21 Mar The law of unintended consequences strikes again
16 Mar Ambitions for space may seem a stretch, but it is more possible than ever before
2 Mar Even as we adjusted to the hybrid cloud age, is it about to be superseded?
16 Feb Great language, ambitious scope, and a gaping hole
9 Feb Despite computer development continuing apace apace on many fronts, the immediate replacement for x86 seems as elusive as ever
2 Feb Data bill fine exemption for public bodies, except where they are competing with the private sector, is a retrograde step
26 Jan Will compliance be a badge of excellence, or a target for attack?
19 Jan There are many sides to handling an unexpected incident, but honesty and respect are still the best policies
12 Jan Europe is getting serious about supercomputers
10 Jan The operatives are giving way to the visionaries
5 Jan And you thought a groaning inbox was the worst to greet you after the holidays
22 Dec Looking back at the TechBeat series for 2017
15 Dec Concerns were for hacking inside the pipes, now fears arise for the pipes themselves
1 Dec Until you know what you have, you can't hope to know how much you have to do
17 Nov The full implications of cryptocurrencies for security are only just emerging
10 Nov Violations, abuses and screw ups dominated the public PSC debate, but no credible alternative was offered
3 Nov Why is data encryption so rarely used in enterprise?
27 Oct Does autonomy for applications take control from the administrator, and does it matter?
13 Oct Concepts rarely hit the road as they are shown, and that may not be all that bad
22 Sep Why do we still struggle for effective communication between the business, IT and the C Suite?
The Westbury Hotel, Dublin 2
Galmont Hotel & Spa
View All Events
Submit Your Event
Click here to go to our index for resellers to source brands and determine who distributes them locally.
Microsoft research indicates dichotomies in perceptions of readiness and security
Visionary and advisor roles now expectations for chief information officers
Study revealed 20% of small to medium businesses use no endpoint security
Attackers use APIs to automate credential stuffing attacks. The financial sector is particularly vulnerable
Reflecting an ‘open, fair, diverse, democratic and confident’ Europe in development of human-centric artificial intelligence