IBM brings Watson to Africa

IBM has launched a 10-year initiative to bring Watson and other cognitive systems to Africa in a bid to fuel development and spur business opportunities across the world’s fastest growing continent. Dubbed “Project Lucy” after the earliest known human ancestor, IBM will invest...

Read More
Datenklau bei Yahoo! – Wie Nutzer und Unternehmen sich schützen sollten

Yahoo! hat seine Nutzer angewiesen, ihre Passwörter zu ändern, nachdem es durch eine „koordinierte Aktion“ zu einem Datenleck gekommen ist.

Read More
HP-Studie: Gut 80 Prozent aller Anwendungen mit Sicherheitslücken

Neuer "HP Cyber Risk Report" analysiert Schwachstellen in der Unternehmens-IT Mobile Endgeräte, unsichere Software und Java sorgen für neue Risiken

Read More
Akamai Kona Site Defender erzielt bei der Erkennung von Web-Attacken eine Trefferquote von 96 Prozent

Mit der neuen Version von Kona Site Defender verbessert Akamai die Websicherheit noch einmal...

Read More
Silver Peak Accelerated IPsec: Kostenloser Schutz gegen Datendiebstahl

AES-Verschlüsselung mit 256-Bit-Keys für Site-to-Site-VPNs in Verbindung mit...

Read More
Dimension Data acquires NextiraOne assets

Dimension Data has acquired certain subsidiaries of NextiraOne, the European multinational company...

Read More
Avnet Technology Solutions UK collaborates with international law firm

Simmons & Simmons hosts Avnet’s first FinancialPath™ University event in London.

Read More
Serco wins €60m contract to extend IT Support Services to the European Parliament

Serco has been awarded a contract by the European Parliament to consolidate and transform their IT...

Read More
Sysadmin Awards launched by Melbourne

Melbourne Server Hosting, the agile provider of complex cloud and managed server hosting solutions...

Read More
BYOx threatens to disrupt the IT landscape

SolarWinds has released the results of its New IT Survey-, which sheds light on the evolving role...

Read More
Grant Thornton announces new global technology industry group

Grant Thornton has announced the creation of a global technology industry group. The group will...

Read More
IT pushing for greater collaboration on digital strategies, while marketing expects IT to solve its complex challenges

New research report from EPiServer reveals disconnect between perceived value of marketing and IT...

Read More
Arbor-Sicherheitsbericht 2013:

Dramatische Zunahme von hochvolumigen DDoS-Angriffen, APTs und Angriffen auf mobile Netzwerke

Read More
Syncsort Data Protection heißt jetzt Catalogic Software™ Innovationen für intelligentere Datensicherung

Catalogic Software, Pionier im Bereich intelligente Datensicherung und -verwaltung, hat sich als...

Read More

Videos

James Netherwood, Head of Research Middle East, Capacity and Datacloud, discusses the upcoming Capacity Middle East event and the launch of Datacloud Middle East. The events unite over 3,500 executives from...
Dan Evans, Associate Director at Lichfields, discusses the results of the company’s recent data centre study, which finds that, for developers, Scotland offers something few regions or countries can match -...
Martin Jakobsen, Founder and Director of Cybanetix, explains how his team takes a “paranoid” security approach, using AI, automation, and analyst training to proactively detect threats. He discusses why...
Erin McLean, CMO at Cynomi, explains how MSPs can use embedded CISO intelligence to manage enterprise-wide cybersecurity programs. She discusses translating technical controls into business outcomes, engaging...

Expert Opinions

This year is set to be a pivotal year for cloud strategy, with repatriation gaining momentum due to shifting legislative, geopolitical, and technological pressures. This trend has accelerated, with a growing...
By David Sewell, Chief Technology Officer, Synechron.
By TES Group, specialists in manufacturing reliable, high-quality, high-performance power distribution and monitoring systems.