Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

Making Hybrid Cloud Safe for Business

Shifting more infrastructure and services to the Cloud carries new security risks that need managing, specifically: reliability, data governance and endpoint protection.

TECHNOLOGY

APPLICATIONS

Unlocking New Value From Traditional ERP

Reinvent Your Business with Cognitive.

CLOUD COMPUTING

Unlocking New Value From Traditional ERP

Reinvent Your Business with Cognitive.

COMPUTER HARDWARE

Nvidia GeForce prices skyrocket as cryptocurrency miners snap up supply

It's a bad time to build a gaming PC.

DATA CENTRE

Mid-range models ring the changes in Top500 supercomputer ranking

There were no new entrants in the top 10 places of the Top500 list, but plenty of action down below, as power efficiency and GPU adoption drive supercomputer development.

EMERGING TECHNOLOGY

From hype to reality: Transformation is urgent, said 80% of Malaysia's business leaders - and yet...

MDEC was present during the unveiling of a new Asia-wide Microsoft study, which showed that only 34% of businesses have a full digital strategy in place.

INDUSTRIES

Philippine Ports Authority now livestreams all bidding process

To ensure transparency and integrity in the agency, says PPA General Manager Jay Daniel Santiago.

INTERNET

Philippines to test online trade accreditation, permit application next month

The platform aims to cut application for trade permit and accreditation processing time to three to two days, or less.

MOBILE

How IoT benefits manufacturers, retailers and hospitals

IoT can help companies “optimise operations, manage assets, rethink products and services, and transform customer experience”, says IBM’s Pankaj Lunia.

NETWORKING

7 in 10 MNOs in developed APAC markets plan to launch 5G services before 2024

Motivated by 5G’s promise to lower TCO, provide greater efficiency and flexibility in harnessing resources, and help create new revenue opportunities.

OPERATING SYSTEMS

5 things you need to know about Stack Clash to secure your shared Linux environment

Attackers can locally exploit the privilege escalation vulnerability to gain root access over Linux, Solaris and BSD machines. This is bad news for Unix-based servers, and even more so for multi-tenant environments.

SECURITY

What it takes to be a security incident responder

A wide range of technical skills and curiosity about the mechanics and goals of an attack are key for effective incidence response.

STORAGE

Video storage leads to hyperconvergence for law enforcement agency

HCI platform combines VDI, long-term storage and video storage arrays.

RELATED WHITE PAPERS

BLOGS

myGov update fails on promises and potential

Even after a revamp, myGov is failing to live up to its potential.

Chatbots: Opportunity and threat

In the first six months after Facebook introduced a bot API for Messenger, around 34,000 chatbots were created.

RELATED WHITE PAPERS