CINXE.COM
Features - IT and Computing - ComputerWeekly.com
<!DOCTYPE html> <!--[if gt IE 8]><!--><html class="no-js gt-ie8" dir="ltr" lang="en"><!--<![endif]--> <head> <link rel="dns-prefetch" href="https://s.dpmsrv.com/"/> <link rel="dns-prefetch" href="https://cdn.doubleverify.com/"/> <link rel="dns-prefetch" href="https://cdn.optimizely.com/"/> <link rel="dns-prefetch" href="https://www.googletagmanager.com/"/> <link rel="dns-prefetch" href="https://pagead2.googlesyndication.com/"/> <link rel="dns-prefetch" href="https://securepubads.g.doubleclick.net/"/> <link rel="dns-prefetch" href="https://static.chartbeat.com/"/> <meta charset="utf-8" /> <meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1" /> <title>Features - IT and Computing - ComputerWeekly.com</title> <meta name="viewport" content="width=device-width,initial-scale=1" /> <meta name="robots" content="noodp" /> <link rel="canonical" href="https://www.computerweekly.com/indepth" /> <link rel="next" href="https://www.computerweekly.com/indepth/page/2" /> <script src="https://www.computerweekly.com/rms/ux/responsive/js/libs/jquery-1.10.2.min.js"></script><link rel="stylesheet" href="https://www.computerweekly.com/rms/ux/responsive/css/main.css?v=9.50"><script src="https://www.computerweekly.com/cmp/sourcepoint/gdprTCFv2-config.min.js?v=9.50"></script><script src="https://www.computerweekly.com/cmp/sourcepoint/ccpa-config.min.js?v=9.50"></script><script src="https://www.computerweekly.com/cmp/ttCmpApi.min.js?v=9.50"></script><script src="https://www.computerweekly.com/rms/ux/responsive/js/responsive.min.js?v=9.50"></script><link rel="stylesheet" href="https://www.computerweekly.com/rms/ux/responsive/css/computerweekly.css"><script> TT("page", {"isChannel":true,"gadText":"-ADS BY GOOGLE","siteName":"ComputerWeekly","isCFBotEnabledSite":"false","appCode":"98","uaid":"UA-19047342-14","uid":"4500247337","isDBEnabledSite":"true","adAbbr":"CW","zone":"INDEPTHLISTING","siteClass":"CW","isSearchsite":true,"ga":true,"id":"671640b1330bd410VgnVCM100000ef01c80aRCRD","lang":"en","inlineLinkCount":0,"showRightRailOverlay":"false","contentType":"INDEPTHLISTING","timestamp":"2024-12-02 16:31:12","siteType":"editorial","hasVideo":"false","homeAdId":"2240035941","wordCount":0,"uidType":"channel","adScheme":"3","ttgtRegHost":"https://users.techtarget.com","atHost":"https://go.techtarget.com","regHost":"https://users.computerweekly.com","adId":"4500247337","pageIndex":0,"siteId":222,"showLeadGenOverlay":"true","gaSiteAcct":"UA-19047342-14"}); </script> <!-- Begin Chartbeat --> <script>var _sf_startpt=(new Date()).getTime();</script><!-- End Chartbeat --> <link rel="shortcut icon" type="image/x-icon" href="/favicon.ico"> <link rel="apple-touch-icon" sizes="144×144" href="/apple-touch-icon-144x144.png"> <link rel="apple-touch-icon" sizes="114×114" href="/apple-touch-icon-114x114.png"> <link rel="apple-touch-icon" sizes="72×72" href="/apple-touch-icon-72x72.png"> <link rel="apple-touch-icon" href="/apple-touch-icon-precomposed.png"> <link rel="apple-touch-icon-precomposed" sizes="144×144" href="/apple-touch-icon-144x144-precomposed.png"> <link rel="apple-touch-icon-precomposed" sizes="114×114" href="/apple-touch-icon-114x114-precomposed.png"> <link rel="apple-touch-icon-precomposed" sizes="72×72" href="/apple-touch-icon-72x72-precomposed.png"> <link rel="apple-touch-icon-precomposed" href="/apple-touch-icon-precomposed.png"> <script type="text/javascript">window.PQ = {"IDS":1,"BSC":["80000200","84121001","84241001"],"VLP":{"lb":{"728x90":"0"},"mb":{"300x50":"0"},"hp":{"fluid":"0"},"ist":{"fluid":"0"},"mu":{"300x250":"0"},"pr":{"800x45":"0"},"mbt":{"300x90":"0"}}}</script><script type="text/javascript">window.GEO = {"country":"SG"}</script></head> <body id="infoType"> <!-- Begin Google Tag Manager --> <noscript><iframe src="//www.googletagmanager.com/ns.html?id=GTM-PWWZSH" height="0" width="0" style="display:none;visibility:hidden"></iframe></noscript><script>(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start':new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0],j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src='//www.googletagmanager.com/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f);})(window,document,'script','dataLayer','GTM-PWWZSH');</script><noscript><iframe src="//www.googletagmanager.com/ns.html?id=GTM-MKCV6V9" height="0" width="0" style="display:none;visibility:hidden"></iframe></noscript><script>(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start':new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0],j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src='//www.googletagmanager.com/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f);})(window,document,'script','dataLayer','GTM-MKCV6V9');</script><!-- End Google Tag Manager --> <div id="site-container" class="site-container"> <!-- PinnedNavBarController, generated at 13:06:31 Mon Dec 2, 2024, by cds1 --> <!-- AdsController, generated at 13:06:31 Mon Dec 2, 2024, by cds1 --> <div id="interstitial" class="ad ad-ist"><script>GPT.display('interstitial')</script></div><div class="cls-hlb-wrapper-mobile"> <div class="ad-wrapper header-leaderboard ad-mobile"> <!-- AdsController, generated at 13:06:31 Mon Dec 2, 2024, by cds1 --> <div id="mobile-lb" class="ad ad-mb"><script>GPT.display('mobile-lb')</script></div></div> </div> <header class="header header_v2-keep-nav" id="page-header"> <button aria-label="Navigation Menu" class="nav-toggle"><i class="icon" data-icon="9"></i></button> <a href="https://www.computerweekly.com/" class="header-logo mobile-link"> <span class="header-logo-mobile"><img src="https://cdn.ttgtmedia.com/rms/ux/responsive/img/cw_logo_mobile.png"></span> </a> <a href="https://www.computerweekly.com/" class="header-logo desktop-link"> <img src="https://cdn.ttgtmedia.com/rms/ux/responsive/img/cw_logo.png" alt="ComputerWeekly" class="header-logo-desktop replace_2x"> <img src="https://cdn.ttgtmedia.com/rms/ux/responsive/img/cw_logo.png" alt="ComputerWeekly" class="header-logo-small replace_2x"> </a> <a href="https://www.techtarget.com/network/" class="header-logo-tt-desktop"> <img src="https://cdn.ttgtmedia.com/rms/ux/responsive/img/cw_tt_logo.png" alt="TechTarget" class="replace_2x"> </a> <button aria-label="Search" class="header-search-toggle"><i class="icon" data-icon="g"></i></button> <form action="https://www.computerweekly.com/search" method="get" class="header-search"> <label for="header-search-input" class="visuallyhidden">Search the TechTarget Network</label> <input class="header-search-input" id="header-search-input" type="text" name="q" placeholder="Search Computer Weekly"> <button aria-label="Search" class="header-search-submit"><i class="icon" data-icon="g"></i></button> <ul class="ui-autocomplete ui-front ui-menu ui-widget ui-widget-content ui-corner-all" id="ui-id-1" tabindex="0" style="display: none;"></ul> </form> <nav class="nav" id="page-nav"> <a href="https://www.computerweekly.com/login" class="nav-join-pro"><span>Join CW+</span></a> <div class="nav-user"> <a href="https://www.computerweekly.com/login" rel="nofollow" class="nav-user-login"><span class="nav-user-action">Login</span></a> <a href="https://www.computerweekly.com/register" rel="nofollow" class="register"><span class="nav-user-action">Register</span></a> <a href="https://www.techtarget.com/html/cookie_policy.html"><span class="nav-user-action cookies">Cookies</span></a> </div> <script>TT(["context","lib/jquery"],function(c,$){var u=c.getUser();if(u.loggedIn){$('div.nav-user').children("a:first") .before('<a href="https://users.computerweekly.com/registration/ComputerWeekly/EditProfile.page?fromURL=' + encodeURIComponent(window.location.href) +'"><i class="icon header_logged_in_icon" title="'+u.displayName+'"></i></a>') .attr("href", "https://users.computerweekly.com/registration/v2/api/logout?fromURL=" + encodeURIComponent(window.location.href)).children("span.nav-user-action:first").text('Logout'); $('a.register span').hide();$('a.register').removeClass();$('a.nav-user-login span').addClass('logout'); $('.nav-join-pro').removeAttr('href');$('a.nav-join-pro span').hide();}else{$('div.nav-user').children("a:first").attr("href", "https://www.computerweekly.com/login?fromURL="+encodeURIComponent(window.location.href)); $('a.register span').attr("href", "https://www.computerweekly.com/register?fromURL="+encodeURIComponent(window.location.href)); $('a.nav-join-pro').attr("href", "https://www.computerweekly.com/login?fromURL="+encodeURIComponent(window.location.href)); $('.register').attr("href", "https://www.computerweekly.com/register?fromURL="+encodeURIComponent(window.location.href));}}); </script> <div class="nav-links"> <ul> <li id="nav-links-News"><a href="https://www.computerweekly.com/news">News</a></li> <li id="nav-links-InDepth"><a href="https://www.computerweekly.com/indepth">In Depth</a></li> <li id="nav-links-Blogs"><a href="https://www.computerweekly.com/blogs">Blogs</a></li> <li id="nav-links-Opinion"><a href="https://www.computerweekly.com/opinions">Opinion</a></li> <li id="nav-links-Videos"><a href="https://www.computerweekly.com/videos">Videos</a></li> <li id="nav-links-PhotoStories"><a href="https://www.computerweekly.com/photostories">Photo Stories</a></li> <li id="nav-links-PremiumContent"><a href="https://www.computerweekly.com/eproducts">Premium Content</a></li> <li id="nav-links-Webinars"><a href="https://www.computerweekly.com/webinars">Webinars</a></li> <li id="nav-links-uniquelink"><a href="https://www.computerweekly.com/ehandbook/Computer-Weekly-2024-salary-survey">Download 2024 IT salary survey</a></li> </ul> </div> <div class="nav-rss"> <a href="https://www.computerweekly.com/rss"><span class="nav-user-action">RSS</span></a> </div> <ul class="nav-list"> <li class="nav-list-item nav-list-item-cw" id="nav-list-item-itmanagement"> <div class="nav-list-item-header"> <span class="nav-list-item-header-title">IT Management</span> <i class="icon icon-arrow-down" data-icon="5"></i><i class="icon icon-navigation-detail" data-icon="A"></i> </div> <div class="nav-list-sublist nav-list-item-dropdown"> <ul class="nav-list-item-jscroll"> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/CW500-and-IT-leadership-skills">IT leadership & CW500</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/IT-architecture">IT architecture</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/IT-efficiency-and-sustainability">IT efficiency</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/IT-governance">Governance</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/IT-innovation-research-and-development">Innovation</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/IT-legislation-and-regulation">Legislation & regulation</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/IT-operations-management-and-IT-support">Operations & support</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/IT-project-management">Project management</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/IT-strategy">Strategy</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/IT-supplier-relationship-management">Supplier management</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Managing-IT-and-business-issues">Business issues</a></li> <li class="nav-list-sublist-item sponsored"> <a href="https://www.computerweekly.com/sponsored_communities">Sponsored Communities</a> </li> </ul> </div> </li> <li class="nav-list-item nav-list-item-cw" id="nav-list-item-industrysectors"> <div class="nav-list-item-header"> <span class="nav-list-item-header-title">Industry Sectors</span> <i class="icon icon-arrow-down" data-icon="5"></i><i class="icon icon-navigation-arrow" data-icon="B"></i> </div> <div class="nav-list-sublist nav-list-item-dropdown"> <ul class="nav-list-item-jscroll"> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Healthcare-and-NHS-IT">Healthcare IT</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/IT-for-charity-organisations">Charity IT</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/IT-for-consulting-and-business-services">Business services IT</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/IT-for-financial-services">Financial services IT</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/IT-for-government-and-public-sector">Government & public sector IT</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/IT-for-leisure-and-hospitality-industry">Leisure & hospitality IT</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/IT-for-manufacturing">Manufacturing IT</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/IT-for-media-and-entertainment-industry">Media & entertainment IT</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/IT-for-retail-and-logistics">Retail IT</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/IT-for-small-and-medium-sized-enterprises-SME">SME IT</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/IT-for-telecoms-and-internet-organisations">Telecoms & internet</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/IT-for-transport-and-travel-industry">Transport & travel IT</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/IT-for-utilities-and-energy">Utilities IT</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/IT-suppliers">IT suppliers</a></li> </ul> </div> </li> <li class="nav-list-item nav-list-item-cw" id="nav-list-item-topics"> <div class="nav-list-item-header"> <span class="nav-list-item-header-title">Technology Topics</span> <i class="icon icon-arrow-down" data-icon="5"></i><i class="icon icon-navigation-arrow" data-icon="B"></i> </div> <div class="nav-list-item-dropdown infotype"> <div class="nav-list-item-jscroll"> <div class="nav-list-child-topics" id="child-topic-Datacentre"> <div class="nav-list-sublist-header nav-list-sublist-header-topics"> <a href="https://www.computerweekly.com/resources/Data-Centre"><span class="nav-list-sublist-header-topics-title">Datacentre</span></a> <span class="view-all">View All<i class="icon" data-icon="6"></i></span> </div> <ul class="nav-list-sublist"> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Clustering-for-high-availability-and-HPC">Clustering for high availability and HPC</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Containers">Containers </a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Converged-infrastructure">Converged infrastructure</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Data-centre-backup-power-and-power-distribution">Datacentre backup power and power distribution</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Data-centre-capacity-planning">Datacentre capacity planning</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Data-centre-cooling-infrastructure">Datacentre cooling infrastructure</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Data-centre-disaster-recovery-and-security">Disaster recovery/security</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Data-centre-energy-efficiency-and-green-IT">Green IT</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Data-centre-performance-troubleshooting-monitoring-and-optimisation">Performance, monitoring and optimisation</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Data-centre-systems-management">Systems management</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/DevOps">DevOps</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Infrastructure-as-a-Service-IaaS">IaaS</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Managing-servers-and-operating-systems">Server and Operating Systems</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Platform-as-a-Service-PaaS">PaaS</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Server-virtualisation-platforms-and-management">Virtualisation</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Software-as-a-Service-SaaS">SaaS</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Virtualisation-management-strategy">Desktop virtualisation platforms</a></li> </ul> </div> <div class="nav-list-child-topics" id="child-topic-Enterprise-software"> <div class="nav-list-sublist-header nav-list-sublist-header-topics"> <a href="https://www.computerweekly.com/resources/Enterprise-software"><span class="nav-list-sublist-header-topics-title">Enterprise software</span></a> <span class="view-all">View All<i class="icon" data-icon="6"></i></span> </div> <ul class="nav-list-sublist"> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Artificial-intelligence-automation-and-robotics">AI and automation</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Blockchain">Blockchain</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Business-applications">Business applications</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Business-intelligence-software">Business intelligence</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Cloud-applications">Cloud applications</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Collaboration-software-and-productivity-software">Collaboration</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Customer-relationship-management-CRM">CRM</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Database-software">Database</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Enterprise-resource-planning-ERP-software">ERP</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Financial-applications">Financial applications</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/HR-software">HR software</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Integration-software-and-middleware">Middleware</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Microservices">Microservices</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Microsoft-Windows-software">Windows</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Mobile-software">Mobile</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Open-source-software">Open source</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Operating-systems-software">Operating systems</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Service-oriented-architecture-SOA">SOA</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Software-development-tools">Software development</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Software-licensing">Software licensing</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Virtualisation-software">Virtualisation</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Web-software">Web software</a></li> </ul> </div> <div class="nav-list-child-topics" id="child-topic-IT-in-Europe-and-Middle-East"> <div class="nav-list-sublist-header nav-list-sublist-header-topics"> <a href="https://www.computerweekly.com/resources/Europe-and-Middle-East-information-technology-IT"><span class="nav-list-sublist-header-topics-title">IT in Europe and Middle East</span></a> <span class="view-all">View All<i class="icon" data-icon="6"></i></span> </div> <ul class="nav-list-sublist"> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/France">IT in France</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Nordics">IT in the Nordics</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Information-technology-IT-in-Benelux">IT in Benelux</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Germany">IT in Germany</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Italy">IT in Italy</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Poland">IT in Poland</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Russia">IT in Russia</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Spain-information-technology">IT in Spain</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Middle-East">IT in the Middle East</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Turkey">IT in Turkey</a></li> </ul> </div> <div class="nav-list-child-topics" id="child-topic-Information-Management"> <div class="nav-list-sublist-header nav-list-sublist-header-topics"> <a href="https://www.computerweekly.com/resources/Information-management"><span class="nav-list-sublist-header-topics-title">Information Management</span></a> <span class="view-all">View All<i class="icon" data-icon="6"></i></span> </div> <ul class="nav-list-sublist"> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Big-data-analytics">Big data</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Business-intelligence-and-analytics">Business intelligence and analytics</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Business-process-management-BPM">BPM</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Content-management">Content management</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Database-management">Database management</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Data-quality-management-and-governance">Quality/governance</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Data-warehousing">Data warehousing</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Master-data-management-MDM-and-integration">MDM/Integration</a></li> </ul> </div> <div class="nav-list-child-topics" id="child-topic-IT-in-Asia-Pacific"> <div class="nav-list-sublist-header nav-list-sublist-header-topics"> <a href="https://www.computerweekly.com/resources/Asia-Pacific-IT"><span class="nav-list-sublist-header-topics-title">IT in Asia-Pacific</span></a> <span class="view-all">View All<i class="icon" data-icon="6"></i></span> </div> <ul class="nav-list-sublist"> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/ASEAN">IT in ASEAN</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Australia-New-Zealand">IT in Australia & New Zealand</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/India">IT in India</a></li> </ul> </div> <div class="nav-list-child-topics" id="child-topic-Internet"> <div class="nav-list-sublist-header nav-list-sublist-header-topics"> <a href="https://www.computerweekly.com/resources/Internet-technology"><span class="nav-list-sublist-header-topics-title">Internet</span></a> <span class="view-all">View All<i class="icon" data-icon="6"></i></span> </div> <ul class="nav-list-sublist"> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Cloud-computing-software">Cloud</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/E-commerce-technology">E-commerce</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Internet-infrastructure">Internet infrastructure</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Social-media-technology">Social media</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Web-development">Web development</a></li> </ul> </div> <div class="nav-list-child-topics" id="child-topic-IT-skills"> <div class="nav-list-sublist-header nav-list-sublist-header-topics"> <a href="https://www.computerweekly.com/resources/IT-careers-and-IT-skills"><span class="nav-list-sublist-header-topics-title">IT skills</span></a> <span class="view-all">View All<i class="icon" data-icon="6"></i></span> </div> <ul class="nav-list-sublist"> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Diversity-in-IT">Diversity in IT</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/IT-education-and-training">Training</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/IT-jobs-and-recruitment">Jobs</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/IT-management-skills">Management skills</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/IT-technical-skills">Technical skills</a></li> </ul> </div> <div class="nav-list-child-topics" id="child-topic-Hardware"> <div class="nav-list-sublist-header nav-list-sublist-header-topics"> <a href="https://www.computerweekly.com/resources/IT-hardware"><span class="nav-list-sublist-header-topics-title">Hardware</span></a> <span class="view-all">View All<i class="icon" data-icon="6"></i></span> </div> <ul class="nav-list-sublist"> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Chips-and-processor-hardware">Chips & processors</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Computer-peripherals-and-printers">Printers</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Computer-storage-hardware">Storage</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Data-centre-hardware">Data centre</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Mobile-hardware">Mobile</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Networking-hardware">Networking</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/PC-hardware">PC</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Server-hardware">Servers</a></li> </ul> </div> <div class="nav-list-child-topics" id="child-topic-IT-security"> <div class="nav-list-sublist-header nav-list-sublist-header-topics"> <a href="https://www.computerweekly.com/resources/IT-security"><span class="nav-list-sublist-header-topics-title">IT security</span></a> <span class="view-all">View All<i class="icon" data-icon="6"></i></span> </div> <ul class="nav-list-sublist"> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Antivirus-firewall-and-IDS-products">Antivirus</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Application-security-and-coding-requirements">Secure Coding and Application Programming</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Business-continuity-planning">Continuity</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Cloud-security">Cloud security </a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Data-breach-incident-management-and-recovery">Data Breach Incident Management and Recovery</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Endpoint-security">Endpoint and NAC Protection</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Hackers-and-cybercrime-prevention">Cybercrime</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Identity-and-access-management-products">IAM</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/IT-risk-management">Risk management</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Network-security-management">Network Security Management</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Privacy-and-data-protection">Data protection</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Regulatory-compliance-and-standard-requirements">Compliance