Opinion

The future is bespoke software

Bespoke management systems will not only improve business operations but also a business’ bottom line, according to managing director and co-founder of Audacia, Philip...

How to design security for biometric threats

The FBI launched a Cyber Most Wanted list in 2014, which featured 42 people and groups in 2018, when Park Jin Hyok topped the...

How to design security for biometric threats

The FBI launched a Cyber Most Wanted list in 2014, which featured 42 people and groups in 2018, when Park Jin Hyok topped the...

How to design security for biometric threats

The FBI launched a Cyber Most Wanted list in 2014, which featured 42 people and groups in 2018, when Park Jin Hyok topped the...

How to design security for biometric threats

The FBI launched a Cyber Most Wanted list in 2014, which featured 42 people and groups in 2018, when Park Jin Hyok topped the...

How to design security for biometric threats

The FBI launched a Cyber Most Wanted list in 2014, which featured 42 people and groups in 2018, when Park Jin Hyok topped the...

How to design security for biometric threats

The FBI launched a Cyber Most Wanted list in 2014, which featured 42 people and groups in 2018, when Park Jin Hyok topped the...

AI and edge computing are making CCTV more effective than ever

Thanks to developments such as artificial intelligence and edge computing, CCTV has become an even more effective tool at keeping both property and people...

Famous movie plots that would’ve been solved with good data security

Data security is a very real issue that we have to deal with in the real world, but it’s also an issue that plagues...

Famous movie plots that would’ve been solved with good data security

Data security is a very real issue that we have to deal with in the real world, but it’s also an issue that plagues...

Top Stories

It takes just one minute to register for the leading twice weekly B2B newsletter for the data centre industry, and it's free.