January 7, 2021
Data Warehouse Q&A with Mitesh Desai
If you're considering cloud migration for your business, it's important to understand how to maximise value with Azure infrastructure
December 1, 2020
How to maximise value with Azure infrastructure
If you're considering cloud migration for your business, it's important to understand how to maximise value with Azure infrastructure
October 8, 2020
Missed Wimbledon this year? AI has you covered
Create your own AI match at Wimbledon using a video collection to predict and specify shot placement and recovery positions of the world's top tennis players
September 30, 2020
The most important thing IT leaders need to consider
If 2020 has taught us anything, it's that resilience and a business continuity plan are among the most important things IT leaders need to consider.
September 21, 2020
Insights,Latest insights,Data analytics
Will AI steal my job?
Phishing attacks from trusted partners are harder to detect and easier to fall for. Here's what you can do to defend your business
September 15, 2020
Microsoft’s underwater data centre resurfaces after two years
Microsoft sank a data centre underwater in the hopes of creating a more efficient and reliable storage facility for cloud computing.
September 11, 2020
Insights,Latest insights,Security
How to defend against phishing attacks from trusted partners
Phishing attacks from trusted partners are harder to detect and easier to fall for. Here's what you can do to defend your business
September 7, 2020
Survival and adaptation
As the government is likely to begin the slow and gradual lifting of lockdown restrictions we will be returning to work, but not as we know it.
August 27, 2020
Aligning IT strategy with business goals
The IT department has a key role to play in aligning its strategy to the goals of the business. Here we discuss the main drivers to achieving this
August 18, 2020
Insights,Latest insights,Security
Five reasons to conduct a cyber security audit ASAP
Conducting a cyber security audit is a good starting point for identifying weak points, along with analysing the way data flows through the business and where it needs to be protected.