Dublin City launches ‘Data Insights for Active Travel’ Project to determine impact of Active Travel infrastructure as part of Global Network of Cities

Lord Mayor Daithí de Róiste has announced that Dublin City Council (DCC) has joined forces with the Partnership for Healthy Cities to pilot new cutting-edge technologies for evaluating and measuring the impact of the city’s active travel investments (walking and cycling). Other partners include the National Transport Authority (NTA), ADAPT, the Science Foundation Ireland Research Centre for AI-Driven Digital Content Technology, and Trinity College Dublin (TCD).

This unique partnership is set to boost understanding on active travel patterns in the city. The project will generate new data, which will be used to inform future infrastructure planning and improve safe and active transit options for city residents.

“Over the coming years, Dublin is investing in a city-wide Active Travel Network to provide 310 km of safe, accessible, and convenient pathways for walking, cycling, and other forms of active transportation. While this capital investment will be transformative for the city we need to think beyond the physical infrastructure and ensure that we are investing in the right technologies to generate better data and actionable insights to help evaluate and justify these investments,” said Lord Mayor of Dublin, Daithí de Róiste.

“The last three years have seen a significant ramping up of NTA investment in Active Travel projects across the country, with many large projects, such as Clontarf to City Centre, now coming to fruition. The monitoring and evaluation of these projects needs to keep pace through the deployment of detection and counting equipment. Smart detection technology may have an important role to play in understanding trends and patterns to inform decision-making and monitor the impact of schemes. The NTA recognises that new technology and data captured will greatly improve our ability to monitor and communicate the impacts of Active Travel schemes,” said Joe Seymour, Head of Active Travel Investment, NTA.

The project will fill a gap in current methodologies by developing an Active Travel Data Toolkit, replacing the ad-hoc approach of data collection with a systematic and integrated process that supports and guides future investments in active travel.

“This project stands as a testament to DCC’s commitment to active travel as a cornerstone of health and well-being. By integrating advanced monitoring technologies, and data visualization techniques, DCC aims to set a new standard for active travel infrastructure. The ultimate goal is to achieve a measurable positive impact on citizen behaviour, emissions reduction, and overall public health, while also influencing active travel policies to foster healthier urban spaces,” said Andy Walsh, Director of Active Travel Programme Office, DCC.

By establishing a robust framework for data gathering and analysis, DCC, in collaboration with the NTA will be able to measure the true value of active travel enhancements more accurately. The initiative will be working through DCC’s Smart City team, leveraging the existing partnerships with ADAPT and collaborating with Prof Brian Caulfield, TCD.

Phase 1 of this project will target two active travel schemes – the Clontarf to City Centre (C2CC) corridor and the Kilmainham to Thomas Street scheme and the surrounding areas. The initial steps will focus on sourcing, validating, and implementing the latest innovations in active travel monitoring. During Phase 2, the insights gained will inform the development of a toolkit to enhance policy-making and active travel project implementation citywide.

Through the Partnership for Healthy Cities, cities commit to one of 14 proven interventions, from improving safety for vulnerable road users to strengthening public health surveillance systems. The network is supported by Bloomberg Philanthropies, in partnership with the World Health Organization (WHO) and the global health organization Vital Strategies.

“Sustained investment in a city’s safe and active transit infrastructure can reduce noncommunicable disease risks and health inequities,” said Ariella Rojhani, Director, Partnership for Healthy Cities at Vital Strategies. “Today, we congratulate Dublin on its commitment to the health and safety of its residents and look forward to seeing how this new data is used to improve their quality of life.”

The announcement comes as this week DCC presents its work to public health leaders from more than 50 cities at the Partnership for Healthy Cities Summit in Cape Town, South Africa. The annual event provides cities from around the world with the opportunity to advance solutions and exchange ideas on how to create healthier, safer and more equitable urban centres.

