Articles

A New Journey to the Cloud

ERP implementation has changed. And for those companies facing the 2027 maintenance deadline for SAP ECC 6, that is good news. In today’s cloud-first, ‘adopt not adapt model, there are no more white boards.

How to add AI to your cybersecurity toolkit 

A successful implementation of AI in cyber defense requires a solid data governance system, reimagined incident response frameworks, sufficient talent and expertise to manage the new system, and established documentation practices.

The Metaverse: Virtually a reality?

Metaverses have the potential to enable virtual worlds to expand beyond the gaming genre to encompass all manner of social and commercial activities.

Cybersecurity and Cloud: A Look Back at 2022 and What to Expect in 2023

Businesses are continuously reassessing their resources and options to fill their tech stack. In this competitive digital landscape, the innovative use of technology will be something that would generate a competitive advantage for organisations.

Shopping for Data: Ensuring a seamless user experience 

This combination can drive a business’s data culture and provide a structured approach for businesses to benefit from data intelligence across their operations, with only a few clicks.

Overcoming the increasing challenges to data solution providers

To address this situation, companies can choose to store data in a more sustainable way, with a company that focuses on renewable sources of energy, sustainable practices and technology that has a proven energy consumption of around 40% less than a legacy data centre. 

How edge cloud is transforming online retail

This is a huge step for online retailers who, over the past decade, have had to split their applications into microservices, distributing their content across a cloud infrastructure from a range of third-party providers.

Why you must enhance visibility and control of your expanding supply chain

As organisations’ supply chains grow and become more digital, threat actors are increasingly targeting third parties to gain access to the enterprise network.

Gaining a grip with the strangler pattern

Big bang migrations, in which all traffic is cutover to a new system when it is sufficiently close to feature-parity with the legacy system, are inherently risky and almost always delayed.

Selecting a sovereign cloud: A data guardian’s guide

If your sovereign cloud provider was holiday accommodation, which would you choose? Like all families, there’s no one size fits all solution and what will work for some, will not work for others.

Top security threats to the cloud

Cloud is an important mechanism for digital transformation. However, many companies still operate with an outdated mindset, which can cause them to make many mistakes. 

Subscribe to our Newsletter