IT management
-
Feature
20 Dec 2024
A simple guide to greenhouse gases: Main types and sources
If you're confused about what greenhouse gases are and why they matter, you're not alone. Learn about carbon, methane and others, and what they have to do with climate change. Continue Reading
By- Diann Daniel, Executive Editor
- Jacob Roundy
-
News
20 Dec 2024
Post Office creates CTO role to support ‘extensive and complex’ plans
Post Office bolsters its IT leadership team as it grapples with massive tech transformation with the nation looking on Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
02 Sep 2022
HMRC to review how IR35 works in practice following PAC criticism
Several months have passed since the Public Accounts Committee issued its damning report on the fallout from the introduction of the IR35 reforms in the public sector, and HMRC has shared its feedback on its contents Continue Reading
By- Caroline Donnelly, Datacentre Editor
-
Opinion
02 Sep 2022
Security Think Tank: Shift left, shift right. What about shift everywhere?
The concepts of shift left and shift right are highly effective in securing the development process, but for those who want to take things that step further there is shift everywhere Continue Reading
By- Paul Holland, Information Security Forum
-
News
01 Sep 2022
Police interview Horizon scandal victim in investigation into potential perjury by Fujitsu staff
The Met Police have interviewed a former subpostmaster as part of an investigation into potential perjury by former Fujitsu staff Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
01 Sep 2022
Vote now: Who should be the 2022 Most Influential Woman in UK Tech?
Each year, we ask our audience who should be named the most influential woman in UK technology. Tell us what you think - the deadline for voting is 21 September... Continue Reading
By- Clare McDonald, Business Editor
-
News
01 Sep 2022
Space nerds beware: James Webb images used to spread malware
Astronomy and space aficionados are being targeted by cyber criminals exploiting some of the now-famous images captured by Nasa’s James Webb Space Telescope to distribute malware Continue Reading
By- Alex Scroxton, Security Editor
-
News
01 Sep 2022
Local authorities experience 10,000 attempted cyber attacks every day
Local authorities across the UK face a daily deluge of cyber incidents, with phishing and DDoS attacks the most prevalent, according to an insurance broker Continue Reading
By- Alex Scroxton, Security Editor
-
News
01 Sep 2022
Swedish Electronics Protection Act coincides with major cyber spend
Swedish cyber security law comes at a time of heavy government investment Continue Reading
By- Gerard O'Dwyer
-
News
01 Sep 2022
New (ISC)² cyber careers schemes go live
(ISC)² has opened up two new global cyber careers schemes to applicants to try to help organisations fill 2.7 million vacant roles worldwide Continue Reading
By- Alex Scroxton, Security Editor
-
News
01 Sep 2022
Arm sues Qualcomm over Nuvia tie-up
Qualcomm hopes to integrate Nuvia’s technology into its system-on-a-chip products based on Arm cores – but Arm says this infringes its IP Continue Reading
By- Cliff Saran, Managing Editor
-
Opinion
01 Sep 2022
Security Think Tank: Effective DevSecOps requires collaboration
Application security and effective DevSecOps can only be achieved through collaboration with the business – the ultimate goal is to make it safer to do business, which requires considering integrated risk management and identity and access management alongside cyber security and application security Continue Reading
By- Andrew Morris, Turnkey Consulting
-
Definition
01 Sep 2022
permittivity of free space
The permittivity of free space is a physical constant that reflects the ability of electrical fields to pass through a classical vacuum. Continue Reading
-
News
31 Aug 2022
Singapore to expand 5G coverage to seaport
The maritime hub will be testing the use of 5G in a range of maritime operations, including remote pilotage of vessels and drone delivery of components to ships Continue Reading
By- Aaron Tan, TechTarget
-
Definition
31 Aug 2022
apparent power
Apparent power is a measure of alternating current (AC) power that is computed by multiplying the root-mean-square (rms) current by the root-mean-square voltage. Continue Reading
