Vision Pro 2 coming, Apple confirms work on successor

W odpowiedzi na niższą od oczekiwań sprzedaż pierwszej generacji Vision Pro, Apple intensyfikuje prace nad nową wersją urządzenia. Kluczowym wyzwaniem…

Cloud in the public sector: modernisation opportunity or procedural maze?

Public administrations are increasingly looking toward the cloud, seeing it as an opportunity to accelerate digitization and service…

Headless commerce – why speed is becoming the new currency in e-commerce

Online customers today have less patience than ever - the median time spent in an e-store is less…

HPE Juniper and AI: What’s new in the Mist platform?

HPE is expanding its Juniper Mist networking platform by implementing advanced agent-based artificial intelligence (AIOps). The goal is…

The regulatory grey area of AI: who really controls knowledge in an age of model distillation?

The distillation of AI models is quickly gaining status as a trendy buzzword in the tech world, promising…

AI in banking: 70% of leaders increase investment in technology

The banking sector is firmly out of the experimentation phase and is embarking on a strategic arms race…

Polish consumer watchdog is taking subscriptions under the microscope. Netflix facing charges, giants pledge changes

The subscription model of major technology companies has come under the magnifying glass of the Polish regulator, which…

The lost innocence of the web: the story of the first great cyber attack

On November 2, 1988, a program consisting of just 99 lines of code, written by a single student,…

The boundary between chatbot and AI agent – why the difference matters for business

Chatbots have been supporting companies in simple customer service processes for years, but their capabilities end in reactive…

A turnaround in AI strategy? Apple talks to Google about implementing Gemini in Siri

In its search for a solution to its long-criticized voice assistant, Apple is considering an unprecedented alliance with…

Companies forget that poor infrastructure will bear the brunt of AI ambitions

A new global study shows a worrying gap between business ambition and real-world technology readiness. Business leaders are…

Phishing training is losing its lustre: why effectiveness is lower than the market promises

The largest study to date on the effectiveness of phishing training shows that the effects of employee education…

4 AI trends that will define the coming years

For business, the time of fascination with the possibilities of generative AI is coming to an end, and…

Vision Pro 2 coming, Apple confirms work on successor

W odpowiedzi na niższą od oczekiwań sprzedaż pierwszej generacji Vision Pro, Apple intensyfikuje prace nad nową wersją urządzenia.…

New IT infrastructure: how companies are designing AI environments without energy compromises

Artificial intelligence is changing how companies approach IT infrastructure design - it's no longer just computing power that…

Huawei stumble delays DeepSeek and exposes weaknesses in China’s AI strategy

Chinese AI startup DeepSeek has had to delay the release of its highly anticipated R2 model. The reason…

The low-code/no-code revolution. These industries are taking the lead

Low-Code/No-Code(LCNC) has evolved from a niche trend into a driving force of digital transformation. Market forecasts are clear:…

Printing in SMEs: from an operating cost to a strategic business tool

For years, the main criterion for the selection of printing devices in small and medium-sized businesses has been…

Nuclear power or windmills? The data centre industry is looking for a plan B to power AI

The rise of artificial intelligence in the technology market has triggered an exponential increase in the demand for…

Clickjacking as part of the attack chain: an underestimated threat in security architecture

Clickjacking has remained on the periphery of security departments' attention for years - regarded more as a threat…

Energy efficiency in the data centre – from cost to profit source

Until a few years ago, green transformation in the data centre was treated as an expensive add-on -…

Why every cable in a factory today is a potential entry point for a hacker

Just a decade ago, the industrial production line was a closed world. Machines ran on isolated networks and…