Magazine Button


5G: Just the next wave or a special generation?

Article by: Chris Lewis 5G is a special generation for mobile. In fact, it’s much more than mobile. The framework of technology must embrace fixed as well as cellular, licensed as well as unlicensed. It is so important to the future of society that a fresh look at spectrum, shared investment and the positioning of […]

Behind the scenes: Connecting fans at Anfield Stadium

Article by: Bob Slorach, CTO of the Wireless Infrastructure Group I can only imagine the spikes in data usage at the 2018 World Cup as fans take selfies, share Facebook Live game highlights and WhatsApp their friends with minute-by-minute game updates. Fortunately, fans who recently attended the highly-anticipated international friendly at Anfield Stadium, Brazil versus […]

Expert predicts the impact of AI on the workplace in the next year

Article by: Brian Chappell, Senior Director, Enterprise and Solution Architecture at BeyondTrust AI offers many opportunities to enhance productivity and accelerate activities by augmenting human capabilities. While there are predictions that AI will step into many roles in the workplace, it’s unlikely we are going to see widespread adoption in any of those that rely […]

Intel and Mobileye begin testing their autonomous fleet in Jerusalem

Article by: Professor Amnon Shashua, Co-founder and CTO of Mobileye The first phase of the Intel and Mobileye 100-car autonomous vehicle (AV) fleet has begun operating in the challenging and aggressive traffic conditions of Jerusalem. The technology is being driven on the road to demonstrate the power of the Mobileye approach and technology, to prove […]

How AI-based machine learning will affect IT security

Article by: Rabih Itani, Regional Business Development Manager – Security, Middle East and Turkey at Aruba, a Hewlett Packard Enterprise company Artificial intelligence (AI) has been a hot topic of discussion in many industries for a while now, with healthcare, retail and hospitality, to name but a few, starting to speculate on the massive opportunities […]

Will businesses be ready in time to comply with the GDPR requirements?

Article by: Bob Worrall, CIO, Juniper Networks On May 25 2018, the General Data Protection Regulation (GDPR) becomes fully enforceable under law, but will organisations be ready to comply by this deadline? Re-read this sentence and you’ll spot that I did not mention the European Union. Although GDPR is a European law, it has global […]

How to prepare your colocation with open compute solutions

With a 17% attendance increase at the 2018 Open Compute Summit last month, the increasing market interest in all things open compute came through loud and clear. Previously, the unique and custom IT gear shared via the Open Compute Project (OCP) was only for hyperscale operators who could buy massive quantities from Original Design Manufacturers […]

Using data to enhance your enterprise cyber hygiene

Jim Doggett, US VP and CISO, Panaseer In the good ‘ol days of CISO, things were straightforward and it was pretty easy to do what it took to be successful. I would prepare a budget for the upcoming year from a list of essential and value-added projects, which my security and risk team supported. Then […]

The top five identity trends of the year

Jim Ducharme, RSA Security’s VP of Identity Products The days where passwords and tokens were our only way of identifying people and systems is long gone. Today, we have a vast array of technologies, including: multi-factor authentication (MFA), standards-based solutions, biometrics and smartphone-based authentication – to name just a few. This change has been driven […]

Cloud technology is becoming more utilised in the workplace

By Angela Evans, Office Business Leader at Microsoft UK “In recent years, the cloud has undoubtedly established itself as a key cog in the enterprise IT wheel. With clear benefits in data storage, security and recovery, 96% of businesses have implemented cloud services to reap both short and long-term advantages. As the technology has embedded […]

Incident response: a six-step guide

Tim Bandos, Senior Director of Cybersecurity at Digital Guardian, discusses how good incident response always starts with answering six key questions. Incident response is defined as the process by which an organisation handles a data breach or cyberattack. The goal of incident response is to efficiently manage an incident so that the damage is limited […]

How to derive value from ‘pay as you go’ cloud

Source: Rob Mellor, VP GM EMEA, WhereScape If you’ve ever had the joy of watching eight-year olds play football, you’ll have witnessed a particular parent on the sidelines; not content with simple encouragement, they bellow instructions to their child to do things that, frankly, the world’s greatest players might struggle with! Their understanding of the […]

Browse our latest issue

Intelligent CIO Europe

View Magazine Archive