By -
News
31 Aug 2022
Google debuts open source bug bounty programme
Google is calling on hackers to take pot-shots at its open source projects for the first time through a new vulnerability research programme Continue Reading
By- Alex Scroxton, Security Editor
-
News
31 Aug 2022
Norway has NOK200m plan to bolster cyber defences
Norway is investing heavily in its cyber defences amid heightened threat from Russia Continue Reading
By- Gerard O'Dwyer
-
News
31 Aug 2022
NHS staff fall further behind amid ransomware attack
While some NHS bodies are now recovering their services after the ransomware attack on a crucial software supplier, others are still being forced to rely on pen and paper, and some will be waiting months to recover Continue Reading
By- Alex Scroxton, Security Editor
-
News
31 Aug 2022
Four years into GDPR, Norway hopes for safer data transfer to US
Much of the data on the internet ends up on US servers at some point, and that is not always compatible with the General Data Protection Regulation, says Norwegian data protection authority Continue Reading
By- Pat Brans, Pat Brans Associates/Grenoble Ecole de Management
-
News
31 Aug 2022
Quantum computing: Industrial opportunities
Mainstream quantum computing may be years away, but some companies are finding ways to pilot the technology now, to see if it can deliver tangible business benefits Continue Reading
By- Cliff Saran, Managing Editor
-
News
31 Aug 2022
VMware CEO: Broadcom acquisition is on track
Raghu Raghuram claims VMware customers are getting more comfortable with the Broadcom acquisition while employees are ‘more or less focused’ on the job at hand Continue Reading
By- Aaron Tan, TechTarget
-
News
31 Aug 2022
HPE supply chain issues drive up server prices
HPE’s latest quarterly results show the company is trying to combat its order backlog by encouraging customers to buy next-gen servers Continue Reading
By- Cliff Saran, Managing Editor
-
News
30 Aug 2022
IAM house Okta confirms 0ktapus/Scatter Swine attack
Following last week’s disclosureby Group-IB researchers of a major phishing campaign, Okta has warned its customers to be on their guard Continue Reading
By- Alex Scroxton, Security Editor
-
News
30 Aug 2022
UK government presses on with new cyber rules for telcos
Government has finalised new security rules for telecoms companies and will move to make them binding in the near future Continue Reading
By- Alex Scroxton, Security Editor
-
News
30 Aug 2022
Growing importance of the data strategist in South Holland
Much has been written about the work of data scientists, but the lesser-known role of data strategist is just as essential – as is being demonstrated in the Netherlands Continue Reading
By- Pat Brans, Pat Brans Associates/Grenoble Ecole de Management
-
News
30 Aug 2022
LastPass breach limited in scale and well-managed, say experts
A breach of LastPass’s developer environment does not seem to have affected users of the password management service, but it may still be time for a credential reset Continue Reading
By- Alex Scroxton, Security Editor
-
News
30 Aug 2022
NetApp storage goes GA for VMware Cloud on AWS
Move will bring up to 50% decrease in TCO for customers running VMware apps in the Amazon cloud, says NetApp. No date yet for extension of the service across other public clouds Continue Reading
By- Antony Adshead, Storage Editor
-
News
30 Aug 2022
Confronting the unique challenges of hiring IT professionals in Saudi Arabia
As Saudi Arabia undergoes an economic transformation, new mandates are being implemented to help Saudi nationals keep up with global talent requirements Continue Reading
By- Pat Brans, Pat Brans Associates/Grenoble Ecole de Management
-
News
30 Aug 2022
One Login digital identity project makes headway
Government services are lining up to work with the GDS on its One Login digital identity system, according to its director of digital identity, Natalie Jones Continue Reading
By -
News
30 Aug 2022
McKinsey advisory council highlights huge impact of tech on business
Advanced AI and new communications promise to revolutionise business, and IP ownership and code quality may hold back adoption of low-code tools Continue Reading
By- Cliff Saran, Managing Editor
-
News
29 Aug 2022
Thinxtra teams up with Hong Kong’s LBS on smart hygiene
