Logo
NEWS
Shadow IT continues to give cause for concern
  • Published in

As cloud computing re-charts the path of enterprise IT, organisations are vastly underestimating the level of shadow IT in their cloud ecosystems. CipherCloud has unveiled the results of the industry’s first comprehensive study of cloud usage and risks from 2014, compiled from enterprise...

Read More
C4L’s Connectivity helps partner deliver cloud access solutions
  • Published in

Securus, the private wide area network provider, has been utilising C4L’s Colocation and Connectivity services, including IP Transit, to give their customers multiple access routes to their cloud infrastructures. Securus’ view that access to the cloud is of critical importance, has seen...

Read More
NEWS
Click and Collect services boom
  • Published in

A report from App Annie and Kantar Retail reveals the vital role mobile apps play for retailers looking to offer a true omni-channel shopping experience.

Read More
Managing the Cloud
  • Published in

Kaseya has launched Release 9 of its product portfolio. This release delivers a new, comprehensive solution for mobility management, and also includes the launch of Kaseya's new private cloud infrastructure, which delivers unprecedented levels of scalability, security and performance to its...

Read More
Re-architecting IT, thanks to Equinix

Equinix, Inc. has experienced significant growth and momentum within the enterprise market.

Read More
NEWS
Farming industry must embrace the Internet of Things Vision

Beecham Research launches ‘Towards Smart Farming’ report.

Read More
NEWS
Resellers need to evolve their cloud services in line with customers’ requirements

Research shows that many resellers risk losing cloud customers because they aren’t broadening...

Read More
Redcentric wins place on all four lots of revamped G-Cloud 6

Cloud services provider welcomes changes brought by newly-named Digital Marketplace.

Read More
NEWS
FireHost teams with Dell

FireHost will be teaming with Dell Services to deliver secure, fully managed private cloud services...

Read More
BeyondTrust expands EMEA channel focus in 2015

New senior executive appointment, updated partner portal, training and certification enhancements...

Read More
The Bunker makes PCI v3.0 compliance black and white

One of the UK’s few VISA-approved Managed Services Hosting Provider removes guidance grey...

Read More
Data quality in the Cloud

Trillium Cloud provides the flexibility to implement a complete data quality offering in 30...

Read More
NEWS
Enterprises to spend more on transformational technologies in 2015

Data from a global survey conducted by Current Analysis reveals that IT decision makers plan to...

Read More
Cyber threat portal

Tier-3 Huntsman has launched Analyst Portal, that enables automated investigation, validation and...

Read More
HP delivers Day 1 storage support for VMware launches

HP is delivering Day 1 support and certification for vSphere 6 and vSphere Virtual Volumes across...

Read More

Videos

Paul Christensen, Macquarie Data Centres General Manager, discusses the company’s 47MW IC3 Super West Sydney AI data centre, in the context of its plans to build out some 200MW of AI and cloud capacity in...
In this interview, Aaron Watts, Chief Channel Officer at usecure, explains why people, not just technology, are now the primary target for cyberattacks. He explores how MSPs can balance automation with...
Jason Feist, Seagate SVP, Go-to-Market, discusses Seagate Technology’s next-generation Mozaic™ 4+ platform, said to be the industry’s only heat-assisted magnetic recording (HAMR)–based storage platform...
Data Centre World 2026

Expert Opinions

By Matt Roberts, VP of Sales, OptiCool Technologies.
Neal Griffiths, Chief Experience Officer at Matrix Booking explores how human-centred design, underpinned by evidence and empathy, is redefining how organisations create flexible, inclusive and high-performing...
Even in 2026, insecure code often stems from time pressure and simple mistakes rather than intent. This guide outlines five common software security pitfalls, how to identify them, and how to fix them before...