www.computerweekly.com Open in urlscan Pro
2606:4700:4400::6812:2461  Public Scan

Submitted URL: https://go.techtarget.com/r/231617405/43428009
Effective URL: https://www.computerweekly.com/?utm_campaign=20220630_MLP-English&utm_medium=EM&utm_source=MLPEN&src=10120825&asrc=EM_MLPEN_231...
Submission: On July 04 via api from CH — Scanned from DE

Form analysis 2 forms found in the DOM

GET https://www.computerweekly.com/search/query

<form action="https://www.computerweekly.com/search/query" method="get" class="header-search">
  <label for="header-search-input" class="visuallyhidden">Search the TechTarget Network</label>
  <input class="header-search-input" id="header-search-input" type="text" name="q" placeholder="Search Computer Weekly">
  <button aria-label="Search" class="header-search-submit"><i class="icon" data-icon="g"></i></button>
  <ul class="ui-autocomplete ui-front ui-menu ui-widget ui-widget-content ui-corner-all" id="ui-id-1" tabindex="0" style="display: none;"></ul>
</form>

GET https://www.techtarget.com/whatis/search/query

<form action="https://www.techtarget.com/whatis/search/query" method="get" class="search-def-form">
  <label for="search-def-title" class="visuallyhidden">Search for definitions</label>
  <input class="search-def-title" type="text" name="q" placeholder="Search for definitions">
  <input type="hidden" name="type" value="definition">
  <input class="button blue-button search-def-form-btn" type="submit" value="Look it Up">
</form>

Text Content

Search the TechTarget Network
Join CW+
Login Register Cookies
 * News
 * In Depth
 * Blogs
 * Opinion
 * Videos
 * Photo Stories
 * Premium Content
 * Webinars
 * IT Salary Survey infographic

RSS
 * IT Management
    * IT leadership & CW500
    * IT architecture
    * IT efficiency
    * Governance
    * Innovation
    * Legislation & regulation
    * Operations & support
    * Project management
    * Strategy
    * Supplier management
    * Business issues
    * Sponsored Communities

 * Industry Sectors
    * Healthcare IT
    * Charity IT
    * Business services IT
    * Financial services IT
    * Government & public sector IT
    * Leisure & hospitality IT
    * Manufacturing IT
    * Media & entertainment IT
    * Retail IT
    * SME IT
    * Telecoms & internet
    * Transport & travel IT
    * Utilities IT
    * IT suppliers

 * Technology Topics
   Datacentre View All
    * Clustering for high availability and HPC
    * Containers
    * Converged infrastructure
    * Datacentre backup power and power distribution
    * Datacentre capacity planning
    * Datacentre cooling infrastructure
    * Disaster recovery/security
    * Green IT
    * Performance, monitoring and optimisation
    * Systems management
    * DevOps
    * IaaS
    * Server and Operating Systems
    * PaaS
    * Virtualisation
    * SaaS
    * Desktop virtualisation platforms
   
   Enterprise software View All
    * AI and automation
    * Blockchain
    * Business applications
    * Business intelligence
    * Cloud applications
    * Collaboration
    * CRM
    * Database
    * ERP
    * Financial applications
    * HR software
    * Middleware
    * Microservices
    * Windows
    * Mobile
    * Open source
    * Operating systems
    * SOA
    * Software development
    * Software licensing
    * Virtualisation
    * Web software
   
   IT in Europe and Middle East View All
    * IT in Benelux
    * IT in Germany
    * IT in Italy
    * IT in Poland
    * IT in Russia
    * IT in Spain
    * IT in the Middle East
    * IT in Turkey
    * IT in France
    * IT in the Nordics
   
   Information Management View All
    * Big data
    * Business intelligence and analytics
    * BPM
    * Content management
    * Quality/governance
    * Data warehousing
    * Database management
    * MDM/Integration
   
   IT in Asia-Pacific View All
    * IT in ASEAN
    * IT in Australia & New Zealand
    * IT in India
   
   Internet View All
    * Cloud
    * E-commerce
    * Internet infrastructure
    * Social media
    * Web development
   
   IT skills View All
    * Diversity in IT
    * Training
    * Jobs
    * Management skills
    * Technical skills
   
   Hardware View All
    * Chips & processors
    * Printers
    * Storage
    * Data centre
    * Mobile
    * Networking
    * PC
    * Servers
   
