SECURITY

What might ‘bad guy’ machine learning mean for security?...

A panel of security experts broadly agrees that adversarial machine learning looks set to increase over the next 18 months

INFRASTRUCTURE MANAGEMENT

What does $1 billion buy you as IoT moves computing to the...

Enterprise firms jostle for share of burgeoning IoT space as computing moves to the edge… and Dell aims to lead with new division and strategy

VOICE & DATA CONVERGENCE

What must change before ‘voice-first’ hits the enterprise?...

Why voice technology can be a game-changer in the way businesses operate

HUMAN RESOURCES

C-suite career advice: David Williamson, EfficientIP

What tips would the c-suite give to the next generation?

SOFTWARE & WEB DEVELOPMENT

GitHub CEO: “The future of coding is no coding at all”

On the eve of celebrating its first 10 years, GitHub outlines where the next 10 could go.

BUSINESS MANAGEMENT

Eight things I learned about Satya Nadella

The Microsoft CEO revealed a complex and distinctive personality at the London launch his book Hit Refresh

MOBILE COMMUNICATIONS

The End of an Error: Microsoft’s litany of Windows Phone...

Windows Phone represented the old Microsoft and it failed because of lack of apps

DATABASES

Five blockchain uses that create networks & reinvent economies...

From component provenance to DevOps – how blockchain can reinvent industries

BUSINESS MANAGEMENT

Unisys CEO plots secure future for 144-year-old firm

Peter Altabef, the CEO of Unisys, is reinventing the old company for the age of cyber threats

MEDICAL DEVICES

Tech history: Human thoughts control computer

A paralysed Georgia man became the first human to control a computer using his thoughts.

INTERNET

Four rules for success in the era of enterprise IoT

Samsung’s VP of Enterprise IoT provides his tips on how to succeed

INTERNET

News roundup: Does the blame lie with Equifax or Apache?...

A roundup of the week’s technology news including some iPhone stuff, Kaspersky woes, and Jack Ma dancing.

1 3 5 86 87

Recommended for You

phil-muncaster

Why does China spot security vulnerabilities quicker than the US?

Phil Muncaster reports on China and beyond

silhouette

Everything you need to know about... Blockchain

IDG Connect tackles the tech stories that matter to you

kathryn-cave

What will be the single biggest security threat of 2018?

Kathryn Cave looks at the big trends in global tech

Most Recent Comments

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.

images

Our Marketing Research

Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.

images

Poll

If it were legal, would your organization hack back?