adv

Opinions

Winnie Tang

The secrets of business success

Earlier this year the World Economic Forum produced The Future of Jobs report, which predicted that...
David Senecal

Managing and not blocking: An innovative approach to handling bots

Bandwidth, server CPU cycle and memory are precious resources that impact the performance of a...

Sponsored Content

At a private luncheon during the World Business Forum Hong Kong 2015, Steve Wozniak, inventor and co-founder of Apple Computer joined Martijn Blanken, Chief Customer Officer at Telstra Global...
Fly To The FutureIf “Back To The Future” were a Hong Kong movie, there would likely be scenes where Marty from 1985 arrives in 2015 at the airport in Chek Lap Kok (no longer Kai Tak!) and finds it...
RFID: be Ready For what It can DeliverThe retail industry is getting increasingly competitive these days, and the recent global shares movements are not making the atmosphere any merrier. With an...
As business go network-centric and threats become more sophisticated, varied and numerous, traditional security measures are not enough. We asked Amnon Bar-Lev, President, Check Point Software what...
Uber has traditional businesses running for cover. While business disruption is not new, the world is now seeing a perfect storm of digital transformation and it threatens established players across...

Featured Story

How to look for a job while you're still employed
Finding a new job while you're still employed is a tricky prospect. On the one hand, you're more attractive to potential employers if you're already...
Why a security team embraces shadow IT
Why a security team embraces shadow IT
When you hear the phrase "getting ahead of shadow IT," it typically comes from a CIO who is...
HK businesses are weak in incident response readiness, says forensic expert
Hong Kong enterprises have been weak in readiness and investment in cybersecurity incident response...
As Hong Kong companies are urged to look into the security impact of using appli
HK companies should look into container security
Since bursting on the scene three years ago, application container technology has been generating a...

Events