Latest News
-
Police accessed phone records of ‘trouble-making journalists’
The Police Service of Northern Ireland ran a rolling programme to monitor phone records of journalists to identify the source of police leaks, it was claimed today
-
Microsoft accused of anti-competitive behaviour in cloud again
A Spanish trade association has filed a complaint with the country's competition watchdog over accusations Microsoft’s ‘anti-competitive’ behaviour is harmful to startups
-
Cyber attack ruled out as source of UK Border Force outage
An IT outage that caused automated passport control e-gates to crash across the UK has been resolved, with a cyber attack ruled out as the cause
-
Huawei launches exabyte-scale OceanStor A800 at AI workloads
Chinese storage array maker announces high-performance NAS that can build out to clusters in excess of 1 exabyte, plus NVMe flash drives of 128TB coming to market next year
-
European court raises legal questions on EncroChat hack
A ruling by the European Court of Justice could prompt legal challenges in EncroChat prosecutions in Germany and other EU states
-
Chinese APT suspected of Ministry of Defence hack
A cyber attack on the Ministry of Defence is suspected to be the work of threat actors working on behalf of Chinese intelligence
In Depth
-
What does the Data Protection and Digital Information Bill mean for UK industry?
The Data Protection and Digital Information Bill is the first shift in the UK’s data protection regime since leaving the EU, but what could it mean for UK industry?
-
Polar Bear Pitching: Hot mobile apps come in from the cold
Flexing its current technological muscle, the city of Oulu in Finland shows that in addition to being a hub of 5G and 6G development, it is also a hot house for mobile apps, even from a hole in the ice
-
Post Office Horizon scandal explained: Everything you need to know
Computer Weekly has investigated the Post Office Horizon scandal since 2008 and is, in fact, part of the story. This guide contains essential information about the scandal
-
E-Zine | May 2024
Casting a critical eye on HMRC’s IR35 checker tool
Download -
E-Zine | April 2024
What’s it like being the IT chief at Man Utd?
Download -
E-Zine | April 2024
CW EMEA: The blueprint for safe GenAI
Download -
E-Zine | April 2024
How data keeps Britain’s trains on track
Download -
E-Zine | April 2024
VMware users hit by licence hikes after Broadcom takeover
Download
Blogs
-
Application connectivity for the hybrid cloud: Red Hat Connectivity Link- Open Source Insider
Red Hat used its annual conference Red Hat Summit 2024 to introduce the developer preview of Red Hat Connectivity Link, a hybrid multi cloud application connectivity technology that is said to ... Continue Reading
-
The Untapped Potential of Liquid Cooling in Modern Data Centres- Write side up - by Freeform Dynamics
Ever since IBM sold off its x86 business to Lenovo back in 2014, I've been closely watching how the company has transitioned from arguably a commodity player to one that often innovates in ... Continue Reading
-
Mamma mia, Red Hat now in tune with AI Sweden- Open Source Insider
At the risk of starting with an Alan Patridge quote. “The Swedish don’t have a bad life when you think about it,” said Partridge. “They get up in the morning, have a bowl of suede, hop into the ... Continue Reading
-
Red Hat OpenShift AI expands predictive & generative AI - Open Source Insider
If there are three z-heavy terms that describe the current shape of functional cloud computing deployments then they might be compartmentalisation, individualisation and customisation in the face ... Continue Reading
Opinion
-
Disabled people at risk from plans to surveil bank accounts
The government is sleepwalking into another scandal as it pushes plans for ‘bank scanning’ algorithms to monitor bank accounts of disabled people
-
Gen AI: what we know, don’t know, what excites us, what scares us
GenAI is probably the most exciting technology development since the creation of the internet but its essential businesses put in the right controls
-
Embrace alternative education pathways for cyber success
Shifting focus toward passion, adaptability, and a willingness to learn can revolutionise talent acquisition, fostering a more diverse and effective cyber security force.
Videos
-
Diversity in tech 2023: Bev White, Nash Squared
-
Suki Fuller, most influential woman in UK tech 2023, winner’s speech
-
Diversity in tech 2022: Explaining employee resource groups
-
Diversity in tech 2022: Mehdi Mobayen-Rahni, Tyl by NatWest
-
Diversity in tech 2022: Kerensa Jennings, BT
-
Diversity in tech 2022: Joel Gujral, Myndup
Search thousands of tech definitions
- Druva
- Digital Personal Data Protection Act, 2023
- risk-based patch management (RBPM)
- logical unit number (LUN)