Regulation and Standard Requirements</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Security-policy-and-user-awareness">Security policy and user awareness</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Web-application-security">Web Application Security</a></li> </ul> </div> <div class="nav-list-child-topics" id="child-topic-IT-services"> <div class="nav-list-sublist-header nav-list-sublist-header-topics"> <a href="https://www.computerweekly.com/resources/IT-services-and-outsourcing"><span class="nav-list-sublist-header-topics-title">IT services</span></a> <span class="view-all">View All<i class="icon" data-icon="6"></i></span> </div> <ul class="nav-list-sublist"> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Cloud-computing-services">Cloud</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/IT-consultancy">Consultancy</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/IT-outsourcing">Outsourcing</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Managed-services-and-hosting-services">Hosting</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Offshore-IT-services">Offshore</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Technology-startups">Startups</a></li> </ul> </div> <div class="nav-list-child-topics" id="child-topic-Mobile"> <div class="nav-list-sublist-header nav-list-sublist-header-topics"> <a href="https://www.computerweekly.com/resources/Mobile-technology"><span class="nav-list-sublist-header-topics-title">Mobile</span></a> <span class="view-all">View All<i class="icon" data-icon="6"></i></span> </div> <ul class="nav-list-sublist"> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Laptops-and-notebooks">Laptop</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Mobile-apps-and-software">Mobile software</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Mobile-networking">Mobile networking</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Smartphone-technology">Smartphone</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Tablet-computers">Tablet</a></li> </ul> </div> <div class="nav-list-child-topics" id="child-topic-Networking"> <div class="nav-list-sublist-header nav-list-sublist-header-topics"> <a href="https://www.computerweekly.com/resources/Networking-and-communication"><span class="nav-list-sublist-header-topics-title">Networking</span></a> <span class="view-all">View All<i class="icon" data-icon="6"></i></span> </div> <ul class="nav-list-sublist"> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Data-centre-networking">Datacentre networking</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Internet-of-Things-IoT">Internet of Things</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Mobile-networks">Mobile</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Network-hardware">Network hardware</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Network-monitoring-and-analysis">Network monitoring and analysis</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Network-routing-and-switching">Network routing and switching</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Network-securitystrategy">Network security strategy</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Network-software">Network software</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Software-defined-networking-SDN">Software-defined networking</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Broadband-communications">Telecoms networks and broadband communications</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Unified-communications">Unified communications</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Voice-networking-and-VoIP">VoIP</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/WAN-performance-and-optimisation">WAN performance and optimisation</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Wireless-networking">Wireless</a></li> </ul> </div> <div class="nav-list-child-topics" id="child-topic-Storage"> <div class="nav-list-sublist-header nav-list-sublist-header-topics"> <a href="https://www.computerweekly.com/resources/Storage"><span class="nav-list-sublist-header-topics-title">Storage</span></a> <span class="view-all">View All<i class="icon" data-icon="6"></i></span> </div> <ul class="nav-list-sublist"> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/AI-and-storage">AI and storage</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Cloud-storage">Cloud storage</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Containers-and-storage">Containers and storage</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Data-management">Data management</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Data-protection-backup-and-archiving">Backup</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Data-protection-regulations-and-compliance">Compliance and storage</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Disaster-recovery">Disaster recovery</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Flash-storage-and-solid-state-drives-SSDs">Flash and SSDs</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Hyper-converged-infrastructure">Hyper-convergence</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Object-storage">Object storage</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/SAN-NAS-solid-state-RAID">Disk systems</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Software-defined-storage">Software-defined storage</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Storage-fabric-switches-and-networks">Storage switches</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Storage-management-and-strategy">Storage management</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Storage-performance">Storage performance</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/Tape-storage">Tape storage</a></li> <li class="nav-list-sublist-item"><a href="https://www.computerweekly.com/resources/virtualisation-and-storage">Virtualisation and storage</a></li> </ul> </div> <div class="nav-list-parent-topics"> <div class="nav-list-sublist-header nav-list-sublist-header-gray">Please select a category</div> <ul class="nav-list-sublist"> <li class="nav-list-sublist-item" id="parent-topic-Datacentre">Datacentre</li> <li class="nav-list-sublist-item" id="parent-topic-Enterprise-software">Enterprise software</li> <li class="nav-list-sublist-item" id="parent-topic-IT-in-Europe-and-Middle-East">IT in Europe and Middle East</li> <li class="nav-list-sublist-item" id="parent-topic-Information-Management">Information Management</li> <li class="nav-list-sublist-item" id="parent-topic-IT-in-Asia-Pacific">IT in Asia-Pacific</li> <li class="nav-list-sublist-item" id="parent-topic-Internet">Internet</li> <li class="nav-list-sublist-item" id="parent-topic-IT-skills">IT skills</li> <li class="nav-list-sublist-item" id="parent-topic-Hardware">Hardware</li> <li class="nav-list-sublist-item" id="parent-topic-IT-security">IT security</li> <li class="nav-list-sublist-item" id="parent-topic-IT-services">IT services</li> <li class="nav-list-sublist-item" id="parent-topic-Mobile">Mobile</li> <li class="nav-list-sublist-item" id="parent-topic-Networking">Networking</li> <li class="nav-list-sublist-item" id="parent-topic-Storage">Storage</li> </ul> </div> </div> </div> </li> </ul> <ul class="nav-social"> <li class="nav-social-item title">Follow:</li> <li class="nav-social-item" title="Like ComputerWeekly on Facebook" id="navBarFacebook"><a href="https://www.facebook.com/computerweekly" target="_blank" aria-label="Follow on Facebook"><i class="icon" data-icon="u"></i></a></li><li class="nav-social-item" title="Follow @computerweekly on X" id="navBarTwitter"><a href="https://x.com/computerweekly" target="_blank" aria-label="Follow on X"><i class="icon x_logo" data-icon="c"></i></a></li><li class="nav-social-item" title="Follow ComputerWeekly on LinkedIn" id="navBarLinkedIn"><a href="https://www.linkedin.com/company/3089746" target="_blank" aria-label="Follow on LinkedIn"><i class="icon" data-icon="o"></i></a></li></ul> <div class="nav-languages"> <a href="#"><i class="icon globe"></i></a> <ul class="nav-languages-dropdown"> <li><a href="https://www.computerweekly.com/br" target="_blank">ComputerWeekly.com.br</a></li> <li><a href="https://www.computerweekly.com/de" target="_blank">ComputerWeekly.de</a></li> <li><a href="https://www.computerweekly.com/es" target="_blank">ComputerWeekly.es</a></li> <li><a href="https://www.lemagit.fr" target="_blank">LeMagIT.fr</a></li> <li><a href="https://www.computerweekly.com/microscope" target="_blank">MicroScope.co.uk</a></li> </ul> </div> </nav> </header> <div class="cls-hlb-wrapper-desktop"> <div class="ad-wrapper header-leaderboard ad-desktop"> <!-- AdsController, generated at 13:06:31 Mon Dec 2, 2024, by cds1 --> <div id="leaderboard" class="ad ad-lb"><script>GPT.display('leaderboard')</script></div></div> </div><div id="main-content" class="main-content"> <article id="content-columns" class="content-columns"> <div class="top-gradient-bar"></div> <!-- ContentItemController, generated at 11:42:54 Mon Dec 2, 2024, by cds1 --> <header class="infotype-header get-started-header"> <h1 class="infotype-title">In Depth</h1> <div class="ad-wrapper page-header-ad ad-desktop-w"> <!-- AdsController, generated at 11:42:54 Mon Dec 2, 2024, by cds1 --> <div id="halfpage-top" class="ad ad-hp"><script>GPT.display('halfpage-top')</script></div></div> </header><div id="content-left" class="content-left"> <div class="locking-full-bar"> <div class="locking-left-bar"> </div> <aside class="resources-bar desktop-resources-bar" id="resources-bar"> <!-- LatestContentController, generated at 11:42:54 Mon Dec 2, 2024, by cds1 --> <section id="latest-blog-posts"> <div class="resources-bar-header"><i class="icon" data-icon="2"></i>Latest Blog Posts</div> <ul class="resources-bar-list latest-blog-posts"> <li class="resources-bar-item"> <a href="https://www.computerweekly.com/blog/Cliff-Sarans-Enterprise-blog/Risk-of-Trump-and-Big-Tech-deregulation">Risk of Trump and Big Tech deregulation</a> <span>– Cliff Saran's Enterprise blog</span> </li> <li class="resources-bar-item"> <a href="https://www.computerweekly.com/blog/Write-side-up-by-Freeform-Dynamics/AI-and-analytics-Been-there-done-that">AI and analytics? Been there, done that</a> <span>– Write side up - by Freeform Dynamics</span> </li> <li class="resources-bar-item see-more"> <a href="https://www.computerweekly.com/blogs" class="button blue-button">View All Blogs</a> </li> </ul> </section> <!-- RecentEProductsController, generated at 16:31:12 Mon Dec 2, 2024, by cds1 --> <div class="resources-bar-header ezine-header"><i class="icon" data-icon="2"></i> Download CW Asia-Pacific</div> <ul class="resources-bar-list ezine"> <li class="resources-bar-item"> <a href="https://www.computerweekly.com/ezine/CW-Asia-Pacific/CW-APAC-Trend-Watch-Modernising-security-operations"><img src="https://cdn.ttgtmedia.com/rms/computerweekly/APAC-1124-cover-252px.png"></a> <span class="ezine-header">In The Current Issue:</span> <ul> <li>Reinventing security operations for the modern threat landscape</li> <li>How Kaspersky is driving growth in APAC</li> <li>Australia bolsters cyber defences with security bill</li> </ul> <a href="https://www.computerweekly.com/ezine/CW-Asia-Pacific/CW-APAC-Trend-Watch-Modernising-security-operations" class="button cw-red-button"> Download Current Issue</a> </li> </ul> </aside> </div></div> <div id="content-center" class="content-center"> <!-- FilterTypeController, generated at 16:00:33 Mon Dec 2, 2024, by cds1 --> <div class="float-mask infotype-mask"></div> <ul class="actions-bar"> <li class="actions-bar-item actions-bar-chapters"><i class="icon" data-icon="1"></i></li> <li class="actions-bar-item actions-bar-resources"><i class="icon" data-icon="2"></i></li> </ul><section class="section get-started infotype-section" id="infotype-content-list"> <h2 class="infotype-section-title infotype-section-title-parent">In Depth</h2> <ul class="infotype-news-items" data-filterType="In Depth"> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/Automated-patch-management-A-proactive-way-to-stay-ahead-of-threats">Automated patch management: A proactive way to stay ahead of threats</a> </h3> <p class="infotype-news-description"> Timely patch management should be crucial in any organisation, but too often it goes by the wayside. Automating the process may offer a path forward for hard-pressed cyber defenders<a href="https://www.computerweekly.com/feature/Automated-patch-management-A-proactive-way-to-stay-ahead-of-threats"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/Cloud-data-lakes-Where-do-they-fit-and-what-are-their-benefits">Cloud data lakes: Where do they fit and what are their benefits?