Schneider Electric and NVIDIA are standardising the construction of AI factories. New projects are set to accelerate the revolution

Schneider Electric and NVIDIA are launching new reference designs to solve one of the biggest challenges of the…

Cyber Security 2025: The New Battlefield

The era of simple cyberattacks is over, replaced by a new generation of threats driven by the commercialization…

Power hunger for AI. Why are IT bosses planning data centres 5 years ahead?

The corporate race to implement generative artificial intelligence has collided with a hard physical limit in the form…

Cyber security: Every employee becomes part of an organisation’s ‘human firewall’

Contemporary cybersecurity is no longer the domain of technology, but is becoming a key element of business strategy…

The end of the fortress era. Why is cyber resilience the future of IT?

The scale and sophistication of cyber threats in Poland necessitates a fundamental change in the approach to IT…

UK 5G in the hands of Nordic giants. VodafoneThree opts for Ericsson and Nokia

Newly formed operator VodafoneThree has selected Ericsson and Nokia as key partners to build its nationwide 5G network…

Cyber attack on software provider paralyses key European airports

A ransomware cyberattack on an aviation software provider paralyzed operations at key European airports from London to Berlin…

Huawei and Chinese AI censorship: new model to block ‘sensitive’ content

Chinese tech giant Huawei has unveiled a new version of its DeepSeek AI model, designed specifically to enforce…

OpenAI adds $100bn for backup servers in new spending plan

OpenAI is making the most expensive bet in the history of the tech industry, raising its computing power…

China’s DeepSeek heats up the debate about the cost of AI. Reveals surprisingly low cost of training

Chinese startup DeepSeek challenges the prevailing narrative about the enormous costs of AI development, revealing that training its…

The handbrake of the AI revolution. It’s not a lack of chips, but a lack of power that will halt development

While the entire tech world is focused on the race for the latest AI processors, energy infrastructure is…

Western banks are drowning in technology debt. A lesson that Poland cannot ignore

The enormous technological debt is pushing the Western banking sector into a deep crisis of loyalty, brutally exposing…

How to meet NIS2 requirements? ITAM as the foundation of security

IT asset management is no longer the domain of administrators optimizing licenses, but has become a strategic imperative…

Cyber Security 2025: How many companies have really implemented Zero Trust?

In 2025, the world of cybersecurity is dominated by Zero Trust, but the growing popularity of this philosophy…

Billions of attacks and a lack of experts. Is the financial sector ready for the crisis

The growing number of cyberattacks and the deepening shortage of specialists pose a critical threat to the European…

How do you effectively manage AI costs in the cloud? The answer is FinOps

Companies are enthusiastically moving their innovations to the cloud, often unaware that behind the enormous technological potential lies…

The end of simple bots? How AI orchestration is revolutionising automation

Business process automation as we knew it is becoming a thing of the past, with simple bots that…

New from Signify: innovative SunStay Pro gen2 and Mini solar lamps

Signify has unveiled its latest innovations in integrated street lighting: the SunStay Pro gen2 and SunStay Pro gen2…

The clock for Windows 10 is ticking. Companies face an inevitable decision

In less than a month, on October 14, Windows 10 will lose critical security support, exposing millions of…

The economics of open source: who pays for the code the world runs on?

Our digital economy, from the AI revolution to smartphone apps, runs on free, open-source software. But this trillion-dollar…

The drone attack launched a digital front. Anatomy of Russian disinformation in Poland

As we predicted, the drone attack on Poland marked the beginning of a coordinated disinformation campaign. According to…