CitySwift secures €7 million funding round, led by Gresham House Ventures

CitySwift, the Galway-based leader in data intelligence for the public transport sector, has announced the closing of its latest funding round, securing €7 million. The round was led by Gresham House Ventures, a growth equity investor specialising in scaling businesses across a range of sectors in Ireland and the UK, investing €5 million. Led by Benjamin Faulkner and Tom Makey, the investment formed part of a €7 million round with all existing investors following including Irelandia Investments, the Western Development Commission, and ACT Venture Capital (with Ireland Strategic Investment Fund (ISIF) has an investor in ACT Venture Capital).

CitySwift is an intelligent transport data platform that increases the performance of public transport networks using AI-powered analytics, simulations and optimisations. Based in Galway, Ireland, CitySwift works with public sector transport authorities and private bus operators to break down the barriers to accessing and interpreting transport data. CitySwift’s platform aggregates, cleans and enriches data from hundreds of sources, providing both operators and authorities with an accurate single source of truth.

Brian O’Rourke, Co-founder and CEO at CitySwift, said: “Public transport services have to be reliable and efficient to drive passenger growth, and key to this is leveraging AI and data to ensure the transport networks of the future meet ever-changing customer needs. This investment is a massive vote of confidence in CitySwift’s platform and people. It will support us in expanding our team so we can continue to deliver the best transport data product and service for both authorities and operators, further positioning CitySwift as the catalyst for growing demand for public transport.”

 

CitySwift’s customer base has grown by 150% in the last 12 months, covering transport networks in all of the major UK cities including London, Manchester, Birmingham, Belfast, and the entire country of Wales. Notable clients include National Express, Go-Ahead Group, Transport for Wales, Metroline, East Riding of Yorkshire Council, Translink and Blackpool Transport. With current trends in hybrid working and leisure travel levels increasing, cities are looking to become more agile in their operations to ensure passengers can access fit-for-purpose, convenient transport services. Rapid access to accurate data across the entire network fuels this collaboration, enabling both parties to take a more dynamic, data-driven approach to move passengers away from private modes of transport to more sustainable, climate-friendly public transportation.

The investment will be used to accelerate CitySwift’s growth, with the company planning  to double headcount in the next two years. Additionally, these funds will go towards enabling CitySwift to further scale its platform development and end-to-end client services, securing the company’s reputation as the leading transportation data innovators in the Irish and global markets.

Speaking on today’s announcement, Benjamin Faulkner, Associate Director at Gresham House Ventures, said: “CitySwift’s growth in recent years has been impressive, and the team’s knowledge of both bus networks and data science makes this a compelling and unique proposition. With our experience working with other transport and mobility data businesses, we look forward to supporting CitySwift as it continues to deliver real-world benefits for transport passengers across the UK, Ireland and global markets over the coming years.”

The investment continues a busy period of dealmaking for Gresham House Ventures and extends its investment activity in the transport and intelligent data areas. The Gresham House Ventures existing investment portfolio includes VivaCity, FocalPoint and Branchspace.

Cybersecurity Mastery: 6 Insider Tips to Safeguard Your Data and Identity

In today’s digital age, cybersecurity is a growing concern for individuals and businesses alike. With the constantly evolving technology landscape, the risk of cyber-attacks and data breaches has become more prevalent than ever before. From phishing emails to ransomware attacks, our personal information and sensitive data are under threat every day.

As we continue to rely on technology for work, communication, and daily tasks, we must take proactive measures to protect ourselves from these potential threats. Let’s dive in and learn how to master cybersecurity!

Consider Removing Your Data

Many people are unaware that their personal information is publicly available on various websites, making them vulnerable to identity theft and other cybercrimes. If you no longer need your account or just want to remove your online presence, you should know how to remove info from MyLife and similar websites. By doing so, you will reduce the chances of your data being accessed by unwanted parties.

