Latest News
-
Autonomous weapons reduce moral agency and devalue human life
Military technology experts gathered in Vienna have warned about the detrimental psychological effects of AI-powered weapons, arguing that implementing systems of algorithmic-enabled killing dehumanises both the user and the target
-
Persistent data breaches deny people with HIV dignity and privacy
The ICO has urged charities and healthcare organisations that work with people living with HIV to do better when it comes to protecting their personal data, after the HIV status of more than 100 people was accidentally disclosed by London’s Central ...
-
Keeper to help Williams F1 keep up with cyber challenges
Keeper Security signs up to support F1 team Williams Racing with credential management ahead of the 2024 Miami Grand Prix
-
Nokia and Vodafone claim successful Open RAN trial in Italy
Leading comms tech provider and operator have successfully completed an end-to-end Open RAN trial on Vodafone Italy’s live 5G standalone network, including hybrid cloud application platform connected to dedicated 5G core
-
IBM boss discusses long-term VMware plan
IBM sees a big opportunity to migrate customers away from VMware onto OpenShift, with its $6.4bn acquisition of HashiCorp part of the plan
-
SES agrees to acquire Intelsat
After abortive attempt a year ago, leading satellite operators present takeover deal that they say will result in creating a stronger multi-orbit operator with around 60% of revenue in high-growth segments
In Depth
-
Post Office Horizon scandal explained: Everything you need to know
Computer Weekly has investigated the Post Office Horizon scandal since 2008 and is, in fact, part of the story. This guide contains essential information about the scandal
-
Five reasons why – and when – cloud storage is the answer
We look at when cloud storage can be the best choice, with considerations that include performance, scalability and agility, cost, management simplicity, and security and resilience
-
Securing the edge: A new battleground in mobile network security
Edge computing is transforming approaches to mobile network infrastructure, but failure to secure it can expose networks and data to cyber threats. Learn more about the dangers and potential solutions
-
E-Zine | April 2024
What’s it like being the IT chief at Man Utd?
Download -
E-Zine | April 2024
CW EMEA: The blueprint for safe GenAI
Download -
E-Zine | April 2024
How data keeps Britain’s trains on track
Download -
E-Zine | April 2024
VMware users hit by licence hikes after Broadcom takeover
Download -
E-Zine | March 2024
What are IT buyers spending their money on?
Download
Blogs
-
From cradle to cradle: Why industry must embrace the circular economy- Green Tech
In this guest post, Lisa Wee, global head of sustainability at IT consultancy AVEVA, outlines the environmental benefits of embracing the circular economy The World Economic Forum has referred to ... Continue Reading
-
Catchpoint Peak: IT Performance Summit: Live report- CW Developer Network
Directly labelling itself as the ‘Internet Resilience Company’, US-headquartered Catchpoint joined the growing band of enterprise technology companies eschewing the traditional conference circuit ... Continue Reading
-
Catchpoint helps Google Cloud customers improve Internet resilience- CW Developer Network
The web is online. It’s such a basic truism that sometimes we don’t question this core technology proposition. Yes, the web is (generally speaking, even when flaky service results) mostly always ... Continue Reading
-
Drop in the ocean? OVHcloud open sources schematics for water-cooled datacentres- Open Source Insider
Euro cloud company OVHcloud is taking part in the 2024 Open Compute Project (OCP) EMEA Regional Summit this month in Lisbon. Drawing upon (pun not necessarily intended) the organisation's some 20 ... Continue Reading
Opinion
-
IT Sustainability Think Tank: Calculating IT equipment capacity
CIOs and IT leaders must take action now to ensure they have an accurate overview of the carbon emissions, energy use and sustainability of their organisation's overall activities. But how should they go about this?
-
Ransomware payment bans need universal buy-in
In the wake of renewed calls for lawmakers to consider enacting legal bans on ransomware payments, the Computer Weekly Security Think Tank weighs in to share their thoughts on how to tackle the scourge for good.
-
Security Think Tank: Maybe let's negotiate with terrorists
In the wake of renewed calls for lawmakers to consider enacting legal bans on ransomware payments, the Computer Weekly Security Think Tank weighs in to share their thoughts on how to tackle the scourge for good.
Videos
-
Diversity in tech 2023: Bev White, Nash Squared
-
Suki Fuller, most influential woman in UK tech 2023, winner’s speech
-
Diversity in tech 2022: Explaining employee resource groups
-
Diversity in tech 2022: Mehdi Mobayen-Rahni, Tyl by NatWest
-
Diversity in tech 2022: Kerensa Jennings, BT
-
Diversity in tech 2022: Joel Gujral, Myndup
Search thousands of tech definitions
- What is data protection and why is it important?
- cloud security posture management (CSPM)
- Cloud Security Alliance (CSA)
- LTO-9 (Linear Tape-Open 9)