Logo
NEWS
10 reasons why great asset management is essential for smooth data centre operations

In any one enterprise organisation right now, there may be four or five separate asset management tracking systems or, more likely, several separate spreadsheets with different naming conventions and probably some overlaps and out-dated information. Many data centers are still managing their...

Read More
NEWS
The benefits and limitations of remote data centre control

Data centres comprise a complex and changing collection of IT and communications equipment housed within an environment that’s also multifaceted and challenging. Yet a host enterprise’s viability often depends critically on its data centre’s uninterrupted availability as a resource....

Read More
NEWS
Data centres: Why They Need Water Leak Detection Systems

Water leak detection is commonly installed in datacentres, communications rooms and other information technology dependent structures. After all it is crucial to protect these critical assets from both fire and floods by receiving the earlier possible notification of an incident, allowing action to...

Read More
NEWS
Why teams are still living in the dark ages?

How to solve the disconnect between manual and digital asset management. By Mark Gaydos, chief marketing officer, Nlyte.

Read More
NEWS
Choosing the right data centre solution for your business

The pace in which technology is advancing makes it near impossible to predict what the business...

Read More
NEWS
How to Use Aisle Containment to Increase Data Center Efficiency

For years, organizations have been using hot-aisle/cold-aisle configurations to manage airflow in...

Read More
NEWS
What’s next for HPC and the future of research innovation?

From big data analytics to genomics, complex science and education research is typically reliant on...

Read More
NEWS
Powering for the Future

Electricity is like air and water - something that we have all come to take for granted. But...

Read More
NEWS
Protect Your Data Center Hardware by Increasing Cabinet-Level Security

With so much emphasis placed on securing data across the network, endpoints and the cloud, it’s...

Read More
NEWS
Uncovering the hidden costs of cooling

STULZ UK’s Johnathan Attwood warns that environmental regulation is increasing the cost of...

Read More
NEWS
Goodbye Infrastructure, hello observability

With greater connectivity, comes increasing complexities. Today’s consumers expect business to...

Read More
NEWS
Lighting the Way to Productivity Growth

The intelligent building is a sleeping giant, in terms of its capability to deliver productivity...

Read More

Videos

Rishi Kapoor, WW Partner Sales Engineering Leader at Alteryx, shares how Alteryx One and the Partner SE model enable MSPs to transition from infrastructure management to high-value data and AI services. From...
Antti “Jogi” Poikola newly appointed Managing Director of the Finnish Data Center Association (FDCA), explains how Finland has an exceptional opportunity to become a leading country in sustainable digital...
In this in-depth conversation, Roy Azoulay, Co-founder and CIO of Cynomi, and Phil Bindley, Field CISO at Intercity Technology, explore how MSPs and MSSPs can turn regulatory compliance, AI governance, and...
In this interview, Kristen Knight, newly appointed VP of Channel Sales at Portnox, discusses the launch of the company’s global partner programme and its cloud-native, passwordless approach to network access...

News

AI is reshaping the cyber threat landscape for SMBs, with Nable's report Cybersecurity in the Age of AI: Moving from Fragile to Resilient examining resilience models designed to address modern, machine-speed...
Scality and WEKA have partnered to integrate their storage technologies, aiming to provide enterprises with a scalable AI storage solution designed to improve performance and reduce infrastructure complexity.
Securonix collaborates with AWS to introduce Sam the AI SOC Analyst, a model designed to enhance SOC productivity and governance.
Sophos’ latest report highlights the rise of identity-related cyberattacks, emphasising the need for robust identity security measures.