Use Strong, Unique Passwords

Having a strong, unique password for each of your online accounts is no longer a recommendation but a necessity. Hackers and cybercriminals constantly come up with new ways to access personal data, and using easily guessed information like birthdays or common words only makes it easier for them. To ensure your online security, it’s best to use a combination of uppercase and lowercase letters, numbers, and special characters that aren’t easily tied to your personal information. The next time you’re creating a password, think beyond the obvious and get creative!

Activate Two-Factor Authentication

Two-factor authentication, also known as 2FA, is an additional layer of security that requires users to provide two forms of identification before accessing their accounts. This typically involves a password and a unique code sent to your phone or email.

Once you enable 2FA, you add another level of protection against unauthorized access to your accounts, even if someone manages to obtain your password. Many popular websites and apps offer this feature, so be sure to activate it whenever possible.

Stay Alert for Phishing Attempts

Phishing is a common tactic used by hackers to steal personal information through deceptive emails or websites. These fraudulent attempts often appear legitimate and may include links, attachments, or requests for personal information.

To safeguard against phishing attacks, you must stay alert and never click on suspicious links or provide personal data unless you’re absolutely certain of the source. Even some seemingly authentic emails can be phishing attempts, so always double-check the sender’s email address and verify any requests for sensitive information before taking action.

Keep Software and Devices Updated

Regularly updating your devices and software is one of the simplest yet most effective ways to protect your digital footprint. These updates are not just about adding new features or improving performance — they often contain important security patches that safeguard against known vulnerabilities.

If you keep your devices and software up to date, you can minimize the risk of cyber-attacks and protect your sensitive information. Don’t procrastinate on those pesky updates because your cybersecurity depends on it!

Use Reliable Antivirus Software

Reputable antivirus software offers real-time protection and detects any malicious activity or attempts to access your personal information. Make sure to research and choose a trusted antivirus software that fits your needs, and keep it updated regularly. Antivirus software can also provide additional features such as anti-phishing tools and ad blockers to further enhance your online security.

By following these insider tips, you can better protect yourself against potential cyber threats and safeguard your data and identity. Remember, cybersecurity is an ongoing effort, so stay vigilant and keep up with the latest best practices to ensure your digital safety. Don’t let cybercriminals get the upper hand — take control of your cybersecurity today!

Half of organisations have suffered a cyberattack or incident that prevented access to data in 2023

Over half (54%) of organizations suffered a cyberattack or incident that prevented access to data last year, according to the 2023 Dell Technologies Global Data Protection Index survey of 1,000 IT decision makers (ITDMs) and 500 IT security decision makers.

Respondents report that IT disruption is commonplace, with the vast majority (90%) saying their organizations experienced some form of IT disruption in 2023. External security breaches were the most cited (40%) cause of data loss and/or systems downtime within organizations. Over half (55%) of those who experienced a cyberattack event said attackers’ first point of entry was external – users clicking on spam or phishing emails and malicious links, compromised user credentials and hacked mobile devices.

Looking to the implications, respondents said that disruptions that include data loss cost on average USD $2.61 million in 2023, accounted for an average of 26 hours of unplanned downtime and resulted in an average of 2.45TB worth of data loss. Costs associated with cyberattacks and related incidents have also doubled, up from USD $0.66 million in 2022 to USD $1.41 million in 2023.

Generative AI and cybersecurity

Generative AI (GenAI) is emerging as a strategic tool for bolstering defences, with 52% of those surveyed saying that integrating GenAI will provide an advantage to their organization’s cybersecurity posture. However, showing the dual nature of GenAI as both a defensive asset and source of complexity, 88% also agreed that the adoption of GenAI will generate large volumes of new data. The same percentage (88%) agreed that GenAI will amplify the value of specific data types.

“The rise of Generative AI and expansion into hybrid, multi cloud environments have put cyber resilience and effective incident recovery front-and-centre for organizations,” said Dermot O’Connell, senior vice president, EMEA Services for Dell Technologies. “Data is crucial in today’s digitally transformed world, making it both a vital resource and a priority target.”