Australia’s Thinxtra will supply its battery-powered IoT devices to monitor hygiene and environmental conditions in residential and commercial venues in Hong Kong Continue Reading
By- Aaron Tan, TechTarget
-
Definition
29 Aug 2022
corporate governance
Corporate governance is the combination of rules, processes and laws by which businesses are operated, regulated and controlled. Continue Reading
By- Ben Lutkevich, Site Editor
- Sarah Lewis
-
Definition
25 Aug 2022
transactional leadership
Transactional leadership, also known as managerial leadership, is a leadership style where leaders rely on rewards and punishments to achieve optimal job performance from their subordinates. Continue Reading
By- Ben Lutkevich, Site Editor
- Mary K. Pratt
-
Feature
25 Aug 2022
ESG for IT: How CIOs can drive environmental sustainability
Sustainability as a business initiative has rocketed up the priority list as investors, consumers and legislators demand accountability from businesses. Here's how IT can help. Continue Reading
By- Diann Daniel, Executive Editor
-
News
25 Aug 2022
CIOs: Geopolitics impacts your IT strategy
Research from analyst Gartner illustrates how geopolitics is influencing IT strategies Continue Reading
By- Cliff Saran, Managing Editor
-
News
25 Aug 2022
Criminal 0ktapus spoofed IAM firm in massive phishing attack
Researchers at Group-IB have published research on a major phishing campaign that ensnared victims at the likes of Cloudflare and Twilio Continue Reading
By- Alex Scroxton, Security Editor
-
Podcast
25 Aug 2022
James Hatch, BAE Systems: Computer Weekly Downtime Upload podcast
We speak to the chief digital officer at BAE Systems’ Digital Intelligence business about the challenges of “digital” in high-trust organisations Continue Reading
By- Cliff Saran, Managing Editor
-
News
25 Aug 2022
Adaptive RedAlert, Monster ransomwares go cross-platform
Kaspersky researchers have shared new intelligence on two emergent cyber criminal groups that have adapted their ransomwares to target different operating systems at the same time Continue Reading
By- Alex Scroxton, Security Editor
-
News
25 Aug 2022
Dell’s deep learning model to support coral reef conservation
Dell Technologies has developed a deep learning model to speed up labelling and analysis of images of Australia’s Great Barrier Reef in move to support coral reef conservation Continue Reading
By- Aaron Tan, TechTarget
-
E-Zine
25 Aug 2022
CW Nordics: Norway struggles to keep up with demand for tech specialists
The growing importance of IT in all industries, along with a shortage in skills, make for an excellent high-tech job market for candidates in Norway. Read how recruiters are struggling to keep up with demand. Also read how the Danish government encourages research in strategic fields to attract tech companies. Continue Reading
-
News
25 Aug 2022
Millions of Plex users may be at risk in password breach
Up to half of Plex’s 30 million users may have had their personal data stolen by an unknown threat actor Continue Reading
By- Alex Scroxton, Security Editor
-
Blog Post
25 Aug 2022
Network sustainability: an unspoken source of carbon emissions
In this guest post, Alissa Starzak, global head of public policy at web application security firm Cloudflare, sets out what can be done to green-up the information superhighway. As the internet ... Continue Reading
-
News
25 Aug 2022
Security pros fret about stress and promotion over cyber attacks
CIISec’s annual report on the state of the security profession reveals some home truths for security leaders Continue Reading
By- Alex Scroxton, Security Editor
-
News
25 Aug 2022
LockBit 3.0 cements dominance of ransomware ecosystem
Ransomware attacks were up 47% in July compared with the previous month, according to the latest threat data from NCC Group, with the LockBit family largely to blame Continue Reading
By- Alex Scroxton, Security Editor
-
News
24 Aug 2022
Most CISOs think they’ve been attacked by a nation state
Most organisations have made changes to their cyber strategies and policies following Russia’s invasion, and almost two-thirds suspect they have been directly targeted or impacted by a nation-state cyber attack Continue Reading
By- Alex Scroxton, Security Editor
-
News
24 Aug 2022
Alleged Twitter security failings spell trouble ahead
