ComputerWeekly ComputerWeekly TechTarget
    Join CW+
    Login Register Cookies
    Informa TechTarget Explore the Network
    • MicroscopeUK
    • TechTarget
    • Dark Reading
    • CIO Dive
    An Informa TechTarget Publication Explore our brands
    • News
    • In Depth
    • Blogs
    • Opinion
    • Videos
    • Podcasts
    • Premium Content
    • Webinars
    • Post Office Scandal
    RSS
    • IT Management
      • IT leadership & CW500
      • IT architecture
      • IT efficiency
      • Governance
      • Innovation
      • Legislation & regulation
      • Operations & support
      • Project management
      • Strategy
      • Supplier management
      • Business issues
      • Sponsored Communities
    • Industry Sectors
      • Healthcare IT
      • Charity IT
      • Business services IT
      • Financial services IT
      • Government & public sector IT
      • Leisure & hospitality IT
      • Manufacturing IT
      • Media & entertainment IT
      • Retail IT
      • SME IT
      • Telecoms & internet
      • Transport & travel IT
      • Utilities IT
      • IT suppliers
    • Technology Topics
      Datacentre View All
      • Clustering for high availability and HPC
      • Containers
      • Converged infrastructure
      • Datacentre backup power and power distribution
      • Datacentre capacity planning
      • Datacentre cooling infrastructure
      • Disaster recovery/security
      • Green IT
      • Performance, monitoring and optimisation
      • Systems management
      • DevOps
      • IaaS
      • Server and Operating Systems
      • PaaS
      • Virtualisation
      • SaaS
      • Desktop virtualisation platforms
      Enterprise software View All
      • AI and automation
      • Blockchain
      • Business applications
      • Business intelligence
      • Cloud applications
      • Collaboration
      • CRM
      • Database
      • ERP
      • Financial applications
      • HR software
      • Middleware
      • Microservices
      • Windows
      • Mobile
      • Open source
      • Operating systems
      • SOA
      • Software development
      • Software licensing
      • Virtualisation
      • Web software
      IT in Europe and Middle East View All
      • IT in France
      • IT in the Nordics
      • IT in Benelux
      • IT in Germany
      • IT in Italy
      • IT in Poland
      • IT in Russia
      • IT in Spain
      • IT in the Middle East
      • IT in Turkey
      Information Management View All
      • Big data
      • Business intelligence and analytics
      • BPM
      • Content management
      • Database management
      • Quality/governance
      • Data warehousing
      • MDM/Integration
      IT in Asia-Pacific View All
      • IT in ASEAN
      • IT in Australia & New Zealand
      • IT in India
      Internet View All
      • Cloud
      • E-commerce
      • Internet infrastructure
      • Social media
      • Web development
      IT skills View All
      • Diversity in IT
      • Training
      • Jobs
      • Management skills
      • Technical skills
      Hardware View All
      • Chips & processors
      • Printers
      • Storage
      • Data centre
      • Mobile
      • Networking
      • PC
      • Servers
      IT security View All
      • Antivirus
      • Secure Coding and Application Programming
      • Continuity
      • Cloud security
      • Data Breach Incident Management and Recovery
      • Endpoint and NAC Protection
      • Cybercrime
      • IAM
      • Risk management
      • Network Security Management
      • Data protection
      • Compliance Regulation and Standard Requirements
      • Security policy and user awareness
      • Web Application Security
      IT services View All
      • Cloud
      • Consultancy
      • Outsourcing
      • Hosting
      • Offshore
      • Startups
      Mobile View All
      • Laptop
      • Mobile software
      • Mobile networking
      • Smartphone
      • Tablet
      Networking View All
      • Datacentre networking
      • Internet of Things
      • Mobile
      • Network hardware
      • Network monitoring and analysis
      • Network routing and switching
      • Network security strategy
      • Network software
      • Software-defined networking
      • Telecoms networks and broadband communications
      • Unified communications
      • VoIP
      • WAN performance and optimisation
      • Wireless
      Storage View All
      • AI and storage
      • Cloud storage
      • Containers and storage
      • Data management
      • Backup
      • Compliance and storage
      • Disaster recovery
      • Flash and SSDs
      • Hyper-convergence
      • Object storage
      • Disk systems
      • Software-defined storage
      • Storage switches
      • Storage management
      • Storage performance
      • Tape storage
      • Virtualisation and storage
      Please select a category
      • Datacentre
      • Enterprise software
      • IT in Europe and Middle East
      • Information Management
      • IT in Asia-Pacific
      • Internet
      • IT skills
      • Hardware
      • IT security
      • IT services
      • Mobile
      • Networking
      • Storage
    • Follow:
    • ComputerWeekly.com.br
    • ComputerWeekly.de
    • ComputerWeekly.es
    • LeMagIT.fr
    • MicroScope.co.uk

    Archive

    Browse the full archive of Computer Weekly online content - see our most recent articles listed below, or browse by year of publication.

