Broadcom Cements European Credentials for Data and Cloud Sovereignty
Data sovereignty is about the legal ability to control how data can be shared and used. Sounds simple, but how it’s applied can vary significantly. What does it mean from…
Podcast: A More Secure Approach to Today’s Threat Landscape
In our annual survey of senior leaders, security continues to be the top priority for IT investment, with cyberattacks, passwords and network security crucial concerns. Phishing, malware and ransomware remain…
Podcast: Putting Generative AI to Use in the Real World
Since OpenAI’s ChatGPT became publicly available in November 2022, the world has been captivated by the possibilities of generative artificial intelligence (AI). But AI isn’t new: companies have been developing…
Podcast: Top IoT and Edge AI Predictions for 2024
Artificial intelligence (AI) and edge computing are taking the Internet of things (IoT) to the next level, with new and exciting applications expected over the next year and beyond. But…
MWC 2024, Tuesday 27 February
Welcome back to CCS Insight’s third day of coverage for MWC 2024. In today’s round-up, our analysts highlight their views on announcements about sustainability and the circular economy, transparent and…
MWC 2024, Monday 26 February
Today marked the first day of MWC, and artificial intelligence (AI) was a key theme, of course. Our analysts got hands-on with Samsung’s Galaxy Ring, witnessed other new device launches,…
What’s in Store for the Digital Enterprise
Next week sees the start of CCS Insight’s Predictions for 2024 and Beyond event — three days of online discussions, presentations and interviews showcasing our expectations for the connected world…
Broadcom Tackles Critics with Positive Outlook for VMware Acquisition
Broadcom’s self-established deadline for its acquisition of VMware is fast approaching and the deal is on track to potentially close by the end of Broadcom’s fiscal year in October. I…
Podcast: Navigating the Path to Secure Apps
In recent months, various industries and organizations worldwide have been hit by numerous high-profile security breaches. These breaches have included unauthorized access, data leaks, ransomware attacks and other forms of…
Podcast: Achieving Customer Success in the Face of IT Complexity
Today’s IT solutions are more complex than ever, with enterprises navigating how to introduce new capabilities like cloud, mobile and Internet of things to a foundation of traditional technology. Maintaining…