Twitter’s former security head, Peiter Zatko, has alleged a number of serious cyber failures at the social media platform, raising the spectre of investigations and sanctions Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
24 Aug 2022
Cloud storage TCO: Key pitfalls and how to avoid them
Cloud’s flexibility is part of the attraction, but it can also lead to costs that spiral. We look at key elements in cloud TCO and how to intelligently make use of the cloud Continue Reading
-
Feature
24 Aug 2022
When network performance is the name of the Games
Major sporting events are now major IT and networking events. For Aruba, being in charge of networking for the Birmingham 2022 Commonwealth Games meant 20 simultaneous major projects - how did it go? Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
24 Aug 2022
Most Influential Women in UK Tech 2022: Entrants to the Hall of Fame
Each year, Computer Weekly announces the women who will be added to its Hall of Fame, a list of women recognised for their lifetime achievements in the technology sector Continue Reading
By- Clare McDonald, Business Editor
-
News
24 Aug 2022
Alibaba Cloud unveils RISC-V chip development platform
The Wujian 600 chip development platform will help developers build systems-on-chip to support edge applications such as home robots, medical imaging and video conferencing Continue Reading
By- Aaron Tan, TechTarget
-
Definition
23 Aug 2022
critical path method (CPM)
The critical path method (CPM) is a step-by-step project management technique for process planning that defines critical and non-critical tasks with the goal of preventing project schedule problems and process bottlenecks. Continue Reading
By -
News
23 Aug 2022
Altice gets regulatory green light for added stake in BT
Despite previous worries by UK government of potential threat to levelling-up agenda on broadband, corporate regulatory probe finds no issue with increase in stakeholding by long-rumoured potential buyer of UK incumbent telco Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
23 Aug 2022
DevSecOps: Software developers lack sufficient security focus
GitLab survey shows developers want to produce high-quality code, but ‘shifting’ security left is hard to achieve Continue Reading
By- Cliff Saran, Managing Editor
-
News
23 Aug 2022
Home Office announces Scale-up visa for fast-growth firms
Scale-up visa launched to help high-growth businesses employ talent from overseas, but sponsorship requirements could undermine effectiveness Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
Feature
23 Aug 2022
Bfloat16: What it is and how it impacts storage
Bfloat16 is an emerging way to handle very large numbers, developed by Google for its machine and neural learning and prediction. We look at what it means for IT and storage Continue Reading
By- Antony Adshead, Storage Editor
-
News
23 Aug 2022
NCSC shares cyber guidance for large infrastructure builds
Balfour Beatty and McAlpine are among the large construction firms to have input into latest NCSC guidance for ensuring the security of major infrastructure projects Continue Reading
By- Alex Scroxton, Security Editor
-
News
23 Aug 2022
Farming tech projects get £16.5m in government funding
Projects receiving funding through latest round of farming innovation programme include tech to improve fruit farming and the use of artificial intelligence to improve pigs’ welfare Continue Reading
By -
E-Zine
23 Aug 2022
How digital technology rescued Merlin
In this week’s Computer Weekly, we talk to the CTO of Merlin Entertainments – operator of Legoland, Sea Life and Alton Towers – to find out how digital saved the company when Covid shut all its theme parks. We look at how software and data analytics can help to track – and reduce – greenhouse gas emissions. And Southern Water explains how data helps to support its most vulnerable customers. Read the issue now. Continue Reading
-
News
22 Aug 2022
Google Cloud and Singapore government team up on AI
Singapore’s National AI office will tap Google Cloud’s expertise in artificial intelligence to build artificial intelligence applications and train public sector officers on AI Continue Reading
By- Aaron Tan, TechTarget
-
Feature
22 Aug 2022
Data classification: What it is and why you need it
