Cloud Computing enters its second decade

As cloud computing evolves, it should move away from experimentation and towards enterprise-wide implementation. By Kasey Panetta, Gartner.

Read More
Outdated data centre remote monitoring systems can threaten uptime

By Victor Avelar, Director and Senior Research Analyst, Schneider Electric Data Center Science Center.

Read More
Leaping into the cloud to develop enterprise apps

By Monica Brink, Director of Marketing, iland.

Read More
NEWS
The biggest expectations for MWC 2017

The tech and mobile industries will soon gather at Mobile World Congress to discuss the very...

Read More
NEWS
How CSOs can avoid the shadow of a cyber security Groundhog Day

By Duncan Hughes, Systems Engineering Director, EMEA, A10 Networks.

Read More
The ruling on cloud computing

By Monica Brink, Director of Marketing EMEA, iland.

Read More
Mashing it up on a connected data centre campus

By Dale Green, Marketing Director, Digital Realty.

Read More

Videos

Howard Pheby, newly appointed Chief Commercial Officer at Stellanor, explains how the company is building something different: urban colocation that serves enterprises where they actually operate, backed by...
Alex Adamopoulos, Chairman and CEO of Emergn, discusses the results of the company’s new research, which reveals that enterprise leaders now expect measurable returns from AI investments within months, not...
In this interview, Gal Yosef, Director of Solution Engineering at AlgoSec, discusses how AI is reshaping both cyber threats and defences, and why visibility, policy enforcement and operational discipline are...

News

Infosecurity Europe 2026 will explore the impact of geopolitics on cybersecurity, featuring insights from industry experts and research findings.
UK legal firms surpass global counterparts in AI adoption, driving efficiency and profitability.
The National Geographic Society is collaborating with AWS to digitise and centralise its media archives, enhancing preservation and storytelling capabilities.
The latest TCG specification aims to strengthen device security with post-quantum cryptography algorithms to defend against quantum attacks.