Topics Archive
Free guide to low-code & no-code platforms
Platforms that enable shadow IT are changing development roles and processes. Here's why it's time to embrace this new reality.
-
Blog Post
13 May 2025
NordVPN goes full GUI on Linux
Arguably best-known VPN company around right now NordVPN has updated its Linux application. Updates feature the launch of a full graphical user interface (GUI). For Linux users, this should make ... Continue Reading
-
Blog Post
13 May 2025
The ongoing AI-automation convergence, and what this means for the enterprise
This is a guest blogpost by Matthew Roberts, Ansible Platform Lead, EMEA, Red Hat Enterprises are being led to believe that their success with AI hinges on whether they use the largest model (or ... Continue Reading
By- Brian McKenna, Enterprise Applications Editor
-
News
13 May 2025
HP expands refurbished PC scheme to cover the UK
HP provides a greener option for partners to pitch to customers concerned about sustainability, as well as budgets Continue Reading
By- Simon Quicke, Microscope Editor
-
News
13 May 2025
O2 upgrades Wembley Stadium connectivity
Upgrade around major UK sporting arena to see fans gaining access to dedicated distributed antenna system-based 5G standalone network inside the stadium, in addition to small cells and upgraded masts in surrounding area Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
13 May 2025
Private cellular business deployments to reach more than 7,000 by 2030
Research finds enhanced security features and neutral host deployments will be central to expediting growth across all sectors for key sector of mobile industry Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
13 May 2025
Controversial Post Office Horizon system could stay until 2033
Post Office seeks off-the-shelf Horizon replacement as part of £492m tender that includes ongoing support for Horizon up to 2033 Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
13 May 2025
Bytes breaks through GII £2bn barrier
Channel player Bytes shares FY numbers that underline its successful ability to emerge strongly through a challenging market Continue Reading
By- Simon Quicke, Microscope Editor
-
News
13 May 2025
Gov.uk One Login loses certification for digital identity trust framework
The government’s flagship digital identity system has lost its certification against the government’s own digital identity system trust framework Continue Reading
By- Bryan Glick, Editor in chief
-
News
13 May 2025
NHS trust cloud plans hampered by Trump tariff uncertainty
Essex NHS wants to move some capacity to the Nutanix cloud, but can’t be certain prices will hold between product selection and when procurement plans gain approval Continue Reading
-
News
13 May 2025
Evidence reveals Post Office scandal victims short-changed in compensation payouts
Subpostmasters who appealed compensation payments have significantly increased ‘worryingly undervalued’ settlements Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
Opinion
13 May 2025
How sovereign AI will reshape APAC’s digital future
Asia-Pacific countries are developing sovereign AI capabilities to address unique cultural, economic, security and data sovereignty needs of the region Continue Reading
By- Serene Nah
-
News
13 May 2025
Australian data breaches hit record high in 2024
More than 1,100 data breaches were reported in Australia last year, a 25% jump from 2023, prompting calls for stronger security measures across businesses and government agencies Continue Reading
By- Aaron Tan, Informa TechTarget
-
Definition
13 May 2025
What is the consumerization of IT (IT consumerization)?
The consumerization of IT refers to how software and hardware products designed for personal use have migrated into the enterprise and are used for work purposes. Continue Reading
By- Rahul Awati
- George Lawton
- Linda Tucci, Industry Editor -- CIO/IT Strategy
-
Tip
13 May 2025
9 IoT training certifications to take your next career step
IoT training certifications offering skills in IoT development, networking and security can give tech experts an advantage, especially when IoT skills are in high demand. Continue Reading
By- Mary E. Shacklett, Transworld Data
- Andy Patrizio
-
Feature
12 May 2025
RIT showcase offers glimpse of early tech innovation cycle
Connected vehicle security, AI and 3D printing were among the technologies featured at Imagine RIT, an annual exhibition focusing on student and faculty innovation. Continue Reading
By- John Moore, Industry Editor
-
Feature
12 May 2025
Semiconductor chip materials: What and where to source them
Semiconductor chips are predominantly made from silicon, germanium and gallium arsenide. Production is limited and mostly based in China, which could create future supply issues. Continue Reading
By- Madeleine Streets, Senior content manager
-
News
12 May 2025
Nokia looks to light up in-building enterprise connectivity with Aurelis
Fibre-based LAN solution designed to deliver simple, reliable and future-proof local area connectivity for enterprises, using up to 70% less cabling and 40% less power than copper-based technologies Continue Reading
By- Joe O’Halloran, Computer Weekly
-
Definition
12 May 2025
What are SMART goals?
