LaCie d2 Thunderbolt 2 features all-new design

LaCie has announced the latest evolution of its popular d2 desktop storage line. Trusted by creative professionals for a decade, the latest LaCie d2 features a new all-aluminum unibody enclosure, dual Thunderbolt 2, and USB 3.0. Plus, as an industry first, LaCie designed the d2 Thunderbolt 2 to be...

Read More
Tiger Technology ships new, ‘compact and affordable’ Tiger Series shared storage solutions

New devices pack powerful features and high-performance into an affordable compact package that ease workspace, project, user, media and metadata workflows.

Read More
Red Hat Satellite 6 delivers Unified Cloud Systems Management

Red Hat Satellite 6 offers comprehensive configuration and lifecycle management across physical, virtual and hybrid cloud environments.

Read More
Rapid7 launches Global Strategic Services Practice

New programme will help transform the security posture of organisations through threat-focused...

Read More
Nokia Networks and Red Hat extend collaboration to deliver OpenStack-powered telco cloud

Nokia Networks and Red Hat, Inc. have extended their collaboration to enable mobile operators to...

Read More
SMBs divided by the digital revolution

Lack of digital skills affects a third of SMBs in the UK as new ‘free-to-all’ learning...

Read More
Clarifying two-factor authentication

By Toyin Adelakun, a VP at Sestus.

Read More
What are the key trends in application development?

Written by Andrew Burgess, solutions engineer, OutSystems.

Read More
Virtualisation’s missed opportunities

By Anthony Poh, Technical Account Manager, MTI.

Read More
Co-lo stepping stones to the cloud

Co-location can serve as an opportunity for organisations to test the waters with various vendors...

Read More

Videos

Work AI leader Glean has launched the Work AI Institute, a first-of-its-kind research initiative - supported by faculty from Stanford, Harvard, Berkeley, Notre Dame, and others - dedicated to decoding what...
Erin McLean, CMO at Cynomi, explains how MSPs can use embedded CISO intelligence to manage enterprise-wide cybersecurity programs. She discusses translating technical controls into business outcomes, engaging...
Michael Downs, VP, global sales at SecurEnvoy, discusses the importance of Multi-Factor Authentication (MFA) as a crucial part of any effective cybersecurity strategy.

Expert Opinions

By David Trossell, CEO and CTO of Bridgeworks
By Mark Daley, Director of Digital Strategy and Business Development, Epsilon Telecommunications.