Insights

Data and artificial intelligence for innovation and transformation

Article by: Suman Nambiar, Head of AI Practice at Mindtree The range of technologies that comprise artificial intelligence (AI), including natural language processing-driven bots, machine learning (ML) and deep...

Home security checklist: what to do before going on holiday

Mohammad Meraj Hoda, VP – Business Development at Ring, offers some top tips on how to keep the home secure during the summer holiday months. We all know that the holidays are a busy time of year. While we focus...

Expert opinion – is SIP trunking the weak link in your armour?

By Paul Clarke, UK Manager, 3CX The advent of IP telephony has not only reduced costs for companies but also enabled the adoption of flexible working conditions – both in terms of working hours and working location. U...

Six key data strategy considerations for a cloud-native transformation

Article by: Priya Balakrishnan, Senior Director of Product Marketing at Redis Labs Many organisations are making the move to cloud-native platforms as their strategy for digital transformation. Cloud-native allows...

Warning: ‘Traffic systems at risk of cyberattack’

Industry experts have responded to comments made about cybersecurity risks posed to the UK’s critical infrastructure. Speaking with the BBC Today programme, and reported by the Daily Telegraph, General Sir Christopher D...

Survey reveals five keys to secure DevOps, cloud and IoT adoption

BeyondTrust, a leading cybersecurity company dedicated to preventing privilege misuse and stopping unauthorised access, has announced the results of the 2018 Implications of Using Privileged Access Management to...

Browse our latest issue

Intelligent CIO Europe

View Magazine Archive