SMART is a best practice framework for setting goals that are specific, measurable, achievable, realistic and time-bound. Continue Reading
By- Katie Terrell Hanna
- Kinza Yasar, Technical Writer
-
Feature
12 May 2025
How digital employee experience strategy drives productivity
Digital employee experience is an often-overlooked driver of productivity and retention. Learn why DEX matters and how to make it a strategic advantage. Continue Reading
By- Damon Garn, Cogspinner Coaction
-
Definition
12 May 2025
What is an emergency notification system?
An emergency notification system is an automated approach to crisis communications that contacts people within an organization and distributes important information during a disruption. Continue Reading
By- Paul Crocetti, Editorial Director
-
Definition
12 May 2025
What is video conferencing?
Video conferencing is a live, visual connection between two or more remote parties over the internet that simulates a face-to-face meeting. Continue Reading
By- Paul Kirvan
- Wesley Chai
- Irwin Lazar, Metrigy Research
-
Definition
12 May 2025
What is the Patient Protection and Affordable Care Act (PPACA, ACA or Obamacare)?
The Affordable Care Act (ACA), formally known as the Patient Protection and Affordable Care Act, is a landmark healthcare law Congress enacted and former President Barack Obama signed in March 2010. Continue Reading
By- Katie Terrell Hanna
- Shaun Sutner, Senior News Director
- Alex DelVecchio, Content Development Strategist
-
Definition
12 May 2025
What is image-based backup?
Image-based backup creates a copy of an operating system (OS) and all the data associated with it, including the system state and application configurations. Continue Reading
By- Erin Sullivan, Senior Site Editor
- TechTarget Contributor
-
News
12 May 2025
Wi-Fi 7 trials show ‘significant’ performance gains in enterprise environments
Wireless technology consortium reveals industry trials of latest Wi-Fi standard in enterprise scenarios revealing increased throughput, lower latency and enhanced efficiency for high-demand applications Continue Reading
By- Joe O’Halloran, Computer Weekly
-
Answer
12 May 2025
The difference between a traditional and hybrid meeting room
The old meeting room is gone for good. Companies need to employ technology that permits all of their workers to collaborate, whether they are at home, in the office or on the road. Continue Reading
By -
News
12 May 2025
Channel moves: Who’s gone where?
Moves of note this week at WatchGuard, Quantum Trilogy, Delinea and Nexer Enterprise Applications Continue Reading
By- Simon Quicke, Microscope Editor
-
News
12 May 2025
Contempt order worsens Apple's antitrust woes
A federal judge found Apple to be in contempt of an injunction ordering the company to make access to alternative payment options in the company's App Store easier. Continue Reading
By- Makenzie Holland, Senior News Writer
-
Feature
12 May 2025
What goes into selecting mobile health clinic equipment?
Healthcare in Action's mobile health clinic is outfitted with tools to deliver medicine tailored specifically for its primarily unhoused patient population. Continue Reading
By- Sara Heath, Executive Editor
-
News
12 May 2025
2025 MedTech Breakthrough winners for healthcare payments
Waystar, Candid Health and TrustCommerce are among the winners of the 2025 MedTech Breakthrough Awards in the healthcare payments category. Continue Reading
By- Jacqueline LaPointe, Executive Editor
-
News
12 May 2025
Systemic gaps hinder cell and gene therapy adoption, access
Over 200 cell and gene therapy treatments could be FDA-approved by 2030, but adoption could lag due to structural barriers, limited infrastructure and centralized access. Continue Reading
By- Alivia Kaylor, MSc, Senior Editor
-
Feature
12 May 2025
Mobile health clinics bring care to California's unhoused
Using a nuanced approach to care management, Healthcare in Action uses mobile health clinics to move California's unhouse population into stable housing. Continue Reading
By- Sara Heath, Executive Editor
-
News
12 May 2025
Italian bank signs 10-year deal with Google Cloud
UniCredit will transform operations through cloud, AI and data analytics technologies from Google Cloud Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
12 May 2025
Limited payer prescription drug coverage pinches patients
As payers limit prescription drug coverage, they are increasingly setting up restrictions like prior authorizations and step therapy. Continue Reading
By- Sara Heath, Executive Editor
-
Definition
12 May 2025
What is virtual memory?