Looking to ransomware attacks, responses suggest an over-confidence surrounding the consequences of a breach. 74% believe that if their organizations experience an attack, they would get all of their data back if they paid the ransom and 66% believe that once they pay the ransom, they won’t be attacked again. The majority (93%) stated that their organizations have ransomware insurance policies but only 28% of those who experienced an attack said their organizations were fully reimbursed through the policy. Survey responses also suggest ransomware policies are heavily caveated. 57% said their organization had to prove ‘best practice’ cyber threat prevention, 43% said their policy limited claim pay-outs and 40% said particular scenarios voided their policy. Read the full research report at Global Data Protection Index Report.

Sample: Survey of 1,000 IT decision makers and 500 IT security decision makers globally commissioned through Vanson Bourne and completed in September and October 2023. Unless otherwise specified, only the results from the 1,000 IT decision makers are referenced when making historical comparisons.

Data Engineering for Accurate, Optimised, Scalable and Secure Data

Data engineering is essential for companies to successfully leverage the data they collect to make informed decisions. Data engineering involves taking raw, potentially unstructured datasets and turning them into an optimized form that can be used meaningfully. 

It requires a combination of technical considerations in terms of security and scalability as well as drawing insights and conclusions from the data itself so that you have accurate information on which to base your decisions. 

In this post, we will explore how creating effective data engineering systems can enable businesses to turn large amounts of data into actionable insights quickly, securely, and efficiently.

 

What is Data Engineering and How Does it Help Organisations Achieve Their Goals

Data engineering involves the process of collecting, transforming, and managing data to enable organizations to make better-informed decisions. It plays a crucial role in turning raw data into valuable insights that can drive business growth. 

According to Lewis Woolcott Analytics, implementing effective data engineering systems allows companies to gain greater insights and make more accurate decisions based on reliable data. By organizing and optimizing large and complex datasets, data engineering enables organizations to uncover patterns, trends, and correlations that would have been impossible to identify otherwise. 

This information can then be used to improve existing processes, develop new strategies, and ultimately achieve business goals more efficiently. With the help of data engineering, companies can streamline their data management processes and ensure the accuracy and reliability of their data.

Key Benefits of Data Engineering for Businesses

Effective data engineering offers several key benefits for businesses looking to leverage their data. One of the primary advantages is the ability to optimize and streamline data management processes, reducing the time and effort required to access and analyze large datasets. This leads to faster decision-making, allowing companies to respond quickly to changing market conditions and stay ahead of their competition. 

Additionally, data engineering ensures the accuracy and consistency of data, providing businesses with reliable information to base their decisions on. This is especially important in today’s data-driven world, where even the smallest error or inconsistency can have significant consequences. 

By implementing robust data engineering systems, companies can also achieve scalability, allowing them to handle larger and more complex datasets as their business grows. Moreover, data engineering plays a crucial role in ensuring data security and privacy, which is a top concern for companies that handle sensitive information.

Best Practices for Setting Up an Effective Data Engineering System

To set up an effective data engineering system, there are several best practices that organizations should follow. First and foremost, it is crucial to identify the specific business needs and objectives that the data engineering system will serve. This will help in determining the types of data sources that need to be integrated and the level of complexity involved in the process. 

Next, organizations should establish a strong data governance framework to ensure the integrity and security of their data. This includes implementing proper data management policies, procedures, and protocols to maintain quality and consistency across all datasets. It is also essential to have a clear understanding of data ownership and access rights within the organization. 

Another critical aspect is selecting the right tools and technologies for data engineering. There are various tools available in the market, and choosing the most suitable ones will depend on factors such as data volume, complexity, and budget. 

Furthermore, it is essential to have a skilled and knowledgeable team in place to handle the data engineering process effectively. To ensure optimal performance of the data engineering system, it is crucial to regularly monitor and maintain it. This includes conducting regular checks for data quality issues and addressing them promptly. It is also essential to have a disaster recovery plan in place to prevent data loss or system downtime. 

