NEWS

Softcat study reveals key business tech priorities for 2024

56% of organisations are prioritising Cyber Security in the year ahead.

Read More

NEWS

Gartner Hype Cycle highlights AI adoption

Transformational technologies, including AI-augmented software engineering (AIASE), AI coding assistants and platform engineering, will reach mainstream adoption in 2-5 years, according to the Gartner, Inc. Hype Cycle for Software Engineering, 2023.

Read More

NEWS

48% of developers believe ML projects are too time-consuming

Civo has published the results of its research into the challenges faced by Machine Learning (ML) developers in their roles. With more businesses deploying ML, the research highlights the current hurdles faced and the high rate of project failure.

Read More

NEWS

More than half admit to ignoring cybersecurity alerts due to information overload at work

More than half of today’s office workers are ignoring important cybersecurity warnings due to being overwhelmed and fatigued from digital communication.

Read More

Latest Video

Hybrid working 2.0 is here – don’t panic!

Neil Patel, Director, European Marketing & Business Development, and Alan Jones, Consumer Solutions & Marketing Manager, UK&I, both at D-Link Europe Ltd, discuss the practicalities of hybrid working, with particular reference to ways in which the home office can be upgraded to ensure an optimised, secure IT environment which, in turn, will lead to an optimised employee experience.

Read more
Ping Identity introduces “Identity for AI,” extending identity and access control to autonomous...
Cavelo sponsors MSP Well to promote mental health and wellbeing among MSP and MSSP professionals...
Centreon recently launched its open-source, multiplatform Monitoring Agent, advancing digital...
Workday has released “The Global State of Skills”, revealing a pressing challenge for...
GTIA introduces elected leaders for the UK & Ireland Community, promoting new initiatives and...
WatchGuard's Zero Trust Bundle aims to integrate identity, device, access, and endpoint protections...