computing_logo
Sign in Join
    • My account
    • Sign out
  • You are currently accessing Computing via your Enterprise account.

    If you already have an account please use the link below to sign in.

    If you have any problems with your access or would like to request an individual access account please contact our customer service team.

    Phone: +44 (0) 1858 438800

    Email: customerservices@incisivemedia.com

    • Sign in
logo
  • logo

    Search Computing

     

     

  • Latest
  • Topics

    Choose a topic from the list below

    • Diversity in Tech
    • Big Data & Analytics
    • DevOps
    • Security
    • GDPR
    • AI & ML
    • Cloud & Infrastructure
    • CIO
    • Deskflix
  • Tech Impact
  • Diversity in Tech
  • Deskflix
  • Events
  • Whitepapers
  • More

    Most Popular content

    • Delta
    • Big Data & Analytics
    • Cloud
    • Leadership & Strategy
    • Open Source
    • Storage
    • Telecoms
    • Top 100 IT Leaders

    Featured content

    • On-demand webinars
    • Identity Access Management Hub
    • Research
    • Delta
    • Tech Marketing Hub

    Authors

    • Stuart Sumner
    • John Leonard
    • Tom Allen
    • Computing Contributors

    Computing Resources

    • English
    • Français
    • Deutsch
    • Espagnol
    • Italien
  • Searchlogo

    Search Computing

    x
Join Sign in
 
    • My account
    • Sign out
  • You are currently accessing Computing via your Enterprise account.

    If you already have an account please use the link below to sign in.

    If you have any problems with your access or would like to request an individual access account please contact our customer service team.

    Phone: +44 (0) 1858 438800

    Email: customerservices@incisivemedia.com

    • Sign in
    • Sign in

Coding

The state of DevSecOps - where are we at with application security?

DevOps

The state of DevSecOps - where are we at with application security?

Merging the security function into DevOps won't happen overnight, but it's a vital step and the barriers aren't as high as sometimes believed

clock 30 November 2021 • 9 min read
Job ads should avoid terms like 'Coding ninja' to secure diverse applicants

Leadership

Job ads should avoid terms like 'Coding ninja' to secure diverse applicants

Young white men are seen as the world's technical workforce - how can you attract different candidates?

clock 18 July 2019 •
Scientists hail breakthrough with 'denary' set to replace binary

Software

Scientists hail breakthrough with 'denary' set to replace binary

Denary 'a bigger deal' than quantum, says leading expert Professor Paol Folir

clock 01 April 2019 •

Software

AI will replace coders by 2040, warn academics

Thought a career in computing would be a job for life? Think again, suggest Oak Ridge National Laboratory researchers

clock 06 December 2017 •
What can go wrong when security is ignored during development?

Security

What can go wrong when security is ignored during development?

Make developers responsible for security from the start, argues MWR InfoSecurity's Filippos Raditsas

clock 04 December 2015 •
'A whole new world': How Chef DevOps tools help JustGiving make new deployments in minutes

Business Software

'A whole new world': How Chef DevOps tools help JustGiving make new deployments in minutes

'Ultimately we're getting far more out the door,' JustGiving CIO Richard Atkinson tells Computing's Danny Palmer

clock 06 November 2015 •
Meet the app intending to revolutionise healthcare communications

Health

Meet the app intending to revolutionise healthcare communications

Mumoactive, brainchild of entrepreneur Sheldon Steed, is an app which helps people manage diabetes. But it's also much, much more

clock 15 October 2015 •

Software

Ada Lovelace Day: Celebrating the world's first computer programmer

From phrenology to the Analytical Engine, Lovelace blazed towards a critical IT function

clock 13 October 2015 • 2 min read
Open source less secure than commercial software, claims report

Software

Open source less secure than commercial software, claims report

Coverity report claims commercial software 'more in compliance' with security standards than open source

clock 04 August 2015 •

Internet

Mighty Morphin' Brand Management: How Saban supercharged an international web context expansion

Months of work was completed in just three weeks thanks to what the firm learned during the tendering process

clock 31 July 2015 • 5 min read
123
Most read
01

Cyberattack hits NHS 111, users warned of delays

08 August 2022 • 2 min read
02

NHS staff told to plan for three weeks of disruption following cyberattack

11 August 2022 • 2 min read
03

Three injured in Google data centre explosion

09 August 2022 • 2 min read
04

Computing announces the UK's most influential IT leaders

11 August 2022 • 2 min read
05

Hackers holding NHS IT to ransom

12 August 2022 • 2 min read
  • Contact us
  • Marketing Solutions
  • About The Channel Company
  • Privacy Settings
  • Terms & Conditions
  • Policies
  • Careers
FOLLOW US

© The Channel Company EMEA
New London House, 172 Drury Lane, London WC2B 5QR.Registered in England and Wales with company registration number 14078896

Loading