</a> </h3> <p class="infotype-news-description"> We look at cloud data lakes, what they are, where they fit in the data management lifecycle, their benefits and the key providers in the hyperscaler clouds<a href="https://www.computerweekly.com/feature/Cloud-data-lakes-Where-do-they-fit-and-what-are-their-benefits"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/Could-generative-AI-help-to-fill-the-skills-gap-in-engineering">Could generative AI help to fill the skills gap in engineering?</a> </h3> <p class="infotype-news-description"> The role of artificial intelligence and machine learning in society continue to be hotly debated as the tools promise to revolutionise our lives, but how will they affect the engineering sector?<a href="https://www.computerweekly.com/feature/Could-generative-AI-help-to-fill-the-skills-gap-in-engineering"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/Case-study-Manchester-Airports-Group-using-AWS-to-revamp-its-data-strategy">Case study: Manchester Airports Group using AWS to revamp its data strategy</a> </h3> <p class="infotype-news-description"> Manchester Airports Group is using AWS technology to improve passenger experience through a revamp of its data strategy, as set out by the organisation's chief digital officer, Ryan Cant<a href="https://www.computerweekly.com/feature/Case-study-Manchester-Airports-Group-using-AWS-to-revamp-its-data-strategy"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/LGE-looks-to-mean-business-with-tech-pivot">LGE looks to mean business with tech pivot</a> </h3> <p class="infotype-news-description"> Refusing to rest on its laurels as a giant in consumer electronics, LGE unveils plan to take accumulated wealth of knowledge to the business sector. We look at how and why this pivot is taking place and where it will drive the company<a href="https://www.computerweekly.com/feature/LGE-looks-to-mean-business-with-tech-pivot"> Continue Reading</a> </p> </li> </ul> </section> <div class="ad-wrapper ad-inline ad-x-desktop-w"> <!-- AdsController, generated at 16:00:33 Mon Dec 2, 2024, by cds1 --> <div id="mu-1" class="ad ad-mu"><script>GPT.display('mu-1')</script></div></div> <section class="section get-started infotype-section" id="infotype-content-list"> <ul class="infotype-news-items" data-filterType="In Depth"> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/Post-Office-Horizon-scandal-explained-everything-you-need-to-know">Post Office Horizon scandal explained: Everything you need to know</a> </h3> <p class="infotype-news-description"> Computer Weekly has investigated the Post Office Horizon scandal since 2008 and is, in fact, part of the story. This guide contains essential information about the scandal<a href="https://www.computerweekly.com/feature/Post-Office-Horizon-scandal-explained-everything-you-need-to-know"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/IAM-within-the-framework-of-defence-in-depth">IAM within the framework of defence in depth</a> </h3> <p class="infotype-news-description"> If it is deployed correctly, identity and access management is among the plethora of techniques that can help to secure enterprise IT<a href="https://www.computerweekly.com/feature/IAM-within-the-framework-of-defence-in-depth"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/Post-Office-Horizon-IT-scandal-inquiry-Two-years-of-shocking-revelations">Post Office Horizon IT scandal inquiry: Three years of shocking revelations</a> </h3> <p class="infotype-news-description"> Nearly three years of shocking revelations from the Post Office Horizon scandal inquiry<a href="https://www.computerweekly.com/feature/Post-Office-Horizon-IT-scandal-inquiry-Two-years-of-shocking-revelations"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/Storage-technology-explained-Ransomware-and-storage-and-backup">Storage technology explained: Ransomware and storage and backup</a> </h3> <p class="infotype-news-description"> We look at ransomware attacks, and the importance of good backup practice as well as immutable snapshots, air-gapping, network segmentation, AI anomaly detection and supplier warranties<a href="https://www.computerweekly.com/feature/Storage-technology-explained-Ransomware-and-storage-and-backup"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/Storage-technology-explained-Flash-vs-HDD">Storage technology explained: Flash vs HDD</a> </h3> <p class="infotype-news-description"> In this guide, we examine the differences between flash storage and HDD, the rise of NVMe and much denser formats such as QLC, and whether or not flash will vanquish HDD in the all-flash datacentre<a href="https://www.computerweekly.com/feature/Storage-technology-explained-Flash-vs-HDD"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/The-Loan-Charge-scandal-explained-Everything-you-need-to-know">The Loan Charge scandal explained: Everything you need to know</a> </h3> <p class="infotype-news-description"> Tens of thousands of IT contractors have been saddled with life-changing tax bills as a result of a controversial, retroactive government policy – and the fall-out from its introduction has been likened to the Post Office IT scandal<a href="https://www.computerweekly.com/feature/The-Loan-Charge-scandal-explained-Everything-you-need-to-know"> Continue Reading</a> </p> </li> </ul> </section> <div class="ad-wrapper ad-inline ad-desktop"> <!-- AdsController, generated at 16:00:33 Mon Dec 2, 2024, by cds1 --> <div id="mu-2" class="ad ad-mu"><script>GPT.display('mu-2')</script></div></div> <div class="ad-wrapper ad-inline ad-mobile"> <!-- AdsController, generated at 16:00:33 Mon Dec 2, 2024, by cds1 --> <div id="mobile-2" class="ad ad-mb"><script>GPT.display('mobile-2')</script></div></div> <section class="section get-started infotype-section" id="infotype-content-list"> <ul class="infotype-news-items" data-filterType="In Depth"> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/Storage-technology-explained-What-is-S3-and-what-is-it-good-for">Storage technology explained: What is S3 and what is it good for?</a> </h3> <p class="infotype-news-description"> We look at S3, AWS’s object storage protocol that originated in its cloud services and has now spread as near enough a standard and to third-party on-premise deployments<a href="https://www.computerweekly.com/feature/Storage-technology-explained-What-is-S3-and-what-is-it-good-for"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/Schools-go-smartphone-free-to-address-online-harms">Schools go smartphone-free to address online harms</a> </h3> <p class="infotype-news-description"> Schools are implementing smartphone-free policies in an attempt to curb students’ exposure to online harms, but teachers and parents are worried the Online Safety Act will only partially address concerns<a href="https://www.computerweekly.com/feature/Schools-go-smartphone-free-to-address-online-harms"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/AWS-storage-Key-storage-options-in-the-Amazon-cloud">AWS storage: Key storage options in the Amazon cloud</a> </h3> <p class="infotype-news-description"> We survey the key cloud storage options available from AWS, which include S3 object storage and its options, block storage in EBS and a range of file storage choices<a href="https://www.computerweekly.com/feature/AWS-storage-Key-storage-options-in-the-Amazon-cloud"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/IAM-Enterprises-face-a-long-hard-road-to-improve">IAM: Enterprises face a long, hard road to improve</a> </h3> <p class="infotype-news-description"> Poor identity and access management puts enterprise data at risk, but the path to stronger IAM remains complex<a href="https://www.computerweekly.com/feature/IAM-Enterprises-face-a-long-hard-road-to-improve"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/Beyond-VPNs-The-future-of-secure-remote-connectivity">Beyond VPNs: The future of secure remote connectivity</a> </h3> <p class="infotype-news-description"> As more companies adopt cloud services and remote work, the limitations of VPNs are becoming obvious. We explore what’s next for secure remote connectivity<a href="https://www.computerweekly.com/feature/Beyond-VPNs-The-future-of-secure-remote-connectivity"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/What-are-the-security-risks-of-bring-your-own-AI">What are the security risks of bring your own AI?</a> </h3> <p class="infotype-news-description"> The rise of generative AI has led to a plethora of publicly accessible artificial intelligence tools, but what are the risks when external AI tools are used with corporate data?<a href="https://www.computerweekly.com/feature/What-are-the-security-risks-of-bring-your-own-AI"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/Storage-explained-Consumption-models-of-storage-procurement">Storage explained: Consumption models of storage procurement</a> </h3> <p class="infotype-news-description"> We look at consumption models of storage purchasing and how cloud operating models have made them mainstream and supplanted the traditional three-year lift-and-shift datacentre refresh<a href="https://www.computerweekly.com/feature/Storage-explained-Consumption-models-of-storage-procurement"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/Virtual-collaboration-within-and-across-industries-promises-and-challenges">Virtual collaboration within and across industries – promises and challenges</a> </h3> <p class="infotype-news-description"> New technologies enable intuitive and realistic visual and auditory landscapes that put users within applications. We look at which industries will likely illustrate the impact of virtual collaboration in commercial environments<a href="https://www.computerweekly.com/feature/Virtual-collaboration-within-and-across-industries-promises-and-challenges"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/Data-classification-What-why-and-who-provides-it">Data classification: What, why and who provides it</a> </h3> <p class="infotype-news-description"> You need to know where your data is, what it is, its governance requirements and relationship to the rest of your data. We look at data classification and how AI can help<a href="https://www.computerweekly.com/feature/Data-classification-What-why-and-who-provides-it"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/Rewiring-Whitehall-The-next-steps-in-digital-government">Rewiring Whitehall: The next steps in digital government</a> </h3> <p class="infotype-news-description"> There’s a new government in place with fresh impetus to accelerate the digital transformation of public services – but what’s going to be different, better and more successful this time around?<a href="https://www.computerweekly.com/feature/Rewiring-Whitehall-The-next-steps-in-digital-government"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/Kenyan-workers-win-High-Court-appeal-to-take-Meta-to-trial">Kenyan workers win High Court appeal to take Meta to trial</a> </h3> <p class="infotype-news-description"> Despite the company arguing that Kenyan courts have no jurisdiction over an American company, the Nairobi High Court has ruled that Meta must face more than 180 content moderators and data labellers in court over allegedly poor working conditions, ...<a href="https://www.computerweekly.com/feature/Kenyan-workers-win-High-Court-appeal-to-take-Meta-to-trial"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/Detect-ransomware-in-storage-to-act-before-it-spreads">Detect ransomware in storage to act before it spreads</a> </h3> <p class="infotype-news-description"> Anomaly detection and immutable copies can be frontline tools against ransomware – we look at the role storage can play against the latest techniques employed by ransomware gangs<a href="https://www.computerweekly.com/feature/Detect-ransomware-in-storage-to-act-before-it-spreads"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/Forrester-Tips-for-choosing-a-UCaaS-provider">Forrester: Tips for choosing a UCaaS provider</a> </h3> <p class="infotype-news-description"> Forrester analysts assess the various options and licensing arrangements available for unified comms-as-a-service offerings<a href="https://www.computerweekly.com/feature/Forrester-Tips-for-choosing-a-UCaaS-provider"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/What-are-tensor-processing-units-and-what-is-their-role-in-AI">What are tensor processing units and what is their role in AI?</a> </h3> <p class="infotype-news-description"> We look at Google’s TPUs – tensor processing units – and ask what makes them different to CPUs, GPUs and DPUs, as well as how you can take advantage of them in AI processing<a href="https://www.computerweekly.com/feature/What-are-tensor-processing-units-and-what-is-their-role-in-AI"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/Reinventing-security-operations-for-the-modern-threat-landscape">Reinventing security operations for the modern threat landscape</a> </h3> <p class="infotype-news-description"> The growing pace of digital transformation has opened new avenues for attackers, making traditional security measures obsolete. Organisations must modernise their security operations to fortify their defences and navigate the evolving threat ...