NEWS
Why Data Quality is Essential to AI Success

By Suki Dhuphar, Head of EMEA at Tamr.

Read More
NEWS
How technology is revolutionising the fan experience in sports

By David Ingham, Client Partner, Media, Entertainment & Sport at Cognizant.

Read More
NEWS
Turbocharge Your Data Monitoring Whilst Slashing Costs

By Roman Khavronenko, Co-Founder of VictoriaMetrics.

Read More
NEWS
Accelerating business growth with data management

By Marco Pozzoni, Director EMEA Storage Sales, Lenovo.

Read More
NEWS
Scaling analytics and achieving high, long-term ROI

By Anurag Kapoor, Vice President, Data and Analytics for The Smart Cube.

Read More
NEWS
“Data as a product” is the key to data democratization

By Felipe Henao Brand, Senior Product Manager, Talend.

Read More
NEWS
Adding AI to applications - how to succeed with data

By Peter Greiff, Data Architect Leader EMEA, DataStax.

Read More

Videos

Matt Wilkins, Global Director of Design and Engineering at Colt DCS, explains that data centre operators need ‘controlled flexibility’ now more than ever, as tightened regulatory environments, skills gaps,...
Mark Banfield, Chief Revenue Officer at TeamViewer, discusses how the company is using its Tia (TeamViewer Intelligent Assistant) and a ‘shift left’ approach to move IT support from reactive to more...
Ryan Parker, Phononic's President & COO, discusses the data centre thermal management challenge, the company’s GPU HBM cooling solution and introduces the idea of Thermal Fabric, a real-time thermal control...

News

Kao Data partners with Discover Tech, aiming to provide immersive tech sector experiences for young people and support greater diversity in the technology sector.
Guardz outlines how AI is influencing cybersecurity, with the report highlighting identity-related issues and vulnerabilities affecting MSPs, based on findings from its latest threat report.
European organisations confront a costly inefficiency in their cloud-first strategies, affecting AI deployment and infrastructure resilience.
Barracuda research reveals how attackers leverage device code authentication for persistent access, highlighting the need for improved security measures.