Virtual memory is a memory management technique where secondary memory can be used as if it were a part of the main memory. Continue Reading
By- Paul Kirvan
- Alexander S. Gillis, Technical Writer and Editor
- Stacey Peterson, Senior Managing Editor
-
Tip
12 May 2025
Verification vs. validation in software testing
Verification and validation are at the heart of all software testing efforts. Together, they check that software fulfills both user expectations and technical requirements. Continue Reading
By- Gerie Owen, Roobrik
-
Definition
12 May 2025
What is PeopleSoft?
PeopleSoft is an enterprise resource planning (ERP) software suite owned by Oracle Corporation. Continue Reading
-
Opinion
12 May 2025
Hybrid data management strategy for enterprise AI success
Hybrid data management gives organizations the access, control and agility needed to support reliable and scalable enterprise AI across various environments. Continue Reading
By- Stephen Catanzano, Senior Analyst
-
Omdia
Intelligence and advice powered by decades of global expertise and comprehensive coverage of the tech markets.
-
News
12 May 2025
Virgin Media O2, Daisy Group merge to form B2B comms company
Comms provider and IT services company unite to offer digital-first connectivity and managed services Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
12 May 2025
University will ‘pull the plug’ to test Nutanix disaster recovery
University of Reading set to save circa £500,000 and deploy Nutanix NC2 hybrid cloud that will allow failover from main datacentre Continue Reading
By- Antony Adshead, Computer Weekly
-
Definition
12 May 2025
What is private PaaS? How is it different from public PaaS?
Private platform as a service (private PaaS) is a cloud computing model that facilitates the development, deployment and management of software applications in a private cloud. Continue Reading
By- Rahul Awati
- Stephen J. Bigelow, Senior Technology Editor
- Moriah Sargent, Associate Director
-
Definition
12 May 2025
What is intelligent process automation (IPA)?
Intelligent process automation (IPA) is a combination of technologies used to manage and automate digital processes. Continue Reading
By- Alexander S. Gillis, Technical Writer and Editor
-
Blog Post
11 May 2025
How big data can help your enterprise
Big data is defined as "any voluminous amount of structured, semi-structured and unstructured data that has the potential to be mined for information." That's great, that means all businesses need ... Continue Reading
By- Jodie Ng, Editorial Assistant
-
Blog Post
10 May 2025
What does Android look like from a Mountain View? Insights on Google I/O
So,they've moved the Google I/O conference away from downtown San Francisco out to Mountain View where Google has a big stake in the Shoreline Amphitheater. I've got mixed emotions on the move. Continue Reading
By- Cameron McKenzie, TechTarget
-
News
09 May 2025
News brief: AI security risks highlighted at RSAC 2025
Check out the latest security news from the Informa TechTarget team. Continue Reading
By -
Definition
09 May 2025
What is cloud asset management?
Cloud asset management is the practice of tracking and managing the resources used in an organization's cloud-based services. Continue Reading
By- Alexander S. Gillis, Technical Writer and Editor
-
Feature
09 May 2025
How business leaders are measuring generative AI's ROI
At EmTech AI, generative AI's value was top of mind. But real ROI depends on business fundamentals like change management and clear success metrics. Continue Reading
By- Olivia Wisbey, Site Editor
-
Blog Post
09 May 2025
Rev speaks out on the big future of small language models
This is a guest post written by Miguel del Rio Fernandez, senior speech scientist at Rev, a company known for its speech-to-text service for the legal trade and elsewhere. If you were to stop a ... Continue Reading
-
Tip
09 May 2025
Iterative vs. incremental development: What's the difference?
Iterative and incremental development refine software differently: one focuses on early feedback, one on complete components. Together, they balance flexibility and stability. Continue Reading
By -
Definition
09 May 2025
What is infrastructure automation?