<a href="https://www.computerweekly.com/feature/Reinventing-security-operations-for-the-modern-threat-landscape"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/The-future-of-collaboration-in-virtuality">The future of collaboration in virtuality</a> </h3> <p class="infotype-news-description"> The internet has introduced a host of applications to enable increasingly sophisticated collaboration across distances. Email catapulted economies into near real-time cooperation of teams, but new technologies promise to unleash immersive ...<a href="https://www.computerweekly.com/feature/The-future-of-collaboration-in-virtuality"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/Global-file-systems-A-single-view-of-on-premise-and-cloud-data">Global file systems: A single view of on-premise and cloud data</a> </h3> <p class="infotype-news-description"> Global file systems aggregate data into a single hybrid cloud from multiple locations using object storage with access that satisfies traditional application needs, like file locking<a href="https://www.computerweekly.com/feature/Global-file-systems-A-single-view-of-on-premise-and-cloud-data"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/Azure-storage-Key-options-in-Microsoft-cloud-storage">Azure storage: Key options in Microsoft cloud storage</a> </h3> <p class="infotype-news-description"> We survey the key cloud storage options available from Microsoft Azure, which include Files, Blob, Elastic SAN, Managed Disk and NetApp files, for a range of use cases<a href="https://www.computerweekly.com/feature/Azure-storage-Key-options-in-Microsoft-cloud-storage"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/What-the-datacentre-industry-would-like-to-see-from-the-governments-planning-reforms">What the datacentre industry would like to see from the government's planning reforms</a> </h3> <p class="infotype-news-description"> How can datacentre policy and planning reform better reflect the criticality of both energy and data?<a href="https://www.computerweekly.com/feature/What-the-datacentre-industry-would-like-to-see-from-the-governments-planning-reforms"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/Datacentre-power-purchase-agreements-Are-they-the-right-way-to-lower-emissions">Datacentre power purchase agreements: Are they the right way to lower emissions?</a> </h3> <p class="infotype-news-description"> Could datacentre energy procurement do even more to green the grid, accelerating the rise in renewables?<a href="https://www.computerweekly.com/feature/Datacentre-power-purchase-agreements-Are-they-the-right-way-to-lower-emissions"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/How-datacentres-can-turn-the-tide-on-carbon-emissions">How datacentres can turn the tide on carbon emissions</a> </h3> <p class="infotype-news-description"> Operators have revealed troubling increases in their carbon emissions of late, but could these have been prevented?<a href="https://www.computerweekly.com/feature/How-datacentres-can-turn-the-tide-on-carbon-emissions"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/Why-responsible-AI-is-a-business-imperative">Why responsible AI is a business imperative</a> </h3> <p class="infotype-news-description"> Tools are emerging for real-world AI systems that focus more on responsible adoption, deployment and governance, rather than academic and philosophical questions about speculative risks<a href="https://www.computerweekly.com/feature/Why-responsible-AI-is-a-business-imperative"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/Shrinking-the-carbon-footprint-of-datacentres">Shrinking the carbon footprint of datacentres</a> </h3> <p class="infotype-news-description"> The digital economy is increasing demand for datacentres, and in turn pushing up the use of power and cooling. Granular metrics are key to achieving digitisation with a low environmental impact<a href="https://www.computerweekly.com/feature/Shrinking-the-carbon-footprint-of-datacentres"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/How-to-keep-datacentres-cool">How to keep datacentres cool</a> </h3> <p class="infotype-news-description"> We look at how datacentre cooling is developing, and how the right choice can increase capacity and cut costs<a href="https://www.computerweekly.com/feature/How-to-keep-datacentres-cool"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/Driving-IT-sustainability-in-datacentres">Driving IT sustainability in datacentres</a> </h3> <p class="infotype-news-description"> Europe’s datacentre operators need to get their power report cards to comply with the European Commission’s drive to greener EU datacentres<a href="https://www.computerweekly.com/feature/Driving-IT-sustainability-in-datacentres"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/The-CMA-anti-trust-investigation-into-AWS-and-Microsoft-explained-Everything-you-need-to-know">The CMA anti-trust investigation into AWS and Microsoft explained: Everything you need to know</a> </h3> <p class="infotype-news-description"> After regulator Ofcom raised red flags about the anti-competitive behaviour of Amazon Web Services and Microsoft, the UK cloud market was referred to the Competition and Markets Authority – here’s why<a href="https://www.computerweekly.com/feature/The-CMA-anti-trust-investigation-into-AWS-and-Microsoft-explained-Everything-you-need-to-know"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/DC01UK-Everything-you-need-to-know-about-the-UK-government-backed-Hertfordshire-mega-datacentre">DC01UK: Everything you need to know about the UK government-backed Hertfordshire mega-datacentre</a> </h3> <p class="infotype-news-description"> A proposal to build one of the biggest datacentres in Europe has been submitted to Hertsmere Borough Council, and already has the support of the technology secretary and local councillors<a href="https://www.computerweekly.com/feature/DC01UK-Everything-you-need-to-know-about-the-UK-government-backed-Hertfordshire-mega-datacentre"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/AI-From-exploration-to-production-five-case-studies-on-GenAI-in-action">AI: From exploration to production – five case studies on GenAI in action</a> </h3> <p class="infotype-news-description"> Many organisations are testing out uses for generative AI, but how are they getting on? We speak to five early adopters to find out the lessons learned so far<a href="https://www.computerweekly.com/feature/AI-From-exploration-to-production-five-case-studies-on-GenAI-in-action"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/The-flex-to-frontline-hybrid-working">The flex to frontline hybrid working</a> </h3> <p class="infotype-news-description"> Hybrid working is a reality for businesses everywhere. Research shows that just under two-thirds of employers offer frontline workers some form of time-based flexibility, yet many workers in this category feel less valued than desk-based colleagues<a href="https://www.computerweekly.com/feature/The-flex-to-frontline-hybrid-working"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/Misinformation-runs-deeper-than-social-media">Misinformation runs deeper than social media</a> </h3> <p class="infotype-news-description"> While social media may contribute to the increasing rapid spread and reach of misinformation, the root causes of the problem go much deeper than the role of a particular company or way of using technology to communicate<a href="https://www.computerweekly.com/feature/Misinformation-runs-deeper-than-social-media"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/Will-autonomous-weapons-make-humans-passive-participants-in-war">Will autonomous weapons make humans passive participants in war?</a> </h3> <p class="infotype-news-description"> Experts warn the emergence and adoption of AI-powered military systems may eventually push battlefield decision-making beyond the limits of human cognition<a href="https://www.computerweekly.com/feature/Will-autonomous-weapons-make-humans-passive-participants-in-war"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/Automation-driving-SD-WAN-optimisation">Automation driving SD-WAN optimisation</a> </h3> <p class="infotype-news-description"> AIOps is being deployed to help manage highly distributed enterprise networking configurations<a href="https://www.computerweekly.com/feature/Automation-driving-SD-WAN-optimisation"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/Kubernetes-disaster-recovery-Five-key-questions">Kubernetes disaster recovery: Five key questions</a> </h3> <p class="infotype-news-description"> We look at disaster recovery for Kubernetes environments, the key challenges to deployment of K8s DR, the risks we aim to mitigate, how to build a plan and the key infrastructure requirements<a href="https://www.computerweekly.com/feature/Kubernetes-disaster-recovery-Five-key-questions"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/Storage-technology-explained-Vector-databases-at-the-core-of-AI">Storage technology explained: Vector databases at the core of AI</a> </h3> <p class="infotype-news-description"> We look at the use of vector data in AI and how vector databases work, plus vector embedding, the challenges for storage of vector data and the key suppliers of vector database products<a href="https://www.computerweekly.com/feature/Storage-technology-explained-Vector-databases-at-the-core-of-AI"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/CTO-interview-Budgeting-in-nanaoseconds">CTO interview: Budgeting in nanoseconds</a> </h3> <p class="infotype-news-description"> At high-performance financial exchange LMAX Group, applications are allowed just eight nanoseconds of latency – but how does it achieve this?<a href="https://www.computerweekly.com/feature/CTO-interview-Budgeting-in-nanaoseconds"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/AI-in-the-enterprise-How-to-build-an-AI-dataset">AI in the enterprise: How to build an AI dataset</a> </h3> <p class="infotype-news-description"> The successful execution of an enterprise's AI strategy lives or dies on the quality of the data underpinning it, so how can companies ensure they are on the right path when it comes to cracking on with the early stages of this process?<a href="https://www.computerweekly.com/feature/AI-in-the-enterprise-How-to-build-an-AI-dataset"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/SD-WANs-in-a-cloud-native-world">SD-WANs in a cloud-native world</a> </h3> <p class="infotype-news-description"> We look at where software-defined wide area networks fit in a modern, cloud-native IT architecture<a href="https://www.computerweekly.com/feature/SD-WANs-in-a-cloud-native-world"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/Cloud-repatriation-How-to-do-it-successfully">Cloud repatriation: How to do it successfully</a> </h3> <p class="infotype-news-description"> The keys to reverse migration success include workload selection, how to prepare your on-premise infrastructure and future-proofing the decision to come back in-house<a href="https://www.computerweekly.com/feature/Cloud-repatriation-How-to-do-it-successfully"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/ERP-firms-target-carbon-reporting-role">ERP firms target carbon reporting role</a> </h3> <p class="infotype-news-description"> As their customers face regulatory challenges ahead, ERP providers have been busy adding functionality to support reporting their green initiatives<a href="https://www.computerweekly.com/feature/ERP-firms-target-carbon-reporting-role"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/Asia-raises-the-5G-bar-in-the-next-digital-revolution">Asia raises the 5G bar in the next digital revolution</a> </h3> <p class="infotype-news-description"> Half a decade since their introduction, 5G networks are being deployed across the world. Yet Asia is already raising the bar, with 5G now flying – literally in some places – and 5G-Advanced coming into play<a href="https://www.computerweekly.com/feature/Asia-raises-the-5G-bar-in-the-next-digital-revolution"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/The-5G-Advanced-era-is-now-as-Asia-raises-the-5G-bar">The 5G-Advanced era is now as Asia raises the 5G bar</a> </h3> <p class="infotype-news-description"> Continuing our look at 5G-Advanced, we find out what products and services the new network will support and which operators are already planning for a new era in communications<a href="https://www.computerweekly.com/feature/The-5G-Advanced-era-is-now-as-Asia-raises-the-5G-bar"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/Key-value-flash-targets-more-efficient-data-storage">Key-value flash targets more efficient data storage</a> </h3> <p class="infotype-news-description"> We look at key-value storage, which promises much greater I/O efficiency and longer flash drive lifespans, but may be constrained by limited use cases and lukewarm productisation efforts<a href="https://www.computerweekly.com/feature/Key-value-flash-targets-more-efficient-data-storage"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/Police-Digital-Service-staff-arrests-Everything-you-need-to-know">Police Digital Service staff arrests: Everything you need to know</a> </h3> <p class="infotype-news-description"> In July 2024, details emerged that two employees working for the Police Digital Service had been arrested on suspicion of bribery, fraud and misconduct in public office. Here’s everything we know about the story so far<a href="https://www.computerweekly.com/feature/Police-Digital-Service-staff-arrests-Everything-you-need-to-know"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/Storage-technology-explained-Kubernetes-containers-and-persistent-storage">Storage technology explained: Kubernetes, containers and persistent storage</a> </h3> <p class="infotype-news-description"> In this guide, we look at the market-leading container platform Kubernetes, how it works, the challenges with persistent storage and backup, and how they have been overcome<a href="https://www.computerweekly.com/feature/Storage-technology-explained-Kubernetes-containers-and-persistent-storage"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/SD-WAN-The-evolution-continues">SD-WAN: The evolution continues</a> </h3> <p class="infotype-news-description"> We go through the alphabet soup of secure networks, propelled by artificial intelligence and 5G, which have rejuvenated software-defined wide area network technology<a href="https://www.computerweekly.com/feature/SD-WAN-The-evolution-continues"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/Updating-taxation-Can-AI-and-data-analysis-help-with-HMRCs-human-resource-problem">Updating taxation: Can AI and data analysis help with HMRC’s human resources problem?