Here in the UK we are used to paying slightly above the standard rates for services and products available elsewhere. Many people remain resigned to the idea that life in Britain is now charged at a premium. From unfavourable currency exchange rates to fuel prices reflecting only the upwards movements in the markets and never [...]
Good marketing is priceless. In B2B tech, we need to learn how to do this better. You know when a marketing campaign stikes the right note. It appeals to you, makes you feel good and as a result the advertiser’s brand gets to shine. Oh and by the way, people then buy more of their [...]
The term Net Neutrality has been bandied around even more of late, but what does it really mean? In short, it’s the “principle that advocates all internet traffic to be treated equally, that packets (of data) are delivered on a first-come, first-served basis regardless from where they originated or to where they are destined.” The [...]
It has been claimed by IT experts that hosted desktop adoption is currently slow because of lack of support for user installed apps and hard to ‘hostedize’ applications, high storage costs and system complexity. So what are the benefits of choosing a hosted desktop solution?
Security was cited as the biggest reason for deploying hosted [...]
In the digital era, consumers have more choice than was ever imagined a little over a decade ago. The well-worn phrase, ‘competition is only a click away’, defines the sentiment that reinforces the expectation of both consumer and supplier alike. The supplier is excited by the simplicity and efficiency of reaching a global market. The [...]
The key advantage to network monitoring, according to those who sell the equipment and services anyway, is that it allows the network manager to identify patterns, spot anomalies before they become problems, and respond to issues as they arise in a timely manner. All good goals, but as they say, “a watched pot never boils.” [...]
Some of the biggest data security breaches in recent years were possible because of remarkably simple oversights. Data thieves for the most part, don’t resort to extremely sophisticated means and rooms full of highly experienced hackers using powerful computers. Rather, they rely on simple and obvious mistakes and sloppy (or nonexistent) compliance.
It’s happened again. Cool, slick technology that first captured the attention of consumers, has infiltrated the workplace. Like instant messaging and smartphones, tablet computers have found a solid place in the world of corporate presentations and “road warrior” travelling kits. It hasn’t been that long since the debut of the iPad, but the progress has [...]
Objections to the cloud range from irrational fear, to the completely realistic and more healthy approach of “trust no one.” It may seem as though these approaches are the same, yet “trust no one” is always good policy for an IT security manager, and a little paranoia is always good for protecting the network. What [...]
TagsCIO Cisco cloud computing cloud data centre cloud hosting cloud providers cloud security cloud services cloud strategy collaboration desktop virtualization dotcloud boom Freeform Dynamics Frost & Sullivan Gartner hybrid approach ICT strategy Internet Speed iPad Metro Ethernet Microsoft Microsoft Sharepoint MPLS Network monitoring outsourcing PCI DSS Polycom private cloud public cloud remote working ROI analysis SaaS server virtualization small business SMB SME Tablet PC telecommuting Unified Communications videoconferencing Vidyo virtual company virtualisation virtualization strategy Webex