NEWS
10 reasons why great asset management is essential for smooth data centre operations

In any one enterprise organisation right now, there may be four or five separate asset management tracking systems or, more likely, several separate spreadsheets with different naming conventions and probably some overlaps and out-dated information. Many data centers are still managing their...

Read More
NEWS
The benefits and limitations of remote data centre control

Data centres comprise a complex and changing collection of IT and communications equipment housed within an environment that’s also multifaceted and challenging. Yet a host enterprise’s viability often depends critically on its data centre’s uninterrupted availability as a resource....

Read More
NEWS
Data centres: Why They Need Water Leak Detection Systems

Water leak detection is commonly installed in datacentres, communications rooms and other information technology dependent structures. After all it is crucial to protect these critical assets from both fire and floods by receiving the earlier possible notification of an incident, allowing action to...

Read More
NEWS
Why teams are still living in the dark ages?

How to solve the disconnect between manual and digital asset management. By Mark Gaydos, chief marketing officer, Nlyte.

Read More
NEWS
Choosing the right data centre solution for your business

The pace in which technology is advancing makes it near impossible to predict what the business...

Read More
NEWS
How to Use Aisle Containment to Increase Data Center Efficiency

For years, organizations have been using hot-aisle/cold-aisle configurations to manage airflow in...

Read More
NEWS
What’s next for HPC and the future of research innovation?

From big data analytics to genomics, complex science and education research is typically reliant on...

Read More
NEWS
Powering for the Future

Electricity is like air and water - something that we have all come to take for granted. But...

Read More
NEWS
Protect Your Data Center Hardware by Increasing Cabinet-Level Security

With so much emphasis placed on securing data across the network, endpoints and the cloud, it’s...

Read More
NEWS
Uncovering the hidden costs of cooling

STULZ UK’s Johnathan Attwood warns that environmental regulation is increasing the cost of...

Read More
NEWS
Goodbye Infrastructure, hello observability

With greater connectivity, comes increasing complexities. Today’s consumers expect business to...

Read More
NEWS
Lighting the Way to Productivity Growth

The intelligent building is a sleeping giant, in terms of its capability to deliver productivity...

Read More

Videos

Stephen Douglas, Head of Market Strategy at Spirent, discusses the company’s 5th annual 5G outlook report, which finds that 5G Standalone (SA) market is picking up significant speed, alongside similar...
Patrick Aronson, Chief Marketing Officer and APAC Executive Vice President at Westcon-Comstor, looks at the challenges and opportunities for MSPs and other channel partners around data, as outlined in the...
Venessa Moffat, EMEA Channel Manager, Ekkosense and Nick Ewing, MD of Efficiency IT, discuss the new partnership between the two companies which brings together EIT’s expertise in data centre design, build,...
Alex Hoff, Co-Founder and Chief Strategy Officer at Auvik, discusses the results of the company’s recent IT Trends 2024 Industry Report, which explains how the ongoing skills shortage is shaping IT...

News

85% of CFOs are expecting to take on a more significant role in shaping business strategy.
New Data Security Posture Management (DSPM), Inline email protection and Gen-AI security advancements safeguard data-in-motion and data-at-rest across all exfiltration channels.
New hybrid cloud storage, private cloud offerings and storage investment protection enable enterprises to transform through automation and data insights on the HPE GreenLake cloud.
The combined company will bring together two cybersecurity SIEM and UEBA innovation leaders with renowned and demonstrated track records in serving customers with effective threat detection, investigation, and...