Re- inventing retail with Internet of Things: engaging with connected consumers to earn their loyalty
Subramanian Hariharan, Senior Director at Mindtree, on how retailers can make gains in efficiency and sales by investing and deploying the correct...
Published On15:37, April 14 2016
Password Re-use: The seed of your undoing
Password re-use means that any breach at another company; any malware infection on a computer belonging to an employee or customer; or any...
Published On16:17, April 11 2016
Know your cyber security blindspots
State-sponsored cyber-attacks are tough to stop. Paul Nicholson, director of product marketing, A10 Networks, explores how organisations can remain...
Published On16:14, March 29 2016
When managing the mobile workforce, turn more into less…it’s more
Alan Giles, Mobility Business Unit Manager at Snow Software, looks at how to balance freedom and control when it comes to the mobile workforce.
Published On16:09, March 29 2016
How the public and private sector can maximise the digital economy opportunity
Rob Lamb, Cloud Business Director, EMC, discusses what actions the gov't & businesses should take to maximise and overcome the challenges posed by...
Published On13:22, March 22 2016
Privacy Shield: What to expect and why businesses must act now
Mark Thompson, Privacy Practice Leader and Ewan Donald, Privacy Advisory at KPMG, on why businesses need to identify and plug Safe Harbor gaps...
Published On13:18, March 22 2016
What’s so scary about compatibility?
Stephen Crick, Regional Manager from ProLabs, on product compatibility and its general lack of pick-up within the networking market.
Published On16:02, March 7 2016
What is NFV and why should MNOs care about it?
Steve Barefoot, senior product analyst at Interop Technologies, on NFV and its numerous benefits to MNOs.
Published On15:56, March 7 2016
Ofcom’s 10-year digital communications review – what it should have called for?
Amid several key areas, there’s no ignoring the Openreach issue, says Alastair Masson, Client Partner, NTT DATA.
Published On15:44, March 7 2016
Are you ready for EU General Data Protection Regulation changes?
Tony Pepper, CEO, Egress Software Technologies, looks at how the upcoming GDPR will impact businesses.
Published On16:13, February 15 2016
Digital Preservation: The 10 Year Tipping Point
Jon Tilbury, CEO at Preservica, argues how companies should be concerned about what will happen to critical digital information in 10 years, not 100.
Published On16:05, February 15 2016
Turning Big Data into Big Value
David Maitland, General Manager, EMEA at Couchbase, looks at how companies can derive profit directly from big data.
Published On12:09, February 12 2016
Plan IT for Planet AND Profit
Peter Duffy, CTO, Sumerian, looks at how 'being green' is much more than being friendly to the environment.
Published On16:17, February 9 2016
The Butterfly Effect – How Technology Can Prevent Minor Regulation Causing Major Problems
Mike Davies, VP EMEA North, GMC Software, looks at how legislation can provide the perfect example of the butterfly effect.
Published On16:11, February 9 2016
The Business Case for the Data Centre
Stuart Borgman, Business Systems Architect, Juniper Networks, identifies five reasons why the data centres are drivers of new business models.
Published On15:55, January 29 2016
Trending on CBR
In the spotlight
- 5 malware attacks revealed: how they get you and how to protect your business
- 5 very smart things said at the OpenStack Summit that hold great significance for the future of the open source cloud
- Microsoft & Google alleviate cloud fears with data privacy and security certifications
- IoT smart cities ‘most UK people don’t even understand the concept’
- Microsoft restricts choice of browser and search engine in Cortana to Bing and Microsoft Edge
The Top 10 Reports for Managing Vulnerabilities
This paper cuts through the data overload generated by some vulnerability detection solutions. It covers the key aspects of the vulnerability...
Getting Value From a Single Customer View?
Regulators are asking for it; will the industry exploit it?
Red Hat JBoss A-MQ Compared with IBM Websphere MQ 7.5
The ability to integrate systems and share data across the enterprise is a common datacenter need. “Integration bus” is a common term that...
Responding to the New Information Risk Landscape
This paper analyses the trends and changing priorities of the emerging information security landscape, setting out a new action agenda for managing...
Capscan is a leading supplier of international address management solutions and data integrity services. Capscan has more than 1800 customers...
Qualys - IT security risk and compliance solutions
Qualys is the leading provider of on demand IT security risk and compliance solutions - delivered as a service. Qualys solutions enable...
Webroot - Security Solutions
Webroot provides industry leading security solutions for consumers, enterprises and small and medium businesses worldwide.
Absolute Software - Security Solutions for Mobile Computers and Smartphones
Absolute® Software specialises in technology and services for the management and security of mobile computers and smartphones.