Digital Transformation driving the need for digital workforce management solutions

According to Back Office Workforce Optimisation pioneer, eg solutions, Digital Transformation is leading to back office activities breaking out of their traditional bricks and mortar role and function, as organisations seek to dramatically improve their service customer propositions.

Read More
Putting the CIO back in control

New service creates an enterprise-grade hybrid cloud that works seamlessly with public clouds, with maximum application performance and security.

Read More
Ceph Community forms Advisory Board

Charter members include leaders from Canonical; CERN; Fujitsu; Intel; Red Hat; SanDisk; SUSE.

Read More
Redweb step into virtual reality with Cancer Research UK
  • Published in

Redweb are pleased to announce that they have collaborated with longstanding client Cancer Research UK to explore the world of virtual reality. Cancer Research UK, the world’s leading cancer charity and client of Redweb’s since 2013, approached the leading UK digital agency in August...

Read More
Setting a new standard in data centre Interconnect?

Coriant has introduced the Coriant Groove™ G30 DCI Platform, a stackable transport solution...

Read More

Videos

Dan Wensley, CEO of the Global Technology Industry Association (GTIA), discusses how MSPs must collaborate as AI adoption accelerates across the industry. He explains why community, peer learning, and open...
Data Centre World 2026
Phil Cullerton, VP Services EMEA at Vertiv, explains why services will define the future of the data centre. The future of the data centre is not just about who builds fastest, it is about who operates best....
Greg Gyves, Director of Global MSP & GSI at TeamViewer, explores the real operational pressures MSPs are dealing with. He highlights expanding service boundaries, rising complexity, and the constant push to do...

Expert Opinions

By Michael Vallas, Global Technical Principal, Goldilock Secure.
Even in 2026, insecure code often stems from time pressure and simple mistakes rather than intent. This guide outlines five common software security pitfalls, how to identify them, and how to fix them before...