NEWS
Five ways AI can be a force for good

By David Fearne, Global Practice Leader for Business Intelligence, Arrow ECS.

Read More
IoT Beyond PoC: A shift in mindset

By Jason Kay, Chief Commercial Officer, IMS Evolve.

Read More
NEWS
Why structured cabling is critical to IoT

By Paul Weber, VP of Engineering, Rahi Systems.

Read More
What’s beyond voice?

For communications service providers (CSP) facing significant churn in traditional lines of...

Read More
IoT’s all about the data

By Erick Dean, Product Director, IoT, Splunk.

Read More
Three industries ripe for IoT transformation in 2018

By Richard Smith, Regional Manager at SOTI.

Read More
The AI capabilities of Google Cloud Platform

By Chris Cox, Technical Lead, Google Cloud Platform, CTS.

Read More

Videos

James Netherwood, Head of Research Middle East, Capacity and Datacloud, discusses the upcoming Capacity Middle East event and the launch of Datacloud Middle East. The events unite over 3,500 executives from...
Joshua Clay, Senior Director Solutions Engineering at Dynatrace, discusses the findings of the company’s ‘The State of Observability Report 2025’, which reveals that while AI adoption is accelerating,...
Softcat’s Dean Gardner (Technology Director) and Adam Harding (Head of OCTO) unpack the findings of the organisation's latest Business Tech Report. From agentic AI and ransomware resilience to sustainability...
Lenaik Andrieux, General Manager – Power Systems EMEA, India & Australia, Rehlko, explains how the acquisition of The Wilmott Group, a UK-based supplier of critical backup-power solutions, makes Rehlko one...

News

Acora partners with Securonix to enhance cyber resilience and modernise security operations through a strategic alliance.
BCS Consultancy expands its offerings with a new Sustainability Service, led by James Rogers Jones, embedding eco-conscious principles across project, cost, and technical management.
Rackspace Technology adds Joseph Vito to lead global alliance partnerships.
With AI adoption accelerating, cloud security faces unprecedented challenges. This article explores some of the key factors complicating contemporary cybersecurity strategies.