Top Menu

The key to IT success in 2019: Invest, train and transform

Successful organizations are investing in IT. That’s the headline finding from this year’s edition of the Business IT Trends Annual Report. The report, based on research carried out in December 2018, surveyed more than 600 US and Canadian IT executives, managers, decision-makers, and decision influencers on their experiences and expectations. Looking back This year’s edition includes, […]

Continue Reading
5G internet – fast, reliable and coming soon

5G internet – fast, reliable and coming soon

It’s no secret that businesses and consumers alike are getting their hands on more and more network-connected devices. Gartner estimates that there will be 20.8 billion network-connected devices worldwide by 2020 (compared to 6.4 billion today) and Internet of Things sensors are appearing in everything from fridges to water meters. Of course, this means that […]

Continue Reading
Can robotic process engineering transform your business?

Can robotic process engineering transform your business?

One of the most talked-about trends in the digital economy is robotics and its ability to perform tasks infinitely faster and more accurately than human workforces. The key to such advances is automation. Specifically, robotic process automation (RPA), which uses software ‘robots’ governed by business logic and structured inputs. RPA is already having a big […]

Continue Reading
Classroom 2.0: When old school meets new tech

Classroom 2.0: When old school meets new tech

The traditional classroom is in some ways a blank canvas, a simple room with desks, chairs and a blackboard at the front. It’s a setup that has worked well for centuries – but interactive technologies are set to transform it by taking this arrangement and adding a new layer of flexibility. Digital technology now allows […]

Continue Reading
Remember what you’ve learned: data storage for schools

Remember what you’ve learned: data storage for schools

As education becomes more and more digital, education CIOs at all levels are faced with an ever-expanding network of desktops, servers, notebooks, mobile devices and digital education and research tools. In addition to requirements around governance, security, deployment, maintenance, and training, these tools typically generate enormous amounts of data. Multimedia information is becoming more prevalent […]

Continue Reading
3 key factors in cloud security

3 key factors in cloud security

Everybody loves cloud services for their utility and accessibility. How about their security? It remains a concern for private users, small businesses and global enterprises alike. Leviathan Security Group research has identified three key factors in the effectiveness of cloud security: availability, staffing and vulnerability management. Only by considering, and carefully managing, all three can […]

Continue Reading
Hackers: use their power for good, not evil

Hackers: use their power for good, not evil

IT systems are business-critical but hard to secure. Criminals are working full-time to find ways to bust in and exploit your valuable data and we all know that no system or infrastructure can ever be made perfectly secure. Hackers are determined, resourceful and devious – so if you can’t beat ’em, join ’em. It may […]

Continue Reading