www.computerweekly.com
Open in
urlscan Pro
2606:4700:4400::6812:2461
Public Scan
Submitted URL: https://go.techtarget.com/r/231617405/43428009
Effective URL: https://www.computerweekly.com/?utm_campaign=20220630_MLP-English&utm_medium=EM&utm_source=MLPEN&src=10120825&asrc=EM_MLPEN_231...
Submission: On July 04 via api from CH — Scanned from DE
Effective URL: https://www.computerweekly.com/?utm_campaign=20220630_MLP-English&utm_medium=EM&utm_source=MLPEN&src=10120825&asrc=EM_MLPEN_231...
Submission: On July 04 via api from CH — Scanned from DE
Form analysis
2 forms found in the DOMGET https://www.computerweekly.com/search/query
<form action="https://www.computerweekly.com/search/query" method="get" class="header-search">
<label for="header-search-input" class="visuallyhidden">Search the TechTarget Network</label>
<input class="header-search-input" id="header-search-input" type="text" name="q" placeholder="Search Computer Weekly">
<button aria-label="Search" class="header-search-submit"><i class="icon" data-icon="g"></i></button>
<ul class="ui-autocomplete ui-front ui-menu ui-widget ui-widget-content ui-corner-all" id="ui-id-1" tabindex="0" style="display: none;"></ul>
</form>
GET https://www.techtarget.com/whatis/search/query
<form action="https://www.techtarget.com/whatis/search/query" method="get" class="search-def-form">
<label for="search-def-title" class="visuallyhidden">Search for definitions</label>
<input class="search-def-title" type="text" name="q" placeholder="Search for definitions">
<input type="hidden" name="type" value="definition">
<input class="button blue-button search-def-form-btn" type="submit" value="Look it Up">
</form>
Text Content
Search the TechTarget Network Join CW+ Login Register Cookies * News * In Depth * Blogs * Opinion * Videos * Photo Stories * Premium Content * Webinars * IT Salary Survey infographic RSS * IT Management * IT leadership & CW500 * IT architecture * IT efficiency * Governance * Innovation * Legislation & regulation * Operations & support * Project management * Strategy * Supplier management * Business issues * Sponsored Communities * Industry Sectors * Healthcare IT * Charity IT * Business services IT * Financial services IT * Government & public sector IT * Leisure & hospitality IT * Manufacturing IT * Media & entertainment IT * Retail IT * SME IT * Telecoms & internet * Transport & travel IT * Utilities IT * IT suppliers * Technology Topics Datacentre View All * Clustering for high availability and HPC * Containers * Converged infrastructure * Datacentre backup power and power distribution * Datacentre capacity planning * Datacentre cooling infrastructure * Disaster recovery/security * Green IT * Performance, monitoring and optimisation * Systems management * DevOps * IaaS * Server and Operating Systems * PaaS * Virtualisation * SaaS * Desktop virtualisation platforms Enterprise software View All * AI and automation * Blockchain * Business applications * Business intelligence * Cloud applications * Collaboration * CRM * Database * ERP * Financial applications * HR software * Middleware * Microservices * Windows * Mobile * Open source * Operating systems * SOA * Software development * Software licensing * Virtualisation * Web software IT in Europe and Middle East View All * IT in Benelux * IT in Germany * IT in Italy * IT in Poland * IT in Russia * IT in Spain * IT in the Middle East * IT in Turkey * IT in France * IT in the Nordics Information Management View All * Big data * Business intelligence and analytics * BPM * Content management * Quality/governance * Data warehousing * Database management * MDM/Integration IT in Asia-Pacific View All * IT in ASEAN * IT in Australia & New Zealand * IT in India Internet View All * Cloud * E-commerce * Internet infrastructure * Social media * Web development IT skills View All * Diversity in IT * Training * Jobs * Management skills * Technical skills Hardware View All * Chips & processors * Printers * Storage * Data centre * Mobile * Networking * PC * Servers IT security View All * Antivirus * Secure Coding and Application Programming * Continuity * Cloud security * Data Breach Incident Management and Recovery * Endpoint and NAC Protection * Cybercrime * IAM * Risk management * Network Security Management * Data protection * Compliance Regulation and Standard Requirements * Security policy and user awareness * Web Application Security IT services View All * Cloud * Consultancy * Outsourcing * Hosting * Offshore * Startups Mobile View All * Laptop * Mobile software * Mobile networking * Smartphone * Tablet Networking View All * Datacentre networking * Internet of Things * Mobile * Network hardware * Network monitoring and analysis * Network routing and switching * Network security strategy * Network software * Software-defined networking * Telecoms networks and broadband communications * Unified communications * VoIP * WAN performance and optimisation * Wireless Storage View All * Cloud storage * Containers and storage * Compliance and storage * Backup * Disaster recovery * Flash and SSDs * Hyper-convergence * Object storage * Disk systems * Software-defined storage * Storage switches * Storage management * Storage performance * Virtualisation and storage Please select a category * Datacentre * Enterprise software * IT in Europe and Middle East * Information Management * IT in Asia-Pacific * Internet * IT skills * Hardware * IT security * IT services * Mobile * Networking * Storage * Follow: * * * * ComputerWeekly.com.br * ComputerWeekly.de * ComputerWeekly.es * LeMagIT.fr * MicroScope.co.uk TOP STORIES Getty Images CYBER INSURANCE: WHAT DOES A CISO NEED TO KNOW? We look at how the market for cyber insurance is evolving and how IT security chiefs can avoid buying the wrong level of cover spainter_vfx - stock.adobe.com HOW LENOVO IS MAKING THE TRANSITION INTO SERVICES Although Lenovo is late to the as-a-service game, it is making headway through its One Lenovo and services-led transformation strategies, says a top company executive Jekaterina Saveljeva ASSANGE APPEALS AGAINST PRITI PATEL’S EXTRADITION ORDER WikiLeaks founder is expected to raise concerns over the political nature of his prosecution, the likelihood of him receiving a fair trial, and the risk of a coercive plea bargain Getty Images WHY IS IT SO HARD TO FIX THE CHIP CRISIS? Through subsidies and grants, the EU and the UK are focused on building out local chip manufacturing to alleviate semiconductor shortages View All Stories PHOTO STORY RASPBERRY PI AT 10 View All Photo Stories LATEST NEWS * Jekaterina Saveljeva ASSANGE APPEALS AGAINST PRITI PATEL’S EXTRADITION ORDER WikiLeaks founder is expected to raise concerns over the political nature of his prosecution, the likelihood of him receiving a fair trial, and the risk of a coercive plea bargain * TELSTRA TAPS ERICSSON, CIENA TO QUADRUPLE SERVICE CAPACITY Leading Australian operator forges partnership with leading comms tech providers to make enhancements to next-generation optical network to increase the service capacity of optical network to 400 Gbps Ethernet * Nicolas delafraye - stock.adobe. UK RURAL PRIMARY SCHOOLS TO RECEIVE HUGE BROADBAND UPGRADE Government announces up to 3,000 primary schools across rural England will get gigabit broadband as part of £82m investment designed to encourage roll-out of better broadband * Getty Images WHY IS IT SO HARD TO FIX THE CHIP CRISIS? Through subsidies and grants, the EU and the UK are focused on building out local chip manufacturing to alleviate semiconductor shortages * Getty Images/500px Prime US COURT RULES NO CONFLICT OF INTEREST IN MINING DEATHS CASE A US district court judge who dismissed a forced labour case against five technology companies was found to have investments in four of the firms, with a separate court now ruling against the victims’ motion for reversal that there was no conflict ... * tiero - Fotolia ICO TO CUT BACK ON FINES FOR PUBLIC SECTOR DATA BREACHES Information