Red Bull Racing teams with IBM

Red Bull Racing has renewed its agreement to team with IBM Spectrum Computing for a further four years, until 2020. Red Bull relies on IBM Spectrum software to manage the data used in the design and development of its RB12 Formula One car, developed to compete in the 2016 season.

Read More
Digital Transformation driving the need for digital workforce management solutions

According to Back Office Workforce Optimisation pioneer, eg solutions, Digital Transformation is leading to back office activities breaking out of their traditional bricks and mortar role and function, as organisations seek to dramatically improve their service customer propositions.

Read More
Putting the CIO back in control

New service creates an enterprise-grade hybrid cloud that works seamlessly with public clouds, with maximum application performance and security.

Read More
Ceph Community forms Advisory Board

Charter members include leaders from Canonical; CERN; Fujitsu; Intel; Red Hat; SanDisk; SUSE.

Read More
Redweb step into virtual reality with Cancer Research UK

Redweb are pleased to announce that they have collaborated with longstanding client Cancer...

Read More
Setting a new standard in data centre Interconnect?

Coriant has introduced the Coriant Groove™ G30 DCI Platform, a stackable transport solution...

Read More

Videos

Matthew Martin, Managing Director of Quantum Design Oxford, discusses the critical role that quantum data centres will play in advancing the deployment of quantum technologies. He explains how quantum data...
Data Centre World 2026
Mostyn Thomas, Senior Director of Security EMEA at Pax8, breaks down how ransomware is evolving, what the new Cyber Essentials standards mean in practice, why attackers are increasingly targeting supply...

Expert Opinions

By Chris Carreiro, Chief Technology Officer, Park Place Technologies.
By Arun Manoharan, Global Head of Strategy Enablement, UBDS Digital.
Even in 2026, insecure code often stems from time pressure and simple mistakes rather than intent. This guide outlines five common software security pitfalls, how to identify them, and how to fix them before...