Data, IT and Communications

iSIM

iSIM solution for global IoT connectivity

A new iSIM solution can help manufacturers deploy IoT devices across disparate mobile network operators ...
cyber security risk

Cyber security risk reporting for C-Suites

As a CISO or CIO it is important to measure and effectively communicate cyber security ...
ChatGPT

Dark web criminals plot ChatGPT takeover

The race to use ChatGPT for cybercrime has sparked a sevenfold rise in hackers discussing ...
data

Leverage data to generate value

As organisations generate greater volumes of data from their operations it’s imperative that data is ...
collaboration

Fostering human–machine collaboration

Companies that blend machine and human collaboration will have the most effective teams, according to ...
cyber

Cyber security solution for automotive ECUs

Industrial fleet vehicles that rely on data-driven systems are as vulnerable to cyber attack as ...
Collaboration

Cloud-based collaboration for industry

Collaboration has taken major leaps forward from traditional workplace tools and now, via IoT, includes ...
Experience data

Experience data offers valuable insights for IT service providers

Experience data is essential for IT service providers seeking to improve or address end-user experience ...
digital reality

Digital reality platform for integrated manufacturing

A new digital reality platform from Hexagon enables real-time collaboration across product lifecycle from design ...
SAP

Migrating to SAP S/4HANA

ERP implementation has changed and for companies facing the 2027 maintenance deadline for SAP ECC 6, ...
zero trust

Solving zero trust architecture with dynamic authorisation

Zero Trust is no longer just another buzzword. As organisations embrace hybrid workforces the need ...
data monitoring

Sustainable data monitoring for high performance

Sustainable data monitoring can cut corporate energy usage by up to 90 per cent, according ...
infrastructure

Optimising infrastructure capex

Access to on-demand subscription-based infrastructure models provides much-needed flexibility and enables greater innovation. Enterprises are ...
vulnerabilities

Known vulnerabilities are the greatest cybersecurity threat

Known vulnerabilities for which patches have already been made available are the primary vehicle for ...
smart systems

Mitigating risk in smart systems adoption

Smart systems development and adoption can be complex but its Achilles Heel and weakness lies ...
malware

26.6 million user logins stolen by bot malware

Cybercriminals were able to obtain extremely sensitive user data including 26.6 million usernames and passwords. A study by NordVPN ...
private mobile networks

5G to accelerate private mobile networks

The growth of 5G connectivity is set to accelerate the use of private mobile networks ...
OpenADR

EV market drives membership of OpenADR Alliance

The Ford Motor Company has become the first automotive manufacturer to join the OpenADR Alliance Board of Directors. ...
GSMA

Open network APIs for new digital services and mobile apps

GSMA Open Gateway is a new framework of universal network APIs designed to provide universal ...
electronics

Environmental impact of electronics can be cut by 86 per cent

Environmental impact of electronics can be cut by 86 per cent if additive printing methods ...
5G

Solutions for supercharging 5G and beyond

With 5G rollouts gathering pace enterprises are seeking to harness the power of super-fast connectivity ...
Newsletter

Sign up for our newsletter and receive the latest magazine

Featured

Enter your details below to receive the latest news, updates and magazine.

"*" indicates required fields

*