   IT security View All
    * Antivirus
    * Secure Coding and Application Programming
    * Continuity
    * Cloud security
    * Data Breach Incident Management and Recovery
    * Endpoint and NAC Protection
    * Cybercrime
    * IAM
    * Risk management
    * Network Security Management
    * Data protection
    * Compliance Regulation and Standard Requirements
    * Security policy and user awareness
    * Web Application Security
   
   IT services View All
    * Cloud
    * Consultancy
    * Outsourcing
    * Hosting
    * Offshore
    * Startups
   
   Mobile View All
    * Laptop
    * Mobile software
    * Mobile networking
    * Smartphone
    * Tablet
   
   Networking View All
    * Datacentre networking
    * Internet of Things
    * Mobile
    * Network hardware
    * Network monitoring and analysis
    * Network routing and switching
    * Network security strategy
    * Network software
    * Software-defined networking
    * Telecoms networks and broadband communications
    * Unified communications
    * VoIP
    * WAN performance and optimisation
    * Wireless
   
   Storage View All
    * Cloud storage
    * Containers and storage
    * Compliance and storage
    * Backup
    * Disaster recovery
    * Flash and SSDs
    * Hyper-convergence
    * Object storage
    * Disk systems
    * Software-defined storage
    * Storage switches
    * Storage management
    * Storage performance
    * Virtualisation and storage
   
   Please select a category
    * Datacentre
    * Enterprise software
    * IT in Europe and Middle East
    * Information Management
    * IT in Asia-Pacific
    * Internet
    * IT skills
    * Hardware
    * IT security
    * IT services
    * Mobile
    * Networking
    * Storage

 * Follow:
 * 
 * 
 * 

 * ComputerWeekly.com.br
 * ComputerWeekly.de
 * ComputerWeekly.es
 * LeMagIT.fr
 * MicroScope.co.uk





TOP STORIES

Getty Images

CYBER INSURANCE: WHAT DOES A CISO NEED TO KNOW?

We look at how the market for cyber insurance is evolving and how IT security
chiefs can avoid buying the wrong level of cover

spainter_vfx - stock.adobe.com

HOW LENOVO IS MAKING THE TRANSITION INTO SERVICES

Although Lenovo is late to the as-a-service game, it is making headway through
its One Lenovo and services-led transformation strategies, says a top company
executive

Jekaterina Saveljeva

ASSANGE APPEALS AGAINST PRITI PATEL’S EXTRADITION ORDER

WikiLeaks founder is expected to raise concerns over the political nature of his
prosecution, the likelihood of him receiving a fair trial, and the risk of a
coercive plea bargain

Getty Images

WHY IS IT SO HARD TO FIX THE CHIP CRISIS?

Through subsidies and grants, the EU and the UK are focused on building out
local chip manufacturing to alleviate semiconductor shortages

View All Stories


PHOTO STORY



RASPBERRY PI AT 10

View All Photo Stories



LATEST NEWS

 * Jekaterina Saveljeva
   
   ASSANGE APPEALS AGAINST PRITI PATEL’S EXTRADITION ORDER
   
   WikiLeaks founder is expected to raise concerns over the political nature of
   his prosecution, the likelihood of him receiving a fair trial, and the risk
   of a coercive plea bargain

 * TELSTRA TAPS ERICSSON, CIENA TO QUADRUPLE SERVICE CAPACITY
   
   Leading Australian operator forges partnership with leading comms tech
   providers to make enhancements to next-generation optical network to increase
   the service capacity of optical network to 400 Gbps Ethernet

 * Nicolas delafraye - stock.adobe.
   
   UK RURAL PRIMARY SCHOOLS TO RECEIVE HUGE BROADBAND UPGRADE
   
   Government announces up to 3,000 primary schools across rural England will
   get gigabit broadband as part of £82m investment designed to encourage
   roll-out of better broadband

 * Getty Images
   
   WHY IS IT SO HARD TO FIX THE CHIP CRISIS?
   
   Through subsidies and grants, the EU and the UK are focused on building out
   local chip manufacturing to alleviate semiconductor shortages

 * Getty Images/500px Prime
   
   US COURT RULES NO CONFLICT OF INTEREST IN MINING DEATHS CASE
   
   A US district court judge who dismissed a forced labour case against five
   technology companies was found to have investments in four of the firms, with
   a separate court now ruling against the victims’ motion for reversal that
   there was no conflict ...

