Red Bull Racing teams with IBM

Red Bull Racing has renewed its agreement to team with IBM Spectrum Computing for a further four years, until 2020. Red Bull relies on IBM Spectrum software to manage the data used in the design and development of its RB12 Formula One car, developed to compete in the 2016 season.

Read More
Digital Transformation driving the need for digital workforce management solutions

According to Back Office Workforce Optimisation pioneer, eg solutions, Digital Transformation is leading to back office activities breaking out of their traditional bricks and mortar role and function, as organisations seek to dramatically improve their service customer propositions.

Read More
Putting the CIO back in control

New service creates an enterprise-grade hybrid cloud that works seamlessly with public clouds, with maximum application performance and security.

Read More
Ceph Community forms Advisory Board

Charter members include leaders from Canonical; CERN; Fujitsu; Intel; Red Hat; SanDisk; SUSE.

Read More
Redweb step into virtual reality with Cancer Research UK

Redweb are pleased to announce that they have collaborated with longstanding client Cancer...

Read More
Setting a new standard in data centre Interconnect?

Coriant has introduced the Coriant Groove™ G30 DCI Platform, a stackable transport solution...

Read More

Videos

Data Centre World 2026
Data Centre World 2026
Mostyn Thomas, Senior Director of Security EMEA at Pax8, breaks down how ransomware is evolving, what the new Cyber Essentials standards mean in practice, why attackers are increasingly targeting supply...
Luca Simonelli, Senior Vice President Channel & Global Alliances at GCX, explains the move toward converging underlay and overlay models, and how this is shaping unified networking and security delivery. He...

Expert Opinions

By Chris Carreiro, Chief Technology Officer, Park Place Technologies.
By Roy Azoulay, Co-founder, Chief Information & AI Officer at Cynomi.
Even in 2026, insecure code often stems from time pressure and simple mistakes rather than intent. This guide outlines five common software security pitfalls, how to identify them, and how to fix them before...