internet of things

Server manufacturers ramp-up edge AI efforts

Server manufacturers have long recognised the niche in public cloud computing that physical servers neatly fill. This has evolved over time to IT leaders and the industry recognising that some workloads will always be run on-premise; some may run both on the public cloud and on-premise; and some may be wholly cloud-based. Artificial intelligence (AI)…

Server manufacturers ramp-up edge AI efforts Read More »

Interview: James Fleming, CIO, Francis Crick Institute

Every digital leader likes to think their work helps boost a greater cause. For James Fleming, CIO at the Francis Crick Institute, that value-adding element is a core element of his job. “I go to sleep at night thinking that I’m helping cure cancer with computers,” he says, reflecting on his everyday roles and responsibilities.…

Interview: James Fleming, CIO, Francis Crick Institute Read More »

Data classification: What, why and who provides it

When it comes to managing data, we need to know where it is – but we also need to know what it is. With the rise in regulatory controls, enterprises now pay more attention to data sovereignty, especially when it comes to data in the cloud, but to know exactly what information they hold is…

Data classification: What, why and who provides it Read More »

First CyberBoost Catalyse startup cohort named

A group of 10 cyber security startups hailing from the UK, India, Singapore and the US have been named as the first cohort of companies selected for the recently launched CyberBoost Catalyse programme, a collaboration between London-based Plexal and the National University of Singapore (NUS). The group represents a diverse mix of seed to Series-B…

First CyberBoost Catalyse startup cohort named Read More »

NCSC exposes Chinese company running malicious Mirai botnet

The UK’s National Cyber Security Centre (NCSC) and its counterpart Five Eyes agencies have accused a China-based company acting as a front for the state of running a massive botnet comprising over 250,000 internet-connected devices, about 8,500 of them located in the UK. The compromised devices include enterprise network and security tools such as routers…

NCSC exposes Chinese company running malicious Mirai botnet Read More »

SAP public cloud migration requires architectural rethink

While almost three-quarters (74%) of in-progress SAP S/4HANA implementation projects are being deployed on public clouds, analyst Gartner has urged IT leaders to avoid simply mirroring their on-premise setups in the cloud. Gartner’s Top practices for deploying SAP S/4HANA in the public cloud report identifies several benefits of public cloud deployments, including the ability to…

SAP public cloud migration requires architectural rethink Read More »

Q&A: Adalbjorn Thorolfsson on IT project management in Iceland

The Icelandic Project Management Association was founded in 1984 by engineers and, as such, was initially focused on engineering projects. As project management evolved and became used in more sectors, such as information technology, healthcare, finance and the public sector, the composition of the members of the association and the board changed accordingly. Adalbjorn Thorolfsson…

Q&A: Adalbjorn Thorolfsson on IT project management in Iceland Read More »

Europol sting operation smokes multiple botnets

Some of the most prominent malware-dropping botnets in operation today, including Bumblebee, IcedID, Pikabot, Smokeloader, SystemBC and Trickbot, have been disrupted in a coordinated law enforcement action orchestrated through the European Union’s (EU’s) Europol agency. Operation Endgame, which enlisted the support of both the UK’s National Crime Agency (NCA) and the US’s FBI, as well…

Europol sting operation smokes multiple botnets Read More »

Storage technology explained: AI and data storage

Artificial intelligence (AI) and machine learning (ML) promises a step change in the automation fundamental to IT, with applications ranging from simple chatbots to almost unthinkable levels of complexity, content generation and control. Storage forms a key part of AI, to supply data for training and store the potentially huge volumes of data generated, or…

Storage technology explained: AI and data storage Read More »

5G networks and biometric breakthroughs: Navigating opportunities and risks

The launch of 5G networks has opened a new chapter in how we connect. This technology, known for its incredibly fast speeds and almost non-existent delay, is already changing how we use our devices and access the internet, and one area where 5G’s capabilities are making major waves is biometric authentication. Businesses are quickly adopting…

5G networks and biometric breakthroughs: Navigating opportunities and risks Read More »

Shopping Cart
Shopping cart0
There are no products in the cart!
Continue shopping
0
Scroll to Top