Lastly, organizations should continuously evaluate and improve their data engineering systems to keep up with changing business needs and advancements in technology.

 

Automation in Data Engineering

Automation plays a crucial role in data engineering, as it allows organizations to streamline and simplify their data management processes. By automating repetitive and time-consuming tasks, such as data cleaning and transformation, companies can significantly reduce the amount of manual labor required for their data engineering process. 

This not only saves time but also minimizes the risk of human error, ensuring that the data remains accurate and consistent. Automation also enables organizations to handle large volumes of data efficiently, which is essential in today’s data-driven world where data continues to grow at an exponential rate.

Enhancing Security and Compliance Through Data Engineering

Data engineering plays an important role in enhancing security and compliance by implementing various measures to protect data throughout its lifecycle. This includes implementing proper authentication and authorization protocols, encryption techniques, and data backup strategies.

 By establishing a robust data engineering system that prioritizes security, organizations can ensure the integrity and confidentiality of their data, maintain compliance with regulatory requirements, and protect themselves against potential cyber threats. With the ever-increasing amount of data being collected and processed by companies, having a strong focus on security and compliance through data engineering is crucial for building trust with customers and maintaining a competitive edge in the market. 

Monitoring and Optimising Performance with Data Engineering Tools

Monitoring and optimizing performance is a critical aspect of data engineering, and having the right tools in place can greatly aid in this process. The right tools, like monitoring dashboards, data quality checks, and performance optimization algorithms, offer valuable insights into system health and efficiency. They help identify bottlenecks and issues, enabling corrective actions for improved performance. 

Continuous monitoring and optimization ensure maximum value from data, informed decisions, and predictive capabilities. Advancements in AI and machine learning enhance performance and identify areas for further optimization.

Data engineering is a vital aspect of modern businesses and plays a crucial role in turning raw data into actionable insights. With the ever-increasing volume of data being generated, having a strong focus on data engineering is essential for businesses to make well-informed decisions and stay ahead in today’s competitive market. 

By following best practices and leveraging automation and advanced technologies, organizations can effectively utilize their data to achieve their goals and drive business growth. 

Tech Review – iStorage diskAshur PRO2

The iStorage diskAshur PRO2 is a PIN-authenticated, encrypted portable drive that offers secure storage and protection of data to military standards. This USB 3.2 Gen 1 HDD/SSD device is designed for use with various operating systems and devices, including laptops, PCs, and smartphones. Its compact design, built-in USB cable, and tamper-proof features make it a reliable choice for users requiring high-level data security. The diskAshur PRO2 is tamper-proof and will reset itself after a certain number of tries if someone tries guessing the PIN, which erases all the data.

 Setup and use:

The diskAshur PRO2 is plug-and-play, requiring no additional software. Users simply need to connect the USB cable to their device, enter the 7-15 digit PIN code, and start using the storage space. The full user manual is stored on the SSD drive, and no additional cables are required, as the drive comes with the USB cable attached to the unit. It is recommended to change the PIN code as soon as possible after initial setup, as outlined in the instructional manual.

Warranty: a commendable quality approach in a 3-year manufacturer’s warranty (HDD & SSD)

 

Conclusion:

Techbuzz did a review on this model type diskAshur2  in 2017 in which it was found at the time we noted the feature of a “ Wear Resistant Epoxy Coated Keypad”  which we can say is still coated,  this implies the quality and build of the current diskAshur PRO2 would be similar with its layer of polymer coating that protects the keys and hides key usage to avoid tipping off a potential hacker to commonly used keys. The speed from the older model has increased from its  diskAshur2  in 2017  3.1 10Gb/s,  to the USB 3.2 with the diskAshur PRO2  20Gb/s transfer speeds. The disc came with the same strong protective carry case with the cable built into the drive. These have worked flawlessly for their previous product with the design of the diskAshur PRO2 very similar indicating the same quality as before.

