IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more
Dale Walker
IT Pro 20/20: The quest to humanise AI
A fox sitting in a field at sunrise in the style of Claude Monet - generated by OpenAI's DALL-E 2
artificial intelligence (AI)

IT Pro 20/20: The quest to humanise AI

Issue 28 looks at recent developments in artificial intelligence that are pushing businesses to be more creative
5 May 2022
Best VPN services 2022
VPN software displayed on a laptop
Security

Best VPN services 2022

With remote working on the rise, we round up the best tried and tested VPN services
25 Apr 2022
What is a freedom of information (FOI) request?
Filing cabinet
Policy & legislation

What is a freedom of information (FOI) request?

We look at the mechanism citizens can use to hold public bodies to account
22 Apr 2022
What is ethical AI?
A robotic hand and a human hand touching fingertips
artificial intelligence (AI)

What is ethical AI?

How do we define what a 'good outcome' is when it comes to algorithms?
13 Apr 2022
What is Microsoft Pluton?
Abstract image of the Microsoft logo ontop of a glowing processor
Security

What is Microsoft Pluton?

A quick look at Microsoft's new approach to CPUs that promises to revolutionise Windows security
5 Apr 2022
IT Pro 20/20: The ugly side of gamification
A pixel art depiction of a business man stood on a hill with a broken trophy
Business strategy

IT Pro 20/20: The ugly side of gamification

Issue 27 looks at why you might want to reconsider team incentives, how cloud PCs are set to transform the enterprise, and why Gaia-X is the last chan…
1 Apr 2022
IT Pro 20/20: Is it time to ditch broadband?
IT Pro 20/20: Is it time to ditch broadband?
5G

IT Pro 20/20: Is it time to ditch broadband?

5G adoption is picking up and promises to solve every networking woe faced by businesses on the move... but is it a Wi-Fi killer?
24 Mar 2022
What is Strong Customer Authentication (SCA) under PSD2?
Online payment
two-factor authentication (2FA)

What is Strong Customer Authentication (SCA) under PSD2?

An in-depth look at the EU directive that aims to harmonise online payment protection
14 Mar 2022
What is a DHCP server?
network cable
Network Access Control

What is a DHCP server?

We take a closer look at how DHCP can make network administration easier
25 Feb 2022
IT Pro 20/20: The new frontier of innovation
IT Pro 20/20: The new frontier of innovation
Hardware

IT Pro 20/20: The new frontier of innovation

Businesses are putting green tech at their heart of their buying decisions, and manufacturers and paying attention
23 Feb 2022
What is cryptocurrency mining?
Two shovels next to Bitcoins being uncovered in mud to depict cryptocurrency mining
cryptocurrencies

What is cryptocurrency mining?

We explain how virtual currencies such as Bitcoin and Ether are actually made
23 Feb 2022
The benefits of hot desking
A laptop, notebook and cup of coffee on a dark wood desk
Business strategy

The benefits of hot desking

Many workers are now adopting this new approach, but what makes it so attractive?
22 Feb 2022
How to build Android apps
Google mobile apps
Google Android

How to build Android apps

Follow these eight steps to get your app on Google Play
17 Feb 2022
What is a default gateway?
Ethernet cables plugged into a router
Network & Internet

What is a default gateway?

A look at one of the most critical components of a well-functioning network
10 Feb 2022
What is a managed IT service?
IT infrastructure digital illustration
Business operations

What is a managed IT service?

With two-thirds of businesses using them, learn about what managed IT services are and how they’re being used
10 Feb 2022
The top 12 password-cracking techniques used by hackers
A list of poorly-constructed passwords on a notepad
Security

The top 12 password-cracking techniques used by hackers

Some of the most common, and most effective methods for stealing passwords
9 Feb 2022
What is PRINCE2?
Two people working at desk with glasses placed at forefront
project management software

What is PRINCE2?

We take a closer look at the project management framework
27 Jan 2022
IT Pro 20/20: Does the UK stand a chance in the global AI race?
IT Pro 20/20: Does the UK stand a chance in the global AI race?
artificial intelligence (AI)

IT Pro 20/20: Does the UK stand a chance in the global AI race?