To be compliant, to ensure data is optimally protected, that it is available, that it can be analysed and that it is stored most cost-effectively – these are reasons why data classification is vital to organisations Continue Reading
-
News
22 Aug 2022
Contracting market weighs in on Liz Truss pledge to review IR35 rules if she becomes prime minister
As Liz Truss continues her Conservative Party leadership campaign, she tells the national press of her plans to review the IR35 rules should she succeed Boris Johnson as prime minister Continue Reading
By- Caroline Donnelly, Datacentre Editor
-
Podcast
22 Aug 2022
State of open source: Computer Weekly Downtime Upload podcast
In this special edition of the Computer Weekly Downtime Upload podcast, OpenUK’s Amanda Brock speaks to Cliff Saran about open source challenges Continue Reading
By- Cliff Saran, Managing Editor
-
News
22 Aug 2022
Kaspersky threat data added to Microsoft Sentinel service
Microsoft and Kaspersky have agreed a collaboration to integrate Kaspersky’s threat data feeds into Microsoft’s cloud-native SIEM/SOAR service Continue Reading
By- Alex Scroxton, Security Editor
-
News
22 Aug 2022
Lloyd’s to end insurance coverage for state cyber attacks
Lloyd’s of London has instructed its members to exclude nation state cyber attacks from insurance policies beginning in 2023, saying they pose unacceptable levels of risk Continue Reading
By- Alex Scroxton, Security Editor
-
Podcast
22 Aug 2022
Maybe 5G isn’t better: Computer Weekly Downtime Upload podcast
In October 1945, Arthur C Clarke wrote a paper, published in Wireless World magazine in the UK, discussing a global communications network Continue Reading
By- Cliff Saran, Managing Editor
-
News
19 Aug 2022
Google employees demand end to collection of abortion data
In the wake of the US Supreme Court rolling back abortion rights, Google employees are calling on the company to stop collecting abortion-related data, so that it can never be shared with police Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
19 Aug 2022
Cozy Bear targets MS 365 environments with new tactics
Cozy Bear, or APT29, is trying out new tricks as it seeks access to its targets’ Microsoft 365 environments Continue Reading
By- Alex Scroxton, Security Editor
-
News
19 Aug 2022
Apple patches two zero-days in macOs, iOS
Mac users should urgently apply new patches addressing vulnerabilities in its desktop and mobile operating systems Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
19 Aug 2022
IT Sustainability Think Tank: Why IT and procurement teams must work together to go green
It takes a village to build a credible and robust IT sustainability strategy, so who should enterprises be collaborating with to make their green IT goals a reality? Continue Reading
By- Alexander Bardell , SDAdvocate
-
News
18 Aug 2022
LexisNexis sued by immigration advocates over data practices
Four immigration advocacy groups launch lawsuit in Illinois alleging data broker’s collection, aggregation and sale of people’s personal data, including non-public information, to corporations and government bodies Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
18 Aug 2022
Growing MFA use spurs ‘pass-the-cookie’ attacks
The exploitation of stolen session cookies by cyber criminals is once again back on the agenda, thanks to the growing popularity of multifactor authentication tools Continue Reading
By- Alex Scroxton, Security Editor
-
News
18 Aug 2022
It takes a breach to force boards to take notice of cyber, says UK government
Too often, it takes a major incident for business leadership to pay attention to cyber issues, according to a government-commissioned study of victims Continue Reading
By- Alex Scroxton, Security Editor
-
News
18 Aug 2022
A-level computing results: Progress made in gender diversity
The UK is facing a vacancies crisis and there is no short-term fix, but this year’s A-level results point to an increasingly gender-diverse future workforce Continue Reading
By- Cliff Saran, Managing Editor
-
News
18 Aug 2022
Ukraine war drives DDoS attack volumes ever higher
There has been a boom in distributed denial-of-service attacks in the first six months of 2022, according to a report, with Russia’s war on Ukraine helping to drive activity Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
18 Aug 2022
