NEWS
Quantum must not repeat AI’s mistakes
  • Posted on 10th March 2026 in by Phil Alsop

By Dr Sebastian Weidt, co-founder & CEO, Universal Quantum.

Read More
NEWS
Preparing for the quantum threat

By David Spillane, Systems Engineering Director, Fortinet.

Read More
NEWS
Creating Pathways into Tech for Girls Means Starting Early

By Samantha Jennings, Head of Operations, Avella.

Read More
NEWS
A Brave New World

The Opportunities & Engineering Challenges Of Quantum Computing Within A Data Centre Environment – Taking learnings from other industries By Matthew Martin, Managing Director, Quantum Design Oxford.

Read More
NEWS
From vision to impact: How women are transforming the technology industry for International Women in Engineering Day

International Women in Engineering Day provides an opportunity to celebrate the women driving...

Read More
NEWS
Mitigating the Threat of Quantum Computing

By David Corlette, VP Product Management, VIPRE Security Group.

Read More
NEWS
The Rise of Quantum Ecosystems in 2024 and Beyond

By Dr. Philip Krantz, Quantum Engineering Solutions team at Keysight Technologies.

Read More

Videos

Data Centre World 2026
Pete Hughes, Founder and Managing Director of Zalara Tech, shares how building a business in the age of AI shapes growth and delivery, and why success depends on understanding that AI is never a...
Mostyn Thomas, Senior Director of Security EMEA at Pax8, breaks down how ransomware is evolving, what the new Cyber Essentials standards mean in practice, why attackers are increasingly targeting supply...

News

CMC Networks partners with AVANT to support enterprise connectivity across EMEA using AI-enabled infrastructure and customer support services.
A demonstration of hydrogen-fuelled engines has been completed as part of testing for data centre backup power applications.
Cisco has unveiled its Universal Quantum Switch, a prototype designed to support communication across different types of quantum systems as part of ongoing work in quantum networking.
Barracuda research reveals how attackers leverage device code authentication for persistent access, highlighting the need for improved security measures.