Infrastructure automation uses software tools to automate processes related to IT infrastructure provisioning, management and monitoring. Continue Reading
By -
News
09 May 2025
ServiceNow shops share AI copilot results, prep for agents
IT ops teams have often already laid the groundwork for generative AI automation with platform consolidation and the previous wave of AIOps tools. Continue Reading
By- Beth Pariseau, Senior News Writer
-
Feature
09 May 2025
Threats versus potential benefits: Weighing up the enterprise risk of embracing AI
Technological opportunities typically come with a certain amount of risk – and generative AI adoption is no exception Continue Reading
By -
Blog Post
09 May 2025
Nutanix puts agentic AI anytime, any place (cloud) & anywhere
Nutanix has come forward with the latest version of its Nutanix Enterprise AI (NAI) service. This release is said to add deeper integration with capitalisation-focused GPU company Nvidia AI ... Continue Reading
-
News
09 May 2025
UK broadband hits 2025 target with strong first quarter
Study from UK communications regulator finds gigabit broadband on track to become virtually universally available across country by 2023, with the number of full-fibre broadband connections in particular increasing to nine million in past six months Continue Reading
By- Joe O’Halloran, Computer Weekly
-
Video
09 May 2025
An explanation of cyberattacks and their different forms
Cyberattacks are malicious attempts to breach computer systems. Types include phishing, ransomware and SQL injection. Prevention requires training, monitoring and encryption. Continue Reading
By- Tommy Everson, Assistant Editor
-
Definition
09 May 2025
What is OEM (original equipment manufacturer)?
An original equipment manufacturer (OEM) is a company that produces hardware or software that is later marketed and sold under another company's brand. Continue Reading
By- Katie Terrell Hanna
- Spencer Smith, Site Editor
- John Moore, Industry Editor
-
News
09 May 2025
Ransomware: What the LockBit 3.0 data leak reveals
An administration interface instance for the ransomware franchise's affiliates was attacked on 29 April. Data from its SQL database has been extracted and disclosed Continue Reading
By- Valéry Rieß-Marchive, Rédacteur en chef
-
News
09 May 2025
Nutanix platform may benefit from VMware customer unrest
Nutanix's Next 2025 conference attendees are jumping ship to the platform after Broadcom's VMware buy, as Nutanix executives plan enterprise-driven evolutions for the platform. Continue Reading
By- Tim McCarthy, Former News Writer
-
News
09 May 2025
Datadog acquisition gives it feature flagging for AI
The move enables the vendor to integrate the startup's feature flagging software into its products. It is the second acquisition the vendor has made in the past few weeks. Continue Reading
By- Esther Shittu, News Writer
-
News
09 May 2025
Interview: Amanda Stent, head of AI strategy and research, Bloomberg
Hallucinating AI, which lies through its teeth, keeps Amanda Stent busy at data analytics and intelligence giant Bloomberg Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
09 May 2025
Broadcom letters demonstrate push to VMware subscriptions
The owner of VMware is reminding customers on perpetual licences that they will no longer be able to buy support for their VMware products Continue Reading
By- Cliff Saran, Managing Editor
-
News
09 May 2025
Channel catch-up: News in brief
Developments this week at Assured Data Protection, Acer, Canon, UiPath and Coro Continue Reading
By- Simon Quicke, Microscope Editor
-
Feature
09 May 2025
How GenAI-driven knowledge management can enhance customer experience
Generative AI’s use for knowledge management (KM) is growing in customer experience programmes, suggesting a new vocation for KM. We find out how Continue Reading
By- Madeline Bennett, Mowser Media
-
Opinion
09 May 2025
RSAC 2025 Conference: Identity security highlights
RSAC 2025 Conference was abuzz with talk about agentic AI and tool convergence. Analyst Todd Thiemann shares how these trends affect identity security. Continue Reading
By- Todd Thiemann, Principal Analyst
-
Omdia
Intelligence and advice powered by decades of global expertise and comprehensive coverage of the tech markets.
-
Definition
09 May 2025
What is a security operations center (SOC)?