Lofty goals and a rich history in computer science may not be enough to stay relevant
21 Dec 2021
What is SSID?
wireless router
broadband

What is SSID?

We look at what SSID is and how it is used to connect devices to the internet
7 Dec 2021
IT Pro 20/20: The problem with diversity in cyber security leadership
IT Pro 20/20: The problem with diversity in cyber security leadership
cyber security

IT Pro 20/20: The problem with diversity in cyber security leadership

Why failing to address a shortage of women in senior roles puts businesses at risk - issue 23 is available to download now
2 Dec 2021
What is reinforcement learning?
Three smiley faces arranged like a traffic light to symbolise reinforcement learning
machine learning

What is reinforcement learning?

We look at a method of AI development built on the idea of positive and negative feedback
9 Nov 2021
IT Pro 20/20: The future of IT infrastructure
IT Pro 20/20: IT infrastructure in 2021 and beyond
IT infrastructure

IT Pro 20/20: The future of IT infrastructure

Is UK net neutrality under threat and can using blockchain ruin your green credentials? Issue 22 of IT Pro 20/20 is out now
4 Nov 2021
What is end-to-end encryption and why is everyone fighting over it?
Abstract image of code passing through a filter to symbolise end-to-end encryption
encryption

What is end-to-end encryption and why is everyone fighting over it?

End-to-end encryption is considered one of the best ways to protect user data, but not everyone thinks it's a good idea
29 Oct 2021
How to unroot Android
An Android smartphone laid flat on a surface beside a model of the Android mascot
Google Android

How to unroot Android

If you've rooted your Android device, here’s how to get everything back to normal
27 Oct 2021
What are the responsibilities of a data controller?
Series of locks on binary code with one unlocked
Business strategy

What are the responsibilities of a data controller?

If your organisation collect people's data, you need to know how GDPR applies to your practices
8 Oct 2021
How to maintain your privacy on social media
Social media button concept
data protection

How to maintain your privacy on social media

Even the most privacy conscious individuals can be caught out by misconfigured accounts
1 Oct 2021
IT Pro 20/20: Using technology to create a better future
IT Pro 20/20: Using technology to create a better future
digital transformation

IT Pro 20/20: Using technology to create a better future

Issue 21 of IT Pro 20/20 looks at the newest innovations and projects shaping our interactions with the world around us
1 Oct 2021
What is bandwidth?
Data in a tunnel for analytics
broadband

What is bandwidth?

We look at how bandwidth works, and why your internet connection sometimes slows to a crawl
8 Sep 2021
IT Pro 20/20: The end of the remote work dream
IT Pro 20/20: Is this the end of the remote work dream?
agile working

IT Pro 20/20: The end of the remote work dream

Issue 20 of IT Pro 20/20 examines whether a new industry policy to pay workers based on location is likely to catch on
1 Sep 2021
Microsoft Surface Pro review: Still worth buying?
Surface Pro
Laptops

Microsoft Surface Pro review: Still worth buying?

Microsoft's hybrid may be four years old, but it still manages to pack a punch
1 Sep 2021
What is a Trojan?
Toy horse on a digital screen to symbolise the attack of the Trojan virus
Security

What is a Trojan?

The malicious malware lurks behind legitimate software to invade your computer
27 Aug 2021
IT Pro 20/20: The weak link in cyber security
IT Pro 20/20: The weak link in cyber security
SMB

IT Pro 20/20: The weak link in cyber security

Issue 19 of IT Pro 20/20 looks at the cyber security problem facing small businesses and what this could mean for wider industries
4 Aug 2021
What is LTE?
LTE technology
Network & Internet

What is LTE?

A guide to the standard that helped launch the 4G revolution
23 Jul 2021
What is EU-US Privacy Shield?
Privacy Shield security concept
Privacy Shield

What is EU-US Privacy Shield?

A look at the now invalidated framework US companies relied on to transfer data to and from the European Union
16 Jul 2021
What is Kubernetes?
Shipping containers stacked on a dock
enterprise applications

What is Kubernetes?

We take a look at the open source platform powering containerisation at scale
15 Jul 2021
What is a botnet?
Image of small robots connected to represent a botnet
botnets

What is a botnet?

An in-depth look at the evolution of this highly effective method of cyber crime
14 Jul 2021