commissioner John Edwards sets out a revised approach to how the ICO handles data breaches in the public sector, saying fining victims risks punishing the public twice over DOWNLOAD COMPUTER WEEKLY In The Current Issue: * Collaboration key to IT sector sustainability * Office 365 has ability to ‘spy’ on workers * How to retain cyber talent in the Great Resignation Download Current Issue View All The Latest News IN DEPTH * ktsdesign - Fotolia FILE, BLOCK AND OBJECT: STORAGE FUNDAMENTALS IN THE CLOUD ERA We look at the three basic ways that storage accesses data – via file, block and object – as well as the ways in which the rise of the cloud and distributed systems have brought changes to them * Getty Images/500px Prime TECH SECTOR EFFORTS TO ROOT OUT FORCED LABOUR ARE FAILING Digitally mapping supply chains to identify forced labour and slavery is no longer a technology problem for the IT sector, but a lack of government enforcement and corporate inaction are major barriers to effective change * LEGISLATION AND CERTIFICATION OF XR APPLICATIONS: CHALLENGES TO ADOPTION AND DIFFUSION Virtual and augmented reality may be changing the game, but such cutting-edge applications run ahead of many regulatory issues. How can the metaverse avoid uncertainties that could slow the adoption of XR and related enabling technologies? View All In Depth Articles CW+ DOWNLOADS View All * E-ZINE | JUNE 2022 COLLABORATION KEY TO IT SECTOR SUSTAINABILITY Download * E-ZINE | JUNE 2022 CW APAC: TECH CAREER GUIDE TO CYBER SECURITY Download * E-HANDBOOK | JUNE 2022 ROYAL HOLLOWAY: SECURING CONNECTED AND AUTONOMOUS VEHICLES Download * E-ZINE | JUNE 2022 DREAMS COME TRUE – HOW DATA AND COMMUNICATION SAVED A FAILING COMPANY Download * E-HANDBOOK | JUNE 2022 INFOGRAPHIC: 5 CONSIDERATIONS BEFORE BUYING DATA CENTER BACKUP SOFTWARE Download BLOGS * HUAWEI MATEBOOK E WINDOWS TABLET (LAPTOP)- INSPECT-A-GADGET Many older laptops die off within about three years of use, especially if you’re a heavy compute user that installs a whole bag of apps and pushes the device in and out of airports once or twice a ... Continue Reading * HELIOS SHINES GOLDEN LIGHT ON MICROSERVICES DEVELOPMENT- CW DEVELOPER NETWORK Developer platform company Helios is making noise. The organisation is comparatively news and it has things to say. Principally, the company highlights the fact that modern cloud apps consist of ... Continue Reading * DIGITAL LEVELLING UP MUST BE A PRIORITY FOR THE TECH COMMUNITY- COMPUTER WEEKLY EDITORS BLOG The UK government’s plans for “levelling up” have, justifiably, come in for criticism. Nice rhetoric, but where’s the delivery? Fair comment. But for the tech community, attempts at digital ... Continue Reading * CIRCULAR IT SERIES - ALIBABA CLOUD: OPEN SESAME ON CARBON MANAGEMENT- INSPECT-A-GADGET Alibaba Cloud, the digital technology and intelligence division of Alibaba Group, has announced the global launch of Energy Expert. Not a person as such (although plenty of the organisation’s staff ... Continue Reading BLOGROLL * Inspect-a-Gadget * CW Developer Network * Computer Weekly Editors Blog * Green Tech * Cliff Saran's Enterprise blog * Open Source Insider * Downtime * Ahead in the Clouds * Networks Generation * When IT Meets Politics View All Computer Weekly Blogs OPINION * Maksim Kabakou - Fotolia NOW IS THE TIME TO THINK ABOUT CYBER INSURANCE Many IT leaders shy away from cyber insurance, but new, innovative developments in the market can help organisations take an approach that suits their needs * Maksim Kabakou - Fotolia ASSESSMENT AND KNOWLEDGE: YOUR KEY TOOLS TO SECURE SUPPLIERS There is no silver bullet that will resolve all the issues arising from today’s interconnected businesses and complex supply chains, but there are some key tools at your disposal * Getty Images/iStockphoto THE BALANCE BETWEEN INNOVATION AND DATA SECURITY IN HEALTHCARE As the government launches its data strategy for health and social care, a fine line must be trodden between