A security operations center (SOC) is a command center facility in which a team of information technology (IT) professionals with expertise in information security (infosec) monitors, analyzes and protects an organization from cyberattacks. Continue Reading
By- Kinza Yasar, Technical Writer
- Paul Kirvan
- Sarah Lewis
-
News
09 May 2025
Government calls on tech companies to join crime-cutting campaign
The justice secretary met with 30 tech companies to discuss how technology can help to tackle prison violence and reduce reoffending rates Continue Reading
By -
Feature
09 May 2025
15 customer service email templates and tips
Email remains an important channel for companies to communicate with customers. Here are some email templates for customer service teams to use in common scenarios. Continue Reading
By- Leslie O'Flahavan, E-WRITE LLC
-
News
09 May 2025
Apple to play modest role after datacentre heat breakthrough in Denmark
Country at forefront of industrial heat recycling expects datacentres will take only modest role in heating homes after government paved way with widely celebrated law Continue Reading
By- Mark Ballard
-
News
09 May 2025
AvePoint highlights partner contribution to Q1 performance
Security player AvePoint is on a mission to grow revenue significantly over the next five years, with the channel a vital part of that ambition Continue Reading
By- Simon Quicke, Microscope Editor
-
News
09 May 2025
Government launches £8.2m plan to encourage girls into AI
The government is investing in teacher training and student support to get more girls into maths classes, ultimately leading to AI careers Continue Reading
By- Clare McDonald, Business Editor
-
News
09 May 2025
AI training gap puts Europe at a disadvantage
Forrester study finds that workers in the US are more likely than their European counterparts to have received AI training to support their job roles Continue Reading
By- Cliff Saran, Managing Editor
-
Blog Post
09 May 2025
UK government set to finally meet with digital identity providers - but will anything change?
Wednesday 14 May is set to be an important day in the long, slow, painful evolution of the use of digital identity in the UK. For the first time since the government announced its digital wallet ... Continue Reading
By- Bryan Glick, Editor in chief
-
News
09 May 2025
Nordic countries plan offline payment system for disaster backup
Board member of the Bank of Finland reveals plan as likelihood of losing internet connectivity increases amid geopolitical tensions Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
Definition
09 May 2025
What is a risk profile? Definition, examples and types
A risk profile is a quantitative analysis of the types of threats an organization, asset, project or individual faces. Continue Reading
-
Definition
09 May 2025
What is risk reporting?
Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes. Continue Reading
By -
Definition
09 May 2025
What is the Sarbanes-Oxley Act? Definition and summary
The Sarbanes-Oxley Act of 2002 (SOX) is a federal law that established sweeping auditing and financial regulations for public companies. Continue Reading
By- Katie Terrell Hanna
- Ben Lutkevich, Site Editor
-
News
08 May 2025
Government will miss cyber resiliency targets, MPs warn
A Public Accounts Committee report on government cyber resilience finds that the Cabinet Office has been working hard to improve, but is likely to miss targets and needs a fundamentally different approach Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
08 May 2025
How digital twins are reshaping clinical trials
As drug development costs soar and timelines tighten, AI digital twins help sponsors cut enrollment, speed timelines and improve trial design, while meeting regulatory standards. Continue Reading
By- Alivia Kaylor, MSc, Senior Editor
-
Definition
08 May 2025
What is Google Drive?
Google Drive is a cloud-based storage service that allows users to store and share files online. Continue Reading
-
Feature
08 May 2025
Why enterprise AI is moving toward customization
At MIT's EmTech AI conference, tech leaders emphasized the value of purpose-built systems designed to support real business workflows. Continue Reading
By -
Feature
08 May 2025
How the MATCH IT Act aims to reduce patient misidentification
The MATCH IT Act attempts to decrease patient misidentification, improve patient safety and privacy and bring down costs. Continue Reading
By- Jill Hughes, Associate Editor
-
News
08 May 2025
Nutanix CEO talks customer challenges and platform updates
Many customers are still looking for a VMware exit and need a modernized platform, Nutanix President and CEO Rajiv Ramaswami says in this Q&A with Informa TechTarget. Continue Reading
By- Tim McCarthy, Former News Writer
-
Feature
08 May 2025
10 core steps in the semiconductor manufacturing process
Semiconductors bridge conductors and insulators, enabling precise control of electrical flow. This complex process creates the foundation of modern electronics. Continue Reading
By- Stephen J. Bigelow, Senior Technology Editor
-
News
08 May 2025
Preparing for post-quantum computing will be more difficult than the millennium bug
The job of getting the UK ready for post-quantum computing will be at least as difficult as the Y2K problem, says National Cyber Security Centre CTO Ollie Whitehouse Continue Reading
By- Bill Goodwin, Investigations Editor
-
Opinion
08 May 2025
The brutal customer experience lesson of Nike's RTFKT NFTs
Nike sinks as Adidas rises in the NFT world. Continue Reading
By- Don Fluckinger, Senior News Writer
-
Definition
08 May 2025
What is Google Docs?