The question then becomes not whether to get an external hard disc backup when removing data off-site. it becomes a choice of what type and size,

The diskAshur range in the SSD from 128 GB to 16 TB, the SSD under review was the 1TB model.  The manufacturer quotes “ The diskAshur PRO² has been certified to the highest government accreditations (FIPS 140-2 Level 3, NCSC CPA, NLNCSA BSPA & NATO Restricted), helping you safeguard valuable and sensitive data to ensure compliance with stringent data protection and confidentiality regulations and directives, such as GDPR, HIPAA, SOX, CCPA and more.”

Overall the 3-year warranty, the speed via the USB 3.2 and the quality combined with the numerous accreditations certifications and compliance with stringent data protection ensure as stated back in 2017 the same applies. This may be like the phrase & quote from 2017; “Nobody ever got fired for choosing IBM &  to the diskAshur PRO2 “  The iStorage diskAshur PRO2 is a premium product with rock-solid build quality and advanced encryption technology that keeps your files safe from unauthorized access.

BUY HERE and see what is on offer this Christmas for that tech lover in your life or spoil yourself.

 Video review 

 

 

How VPNs Can Protect Your iPhone from Cyber Threats

In the digital age, where cyber threats are increasingly sophisticated, protecting your iPhone’s data is more critical than ever. Virtual Private Networks (VPNs) offer a robust line of defense, ensuring your digital privacy and security in various ways. Let’s explore how a quality VPN, such as a robust VPN for iPhone, can shield your device from numerous cyber threats.

Encryption of Data Transmission

The fundamental security feature of any VPN is its ability to encrypt data transmissions. When using a VPN on your iPhone, your data is secured in an encrypted tunnel, rendering it unreadable to potential interceptors. This encryption is particularly vital when transmitting sensitive information, such as passwords or financial data. VPNs employ advanced encryption protocols like OpenVPN or IKEv2/IPsec, balancing maximum security with optimal speed. This encryption ensures that your personal information remains confidential, safeguarding it against cyber criminals who may intercept network traffic.

Securing Public Wi-Fi Connections

Public Wi-Fi networks are convenient but notoriously insecure, making them prime targets for cybercriminals. A VPN secures your iPhone’s connection on these networks by routing your internet traffic through encrypted servers. This hides your online activities from potential snoops on the same network. By using a VPN on public Wi-Fi, you substantially lower the risk of cyber attacks, keeping your personal information safe from the vulnerabilities commonly found in these networks.

Anonymizing Online Activities

Anonymity is a crucial aspect of cybersecurity. A VPN masks your iPhone’s IP address, making your online activities anonymous and protecting you against targeted cyber-attacks and surveillance. This anonymity makes it challenging for hackers to track your online movements or determine your physical location, providing a critical barrier against identity theft and digital espionage.

Blocking Malicious Sites and Adware

Beyond encryption and anonymity, many VPNs offer integrated features to block access to malicious websites and ads. This is a proactive security measure, vital in an era where cyber threats are constantly evolving. By filtering out harmful content, a VPN can prevent your iPhone from being compromised by malware, protecting your personal data from unauthorized access or theft.

Regular Updates and Security Patches

The dynamic nature of cyber threats necessitates regular software updates. A VPN that frequently updates its software ensures protection against the latest vulnerabilities and threats. These updates often include security patches for newly discovered exploits, keeping your iPhone secure against emerging cyber threats. A commitment to regular updates is essential for maintaining high security on your iPhone, protecting it from the plethora of evolving cyber risks.

In conclusion, employing a VPN on your iPhone is a prudent step towards enhancing your digital security and privacy. It provides a multifaceted defense mechanism against various cyber threats, from encrypting data to blocking malicious sites. Remember, not all VPNs are created equal. Choose a VPN that offers comprehensive features and regular updates to ensure the best protection for your iPhone in the ever-changing landscape of cybersecurity.

Wisetek Urges Businesses to Prioritise Sustainability in Data Centres Ahead of Data Centre Ireland Conference.