innovating through privacy-enhancing technologies, and retaining data security for patients View All Opinion Articles VIDEOS * THE RISE AND RISE OF BLOCKCHAIN TECHNOLOGY * HOW TWILIO IS EMPOWERING WOMEN IN TECH * LIFELONG LEARNING CRITICAL FOR TECH’S FUTURE – JACQUELINE DE ROJAS * INCLUSION, TECH AND THE PANDEMIC – BEV WHITE * TECH TALENT IS CRITICAL - AMALI DE ALWIS * DIVERSITY AND INCLUSION IN TECH: HAS GENDER BEEN LEFT BEHIND? View all Videos SEARCH THOUSANDS OF TECH DEFINITIONS Search for definitions * digital accessibility * CONFIG.SYS * DigitalOcean * Intel View All Definitions Latest TechTarget resources * CIO * Security * Networking * Data Center * Data Management SearchCIO * Big tech regulation needs both privacy and antitrust reform Privacy and antitrust laws work together, and if Congress wants to regulate the tech giants, it has to figure out how these laws ... * Laggards, leaders face digital transformation challenges No one can relax in digital business: Those trailing behind must conquer the basics to get on the innovation path, while ... * 10 metaverse dangers CIOs and IT leaders should address The metaverse poses many of the same risks and security pitfalls that the internet does. Here's a look at 10 of those issues and ... SearchSecurity * SANS Institute: Human error remains the top security issue The SANS Institute's annual report on security awareness found that human risk is still the biggest source of data breaches and ... * How to conduct a cyber-resilience assessment It's a good cyber hygiene practice to periodically review your organization's cybersecurity plans and procedures. Use this ... * Ransomware gangs using Log4Shell to attack VMware instances Ransomware groups are exploiting the Log4Shell flaw in VMware Horizon and using DLL sideloading techniques to exfiltrate and ... SearchNetworking * An introduction to neutral host networks using private 5G Enterprises often use signal boosters and distributed antenna systems to improve carrier signal strength. Neutral host networks ... * How to convert binary to decimal It's helpful for network admins to know how to convert binary to decimal, and vice versa, for IPv4 addressing, subnet masks, ... * 5 factors that form the future of Wi-Fi For businesses, mounting ownership costs, unrealistic performance expectations, client device chaos and competing technologies ... SearchDataCenter * HPE GreenLake achieves everything as a service The latest version of HPE GreenLake has realized the vision of everything as a service, although customers are still figuring out... * HPE GreenLake updates aim for public cloud-like simplicity HPE GreenLake has been simplified to feel more like a public cloud while making management of VMs across hybrid clouds more ... * New HPE ProLiant servers with Arm target energy savings The new HPE ProLiant system incorporates the Ampere Altra and Ampere Altra Max cloud-native processors with the goal of energy ... SearchDataManagement * Cloudera embraces Apache Iceberg as cloud data lake evolves The Cloudera Data Platform now supports the open source cloud data lake table format as part of the continuing evolution of the ... * DataStax extends Astra Streaming event data platform The data platform vendor extended its Apache Pulsar-based Astra Streaming platform with support for more streaming protocols, ... * Yugabyte distributed SQL database adds migration service The YugabyteDB 2.15 distributed SQL database update introduces a table group feature to accelerate and optimize performance for ... * About Us * Editorial Ethics Policy * Meet The Editors * Contact Us * Our Use of Cookies * Advertisers * Business Partners * Media Kit * Corporate Site * Contributors * Reprints * Answers * E-Products * Events * In Depth * Guides * Opinions * Quizzes * Photo Stories * Tips * Tutorials * Videos * Computer Weekly Topics All Rights Reserved, Copyright 2000 - 2022, TechTarget Privacy Policy Cookie Preferences Do Not Sell My Personal Info Close