Google Docs is a free web-based word processor that can be used to create, edit and store digital documents. Continue Reading
-
Definition
08 May 2025
What are the top 10 spyware threats?
The top 10 spyware list describes the most common spyware threats behind famous spyware attacks and is frequently identified by leading antispyware tools from vendors like Webroot, Norton and Malwarebytes. Continue Reading
-
News
08 May 2025
Trump targets AI diffusion rule as big tech talks AI race
President Donald Trump will walk back a Biden-era rule restricting the sale of advanced U.S. AI chips and models in the month it's set to take effect. Continue Reading
By- Makenzie Holland, Senior News Writer
-
Definition
08 May 2025
What is a capacitor (capacitance)?
A capacitor is a passive electronic component that stores electrical charge. Continue Reading
By -
Tip
08 May 2025
Key differences between chief data officers vs. CIOs
CDOs and CIOs hold distinct roles in the tech-driven C-suite. Both roles are key to improving data collection and usage throughout the company. Continue Reading
-
Tip
08 May 2025
Benefits and challenges of underground data centers
Underground data centers offer sustainable alternatives to traditional facilities. They occupy less surface land, provide a naturally cool environment and use renewable energy. Continue Reading
By -
News
08 May 2025
US tells CNI orgs to stop connecting OT kit to the web
US authorities have released guidance for owners of critical national infrastructure in the face of an undisclosed number of cyber incidents Continue Reading
By- Alex Scroxton, Security Editor
-
News
08 May 2025
UK Digital Services Tax survives US trade negotiations
The UK will retain its Digital Services Tax on tech giants in a landmark US trade agreement that paves the way for a future digital tech deal Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
08 May 2025
How to spot and expose fraudulent North Korean IT workers
North Koreans have infiltrated countless U.S. companies as remote IT workers. That means your top developer could also work for one of the world's most notorious dictators. Continue Reading
By- Alissa Irei, Senior Site Editor
-
News
08 May 2025
Virtual pulmonary rehab effective for high-need COPD patients
New research shows that virtual pulmonary rehab is similarly effective for COPD patients who need oxygen as those who do not, offering an individualized approach to rehab. Continue Reading
By- Anuja Vaidya, Senior Editor
-
Tip
08 May 2025
The 10 best generative AI courses in 2025
These wide-ranging courses help users of all skill levels learn the ins and outs of GenAI, offer advice and training on tools, and keep users updated regarding trends. Continue Reading
By- Kim Hefner, Former Executive Managing Editor
- George Lawton
-
News
08 May 2025
Nutanix opens up to all external storage
CEO Rajiv Ramaswami says Nutanix will open its platform to all external storage, allowing it to profit from customers wanting to move away from VMware, as well as the hyper-converged curious Continue Reading
By- Antony Adshead, Computer Weekly
-
Definition
08 May 2025
What is a change agent (agent of change)?
A change agent, or agent of change, is someone who promotes change and enables it to happen within any group or organization. Continue Reading
By- Katie Terrell Hanna
- Ben Lutkevich, Site Editor
- Mary K. Pratt
-
Feature
08 May 2025
AI and the future of genomics
AI genomics' speed and accuracy in drug target discovery, disease modeling and detection, and gene therapy hold promise for delivering personalized, precise medicine to patients. Continue Reading
-
Blog Post
08 May 2025
Risk of corporate hospitality to IT teams
The practice of making deals on golf courses seems to be alive and well. And it is IT leaders and their teams that are having to pick up the pieces following the agreed purchase of unsuitable tech ... Continue Reading
By- Cliff Saran, Managing Editor
-
News
08 May 2025
SAP sales tactic fuels IT disconnect
Business heads are being targeted by SAP as it pushes out its Rise cloud ERP system Continue Reading
By- Cliff Saran, Managing Editor