    • Networking
    • Data Center
    • Data Management
    Search CIO
    • OpenClaw: Moving the perimeter to the reasoning boundary

      OpenClaw accelerates agentic orchestration, bridging LLMs to real-world systems. CIOs must focus on governance, securing action ...

    • Top 9 smart contract platforms to consider in 2026

      Platform speed, scalability, security, cost, and smart contract support vary widely. Here’s a guide to align trade-offs with ...

    • Weekly news roundup: Tim Cook exits Apple, Meta layoffs intensify and Anthropic investigates Claude

      Stay up to date with the latest U.S. tech news, IPOs and executive moves shaping the industry each week.

    Search Security
    • News brief: AI woes continue for security leaders

      Check out the latest security news from TechTarget SearchSecurity's sister sites, Cybersecurity Dive and Dark Reading.

    • Deepfake era demands proof-based security, not just awareness

      Deepfakes are reshaping social engineering attacks, and traditional security awareness training is falling short. Some experts ...

    • Is SOAR dead or alive? Sort of

      Orchestration and automation capabilities remain critical elements in effective cyber defense. Just don't expect to hear much ...

    Search Networking
    • 5 clues your network has shadow AI

      Shadow AI, or unauthorized AI tool use, poses risks like data exposure and compliance issues. Improved network visibility and ...

    • Cisco unveils quantum network advancements

      Cisco's quantum switch prototype operates like a data center switch and supports four encoding modalities. It marks a step ...

    • Network engineers must take the lead to push DDI to the cloud

      DDI can help network engineers break through the silos that separate cloud and on-premises network management. But engineers have...

    Search Data Center
    • Balancing automation with human oversight in AI data centers

      AI enhances data center operations through automation but requires human governance to manage risks, ensure ethical use and ...

    • AI capacity planning: Balancing flexibility, performance and risk

      AI is transforming capacity planning, introducing unpredictable demand patterns. IT leaders must adopt new models to optimize ...

    • Modern data center sustainability: 5 best practices to consider

      Sustainable data centers are needed as energy demands rise. CIOs should consider the following best practices to reduce costs, ...

    Search Data Management
    • The data ownership blind spots putting organizations at risk

      Organizations can't claim to have good data governance when they still have unowned data. Assigning ownership to siloed and dark ...

    • Why enterprise AI stalls between pilot and production

      Most enterprise AI programs stall between pilot and production. Closing the operationalization gap requires trusted data, ...

    • Controlling data sprawl requires governance discipline

      Data sprawl drives higher infrastructure costs, expands security exposure and weakens compliance controls as data proliferates ...

    • About Us
    • Editorial Ethics Policy
    • Meet The Editors
    • Contact Us
    • Our Use of Cookies
    • Advertisers
    • Business Partners
    • Media Kit
    • Corporate Site
    • Contributors
    • Reprints
    • Answers
    • E-Products
    • Events
    • In Depth
    • Guides
    • Opinions
    • Quizzes
    • Photo Stories
    • Tips
    • Tutorials
    • Videos
    • Computer Weekly Topics

    ©2026 TechTarget, Inc. d/b/a Informa TechTarget. All Rights Reserved.

    Privacy Policy
    Cookie Preferences
    Cookie Preferences
    Do Not Sell or Share My Personal Information

    Close