Author Archives: Dale Vile
Experience with the iPad Pro
The rumour mill says that that Apple will soon launch a smaller (9.7 inch) version[...]
APIs and the Digital Enterprise
Application programming interfaces (APIs) have been around for decades. In the early days of IT[...]
If you think DevOps is BS, you may be a victim of bandwagon marketing
I’ve been coming across more DevOps naysayers and sceptics recently. Whether online or face-to-face, I[...]
Readers of The Register speak out on Thin Client technology
Managing PC estates is a time-consuming, expensive and thankless task. Better provisioning and management tools[...]
Stressed Networks Create a Channel Opportunity
No one needs telling that the pressure on their network infrastructure is growing. In fact[...]
Mobile Security Infographic
Content Contributors: Dale Vile & Jack Vile
Assembling the DevOps Jigsaw
The world we live in is increasingly digital. As the smart use of technology leads[...]
Exploiting the Software Advantage
Advances in digital technology create significant opportunities to transform both customer engagement and business operations.[...]
Infrastructure Readiness Temperature Check
IT infrastructures are often coping pretty well with current business requirements, but many IT professionals[...]
Modern Storage Options for Small and Mid-Sized Businesses
If you work in a small or medium-sized business environment, storage is probably something you[...]
Data Protection and Management in a Box
In today’s fast-moving, information-intensive business environment, data management is more of a challenge than ever.[...]
Ceph as an Enabler of Growth and Scalability
A perennial problem with storage is how to deal with escalating requirements in a smooth,[...]
Taking Cyber Security to the Next Level
As cyber security threats become more sophisticated, targeted and persistent, it’s no longer possible to[...]
Safe and Secure Mobile Working
For many of us, our work life and social life are becoming intermingled. We can[...]
The Escalating Mobile Security Challenge
Just as IT professionals and others responsible for mobile security have come to terms with[...]
Mobile Security and the Challenge of User Resistance
Mobile security is becoming more of a headache as the crossover between business and personal[...]
User-Centric Mobile Security
Not so long ago, many were speculating that ‘Bring Your Own Device’ (BYOD) would define[...]
Future Proofing Your Network
Network traffic flows have become pretty complex in today’s distributed business environment, and not just[...]
Mobile Working without the Tears
As both company and personally owned mobile devices are increasingly used in business, understanding and[...]
Windows Server 2003 end of support – Don’t panic, do something secure, now
Webcast recorded 12th June 2015 Firstly, Tony Lock and Dale Vile show you where your[...]
Cloud Security Temperature Check
In a recent online survey in which responses were gathered from almost three hundred IT[...]
What scares you most about ‘the cloud’?
Cloud computing has gone mainstream. While a hard-core of naysayers still exists, the black-and-white negative[...]
Evolution of the OpenText portfolio
A few days into my first software sales role back in the 90’s, I was[...]
Storage Quality of Service Management
Organisations are increasingly turning to multi-tiered shared storage environments to deal with growing data volumes,[...]