Why you should start your post-quantum encryption migration now
Some say we have the best part of a decade to prepare for the security risks that quantum computing presents to current encryption tech, but PA Consulting experts believe that timeframe is shrinking dramatically Continue Reading
By- Richard Watson-Bruhn and Mark Chang
-
News
17 Aug 2022
CTO interview: Steve Otto, CTO, The R&A
The Open Championship was fully back in 2022 after Covid, and back at golf’s spiritual home of St Andrews – and it was an opportunity for the club’s CTO to reflect on where technology will take the sport next Continue Reading
By -
News
17 Aug 2022
The Turing Trust receives first batch of donated Govia Thameslink computers
Train operator plans to donate 600 computers to the charity, which will refurbish them and send them to schools in Malawi Continue Reading
By- Cliff Saran, Managing Editor
-
Opinion
17 Aug 2022
IT Sustainability Think Tank: Collaborating with consultancies to go green
It takes a village to build a credible and robust IT sustainability strategy, so who should enterprises be collaborating with to make their green IT goals a reality? Continue Reading
By- John Booth, Carbon3IT
-
News
17 Aug 2022
How BE Switchcraft is using RFID to streamline manufacturing
The Australian switchboard manufacturer has rolled out a radio frequency identification system to track production jobs and streamline manufacturing processes Continue Reading
By- Aaron Tan, TechTarget
-
News
16 Aug 2022
Cyber security accelerator launches in Greater Manchester
Accelerator will add to Manchester’s growing cyber security ecosystem, which already includes several tech unicorns, arms companies and the offices of GCHQ Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
16 Aug 2022
Most influential women in UK tech: The 2022 longlist
Each year, Computer Weekly publishes the longlist of all of the women put forward to be considered for its list of the top 50 Most Influential Women in UK Tech. Here are 2022’s nominees Continue Reading
By- Clare McDonald, Business Editor
-
News
16 Aug 2022
South Staffs Water is victim of botched Clop attack
South Staffordshire Water moves to reassure customers that their supplies remain safe after its attackers screw up their initial assault Continue Reading
By- Alex Scroxton, Security Editor
-
News
16 Aug 2022
Why organisations need to harmonise their CIO and CISO roles
Unless properly managed, conflicting responsibilities between the chief information officer and the chief information security officer can cause project delays and budget overruns, says Netskope’s Mike Anderson Continue Reading
-
News
16 Aug 2022
DWP looks to hire new CDIO
Department is on the hunt for a chief digital and information officer to lead on its digital agenda, offering up to £200,000 pa for the role Continue Reading
By -
E-Zine
16 Aug 2022
Broadband reaches for the stars – the new space race
In this week’s Computer Weekly, we look at the latest space race, as satellite firms compete to provide high-speed connectivity. Is the datacentre sector hindering house building in the UK? We find out what’s really going on. And we talk to the IT director of the Mercedes Formula One team about how data helps to win races. Read the issue now. Continue Reading
-
News
15 Aug 2022
Lawyers and journalists sue CIA and Mike Pompeo over Assange surveillance claims
CIA and its former director sued over allegations that they authorised unlawful spying on US citizens when they visited WikiLeaks founder Julian Assange at the Ecuadorian Embassy in London Continue Reading
-
News
15 Aug 2022
How clean data helps Southern Water identify vulnerable customers
Escalating prices means households around the country are having to tighten spending, with many struggling to pay their bills. Water4All, a consortium led by Southern Water, is using data to identify low-income and vulnerable households so they can be better supported Continue Reading
By- Cliff Saran, Managing Editor
-
News
15 Aug 2022
England and Wales councils unprepared for PSTN withdrawal in 2025
Freedom of information act request reveals worrying finding that over half of councils in England and Wales have no strategy for the prospective withdrawal of traditional PSTN communications networks Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