</a> </h3> <p class="infotype-news-description"> HMRC resources are currently thinly spread in the aftermath of Covid and Brexit. Could automating systems using generative AI help HMRC’s digital transformation?<a href="https://www.computerweekly.com/feature/Updating-taxation-Can-AI-and-data-analysis-help-with-HMRCs-human-resource-problem"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/Computer-simulations-show-Swedish-fusion-initiative-could-have-global-impact">Computer simulations show Swedish fusion initiative could have global impact</a> </h3> <p class="infotype-news-description"> The only nuclear fusion initiative in the Nordics, Novatron, believes it has a lot to offer on the global scale<a href="https://www.computerweekly.com/feature/Computer-simulations-show-Swedish-fusion-initiative-could-have-global-impact"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/Keeping-control-of-SaaS-costs">Keeping control of SaaS costs</a> </h3> <p class="infotype-news-description"> The ease with which someone with a corporate credit card can buy a SaaS product can lead to runaway costs and data leakage risks<a href="https://www.computerweekly.com/feature/Keeping-control-of-SaaS-costs"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/AI-interview-Thomas-Dekeyser-researcher-and-film-director">AI interview: Thomas Dekeyser, researcher and film director</a> </h3> <p class="infotype-news-description"> On the politics of ‘techno-refusal’, and the lessons that can be learned from a clandestine group of French IT workers who spent the early 1980s sabotaging technological infrastructure<a href="https://www.computerweekly.com/feature/AI-interview-Thomas-Dekeyser-researcher-and-film-director"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/Forrester-Rethink-your-software-asset-management-practices">Forrester: Rethink your software asset management practices</a> </h3> <p class="infotype-news-description"> Software as a service needs to be managed as part of software asset management. Forrester analysts offer some practical advice on how to succeed<a href="https://www.computerweekly.com/feature/Forrester-Rethink-your-software-asset-management-practices"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/Deep-dive-into-quantum-resistant-cryptography-for-email-security">Deep dive into quantum-resistant cryptography for email security</a> </h3> <p class="infotype-news-description"> Quantum computers have the potential to crack many of the encryption methods we currently rely on to keep our digital communications safe. Quantum-resistant cryptography may be the answer<a href="https://www.computerweekly.com/feature/Deep-dive-into-quantum-resistant-cryptography-for-email-security"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/How-UK-firms-can-get-ready-for-the-implementation-of-NIS2">How UK firms can get ready for the implementation of NIS2</a> </h3> <p class="infotype-news-description"> Many British companies will need to adhere to NIS2’s cyber security risk management and reporting requirements if they want to continue operating in the EU market and avoid huge fines<a href="https://www.computerweekly.com/feature/How-UK-firms-can-get-ready-for-the-implementation-of-NIS2"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/Kubernetes-and-storage-in-the-enterprise-What-the-analysts-say">Kubernetes and storage in the enterprise: What the analysts say</a> </h3> <p class="infotype-news-description"> We talk to analysts about Kubernetes adoption in the enterprise, how mature it is, deployment challenges and key obstacles to enterprises that want to go cloud-native with containers<a href="https://www.computerweekly.com/feature/Kubernetes-and-storage-in-the-enterprise-What-the-analysts-say"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/Kubernetes-at-10-CRDs-at-core-of-extensible-modular-storage-in-K8s">Kubernetes at 10: CRDs at core of extensible, modular storage in K8s</a> </h3> <p class="infotype-news-description"> We talk to VMware engineer Xing Yang, who saw Kubernetes storage evolve from the early days where its modular, extensible origins translated to Operators for storage and backup<a href="https://www.computerweekly.com/feature/Kubernetes-at-10-CRDs-at-core-of-extensible-modular-storage-in-K8s"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/The-shifting-landscape-of-DEI-in-the-tech-industry">The shifting landscape of DEI in the tech industry</a> </h3> <p class="infotype-news-description"> Diversity, equity and inclusion was once a regularly discussed part of the tech industry, but as attitudes shift, what does this look like for the DEI landscape of tech in the near future?<a href="https://www.computerweekly.com/feature/The-shifting-landscape-of-DEI-in-the-tech-industry"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/CXEXBG-with-added-AI-A-winning-formula-for-customer-experience">CX+EX=BG, with added AI: A winning formula for customer experience</a> </h3> <p class="infotype-news-description"> Guaranteeing customer experiences of the highest level possible is one of the cornerstones of the modern business. Is there a magic formula? It could well be a combination of artificial intelligence and pixie dust<a href="https://www.computerweekly.com/feature/CXEXBG-with-added-AI-A-winning-formula-for-customer-experience"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/AI-disempowers-logistics-workers-while-intensifying-their-work">AI disempowers logistics workers while intensifying their work</a> </h3> <p class="infotype-news-description"> Conversations on the algorithmic management of work largely revolve around unproven claims about productivity gains or job losses - less attention is paid to how AI and automation negatively affect low-paid workers<a href="https://www.computerweekly.com/feature/AI-disempowers-logistics-workers-while-intensifying-their-work"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/How-to-optimise-SAM-budget-in-todays-heterogeneous-environments">How to optimise SAM budget in today’s heterogeneous environments</a> </h3> <p class="infotype-news-description"> Hidden software costs and ecosystem complexity make managing a mixed software estate harder than ever. Here’s how to optimise your spending<a href="https://www.computerweekly.com/feature/How-to-optimise-SAM-budget-in-todays-heterogeneous-environments"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/CISO-mentoring-who-to-turn-to-when-the-worst-happens">CISO mentoring – who to turn to when the worst happens</a> </h3> <p class="infotype-news-description"> Those who get the role of a CISO may have overcome some professional hurdles, but are they ready to face what comes as part of the job? And who do they ask for advice? We look at the mentoring dilemma<a href="https://www.computerweekly.com/feature/CISO-mentoring-who-to-turn-to-when-the-worst-happens"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/CrowdStrike-update-chaos-explained-What-you-need-to-know">CrowdStrike update chaos explained: What you need to know</a> </h3> <p class="infotype-news-description"> A botched software update at cyber security firm CrowdStrike has caused IT chaos around the world. Learn more about the global CrowdStrike update outage as it develops<a href="https://www.computerweekly.com/feature/CrowdStrike-update-chaos-explained-What-you-need-to-know"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/Cloud-databases-Base-jumping-for-the-bigger-picture">Cloud databases: Base jumping for the bigger picture</a> </h3> <p class="infotype-news-description"> In the era of cloud-native computing, graph and NoSQL have emerged as two alternatives to the relational database model<a href="https://www.computerweekly.com/feature/Cloud-databases-Base-jumping-for-the-bigger-picture"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/Kubernetes-at-10-The-long-road-to-mastery-of-persistent-storage">Kubernetes at 10: The long road to mastery of persistent storage</a> </h3> <p class="infotype-news-description"> Jan Safranek of Red Hat saw containers emerge as an exciting new way of deploying applications, but it took several additions to make it the mature enterprise platform it is today<a href="https://www.computerweekly.com/feature/Kubernetes-at-10-The-long-road-to-mastery-of-persistent-storage"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/Enhancing-mobile-app-security-with-behaviour-based-biometrics">Enhancing mobile app security with behaviour-based biometrics</a> </h3> <p class="infotype-news-description"> Behavioural-based biometrics offer tantalising advantages over more traditional biometric solutions. Learn about some of the benefits and potential challenges for safe and secure implementation<a href="https://www.computerweekly.com/feature/Enhancing-mobile-app-security-with-behaviour-based-biometrics"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/Hybrid-multicloud-storage-Pros-cons-and-key-workloads">Hybrid multicloud storage: Pros, cons and key workloads</a> </h3> <p class="infotype-news-description"> We look at hybrid multicloud storage, making the best of on-premise and multiple cloud application locations, its key benefits, some pitfalls and the technologies to build it with<a href="https://www.computerweekly.com/feature/Hybrid-multicloud-storage-Pros-cons-and-key-workloads"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/IT-sustainability-Why-were-still-waiting-for-quantified-emissions-reductions">IT sustainability: Why we’re still waiting for quantified emissions reductions</a> </h3> <p class="infotype-news-description"> It is not all down to greenwashing. Genuine challenges stand in the way of many organisations implementing IT in support of their environmental, social and governance goals<a href="https://www.computerweekly.com/feature/IT-sustainability-Why-were-still-waiting-for-quantified-emissions-reductions"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/Engaging-young-people-with-careers-in-STEM-at-the-Goodwood-Festival-of-Speed">Engaging young people with careers in STEM at the Goodwood Festival of Speed</a> </h3> <p class="infotype-news-description"> Backed by astronaut Tim Peake, the Future Lab exhibition at Goodwood’s annual celebration of motoring aimed to engage children with the excitement of technology innovation. Computer Weekly went to take a look<a href="https://www.computerweekly.com/feature/Engaging-young-people-with-careers-in-STEM-at-the-Goodwood-Festival-of-Speed"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/The-skys-the-limit-with-the-two-sides-of-AI-and-networking">The sky’s the limit with the two sides of AI and networking</a> </h3> <p class="infotype-news-description"> Generative AI is a hyped topic in virtually all industries. But within the realms of infrastructure management, there are two aspects to consider: AI for networking, and networking for AI<a href="https://www.computerweekly.com/feature/The-skys-the-limit-with-the-two-sides-of-AI-and-networking"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/Riding-the-cloud-database-wave">Riding the cloud database wave</a> </h3> <p class="infotype-news-description"> There is set to be a surge in demand for cloud databases, driven by new use cases and greater decentralised IT spending<a href="https://www.computerweekly.com/feature/Riding-the-cloud-database-wave"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/Opening-the-gates-of-the-smart-city">Opening the gates of the smart city</a> </h3> <p class="infotype-news-description"> Driven by the growing prevalence of smart tech such as 5G, AI and IoT, cities around the world will be able to become smarter places to live and work. But how can smart tech get to places hitherto unconnected to prevent a digital divide?