News

IT for small and medium-sized enterprises (SME)

  • May 20, 2019 20 May'19

    DCMS shakes up BDUK with new rural full-fibre scheme

    The Rural Gigabit Connectivity programme will run for two years, trialling a new model for full-fibre broadband delivery – meanwhile, BDUK is getting a new name

  • May 20, 2019 20 May'19

    GDPR an opportunity to improve data systems and processes

    A year after the official implementation of the GDPR, it is important to highlight the positive opportunities that compliance provides and the insights breach reports are providing, say Deloitte consultants

  • May 20, 2019 20 May'19

    ICO to support GDPR certification schemes

    The UK data protection watchdog is accepting enquiries from organisations considering developing GDPR certification schemes, which the ICO says could help recipients achieve competitive advantage

  • May 17, 2019 17 May'19

    École Hôtelière de Lausanne puts Amelia the robot at its core

    When Switzerland-based hospitality school EHL began to automate processes, it was met with staff inertia, but that all changed after its benefits became clear

  • May 17, 2019 17 May'19

    Identity custodians needed in digital era

    Digital identity systems will fail if they do not take humans into account, warns identity innovator, suggesting that a ‘digital guardian’ could help overcome most of these challenges

  • May 17, 2019 17 May'19

    GozNym bust underlines cyber crime threat

    A criminal network using GozNym malware has been shut down in an international law enforcement operation, but others are still operating, underlining the need for vigilance, warns a security expert

-ADS BY GOOGLE

SearchCIO

SearchSecurity

SearchNetworking

SearchDataCenter

  • How do I size a UPS unit?

    Your data center UPS sizing needs are dependent on a variety of factors. Develop configurations and determine the estimated UPS ...

  • How to enhance FTP server security

    If you still use FTP servers in your organization, use IP address whitelists, login restrictions and data encryption -- and just ...

  • 3 ways to approach cloud bursting

    With different cloud bursting techniques and tools from Amazon, Zerto, VMware and Oracle, admins can bolster cloud connections ...

SearchDataManagement

Close