Unlocking hybrid workforce productivity
The edge computing ecosystem and experience have become the keys to unlocking hybrid workforce productivity, says Annelee Le Grange, GM: HP at Axiz.
IT equipment at the end of its life
Considering donating old office equipment? There are three pieces of legislation you need to comply with when dealing with IT equipment at the end of its life.
Fujitsu Labs, University of Toronto researchers collaborate
The two have developed quantum-inspired technology to optimise radiation treatment plans for brain tumours and other diseases.
Introducing coding at school from a teacher’s perspective
Coding has the potential to transform from being another subject to becoming a literacy, but it will take a collaborated effort from all relevant stakeholders to achieve this.
The rise of Kubernetes and the growing challenge around data protection
If you're going to embrace containers, you must also get your arms around the issue of data protection, says Florian Malecki, international product marketing senior director at Loophold.
Remote working boosts PC distributor Mustek
Revenue for the group continued the growth trajectory that started during the previous financial year due to surging demand sparked by remote working.
Telkom offers coding programme in Eastern Cape
The Telkom Foundation, in partnership with the Department of Communications, unveils a community-led coding programme for the Alice community.
Three key things about mainframe access
A mainframe survey run by Micro Focus and ITWeb revealed 93% of respondents are concerned about high levels of user frustration owing to lack of operational efficiency.
Republic of Gamers, Alan Walker continue collaboration with brand new video
The artist stars in a new video that features the popular ROG Zephyrus G14 gaming laptop.
Your complimentary Stratus ztC Edge ROI Guidebook
Research has found significant benefits related to overall cost savings, cost avoidance and improved productivity when using Stratus' zero-touch Edge Computing platform.
The anatomy of the SolarWinds attack chain
As traditional network security barriers dissolve, the ‘assume breach’ mindset has never been more critical.