The Paris 2024 Summer Olympic Games gets underway on July 26 this year. Securing the IT architecture of the Olympic Games is no easy matter. It is complex, built on a cloud-native
With most of the international community pledging to achieve net zero carbon emissions by 2050, the pressure is on; though at our current pace, the world is falling behind. Fortunately, we still
In 1985, Toshiba developed the world’s first commercial laptop computer and the world’s first notebook computer. These two computing innovations allowed people to safely and securely, work anywhere they wanted and defined
For data and the datacentre industry, the pandemic disruption was also a major catalyst for accelerated digitalisation. Thankfully, most of the technology needed during the crisis was already in existence, supported by
Within months of the pandemic, businesses were deploying different solutions to track occupancy in their buildings and control social distancing. Almost two years later, this trend is still growing because they are seeing value from
Even before the pandemic, impartial observers such as third-party analyst firms were predicting surges in AI adoption. PwC, for example, predicted that AI would have a $320 billion impact on combined Middle
The changes in IT landscape dominated the focus of many companies and institutions. To be able to cope with all the developments, organisations must become increasingly dynamic. These changes include the growing
When it comes to ransomware, what we see today is not that simple. We now have ransomware cartels, like REvil, Conti, DarkSide, and others, and ransomware is not a piece of malware,
The cybersecurity industry saw some key trends emerge from defenders and attackers in 2021. The defence trends were, in almost all cases, a direct result of the threat trend, these defence trends
Developing the next generation of advanced AI will require powerful new computers capable of quintillions of operations per second. Meta has designed and built the AI Research SuperCluster, which is among the
Those intent on infiltrating computer systems to access, delete, exfiltrate or immediately extort sensitive data constantly evolve their approach to counteract measures being taken to block them. Inevitably this means those tasked