NEWS
Kubernetes and containers - powering tomorrow’s applications

Containers and Kubernetes are the driving force behind how the industry is reinventing the way we build and run applications, fueling enterprise IT efficiency. By James Petter, VP International at Pure Storage.

Read More
NEWS
Efficient monitoring: how to realise a return on investment from container use

Containerised applications are fast becoming an established fact in the IT infrastructure of global organisations. By John Rakowski, vice president of strategy at LogicMonitor.

Read More
NEWS
What are Linux containers?

Programs used to be made by creating large monolithic scripts, however, a lot has changed in the last two decades. There are now prominent methods in manufacturing applications that use small, self-contained programs in tandem to add extra functionality to hardware. Here Florian Froschermeier,...

Read More
NEWS
Open Source: Between myth and reality

Where does open source software stand today? That is a question that many are asking, with opinions...

Read More
NEWS
Bridging the OpenStack and Container Worlds

By Radhesh Balakrishnan, general manager, OpenStack, Red Hat.

Read More
Containers: the road to enterprise adoption

By Marco Ceppi, Ubuntu Product & Strategy Team, Canonical.

Read More
Building an Open Source strategy

By Sameet Agarwal, VP Engineering at Snowflake Computing.

Read More
NEWS
Building Online Communities: Deeplearning4j

We asked Adam & Chris, the founders of Deeplearning4j? —?first commercial-grade,...

Read More

Videos

DCW Asia 2025 - Part 3 of 3
Martin Jakobsen, Founder and Director of Cybanetix, explains how his team takes a “paranoid” security approach, using AI, automation, and analyst training to proactively detect threats. He discusses why...
In this conversation, ESET UK Country Manager, Matt Knell, discusses why MSPs must move beyond basic endpoint protection and adopt a layered, proactive security approach. He shares practical insights on MDR...
Erin McLean, CMO at Cynomi, explains how MSPs can use embedded CISO intelligence to manage enterprise-wide cybersecurity programs. She discusses translating technical controls into business outcomes, engaging...

News

RETN has unveiled a new network route between Tallinn and Cēsis, enhancing connectivity across Europe while demonstrating resilience during a real-world failure event.
The Workiva 2026 Benchmark Survey highlights data validation and governance as top priorities for businesses, crucial for financial and non-financial reporting.
Genetec launches a UK-based data centre for its Security Center SaaS to ensure data sovereignty and compliance with local regulations.
Genetec introduces a dedicated UK data centre for its Security Center SaaS, ensuring compliance and data sovereignty amidst growing demand.