Logo
F5 enhances application availability
  • Published in

Interoperability improves disaster recovery/business continuity across data centre and VMware cloud environments.

Read More
PTC to acquire Axeda
  • Published in

Axeda’s connectivity expertise to extend PTC’s ability to deliver secure, closed loop lifecycle management for smart, connected products.

Read More
FireEye and Quantum team
  • Published in

New partnership enables enterprises to easily conduct cybersecurity investigations and improve security against advanced attacks.

Read More
Further changes likely to hinder G-Cloud adoption at local government level, says Databarracks

The lack of guidance and clarity surrounding the new G-Cloud Security Approach and the recently changed Government Security Classifications will only add further confusion for local government departments considering procuring services through the G-Cloud framework, warns Peter Groucutt, managing...

Read More
KDDI invests a further £135m into Telehouse’s London Docklands data centre campus

Telehouse North Two will be a major investment in a next generation mission-critical data centre,...

Read More
NAKIVO releases v4.1 for VMware Cloud, Hosting, and Service Providers

NAKIVO introduces new features that enable monitoring, automation, and orchestration of VMware data...

Read More
ICT investments in Singapore and Malaysia are on the rise

Enterprises in Singapore and Malaysia will increase their ICT spendings in 2014, says new research...

Read More
Daisy Group awarded Royal Institution of Chartered Surveyors (RICS) contract

Business communications firm Daisy Group has been named as the new supplier for RICS (Royal...

Read More
Colt Technology Services and Virtustream partner

Leading European service provider and US Enterprise Cloud Software provider enable mission-critical...

Read More
IT budgets and hiring stabilise in 2014

Complexity expected to grow in 2015 as IT budgets rise while IT departments feel a hiring squeeze.

Read More
MTI bolsters security offering with EnCase

Guidance Software brings digital investigation capabilities to the MTI Security Practice.

Read More
US$1 trillion to be spent on telecom and datacom over next five years

Market research firm Infonetics Research released data from its 2014 Telecom and Datacom Network...

Read More
Smartphone charging to consume almost 14,000 gigawatt-hours of dirty energy by 2019

A new report from Juniper Research has found that charging mobile devices will generate more than...

Read More
bluesource launches complete cloud archiving service

bluesource has launched EV247- said to be a unique, complete cloud archiving service, that combines...

Read More
ISACA outlines five principles for effective information and technology governance

In new guidance issued today, global IT association ISACA outlines five principles organizations...

Read More

Videos

Pete Hughes, Founder and Managing Director of Zalara Tech, shares how building a business in the age of AI shapes growth and delivery, and why success depends on understanding that AI is never a...
Mostyn Thomas, Senior Director of Security EMEA at Pax8, breaks down how ransomware is evolving, what the new Cyber Essentials standards mean in practice, why attackers are increasingly targeting supply...
Daniel Reeves, CEO of The Computer Clinic Bicester, shares how the business has evolved from its roots into a modern IT services provider supporting both consumers and organisations. He discusses shifting...
Laura Allwood, now a fully qualified Project Manager at Arcadis, outlines her journey from Apprentice Project Manager to her current role - along the way obtaining a degree in Construction Management and...

Expert Opinions

By Graham Jarvis, Freelance Business and Technology Journalist
By Dan Bridges, Technical Director, Dropzone AI.
By Robert Hannigan, Chairman of International Business at BlueVoyant.
By Mihir Nandkeolyar, Director Business Development Global Data Centre Solutions, Johnson Controls.