NEWS
Choosing the right data centre solution for your business

The pace in which technology is advancing makes it near impossible to predict what the business landscape will look like in five years’ time. One thing is for certain: IT requirements are changing and will continue to do so for the unforeseeable future. By Tom Adams, Director of Product...

Read More
NEWS
Five ways to empower SaaS start-ups

There are a lot of SaaS companies. A lot. LinkedIn lists over 44,000 SaaS companies, while business software review site G2 lists over 142,000 SaaS software products available to review. Gartner has even estimated over 250,000 SaaS companies to be in existence. BY Daniel Twigg is Marketing...

Read More
NEWS
GDPR – one year on

How has GDPR changed the security and compliance landscape? Over the following pages, you’ll find a range of views and opinions as to what’s changed, for better and worse! Here, we start with a GDPR Q and A with Mark Thompson, Global Privacy Lead, KPMG.

Read More
NEWS
The five myths of GDPR

May 2019 marks the first anniversary of the General Data Protection Regulation (GDPR), and early numbers make clear that its implementation has been a success as a breach notification law. As such, GDPR has affected multiple aspects of a business. It has created increased requirements for...

Read More
NEWS
CAE S.p.A. Reduces Hardware Dependency, Energy Costs and Management Time with SvSAN

StorMagic® has announced a customer win with Bologna, Italy-based manufacturer, CAE S.p.A. CAE’s...

Read More
NEWS
Don’t fear the chatbot – it’s here to help

80% of sales and marketing leaders are either already using chatbots as part of their customer...

Read More
NEWS
How to Use Aisle Containment to Increase Data Center Efficiency

For years, organizations have been using hot-aisle/cold-aisle configurations to manage airflow in...

Read More
NEWS
Digital Transformation in the Public Sector: The Magic Trio for Success

Consumer expectations of how services should be delivered today are high. Increasingly, we have...

Read More
NEWS
How SD-WAN is Transforming Networks for Enterprises

Large enterprise level businesses, or smaller businesses that are beginning to expand, face major...

Read More
NEWS
Why organisations should mask data on demand to protect privacy across enterprise

Today’s organisations realise that data is a critical enterprise asset, so protecting that data...

Read More
NEWS
Open source v commercial parallel file systems – truth and fiction in an HPC world

High-Performance Computing (HPC) and its ability to store, process and analyse vast amounts of data...

Read More
NEWS
Why Structured Cabling Is Critical for the Industrial Internet of Things

The structured cabling market is expected to grow from $11 billion in 2018 to $25 billion by 2025,...

Read More

Videos

Nicolas Leszczynski, Principal Solutions Engineer at Riverbed Technology, discusses the findings of the company’s 2025 Future of IT Operations in the AI Era report. Despite record investments, only 12% of AI...
Keith Young, Global Head of Last Mile Services at Arvato, explains how the recent entry into the US data centre market is the latest step in the strategic integration of ATC, the Irish logistics company that...
Richard Jelbert, CEO of Cyberrock, discusses how, in today’s fast-changing digital landscape, businesses of all sizes face relentless cyber threats often without the dedicated resources or in-house expertise...
Irvin Shillingford - Regional Manager Northern Europe at Hornetsecurity, discusses the results from the company's annual Ransomware Impact Report, with a rise in ransomware attacks the headline finding. Irvin...

News

Skillsoft partners with edX to enrich its platform with university courses, bridging skills gaps in the evolving workforce.
Carbon3.ai launches NVIDIA Blackwell Ultra AI systems with HPE liquid-cooling, revolutionising AI performance and sustainability.
Red Hat expands its AI capabilities with Chatterbox Labs, emphasising AI safety and security within a hybrid cloud platform.
Trellix unveils innovations in cybersecurity, bolstering the convergence of OT-IT environments and enhancing perimeter defence against sophisticated threats.