 * tiero - Fotolia
   
   ICO TO CUT BACK ON FINES FOR PUBLIC SECTOR DATA BREACHES
   
   Information commissioner John Edwards sets out a revised approach to how the
   ICO handles data breaches in the public sector, saying fining victims risks
   punishing the public twice over


DOWNLOAD COMPUTER WEEKLY

In The Current Issue:
 * Collaboration key to IT sector sustainability
 * Office 365 has ability to ‘spy’ on workers
 * How to retain cyber talent in the Great Resignation

Download Current Issue
View All The Latest News


IN DEPTH

 * ktsdesign - Fotolia
   
   FILE, BLOCK AND OBJECT: STORAGE FUNDAMENTALS IN THE CLOUD ERA
   
   We look at the three basic ways that storage accesses data – via file, block
   and object – as well as the ways in which the rise of the cloud and
   distributed systems have brought changes to them

 * Getty Images/500px Prime
   
   TECH SECTOR EFFORTS TO ROOT OUT FORCED LABOUR ARE FAILING
   
   Digitally mapping supply chains to identify forced labour and slavery is no
   longer a technology problem for the IT sector, but a lack of government
   enforcement and corporate inaction are major barriers to effective change

 * LEGISLATION AND CERTIFICATION OF XR APPLICATIONS: CHALLENGES TO ADOPTION AND
   DIFFUSION
   
   Virtual and augmented reality may be changing the game, but such cutting-edge
   applications run ahead of many regulatory issues. How can the metaverse avoid
   uncertainties that could slow the adoption of XR and related enabling
   technologies?


View All In Depth Articles


CW+ DOWNLOADS

View All


 * E-ZINE | JUNE 2022
   
   COLLABORATION KEY TO IT SECTOR SUSTAINABILITY
   
   Download


 * E-ZINE | JUNE 2022
   
   CW APAC: TECH CAREER GUIDE TO CYBER SECURITY
   
   Download


 * E-HANDBOOK | JUNE 2022
   
   ROYAL HOLLOWAY: SECURING CONNECTED AND AUTONOMOUS VEHICLES
   
   Download


 * E-ZINE | JUNE 2022
   
   DREAMS COME TRUE – HOW DATA AND COMMUNICATION SAVED A FAILING COMPANY
   
   Download


 * E-HANDBOOK | JUNE 2022
   
   INFOGRAPHIC: 5 CONSIDERATIONS BEFORE BUYING DATA CENTER BACKUP SOFTWARE
   
   Download


BLOGS

 * HUAWEI MATEBOOK E WINDOWS TABLET (LAPTOP)- INSPECT-A-GADGET
   
   Many older laptops die off within about three years of use, especially if
   you’re a heavy compute user that installs a whole bag of apps and pushes the
   device in and out of airports once or twice a ... Continue Reading

 * HELIOS SHINES GOLDEN LIGHT ON MICROSERVICES DEVELOPMENT- CW DEVELOPER NETWORK
   
   Developer platform company Helios is making noise. The organisation is
   comparatively news and it has things to say. Principally, the company
   highlights the fact that modern cloud apps consist of ... Continue Reading

 * DIGITAL LEVELLING UP MUST BE A PRIORITY FOR THE TECH COMMUNITY- COMPUTER
   WEEKLY EDITORS BLOG
   
   The UK government’s plans for “levelling up” have, justifiably, come in for
   criticism. Nice rhetoric, but where’s the delivery? Fair comment. But for the
   tech community, attempts at digital ... Continue Reading

 * CIRCULAR IT SERIES - ALIBABA CLOUD: OPEN SESAME ON CARBON MANAGEMENT-
   INSPECT-A-GADGET
   
   Alibaba Cloud, the digital technology and intelligence division of Alibaba
   Group, has announced the global launch of Energy Expert. Not a person as such
   (although plenty of the organisation’s staff ... Continue Reading


BLOGROLL

 * Inspect-a-Gadget
 * CW Developer Network
 * Computer Weekly Editors Blog
 * Green Tech
 * Cliff Saran's Enterprise blog
 * Open Source Insider
 * Downtime
 * Ahead in the Clouds
 * Networks Generation
 * When IT Meets Politics

View All Computer Weekly Blogs


OPINION

 * Maksim Kabakou - Fotolia
   
   NOW IS THE TIME TO THINK ABOUT CYBER INSURANCE
   
   Many IT leaders shy away from cyber insurance, but new, innovative
   developments in the market can help organisations take an approach that suits
   their needs

 * Maksim Kabakou - Fotolia
   
   ASSESSMENT AND KNOWLEDGE: YOUR KEY TOOLS TO SECURE SUPPLIERS
   
   There is no silver bullet that will resolve all the issues arising from
   today’s interconnected businesses and complex supply chains, but there are
   some key tools at your disposal

