Stemettes launches documentary about Outbox Incubator programme

Social enterprise Stemettes has produced a short film featuring its Outbox Incubator programme to highlight the importance of getting girls into science, technology, engineering and maths

Gartner predicts BI market will jump 7.3% to $18.3bn in 2017

So-called “modern BI and analytics platforms” outpace traditional business intelligence, but rate will slow down

Visa, Bosch and Indiegogo debut IBM Watson IoT partnerships

At the inauguration of the Watson IoT HQ in Munich, IBM customers announced a swathe of new partnerships to bring IoT tech to market

Big data projects need business input and careful management

Big data projects need to be managed. Ocado and Graydon have been figuring out how

Swedish capital uses Bluetooth and Wi-Fi to cut road congestion

Stockholm transport authorities are gaining a better understanding of road traffic through technology

HPE services and CSC to become DXC Technology

The merger between HP's services division and CSC will launch in April 2017 and is expected to save the companies billions

Amazon, Apple and Microsoft pledge to support government push for fair cloud storage use

Competition and Markets Authority confirms support of Amazon, Apple and Microsoft as it concludes compliance review into cloud storage sector

RSAC17: Former MI5 head calls on infosec community to make world safer

In a digital era, the information security community has a key role in helping to make the world a safer place, according to former MI5 boss Stella Rimington

FOI requests reveal appetite for datacentre change in London’s local councils

Research conducted by cloud service provider HyperGrid suggests IT departments in local councils are working with outdated and underperforming datacentre infrastructures

High Court rules for SAP, against Diageo in indirect licensing case

Judge rejects Diageo’s submission that SAP PI is a “gatekeeper” licence for gaining access to the SAP suite of applications and database

Security Think Tank: Integrity of business data key to cyber defence

What types of organisation are likely to be targeted by data integrity breaches and how best can they detect and mitigate against such attacks?

RSAC17: Geopolitical changes driving encryption usage, survey shows

More organisations are planning to deploy encryption in response to geopolitical changes, but confidence in organisations’ ability to secure and protect encryption is low, a survey shows

Drizzle on tap to spur Spark Streaming architecture

Spark Streaming architecture to date has focused much on programming perks. Now, as a bit of a hedge against other streaming choices, Drizzle comes to bat to cut streaming latency.

Microsoft PCs get Brexit-fuelled price increase

Microsoft has raised the price of its Surface PCs by as much as 15% in the UK because of the falling value of the pound since the country voted to leave the EU

Sweden’s Kiviks Musteri turns to cloud to keep up with growth

Swedish fruit products manufacturer Kiviks Musteri plans to put further systems in the cloud as a cloud-based ERP migration nears completion

Cisco sales fall as traditional product sales slump

Cisco's traditional product sales such as switches are falling, but revenues in emerging products in areas such as security are on the up

Brexit is a potential boost for Swedish fintech

Stockholm could be set to benefit from the UK’s exit from the European Union by attracting more fintech investment

Oracle executives claim more comprehensive reach for cloud business

At a recent customer conference in London, US-based Oracle executives gave accounts of the supplier’s cloud business as becoming at once more enterprise and more mid-market

NatWest launches digital lending platform to compete with fintech startups

NatWest has launched a lending platform that promises loan approval times as fast as those offered by peer-to-peer lenders

Security Think Tank: Three strategies against data integrity attacks

What type of organisations are likely to be targeted by data integrity breaches, and how best can they detect and mitigate against such attacks?