Ahead of the Data Centre Ireland conference, Wisetek (Booth 521) are calling on all businesses to improve their sustainability practices when it comes to data centres.
With data centres expected to consume around 20% of the world’s power supply by 2025 and an estimated 59.4 million tonnes of e-waste in total produced globally in 2022, the environmental impact is significant. The decommissioning of data centres is one of the biggest contributors to e-waste, making it crucial for businesses to be aware of just how their e-waste is handled.

The backbone of our flourishing digital economy is the data centre. Modern data centres are quite resource-intensive, consuming about one per cent of total electricity consumption worldwide, or 205 terawatt-hours. Reducing this figure will require greater efforts in data centre resource management.”
notes Donal Gibson, Head of International Sales at Wisetek

Wisetek offers a comprehensive suite of data centre services, including migration, data centre decommissioning, data destruction, and erasure services. By partnering with Wisetek, businesses can ensure the safe and responsible management of their data centres throughout their lifecycle. Wisetek’s expertise in data sanitisation and IT asset disposition allows for the recycling and reuse of IT assets, minimising e-waste generation.
Speaking on the Circular Economy
On Day 2 of the conference Wisetek’s Global Accounts Director, Gary McCarthy will be one of the speakers on ‘The Growing Circular Economy Within Data Centres’ panel (3:10-3:55, strategy stream, room 1.)

As data centres evolve, their commitment to the circular economy shapes not just their efficiency but our collective responsibility for a greener future. Wisetek are incredibly proud to be a part of this initiative and to help grow sustainability in the industry.
Gary McCarthy, Global Accounts Director, Wisetek

The Importance of Migration, Decommissioning, Data Destruction & Data Erasure

Our decommissioning services provide full ITAD reporting, including certificates of data destruction and inventory reporting whilst endeavouring to minimise the amount of e-waste generated via the recycling and reuse of IT assets wherever possible
Donal Gibson, Head of International Sales at Wisetek

As the demand for data centres continues to grow, businesses must prioritize sustainability to mitigate the environmental impact. By implementing Wisetek’s suite of data centre services, businesses can improve their sustainability practices and contribute to a greener future. Wisetek is committed to helping businesses handle their e-waste responsibly and operate data centres in a sustainable manner.

As Data Centres become increasingly common, the safe handling of large data volumes is of the utmost importance. Wisetek is at the forefront of this exciting field, providing solutions for data sanitisation and data centre hardware lifecycle management. With a track record of continuous innovation in the OEM industry, we are excited to showcase our expertise at the Data Centre Ireland event at the RDS this week.
Donal Gibson, Head of International Sales at Wisetek

Wisetek’s suite of data centre services includes migration, data centre decommissioning, data destruction, and erasure services.

We understand the significance of maintaining the security of your data. Our migration services encompass a comprehensive on-site customer audit, ensuring clients stay informed with real-time portal reports, as well as a complete IT relocation service, covering deinstallation, logistics, packaging, reinstallation, and powering up. For those in the decommissioning phase, we offer a secure range of services, including decabling and deracking. A thorough and efficient IT asset audit is included, featuring inventory reconciliation of retired assets, in addition to the documentation and logging of assets within the inventory tracking system.
Donal Gibson, Head of International Sales at Wisetek

Unused materials are recycled according to Wisetek’s Sustainable EARTH standard, which has received external certification for meeting the R2 Responsible Recycling standard and adhering to global regulations.
The Wisetek Sustainable EARTH Program is designed to provide assurance that all of our processing is done in a full transparent, secure and auditable manner whilst ensuring compliance with the highest global environmental regulatory recycling standards

Our aim with the Wisetek Sustainable EARTH Program is to deliver the assurance that all our operations are conducted transparently, securely, and in a way that can be audited, while also ensuring strict compliance with the highest environmental recycling standards across the globe.
Donal Gibson, Head of International Sales at Wisetek