 * Getty Images/iStockphoto
   
   THE BALANCE BETWEEN INNOVATION AND DATA SECURITY IN HEALTHCARE
   
   As the government launches its data strategy for health and social care, a
   fine line must be trodden between innovating through privacy-enhancing
   technologies, and retaining data security for patients

View All Opinion Articles


VIDEOS

 * THE RISE AND RISE OF BLOCKCHAIN TECHNOLOGY

 * HOW TWILIO IS EMPOWERING WOMEN IN TECH

 * LIFELONG LEARNING CRITICAL FOR TECH’S FUTURE – JACQUELINE DE ROJAS

 * INCLUSION, TECH AND THE PANDEMIC – BEV WHITE

 * TECH TALENT IS CRITICAL - AMALI DE ALWIS

 * DIVERSITY AND INCLUSION IN TECH: HAS GENDER BEEN LEFT BEHIND?

View all Videos


SEARCH THOUSANDS OF TECH DEFINITIONS

Search for definitions
 * digital accessibility
 * CONFIG.SYS
 * DigitalOcean
 * Intel

View All Definitions


Latest TechTarget resources
 * CIO
 * Security
 * Networking
 * Data Center
 * Data Management

SearchCIO
 * Big tech regulation needs both privacy and antitrust reform
   
   Privacy and antitrust laws work together, and if Congress wants to regulate
   the tech giants, it has to figure out how these laws ...

 * Laggards, leaders face digital transformation challenges
   
   No one can relax in digital business: Those trailing behind must conquer the
   basics to get on the innovation path, while ...

 * 10 metaverse dangers CIOs and IT leaders should address
   
   The metaverse poses many of the same risks and security pitfalls that the
   internet does. Here's a look at 10 of those issues and ...

SearchSecurity
 * SANS Institute: Human error remains the top security issue
   
   The SANS Institute's annual report on security awareness found that human
   risk is still the biggest source of data breaches and ...

 * How to conduct a cyber-resilience assessment
   
   It's a good cyber hygiene practice to periodically review your organization's
   cybersecurity plans and procedures. Use this ...

 * Ransomware gangs using Log4Shell to attack VMware instances
   
   Ransomware groups are exploiting the Log4Shell flaw in VMware Horizon and
   using DLL sideloading techniques to exfiltrate and ...

SearchNetworking
 * An introduction to neutral host networks using private 5G
   
   Enterprises often use signal boosters and distributed antenna systems to
   improve carrier signal strength. Neutral host networks ...

 * How to convert binary to decimal
   
   It's helpful for network admins to know how to convert binary to decimal, and
   vice versa, for IPv4 addressing, subnet masks, ...

 * 5 factors that form the future of Wi-Fi
   
   For businesses, mounting ownership costs, unrealistic performance
   expectations, client device chaos and competing technologies ...

SearchDataCenter
 * HPE GreenLake achieves everything as a service
   
   The latest version of HPE GreenLake has realized the vision of everything as
   a service, although customers are still figuring out...

 * HPE GreenLake updates aim for public cloud-like simplicity
   
   HPE GreenLake has been simplified to feel more like a public cloud while
   making management of VMs across hybrid clouds more ...

 * New HPE ProLiant servers with Arm target energy savings
   
   The new HPE ProLiant system incorporates the Ampere Altra and Ampere Altra
   Max cloud-native processors with the goal of energy ...

SearchDataManagement
 * Cloudera embraces Apache Iceberg as cloud data lake evolves
   
   The Cloudera Data Platform now supports the open source cloud data lake table
   format as part of the continuing evolution of the ...

 * DataStax extends Astra Streaming event data platform
   
   The data platform vendor extended its Apache Pulsar-based Astra Streaming
   platform with support for more streaming protocols, ...

 * Yugabyte distributed SQL database adds migration service
   
   The YugabyteDB 2.15 distributed SQL database update introduces a table group
   feature to accelerate and optimize performance for ...

 * About Us
 * Editorial Ethics Policy
 * Meet The Editors
 * Contact Us
 * Our Use of Cookies
 * Advertisers
 * Business Partners
 * Media Kit

 * Corporate Site
 * Contributors
 * Reprints
 * Answers
 * E-Products
 * Events
 * In Depth
 * Guides

 * Opinions
 * Quizzes
 * Photo Stories
 * Tips
 * Tutorials
 * Videos
 * Computer Weekly Topics

All Rights Reserved, Copyright 2000 - 2022, TechTarget

Privacy Policy
Cookie Preferences
Do Not Sell My Personal Info


Close