EGUIDE:
Artificial Intelligence and the sub-set of it which is machine learning are hot. It's been impossible to attend an IT conference in the last year or so without encountering a dead human genius reincarnated as a software system or a robot.
EGUIDE:
In this e-guide we showcase some of the industry role models who break the stereotypical IT mold, and share opinions on what we can do to make the industry more diverse and inclusive.
EGUIDE:
While GenAI is not expected to supersede other IT priorities such as cloud, application development and cyber security, it will augment those areas by making it easier to build software and improve cyber resilience. In this round-up, we review some of the key IT trends that are likely to shape the industry across the region in 2024.
EBOOK:
Nearly two-thirds of enterprises in Asia-Pacific plan to increase their IT budgets next year in areas such as cloud computing and cyber security to secure their digital future. This e-guide dives into the reasons as to how and why APAC enterprises are leading their peers in the shift to a digital-first strategy.
INFOGRAPHIC:
In this infographic, we share insights on the ever-growing IT buying team and give practical advice on how to engage the whole purchasing team throughout a complicated buying process.
EGUIDE:
In this issue find out how blockchain is being tried out in Saudi Arabia to enable consumers to use their faces and blockchain-based apps to withdraw money from cash machines, rather than inserting PINs. Also, read how the UAE's Etihad Airways is working to use AI to help it better engage with staff and benefit from their knowledge and ideas.
EGUIDE:
Find out how Norwegian bakery chain Baker Brun is doing things in a smarter way through the collection of data, that helps it make sound business decisions, through a mobile app rather than pen and paper.
EZINE:
In this issue, read about how and why one public sector IT professional in the Netherlands, Victor Gevers, took a whole year out to hack ethically and, in the process, unearthed about 1,000 vulnerabilities.
EGUIDE:
Today's businesses run on software, which must interoperate with myriad other software platforms. How can a business offer its data and computing capabilities to potential users without revealing the underlying source code? In this e-guide we explore the benefits of APIs, how to build an API strategy and why it is so important to have one in place.
EGUIDE:
Security technologist Bruce Schneier's insights and warnings around the regulation of IoT security and forensic cyber psychologist Mary Aiken's comments around the tensions between encryption and state security were the top highlights of the keynote presentations at Infosecurity Europe 2017 in London.