15 Aug 2022
Lightbits offers NVMe-over-TCP at 5x less than NVMe-over-FC et al
Lightbits builds NVMe-overTCP SAN clusters for Linux servers with Intel cards that accelerate network processing to give millions of IOPS with storage for public and private clouds Continue Reading
By- Yann Serra, LeMagIT
- Antony Adshead, Storage Editor
-
News
15 Aug 2022
Report reveals consensus around Computer Misuse Act reform
A study produced by the CyberUp campaign reveals broad alignment among security professionals on questions around the Computer Misuse Act, which it hopes will give confidence to policymakers as they explore its reform Continue Reading
By- Alex Scroxton, Security Editor
-
News
15 Aug 2022
Royal Mint turns to Circular Computing for remanufactured Lenovo laptops
BSI Kitemark for laptops supplied by Circular Computing intended to certify remanufactured products that are ‘as good as’ brand new devices Continue Reading
By- Cliff Saran, Managing Editor
-
15 Aug 2022
Driven by data: Michael Taylor, Mercedes-AMG Petronas Formula One
Michael Taylor, IT director of the Mercedes-AMG Petronas Formula One team, talks about historical data, race data and fast-paced analytics. Continue Reading
-
News
15 Aug 2022
UK government aims to allow struggling families access to cheaper broadband
New support scheme designed to enable customers to give permission to broadband providers to confirm their eligibility for cheaper deals Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
15 Aug 2022
Major APAC economies to lose 63 million jobs to automation
Workers in India, China, South Korea, Australia and Japan are more at risk of losing their jobs to automation, despite the creation of new jobs in the green economy and ICT industry Continue Reading
By- Aaron Tan, TechTarget
-
News
15 Aug 2022
FCSA appoints independent panel to bolster dispute resolution protocols for umbrella firms
In a statement to Computer Weekly, the Freelancer and Contractor Services Association says the panel will provide umbrella companies with a route to appeal against the decisions made by its CEO Continue Reading
By- Caroline Donnelly, Senior Editor, UK
-
Opinion
15 Aug 2022
IT Sustainability Think Tank: Collaboration key to achieving ESG goals faster
It takes a village to build a credible and robust IT sustainability strategy, so who should enterprises be collaborating with to make their green IT goals a reality? Continue Reading
By- Mattie Yeta, CGI
-
E-Zine
15 Aug 2022
CW Benelux: Belgium seeks top tech talent
The battle for the right IT staff to transform businesses in the digital age is changing and recruiters and job-seekers need to be clued up. In this issue, we feature an interview with a Belgium-based recruiter who gives the lowdown on tech job seeking in the Benelux nation. Also read why Dutch beer brewer Heineken has replaced more than 60 different HR systems with SAP SuccessFactors as its central HR system. Continue Reading
-
Feature
15 Aug 2022
Global broadband reaches for the stars to connect the Earth
Despite fears of recession, especially in major economies, there is one thing that people can’t seem to have enough of: high-speed connectivity Continue Reading
By- Joe O’Halloran, Computer Weekly
-
Definition
12 Aug 2022
deprecated
In information technology (IT), deprecation means that although something is available or allowed, it is not recommended or that -- in the case where something must be used -- to say it is deprecated means that its failings are recognized. Continue Reading
-
News
12 Aug 2022
Department of Health investigates bias in medical devices and algorithms
The government has launched a review to look at the problem of discrimination in medical devices and decision-making software Continue Reading
By- Cliff Saran, Managing Editor
-
News
12 Aug 2022
UK Amazon workers stage series of wildcat strikes over pay offers
Amazon warehouse workers across the UK have organised a series of spontaneous strike actions after the e-commerce giant’s management offered them pay rises between 35p and 50p Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
12 Aug 2022
Microsoft doles out $13.7m in bug bounties
Microsoft’s Bug Bounty programme has paid a total of $13.7m to more than 300 researchers in almost 50 countries Continue Reading
By- Alex Scroxton, Security Editor