Logo
NEWS
IoT is the fastest growing force affecting PKI planning and evolution
  • Published in

Organisations apply stronger PKI security controls due to their increasingly critical role today.

Read More
NEWS
DigiCert, Gemalto and ISARA partner
  • Published in

Partnership aims to deliver secure, post-quantum-ready PKI with end-to-end roots of trust and safe, reliable key management for next-gen IoT devices.

Read More
NEWS
BMC strengthens its TrueSight AIOps Platform
  • Published in

New use cases for IT Operations leverage artificial intelligence to improve agility and efficiency.

Read More

Videos

Robert Schuetzle, CEO of Infinium, explains that, as power densities of GPUs, CPUs and supporting components continue to rise, cooling has emerged as one of the primary constraints to data centre performance,...
Dr. Peter de Bock, vice president, Data Center Energy and Cooling Technology, Eaton, discusses what the launch of the NVIDIA Rubin platform means for data centre power demand, explaining that it could be a...
Simon Kerr, head of heat networks at EnergiRaven, discusses the recent analysis from EnergiRaven and Viegand Maagøe finds that projected growth in data centres will produce enough waste heat to warm millions...
Nigel Hedges, Application and Technical Specialist at Fluke Networks explains that, as fibre density increases and performance margins tighten; driven by AI, cloud, and next-generation digital infrastructure,...

Expert Opinions

New research shows water use by data centers worldwide will more than triple by 2050, impacting water-stressed regions the most. Water scarcity poses a material risk to data center operations and expansion....
AI growth makes datacenters prime targets for drones, requiring radar-led, multi-sensor airspace security to detect threats, prevent disruptions, and protect critical infrastructure. By Kara Quesada,...
By George Tziahanas, AGC and VP of Compliance at Archive360.
Sam Kirkman, Director of Services, EMEA at NetSPI, on why organisations need proof, not promise, when it comes to third-party security.