Author Archives: Dale Vile
A higher impact approach to IT investment
In a nutshell You may have doubts about the value for money or level of[...]
Enterprise Git in Perspective
In a nutshell If asked to name a distributed version control system (DVCS), most people[...]
Cyber Security Ownership and Responsibility
It’s easy to be caught out by a cyber attack or internal mistake that leads[...]
iPad Pro as a laptop replacement? WRONG QUESTION. Ditch that paper notebook!
I have used iPads for many years, but they have always been ’nice to have’[...]
Experience with the iPad Pro
The rumour mill says that that Apple will soon launch a smaller (9.7 inch) version[...]
APIs and the Digital Enterprise
Application programming interfaces (APIs) have been around for decades. In the early days of IT[...]
If you think DevOps is BS, you may be a victim of bandwagon marketing
I’ve been coming across more DevOps naysayers and sceptics recently. Whether online or face-to-face, I[...]
Readers of The Register speak out on Thin Client technology
Managing PC estates is a time-consuming, expensive and thankless task. Better provisioning and management tools[...]
Thin Client Devices Revisited
Technology best forgotten or time for a renaissance?
Stressed Networks Create a Channel Opportunity
No one needs telling that the pressure on their network infrastructure is growing. In fact[...]
Mobile Security Infographic
Content Contributors: Dale Vile & Jack Vile
Assembling the DevOps Jigsaw
The world we live in is increasingly digital. As the smart use of technology leads[...]
Exploiting the Software Advantage
Advances in digital technology create significant opportunities to transform both customer engagement and business operations.[...]
Infrastructure Readiness Temperature Check
IT infrastructures are often coping pretty well with current business requirements, but many IT professionals[...]
Modern Storage Options for Small and Mid-Sized Businesses
If you work in a small or medium-sized business environment, storage is probably something you[...]
Data Protection and Management in a Box
In today’s fast-moving, information-intensive business environment, data management is more of a challenge than ever.[...]
Ceph as an Enabler of Growth and Scalability
A perennial problem with storage is how to deal with escalating requirements in a smooth,[...]
Taking Cyber Security to the Next Level
As cyber security threats become more sophisticated, targeted and persistent, it’s no longer possible to[...]
Safe and Secure Mobile Working
For many of us, our work life and social life are becoming intermingled. We can[...]
The Escalating Mobile Security Challenge
Just as IT professionals and others responsible for mobile security have come to terms with[...]
Mobile Security and the Challenge of User Resistance
Mobile security is becoming more of a headache as the crossover between business and personal[...]
User-Centric Mobile Security
Not so long ago, many were speculating that ‘Bring Your Own Device’ (BYOD) would define[...]
Future Proofing Your Network
Network traffic flows have become pretty complex in today’s distributed business environment, and not just[...]
Mobile Working without the Tears
As both company and personally owned mobile devices are increasingly used in business, understanding and[...]