NEWS
Chatbots Lend a Helping Hand: 3 Ways Conversational Interfaces are Helping Non-Profits

Needless to say, the opportunities the Internet has created have been transformational for charities and non-profits: by making online guidance available to all, they’ve been undoubtedly been able to inform and help more people. And by introducing e-commerce into the equation, it’s easier than...

Read More
NEWS
How to Effectively Manage Cyber Threats on Critical Infrastructure

Criminals are tirelessly attacking critical infrastructure (CRITIS) around the world and compromising the Industrial Control System (ICS) and the Supervisory Control and Data Acquisition (SCADA) systems that control these infrastructures. In 2010, the Stuxnet worm infiltrated numerous control...

Read More
NEWS
Five ways organisations can prepare their workforce for IoT

Gartner predicts that 25 billion connected things will be in use by 2021. This presents a huge opportunity for businesses to harness data, optimise their operations and deliver more personalised experiences to users. By Martin Ewings, Director of Specialist Markets, Experis.

Read More
NEWS
Why edge computing and VDI make the perfect pair

Virtual Desktop Infrastructure (VDI) - a technology that can make fully-personalised, individual desktop virtual machines with user profile control and golden imaging, is realising new levels of growth recently, with the global VDI market expected to be worth almost $5 billion by 2020. By...

Read More
NEWS
The benefits and limitations of remote data centre control

Data centres comprise a complex and changing collection of IT and communications equipment housed...

Read More
NEWS
AI skills are essential for businesses, and you can’t just wait for universities for produce new talent

There’s a global shortage of artificial intelligence (AI) talent; labour markets all over the...

Read More
NEWS
“Making Connections” – How IOT-based Technology Transforms Local Government

The digital revolution has transformed how assets are managed and services are delivered for...

Read More
NEWS
Smart field service begins with the IoT

In this article, Steve Smith, VP, Strategic Industries at ClickSoftware explains how IoT and...

Read More
NEWS
Going in deep - why collaboration is the key to cybersecurity

Fighting cybercrime is a never-ending arms race. If businesses want to get ahead of the bad guys,...

Read More
NEWS
Avoiding future legal problems when starting a digital business

Within the fast-moving digital world, with its large number of start-ups, it is extremely important...

Read More
NEWS
Outsourcing maintenance makes sense

Bill Raftery, SVP of Global Storage Solutions, Curvature, discusses the advantages of outsourcing...

Read More
NEWS
Data centres: Why They Need Water Leak Detection Systems

Water leak detection is commonly installed in datacentres, communications rooms and other...

Read More

Videos

Lenaik Andrieux, General Manager – Power Systems EMEA, India & Australia, Rehlko, explains how the acquisition of The Wilmott Group, a UK-based supplier of critical backup-power solutions, makes Rehlko one...
Dan Evans, Associate Director at Lichfields, discusses the results of the company’s recent data centre study, which finds that, for developers, Scotland offers something few regions or countries can match -...
Erin McLean, CMO at Cynomi, explains how MSPs can use embedded CISO intelligence to manage enterprise-wide cybersecurity programs. She discusses translating technical controls into business outcomes, engaging...
DCW Asia 2025 - Part 3 of 3

News

Westcon-Comstor launches Tech Insights, a programme for channel partners to assess IT environments and identify potential risks.
Infosecurity Europe introduces a new programme to support cybersecurity startups, aiming to foster innovation and growth across the UK's cyber ecosystem.
LINX achieves new global traffic record across multiple regions, driven by live sports streaming.
A recent survey uncovers the high stress levels experienced by UK IT and cyber professionals, highlighting the fear of job loss following a breach.