NEWS
Schiphol Awarded for Results Using Oracle Aconex

Schiphol Group safeguards against risk and loss and creates a complete audit trail using Oracle Aconex. Packages functionality breaks down work and speeds reporting. APIs are used to tie Aconex to other applications and provide one complete view.

Watch Online
NEWS
Cloudless Computing Explained

Cloudless Computing is a new approach to how software is developed, delivered, and consumed. It radically simplifies and democratizes the way developers and users access the tools, services and data that power enterprise applications.

Watch Online
NEWS
Application Modernization: Three Transformations at Once

In this video, Eric Minick with IBM Cloud discusses application modernization and three transformations that are happening at the same time in architecture, infrastructure and delivery.

Watch Online
NEWS
Scaling DevOps and automation

How the Splunk team uses DevOps methodologies to help with automation strategies, application deployment, and building a demo environments and workshops.

Watch Online

News

Expanded platform offers new approach to detecting and prioritizing risk, starting with comprehensive visibility across the total attack surface.
Research revealed at Coterie Connect event highlights shifting team structures, evolving skills priorities, and urgent training needed for partner marketing success by 2030.
AI portfolio adds enhancements to Red Hat OpenShift AI and Red Hat Enterprise Linux AI to help operationalise AI strategies.
Veeam, a leader in Kubernetes data resilience, can now leverage Infinidat’s InfiniBox® high-performance, cyber resilient storage solution to ensure data protection of Kubernetes-based workloads.

Expert Opinions

By Matt Bailey, workplace analytics specialist at Matrix Booking explores how data-driven insights can help organisations balance occupancy levels and adapt to changing work patterns.
By Brian Davis, VP UK and Ireland, Climb Channel Solutions.
By Alwin Bakkenes, Head of Global Software Engineering, Volvo Cars.
2025 will see cybersecurity challenges continuing to evolve, security breaches becoming ever more sophisticated, and organisations accelerating their adoption of SASE and SSE in response.