NEWS
Taking control of maintenance
  • Published in

Customer expectations have never been higher. Patience and tolerance for error is ever decreasing in the consumer world, where immediate results, on-hand service and uninterrupted availability are minimum requirements. It is imperative for organisations to ensure that consumer-facing assets are...

Read More
NEWS
AI Underpinned Document Management Essential to Detecting Malicious Behaviour
  • Published in

The frequency with which high-profile data breaches and massive data privacy violations appear in global headlines clearly demonstrates the need to manage information with more stringent security and privacy controls. By Aaron Rangel, Director Product Management at iManage.

Read More
NEWS
Bridge the IT skills gap
  • Published in

Artificial intelligence (AI) hasn’t always had favourable representation in pop culture. In Stanley Kubrick’s 2001: A Space Odyssey (1968), homicidal supercomputer Hal demonstrated how AI could surpass the intelligence of a human — and for humans, the results weren’t so great. In reality,...

Read More
NEWS
Botnets and machine learning: a story of “hide and seek”
  • Published in

Malware authors have always been trying to update their software and evolve their techniques in order to take advantage of new technologies and bypass security measures. By Leonidas Plagakis, Security Engineer, RiverSafe.

Read More
NEWS
Ten ways AI is transforming sales

In the world of commerce, AI has grown to become a useful and vital tool. One area of business...

Read More
NEWS
How the financial industry can connect securely to blockchain

With traders executing thousands of transactions a day, financial firms are investing large amounts...

Read More
NEWS
From Blockchain to Digital Twinning—Technologies That Can Revolutionise Business Models in Manufacturing

In the future, the success factors that will separate winners from losers in an increasingly...

Read More
NEWS
IoT security: Keeping connected devices secure over time

The technology industry is renowned for its relentless pace and rewards for first mover advantage....

Read More
NEWS
Telstra and Ericsson launch global enterprise IoT capability

Partnership combines Telstra’s cellular IoT capabilities and Ericsson’s connectivity services.

Read More
NEWS
Inmarsat and Microsoft Azure IoT join forces

New collaboration brings global access to Microsoft Azure IoT cloud services via satellite...

Read More
NEWS
Are Machines the New Face of Customer Service?

If you prefer not to deal with people when shopping, you’re not alone. Mitel’s recent study of...

Read More

Videos

Andy Bevan, Head of Propositions and Strategy Consulting at Daisy Corporate Services, discusses recent research findings which reveal that two-thirds of IT leaders say that legacy infrastructure is creating a...
Alexander Troshin, EMEA Product and Marketing Manager, Enterprise and HPC Server at AMD, outlines the energy efficiency challenges facing the data centre industry, with particular reference to power-efficient...
Libby Duane Adams, Chief Advocacy Officer and Co-Founder at Alteryx, believes that businesses can’t afford to fall behind in their AI and data strategy – they must accelerate it to stay ahead of the curve...
Andrew Fettes-Brown, Rider Levett Bucknall (RLB) Global Board Director, Head of Data Centres at RLB UK and Europe, outlines the results of the company’s recent research, the results of which suggest that the...

News

Hexaware Technologies has acquired Softcrylic, a premier data consulting firm headquartered in Minneapolis. This strategic acquisition bolsters Hexaware's data and analytics capabilities, enabling the company...
XM Cyber has released the findings of its third annual research report, Navigating the Paths of Risk: The State of Exposure Management.
Record growth follows 42% increase in revenues in FY23 as Oracle partner bolsters expansion in UK and India.
Cato Networks has unveiled the findings of its inaugural Cato CTRL SASE Threat Report for Q1 2024. The report shows all organisations surveyed continue to run insecure protocols across their wide access...