Six Red-hot IoT Predictions for 2018

By Matt Smith, CTO at Software AG.

Read More
2018 IoT Predictions

By Mike Bell, EVP Devices & IoT, Canonical.

Read More
Cybersecurity Predictions for 2018

NordVPN offers predictions and advice for 2018.

Read More
Clarifying digital transformation – before it’s too late

With DX beginning to suffer from the same over hyping that has beset far too many IT industry...

Read More
GDPR and Machine Learning to be dominating topics

As 2017 comes to an end, the impending implementation of GDPR looms and the rise of automation...

Read More
GDPR: protect your data, recover more quickly.

By David Trossell, CEO and CTO of Bridgeworks.

Read More
NEWS
To buy or to build? That is the question

By Mark Baker, Field Product Manager, Canonical.

Read More

Videos

Richard Jelbert, CEO of Cyberrock, discusses how, in today’s fast-changing digital landscape, businesses of all sizes face relentless cyber threats often without the dedicated resources or in-house expertise...
Irvin Shillingford - Regional Manager Northern Europe at Hornetsecurity, discusses the results from the company's annual Ransomware Impact Report, with a rise in ransomware attacks the headline finding. Irvin...
Benoit Fleury, CPO Business Director at Corning, explains how Corning is collaborating with GlobalFoundries to develop detachable fibre connector solutions for the GF Fotonix™ silicon photonics platform. The...
Benoit Fleury, CPO Business Director at Corning, explains how Corning is collaborating with GlobalFoundries to develop detachable fibre connector solutions for the GF Fotonix™ silicon photonics platform. The...

News

Red Hat expands its AI capabilities with Chatterbox Labs, emphasising AI safety and security within a hybrid cloud platform.
Cognizant partners with Microsoft to infuse AI across enterprises, propelling innovation and enhancing operational efficiency.
StorONE's platform meets HPE's standards, enabling organisations to efficiently leverage HPE ProLiant Gen11 servers.
Trellix unveils innovations in cybersecurity, bolstering the convergence of OT-IT environments and enhancing perimeter defence against sophisticated threats.