It has been claimed by IT experts that hosted desktop adoption is currently slow because of lack of support for user installed apps and hard to ‘hostedize’ applications, high storage costs and system complexity. So what are the benefits of choosing a hosted desktop solution?
Security was cited as the biggest reason for deploying hosted [...]
In the digital era, consumers have more choice than was ever imagined a little over a decade ago. The well-worn phrase, ‘competition is only a click away’, defines the sentiment that reinforces the expectation of both consumer and supplier alike. The supplier is excited by the simplicity and efficiency of reaching a global market. The [...]
The key advantage to network monitoring, according to those who sell the equipment and services anyway, is that it allows the network manager to identify patterns, spot anomalies before they become problems, and respond to issues as they arise in a timely manner. All good goals, but as they say, “a watched pot never boils.” [...]
Some of the biggest data security breaches in recent years were possible because of remarkably simple oversights. Data thieves for the most part, don’t resort to extremely sophisticated means and rooms full of highly experienced hackers using powerful computers. Rather, they rely on simple and obvious mistakes and sloppy (or nonexistent) compliance.
It’s happened again. Cool, slick technology that first captured the attention of consumers, has infiltrated the workplace. Like instant messaging and smartphones, tablet computers have found a solid place in the world of corporate presentations and “road warrior” travelling kits. It hasn’t been that long since the debut of the iPad, but the progress has [...]
Objections to the cloud range from irrational fear, to the completely realistic and more healthy approach of “trust no one.” It may seem as though these approaches are the same, yet “trust no one” is always good policy for an IT security manager, and a little paranoia is always good for protecting the network. What [...]
I recently attended the 7th Cloud Circle forum focussed in London in the course of which speakers from Microsoft, InTechnology and IBM considered the impact that the Cloud is starting to have on UK business. The momentum behind the drive toward utility computing by businesses shying away from traditional network [...]
Whilst the vast majority of businesses understand the need to create a strategy for dealing with social networking, many network managers still perceive sites such as facebook, Twitter and You Tube as a threat to productivity. Much like email they are always open to abuse (it’s nigh on impossible to stamp out those email funnies) [...]
With cloud computing becoming a way of life for many businesses, the inevitable backlash looms ahead. Naysayers abound with negative blog posts that point out all of the pesky, and, sometimes, very pertinent issues that cloud computing presents. The fact of the matter is that working in the Cloud has as many disadvantages as not. [...]
TagsCIO Cisco cloud computing cloud data centre cloud hosting cloud providers cloud security cloud services cloud strategy collaboration desktop virtualization dotcloud boom Freeform Dynamics Frost & Sullivan Gartner hosted solution hybrid approach ICT strategy Internet Speed iPad Metro Ethernet Microsoft Microsoft Sharepoint MPLS Network monitoring outsourcing Polycom private cloud public cloud remote working ROI analysis SaaS server virtualization small business SMB SME Tablet PC telecommuting Unified Communications videoconferencing Vidyo virtual company virtualisation virtualization strategy Webex