Logo
Comprehensive heat load testing for an industry-leader in cloud computing
  • Published in

Temperature control is integral to the build and layout of a data centre, and heat load testing is a crucial part of its system maintenance routine. It provides timely identification of issues and ensures they can be dealt with before they cause problems, leaving companies confident that equipment...

Read More
Users can expect more frequent software auditing to plug 19% vendor revenue shortfall

Against a backdrop of declining global revenues, the recent release of the Business Software Alliance (BSA) Global Software Survey findings provides some interesting reading. It estimates that US $62.7 billion worth of commercial software was being used illegally around the world in 2013.

Read More
Cloud helps solar specialist to shine
  • Published in

A Sheffield-based cloud computing specialist is helping to fuel record-growth at renewable energy specialists The Green Deal Initiative after securing a contract to overhaul its IT infrastructure.

Read More
Fujitsu unveils major step towards business-centric data centre
  • Published in

Fujitsu announces the introduction of its new, comprehensive line-up of Integrated Systems for the data centre, helping ICT managers to make immediate progress in focusing on end-user needs in a move towards the data centre becoming more business centric.

Read More
Nearly 70 percent of critical infrastructure providers have been breached in the past year

Utility, oil and gas, energy and manufacturing organisations unprepared for both internal and...

Read More
Introducing Microsoft Azure StorSimple

Microsoft has introduced the Microsoft Azure StorSimple solution.

Read More
Gridstore debuts 48TB node

Gridstore™ is showcasing their new 48TB 2U nodes at the Microsoft Worldwide Partner...

Read More
Gridstore supports Microsoft System Center 2012

Gridstore™ has announced the integration of Gridstore 3 with Microsoft System Center 2012,...

Read More
BitTitan and Vaultive announce Office 365 Data Encryption at WPC 2014

Strategic partnership makes enterprise-class technology accessible to SMBs via the cloud.

Read More
Six Degrees provides HOPEHIV

Six Degrees Group (6DG), a converged technology infrastructure provider, has raised £13,690...

Read More
Cloudamour honoured with the prestigious Microsoft Worldwide Cloud Partner of the Year 2014 Award

Cloudamour was formally honoured with the prestigious Microsoft Worldwide Cloud Partner of the Year...

Read More
IBM announces $3 billion research initiative to tackle chip challenges

Scientists and engineers to push limits of silicon technology to 7 nanometers and below and create...

Read More
Cloud translates to competitive advantage for UK businesses

55 per cent of organisations believe Cloud services have enhanced their competitiveness.

Read More
What should be driving cloud adoption in UK businesses

Paul Kinsella, General Manager Europe, j2 Global ponders whether the UK’s take up of cloud...

Read More
Even IT professionals don’t encrypt

A survey conducted on behalf of Voltage Security has shown that a surprising number of security...

Read More

Videos

Data Centre World 2026
Daniel Reeves, CEO of The Computer Clinic Bicester, shares how the business has evolved from its roots into a modern IT services provider supporting both consumers and organisations. He discusses shifting...
Phylip Morgan, Senior Vice President, Marketplace & Channel Expansion at Pax8, explores the shift from Managed Service Providers to Managed Intelligence Providers and what it means for the future of the...
In this interview, Will Morey, Managing Director at Gamma, discusses the company’s Webex launch, including how a partner-led pre-launch shaped the offering, the influence of MSP demand, and how the platform...

Expert Opinions

By Anna Marie Clifton, Director of Product, AI and Agents, at Zapier.
By Michael Vallas, Global Technical Principal, Goldilock Secure.
By Brett Candon, VP International, Dropzone AI.
Even in 2026, insecure code often stems from time pressure and simple mistakes rather than intent. This guide outlines five common software security pitfalls, how to identify them, and how to fix them before...