Analysis

Machine Learning garners impetus in Africa

To make decisions more quickly and accurately, enterprises in Africa are increasingly turning to Machine Learning, arguably today’s most practical application of Artificial Intelligence (AI). How should...

Mergers and acquisitions: Why IT teams should quickly consolidate

When it comes to merger and acquisition (M&A) activity, IT departments and the way consolidation is handled can make or break an efficient transition. Mike Weaver, Technical Product Manager at Quest, specialising...

Oracle Support Rewards programme helps customers accelerate cloud migrations

Oracle recently announced a new Oracle Support Rewards programme to help customers speed migrations to the cloud while reducing their software license support costs.  Customers that buy Oracle Cloud...

Data storage infrastructure will play a crucial role in business recovery

Ken Claffey, Senior Vice President, Seagate, explains why data storage is so critical to the future success of the UK businesses and how the right storage infrastructure can set UK plc on the path to pandemic...

How to secure the endpoint

Endpoint security management is a policy-based approach to network security that requires endpoint devices to comply with specific criteria before they are granted access to network resources. Endpoints can include...

Disaster planning in the wake of increased threat vectors

Typically, Disaster Recovery planning involves an analysis of business processes and continuity needs. Before generating a detailed plan, an organisation often performs a business impact analysis (BIA) and risk...

Browse our latest issue

Intelligent Tech Channels

View Magazine Archive