<a href="https://www.computerweekly.com/feature/Opening-the-gates-of-the-smart-city"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/Interview-Nvidia-on-AI-workload-demands-and-storage-performance">Interview: Nvidia on AI workload demands and storage performance</a> </h3> <p class="infotype-news-description"> We talk to Charlie Boyle of Nvidia about AI impacts on storage I/O, key performance metrics for storage for AI, and storage attributes required across differing AI workloads<a href="https://www.computerweekly.com/feature/Interview-Nvidia-on-AI-workload-demands-and-storage-performance"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/Kubernetes-at-10-From-stateless-also-ran-to-platform-to-build-platforms">Kubernetes at 10: From stateless also-ran to ‘platform to build platforms’</a> </h3> <p class="infotype-news-description"> Sergey Pronin of Percona was all for ‘Kubernetes for stateless’ at a time when it was hard to provision storage and day-two services – then Operators and Stateful Sets came along<a href="https://www.computerweekly.com/feature/Kubernetes-at-10-From-stateless-also-ran-to-platform-to-build-platforms"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/IOWN-explained-Everything-you-need-to-know">IOWN explained: Everything you need to know</a> </h3> <p class="infotype-news-description"> In this essential guide, Computer Weekly investigates the Innovative Optical and Wireless Network project, and why the technology it’s aiming to produce could form the future basis of networking<a href="https://www.computerweekly.com/feature/IOWN-explained-Everything-you-need-to-know"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/Cloud-repatriation-What-it-is-and-when-you-can-benefit">Cloud repatriation: What it is and when you can benefit</a> </h3> <p class="infotype-news-description"> We look at the growing trend of cloud repatriation, why organisations repatriate data, the pros and cons, who can most benefit, and how to decide which data to move<a href="https://www.computerweekly.com/feature/Cloud-repatriation-What-it-is-and-when-you-can-benefit"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/news/366592533/The-human-side-of-the-industrial-metaverse">The human side of the industrial metaverse</a> </h3> <p class="infotype-news-description"> As the metaverse evolves, could workers get lost in the process of implementing advanced simulations, automated operations and increasing connectivity between systems?<a href="https://www.computerweekly.com/news/366592533/The-human-side-of-the-industrial-metaverse"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/Updating-agriculture-Can-data-analysis-save-farming">Updating agriculture: Can data analysis save farming?</a> </h3> <p class="infotype-news-description"> Modern agriculture is experiencing challenges due to increased costs and environmental disruption. Could data analysis help farmers overcome these issues?<a href="https://www.computerweekly.com/feature/Updating-agriculture-Can-data-analysis-save-farming"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/Kubernetes-at-10-When-K8s-won-and-life-now-as-a-surly-teenager">Kubernetes at 10: When K8s ‘won’ and life now as a ‘surly teenager’</a> </h3> <p class="infotype-news-description"> We talk to Datastax’s Patrick McFadin about Kubernetes’ success against competitors and how StatefulSet and operators solved key challenges, but why there are still obstacles to clear<a href="https://www.computerweekly.com/feature/Kubernetes-at-10-When-K8s-won-and-life-now-as-a-surly-teenager"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/Hybrid-cloud-storage-vs-on-prem-What-data-goes-where">Hybrid cloud storage vs on-premise: What data goes where?</a> </h3> <p class="infotype-news-description"> We look at hybrid cloud in storage strategy, key benefits of the cloud vs on-premise storage, key workloads that suit the cloud and how to decide which workloads work best where<a href="https://www.computerweekly.com/feature/Hybrid-cloud-storage-vs-on-prem-What-data-goes-where"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/Deep-dive-How-Pure-Fusion-plans-to-implement-storage-classes">Deep dive: How Pure Fusion plans to implement storage classes</a> </h3> <p class="infotype-news-description"> We spoke to Pure Storage founder John ‘Coz’ Colgrove about how Pure Storage’s Fusion control plane will make its capacity available to applications via pre-defined storage classes<a href="https://www.computerweekly.com/feature/Deep-dive-How-Pure-Fusion-plans-to-implement-storage-classes"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/Rise-of-the-citizen-developer-Gen-AI-and-the-democratisation-of-codeRise-of-the-citizen-developer">Rise of the citizen developer: GenAI and the democratisation of code</a> </h3> <p class="infotype-news-description"> Computer Weekly asks artificial intelligence and data specialists for their take on the large language model-powered rise of so-called ‘citizen developers’<a href="https://www.computerweekly.com/feature/Rise-of-the-citizen-developer-Gen-AI-and-the-democratisation-of-codeRise-of-the-citizen-developer"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/APAC-career-guide-on-software-development">APAC career guide on software development</a> </h3> <p class="infotype-news-description"> In this career guide, we look at what it takes to land a career and thrive in the fast-moving world of software development<a href="https://www.computerweekly.com/feature/APAC-career-guide-on-software-development"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/Women-in-Data-Barilla-chief-of-analytics-on-reaching-the-so-what-moment-with-data-insights">Women in Data: Barilla chief of analytics on reaching the ‘so what?’ moment with data insights</a> </h3> <p class="infotype-news-description"> Barilla’s chief of analytics and insights, Lyndsay Weir, talks about how to get from data to results, and where the industry needs to change<a href="https://www.computerweekly.com/feature/Women-in-Data-Barilla-chief-of-analytics-on-reaching-the-so-what-moment-with-data-insights"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/Trends-in-the-cloud-database-market">Trends in the cloud database market</a> </h3> <p class="infotype-news-description"> We look at how the cloud database market is evolving<a href="https://www.computerweekly.com/feature/Trends-in-the-cloud-database-market"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/The-shift-towards-developing-internal-tech-talent">The shift towards developing internal tech talent</a> </h3> <p class="infotype-news-description"> When it comes to tech roles, companies often have difficulty hiring skilled workers to fill positions, so some are looking internally to develop the talent they need<a href="https://www.computerweekly.com/feature/The-shift-towards-developing-internal-tech-talent"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/Security-in-the-public-cloud-explained-A-guide-for-IT-and-security-admins">Security in the public cloud explained: A guide for IT and security admins</a> </h3> <p class="infotype-news-description"> In this guide, IT security and industry experts share their top recommendations for protecting public cloud deployments<a href="https://www.computerweekly.com/feature/Security-in-the-public-cloud-explained-A-guide-for-IT-and-security-admins"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/Kubernetes-at-10-Building-stateful-app-storage-and-data-protection">Kubernetes at 10: Building stateful app storage and data protection</a> </h3> <p class="infotype-news-description"> Google engineer Michelle Au was involved in Kubernetes storage early, as the container orchestration platform was developed to support data protection operations such as snapshots<a href="https://www.computerweekly.com/feature/Kubernetes-at-10-Building-stateful-app-storage-and-data-protection"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/Pures-storage-as-a-service-We-can-offer-what-others-cant">Pure’s storage as a service: We can offer what others can’t</a> </h3> <p class="infotype-news-description"> All-flash storage vendor Pure makes bold claims about subscription pricing for storage, stating that the competition can’t offer what it can because its arrays are built for non-disruptive upgrades<a href="https://www.computerweekly.com/feature/Pures-storage-as-a-service-We-can-offer-what-others-cant"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/The-pros-cons-and-misconceptions-of-dynamic-pricing-for-retailers">The pros, cons and misconceptions of dynamic pricing for retailers</a> </h3> <p class="infotype-news-description"> The terms dynamic pricing and surge pricing are often conflated, leaving retailers battling against misconceptions and angry consumers as they use technology to implement price flexibility across their stores<a href="https://www.computerweekly.com/feature/The-pros-cons-and-misconceptions-of-dynamic-pricing-for-retailers"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/IOWN-Shining-light-on-the-future-of-communications">IOWN: Shining light on the future of communications</a> </h3> <p class="infotype-news-description"> With rising demand for data and energy consumption due to the vast compute power required by applications such as AI and large language models, something needs to change in networks – this could be IOWN<a href="https://www.computerweekly.com/feature/IOWN-Shining-light-on-the-future-of-communications"> Continue Reading</a> </p> </li> <li class="infotype-news-item"> <h3 class="infotype-news-title"> <a href="https://www.computerweekly.com/feature/IOWN-putting-vision-into-reality">IOWN: Putting vision into reality</a> </h3> <p class="infotype-news-description"> Continuing our look at the work of the Innovative Optical and Wireless Network project, we find out what use cases the infrastructure will support and look at the application of IOWN technologies<a href="https://www.computerweekly.com/feature/IOWN-putting-vision-into-reality"> Continue Reading</a> </p> </li> </ul> </section> <div class="pagination paginationTypePageList"> <div class="paginationNavigation"> <ul class="listTypePagination"> <li><a href="https://www.computerweekly.com/indepth" class="currentPage">1</a></li> <li><a href="https://www.computerweekly.com/indepth/page/2" class="">2</a></li> <li><a href="https://www.computerweekly.com/indepth/page/3" class="">3</a></li> <li><a href="https://www.computerweekly.com/indepth/page/4" class="">4</a></li> <li><a href="https://www.computerweekly.com/indepth/page/5" class="">5</a></li> <li><a href="https://www.computerweekly.com/indepth/page/6" class="">6</a></li> <li><a href="https://www.computerweekly.com/indepth/page/7" class="">7</a></li> <li><a href="https://www.computerweekly.com/indepth/page/8" class="">8</a></li> <li><a href="https://www.computerweekly.com/indepth/page/9" class="">9</a></li> <li><a href="https://www.computerweekly.com/indepth/page/10" class="">10</a></li> <li><a href="https://www.computerweekly.com/indepth/page/11" class="">11</a></li> <li><a href="https://www.computerweekly.com/indepth/page/12" class="">12</a></li> <li><a href="https://www.computerweekly.com/indepth/page/13" class="">13</a></li> <li><a href="https://www.computerweekly.com/indepth/page/14" class="">14</a></li> <li><a href="https://www.computerweekly.com/indepth/page/15" class="">15</a></li> <li><a href="https://www.computerweekly.com/indepth/page/16" class="">16</a></li> <li><a href="https://www.computerweekly.com/indepth/page/17" class="">17</a></li> <li><a href="https://www.computerweekly.com/indepth/page/18" class="">18</a></li> <li><a href="https://www.computerweekly.com/indepth/page/19" class="">19</a></li> <li><a href="https://www.computerweekly.com/indepth/page/20" class="">20</a></li> <li><a href="https://www.computerweekly.com/indepth/page/21" class="">21</a></li> <li><a href="https://www.computerweekly.com/indepth/page/22" class="">22</a></li> <li><a href="https://www.computerweekly.com/indepth/page/23" class="">23</a></li> <li><span class="pageNext"><a href="https://www.computerweekly.com/indepth/page/2"></a></span></li> </ul> </div> </div> </div> <div id="content-right" class="content-right"> </div> </article> </div> <!-- GoogleAdSenseController, generated at 15:07:49 Mon Dec 2, 2024, by cds1 --> <!