    View By Year
    • Latest Stories
    • 2026
    • 2025
    • 2024
    • 2023
    • 2022
    • 2021
    • 2020
    • 2019
    • 2018
    • 2017
    • 2016
    • 2015
    • 2014
    • 2013
    • 2012
    • 2011
    • 2010
    • 2009
    • 2008
    • 2007
    • 2006
    • 2005
    • 2004
    • 2003
    • 2002
    • 2001
    • 2000
    View Previous Years +

    2008 Stories

    • 1
    • 2
    • 3
    Latest TechTarget resources
    • CIO
    • Security
    • Networking
    • Data Center
    • Data Management
    Search CIO
    • The KelpDAO $292M crypto hack: What IT execs must know

      Decentralized finance faces escalating risks as attacks on platforms like KelpDAO reveal vulnerabilities in cross-chain bridges, ...

    • How to migrate to a new ERP system

      ERP migrations can go off track fast. Strong governance and disciplined scope control can help CIOs improve the odds of success.

    • MIT EmTech: 2026 is the year AI goes to work

      At MIT EmTech AI, 2026 is called the year for enterprise agentic AI, with companies deploying agents that autonomously handle ...

    Search Security
    • Shadow code: The hidden threat for enterprise IT

      The shadow code running in your web apps could be a ticking time bomb. Learn more about the cybersecurity risks of shadow code ...

    • How to fix cybersecurity's agentic AI identity crisis

      AI agents are transforming enterprise operations, but their autonomy poses critical security challenges. Learn how to secure ...

    • 5 top SIEM use cases in the enterprise

      In the age of AI everything, SIEM isn't exactly flashy -- but it still matters. Explore top SIEM use cases that span the ...

    Search Networking
    • 5 clues your network has shadow AI

      Shadow AI, or unauthorized AI tool use, poses risks like data exposure and compliance issues. Improved network visibility and ...

    • Cisco unveils quantum network advancements

      Cisco's quantum switch prototype operates like a data center switch and supports four encoding modalities. It marks a step ...

    • Network engineers must take the lead to push DDI to the cloud

      DDI can help network engineers break through the silos that separate cloud and on-premises network management. But engineers have...

    Search Data Center
    • Balancing automation with human oversight in AI data centers

      AI enhances data center operations through automation but requires human governance to manage risks, ensure ethical use and ...

    • AI capacity planning: Balancing flexibility, performance and risk

      AI is transforming capacity planning, introducing unpredictable demand patterns. IT leaders must adopt new models to optimize ...

    • Modern data center sustainability: 5 best practices to consider

      Sustainable data centers are needed as energy demands rise. CIOs should consider the following best practices to reduce costs, ...

    Search Data Management
    • Actian targets secure, compliant AI with new vector database

      The vendor's portable database enables organizations in heavily regulated industries to build AI tools without risking accidental...

    • How to develop a data governance strategy: 7 key steps

      A strong data governance strategy enables more effective data use and helps prevent financial, legal and reputational problems. ...

    • The data ownership blind spots putting organizations at risk

      Organizations can't claim to have good data governance when they still have unowned data. Assigning ownership to siloed and dark ...

    • About Us
    • Editorial Ethics Policy
    • Meet The Editors
    • Contact Us
    • Our Use of Cookies
    • Advertisers
    • Business Partners
    • Media Kit
    • Corporate Site
    • Contributors
    • Reprints
    • Answers
    • E-Products
    • Events
    • In Depth
    • Guides
    • Opinions
    • Quizzes
    • Photo Stories
    • Tips
    • Tutorials
    • Videos
    • Computer Weekly Topics

    ©2026 TechTarget, Inc. d/b/a Informa TechTarget. All Rights Reserved.

    Privacy Policy
    Cookie Preferences
    Cookie Preferences
    Do Not Sell or Share My Personal Information

    Close