-- NetworkCoverageController, generated at 15:07:49 Mon Dec 2, 2024, by cds1 --> <section class="latest-wrapper" id="network-coverage"> <nav class="latest-nav-wrapper" aria-label="Latest Resources"> <span class="latest-heading">Latest TechTarget <span class="latest-title">resources</span></span> <ul class="latest-nav"> <li> <a href="#" class="latest-nav-item selected" data-item="1"> CIO<i class="icon mobile-icon" data-icon="5"></i> <i class="icon desktop-icon" data-icon="A"></i> </a> </li> <li> <a href="#" class="latest-nav-item" data-item="2"> Security<i class="icon mobile-icon" data-icon="5"></i> <i class="icon desktop-icon" data-icon="A"></i> </a> </li> <li> <a href="#" class="latest-nav-item" data-item="3"> Networking<i class="icon mobile-icon" data-icon="5"></i> <i class="icon desktop-icon" data-icon="A"></i> </a> </li> <li> <a href="#" class="latest-nav-item" data-item="4"> Data Center<i class="icon mobile-icon" data-icon="5"></i> <i class="icon desktop-icon" data-icon="A"></i> </a> </li> <li> <a href="#" class="latest-nav-item" data-item="5"> Data Management<i class="icon mobile-icon" data-icon="5"></i> <i class="icon desktop-icon" data-icon="A"></i> </a> </li> </ul> </nav> <span class="latest-nav-mask before-mask"></span> <span class="latest-nav-mask after-mask"></span> <div class="latest-body"> <div class="latest-content" data-item="1"> <span class="searchcio"> <a href="https://www.techtarget.com/searchcio/"> <span class="logo-1">Search </span><span class="logo-2">CIO</span></a> </span> <ul> <li> <i class="icon" data-icon="2"></i> <span><a href="https://www.techtarget.com/searchcio/feature/Quantum-computing-technology-pushes-for-IT-advantage">Quantum computing technology pushes for IT advantage</a></span> <p>Tech and funding issues remain. But work on error handling, an expanding software stack and the growth of quantum ecosystems are ...</p> </li> <li> <i class="icon" data-icon="2"></i> <span><a href="https://www.techtarget.com/searchcio/news/366580080/CHIPS-and-Science-Act-funds-TSMC-Intel-projects">CHIPS and Science Act funds TSMC, Intel projects</a></span> <p>President Joe Biden finalized CHIPS and Science Act funding for TSMC and Intel, although at a lesser amount for Intel than its ...</p> </li> <li class="hide-for-small"> <i class="icon" data-icon="2"></i> <span><a href="https://www.techtarget.com/searchcio/feature/How-to-create-an-IT-succession-plan-for-key-tech-roles">How to create an IT succession plan for key tech roles</a></span> <p>IT departments should view succession planning as an ongoing component of their strategy rather than an afterthought. Our free ...</p> </li> </ul> </div> <div class="latest-content" data-item="2"> <span class="searchsecurity"> <a href="https://www.techtarget.com/searchsecurity/"> <span class="logo-1">Search </span><span class="logo-2">Security</span></a> </span> <ul> <li> <i class="icon" data-icon="2"></i> <span><a href="https://www.techtarget.com/searchsecurity/news/366616525/AWS-launches-automated-service-for-incident-response">AWS launches automated service for incident response</a></span> <p>AWS Security Incident Response, which launched ahead of the re:Invent 2024 conference this week, can automatically triage and ...</p> </li> <li> <i class="icon" data-icon="2"></i> <span><a href="https://www.techtarget.com/searchsecurity/tip/How-to-build-an-effective-third-party-risk-assessment-framework">How to build an effective third-party risk assessment framework</a></span> <p>Don't overlook the threats associated with connecting vendors and partners to internal systems. Do your due diligence and use ...</p> </li> <li class="hide-for-small"> <i class="icon" data-icon="2"></i> <span><a href="https://www.techtarget.com/searchsecurity/tip/How-AI-is-reshaping-threat-intelligence">How AI is reshaping threat intelligence</a></span> <p>As promising as AI technology is for threat intelligence, organizations grapple with a long learning curve and other challenges ...</p> </li> </ul> </div> <div class="latest-content" data-item="3"> <span class="searchnetworking"> <a href="https://www.techtarget.com/searchnetworking/"> <span class="logo-1">Search </span><span class="logo-2">Networking</span></a> </span> <ul> <li> <i class="icon" data-icon="2"></i> <span><a href="https://www.techtarget.com/searchnetworking/feature/12-common-network-protocols-and-their-functions-explained">14 common network protocols and their functions explained</a></span> <p>Networking makes the internet work, but neither can succeed without protocols. Common network protocols and their functions are ...</p> </li> <li> <i class="icon" data-icon="2"></i> <span><a href="https://www.techtarget.com/searchnetworking/tip/5-principles-of-the-network-change-management-process">5 principles of change management in networking</a></span> <p>Network change management includes five principles, including risk analysis and peer review. These best practices can help ...</p> </li> <li class="hide-for-small"> <i class="icon" data-icon="2"></i> <span><a href="https://www.techtarget.com/searchnetworking/tip/A-guide-to-Li-Fi-technology">A guide to Li-Fi technology</a></span> <p>Li-Fi is an emerging wireless technology that uses visible light to transmit data instead of radio frequencies. Though still ...</p> </li> </ul> </div> <div class="latest-content" data-item="4"> <span class="searchdatacenter"> <a href="https://www.techtarget.com/searchdatacenter/"> <span class="logo-1">Search </span><span class="logo-2">Data </span><span class="logo-3">Center</span></a> </span> <ul> <li> <i class="icon" data-icon="2"></i> <span><a href="https://www.techtarget.com/searchdatacenter/feature/How-the-rise-in-AI-impacts-data-centers-and-the-environment">How the rise in AI impacts data centers and the environment</a></span> <p>AI's impact on data centers raises environmental concerns as rising energy demands from technologies such as ChatGPT strain ...</p> </li> <li> <i class="icon" data-icon="2"></i> <span><a href="https://www.techtarget.com/searchdatacenter/news/366616300/HPC-supercomputing-share-stage-with-enterprise-AI-at-SC24">HPC, supercomputing share stage with enterprise AI at SC24</a></span> <p>AI's effects on supercomputing helped shift the focus toward enterprise demands at SC24, as vendors -- including Dell and HPE -- ...</p> </li> <li class="hide-for-small"> <i class="icon" data-icon="2"></i> <span><a href="https://www.techtarget.com/searchdatacenter/news/366615895/Object-storage-VM-offerings-emerge-for-HPE-GreenLake">Object storage, VM offerings emerge for HPE GreenLake</a></span> <p>HPE aims to attract new customers to its GreenLake ecosystem by launching standalone virtualization software. It also eyes AI ...</p> </li> </ul> </div> <div class="latest-content" data-item="5"> <span class="searchdatamanagement"> <a href="https://www.techtarget.com/searchdatamanagement/"> <span class="logo-1">Search </span><span class="logo-2">Data </span><span class="logo-3">Management</span></a> </span> <ul> <li> <i class="icon" data-icon="2"></i> <span><a href="https://www.techtarget.com/searchdatamanagement/news/366616579/Couchbase-unveils-suite-of-services-for-developing-AI">Couchbase unveils suite of services for developing AI</a></span> <p>The new services include access to LLMs and unstructured data transformation aimed at enabling customers to build AI tools.</p> </li> <li> <i class="icon" data-icon="2"></i> <span><a href="https://www.techtarget.com/searchdatamanagement/news/366616247/How-to-get-data-ready-for-AI-development">How to get data ready for AI development</a></span> <p>Factors including a combination of commitment to data quality, proper technology and pertinent processes are key to preparing ...</p> </li> <li class="hide-for-small"> <i class="icon" data-icon="2"></i> <span><a href="https://www.techtarget.com/searchdatamanagement/news/366616397/Snowflake-fuels-edtech-vendors-data-and-AI-initiatives">Snowflake fuels edtech vendor's data and AI initiatives</a></span> <p>PowerSchool is creating personalized educational experiences for teachers, students, parents, administrators and others by using ...</p> </li> </ul> </div> </div> </section> <!-- FooterLinksController, generated at 15:07:49 Mon Dec 2, 2024, by cds1 --> <footer id="page-footer"> <div class="content-left"> <!-- Plug in TechTarget Logo inside the anchor tag here. --> <div class="column column-logo"> </div> </div> <div class="content-center"> <ul class="column"> <li class="footer-item footer-item-col-1 footer-item-row-1"><a href="https://www.computerweekly.com/about">About Us</a></li> <li class="footer-item footer-item-col-1 footer-item-row-2"><a href="https://www.computerweekly.com/about/Computer-Weekly-Editorial-Policies-and-Code-of-Conduct">Editorial Ethics Policy</a></li> <li class="footer-item footer-item-col-1 footer-item-row-3"><a href="https://www.computerweekly.com/about/editors">Meet The Editors</a></li> <li class="footer-item footer-item-col-1 footer-item-row-4"><a href="https://www.computerweekly.com/about/contact">Contact Us</a></li> <li class="footer-item footer-item-col-1 footer-item-row-5"><a href="https://www.techtarget.com/html/cookie_policy.html">Our Use of Cookies</a></li> <li class="footer-item footer-item-col-1 footer-item-row-6"><a href="https://www.computerweekly.com/about/advertising/">Advertisers</a></li> <li class="footer-item footer-item-col-1 footer-item-row-7"><a href="https://www.computerweekly.com/about/partners">Business Partners</a></li> <li class="footer-item footer-item-col-1 footer-item-row-8"><a href="https://media.bitpipe.com/io_10x/io_102267/item_1107555/TTGT-ComputerWeekly_Media-Kit_final.pdf">Media Kit</a></li> </ul> <ul class="column"> <li class="footer-item footer-item-col-2 footer-item-row-1"><a href="https://www.techtarget.com">Corporate Site</a></li> <li class="footer-item footer-item-col-2 footer-item-row-2"><a href="https://www.computerweekly.com/contributors">Contributors</a></li> <li class="footer-item footer-item-col-2 footer-item-row-3"><a href="https://licensing.ygsgroup.com/ygspublishersolutions/">Reprints</a></li> <li class="footer-item footer-item-col-2 footer-item-row-4"><a href="https://www.computerweekly.com/answers">Answers</a></li> <li class="footer-item footer-item-col-2 footer-item-row-5"><a href="https://www.computerweekly.com/eproducts">E-Products</a></li> <li class="footer-item footer-item-col-2 footer-item-row-6"><a href="https://www.computerweekly.com/events">Events</a></li> <li class="footer-item footer-item-col-2 footer-item-row-7"><a href="https://www.computerweekly.com/indepth">In Depth</a></li> <li class="footer-item footer-item-col-2 footer-item-row-8"><a href="https://www.computerweekly.com/guides">Guides</a></li> </ul> <ul class="column column-mobile-hidden"> <li class="footer-item footer-item-col-3 footer-item-row-1"><a href="https://www.computerweekly.com/opinions">Opinions</a></li> <li class="footer-item footer-item-col-3 footer-item-row-2"><a href="https://www.computerweekly.com/quizzes">Quizzes</a></li> <li class="footer-item footer-item-col-3 footer-item-row-3"><a href="https://www.computerweekly.com/photostories">Photo Stories</a></li> <li class="footer-item footer-item-col-3 footer-item-row-4"><a href="https://www.computerweekly.com/tips">Tips</a></li> <li class="footer-item footer-item-col-3 footer-item-row-5"><a href="https://www.computerweekly.com/tutorials">Tutorials</a></li> <li class="footer-item footer-item-col-3 footer-item-row-6"><a href="https://www.computerweekly.com/videos">Videos</a></li> <li class="footer-item footer-item-col-3 footer-item-row-7"><a href="https://www.computerweekly.com/resources">Computer Weekly Topics</a></li> </ul> </div> <div class="content-right"> <div class="column column-legal"> <p class="footer-legal">All Rights Reserved, <span> <a href="https://www.computerweekly.com/about/copyright">Copyright 2000 - 2024</a>, TechTarget</span><br /> <br /> <span> <a href="https://www.techtarget.com/privacy-policy/" target="_blank">Privacy Policy</a> </span> <br /> <span id="cPref" > <a href="#" onclick="window._sp_.gdpr.loadPrivacyManagerModal(1048617,'purposes')">Cookie Preferences </a> <br /> </span> <span id="cPrefCCPA" style="display:none"> <a href="#" onclick="window._sp_.usnat.loadPrivacyManagerModal('1048406')">Cookie Preferences </a> <br /> </span> <span> <a href="https://techtarget.zendesk.com/hc/en-us/requests/new?ticket_form_id=360004852434">Do Not Sell or Share My Personal Information</a></span> </p> </div> </div> </footer><script src="https://www.computerweekly.com/rms/ux/responsive/js/responsive-ui.min.js?v=9.50"></script><!-- Begin Chartbeat --> <script> var _sf_async_config={}; _sf_async_config.uid = 41935; _sf_async_config.domain = 'techtargetnetwork.com'; _sf_async_config.sections = 'CW, CW - NO TOPIC'; _sf_async_config.authors = 'NO AUTHOR, INDEPTHLISTING, CW - INDEPTHLISTING'; _sf_async_config.useCanonical = true; </script><!-- End Chartbeat --> </div> <div id="mobile-sidebars" class="mobile-sidebars"> </div> <div id="image-overlay" class="image-overlay"> <div class="image-overlay-img"></div> <div class="image-overlay-close">Close</div> </div> <!-- Component Load Times ==================== DefaultPageController=41 ms RecentEProductsController=9 ms Total time=50 ms Request Serving Server: cds1 --> </body> </html>