Author Archives: Dale Vile

A higher impact approach to IT investment

In a nutshell You may have doubts about the value for money or level of[...]

Enterprise Git in Perspective

In a nutshell If asked to name a distributed version control system (DVCS), most people[...]

Cyber Security Ownership and Responsibility

It’s easy to be caught out by a cyber attack or internal mistake that leads[...]

iPad Pro as a laptop replacement? WRONG QUESTION. Ditch that paper notebook!

I have used iPads for many years, but they have always been ’nice to have’[...]

Experience with the iPad Pro

The rumour mill says that that Apple will soon launch a smaller (9.7 inch) version[...]

APIs and the Digital Enterprise

Application programming interfaces (APIs) have been around for decades. In the early days of IT[...]

If you think DevOps is BS, you may be a victim of bandwagon marketing

I’ve been coming across more DevOps naysayers and sceptics recently. Whether online or face-to-face, I[...]

Readers of The Register speak out on Thin Client technology

Managing PC estates is a time-consuming, expensive and thankless task. Better provisioning and management tools[...]

Thin Client Devices Revisited

Technology best forgotten or time for a renaissance?

Stressed Networks Create a Channel Opportunity

No one needs telling that the pressure on their network infrastructure is growing. In fact[...]

Mobile Security Infographic

Content Contributors: Dale Vile & Jack Vile

Assembling the DevOps Jigsaw

The world we live in is increasingly digital. As the smart use of technology leads[...]

Exploiting the Software Advantage

Advances in digital technology create significant opportunities to transform both customer engagement and business operations.[...]

Infrastructure Readiness Temperature Check

IT infrastructures are often coping pretty well with current business requirements, but many IT professionals[...]

Modern Storage Options for Small and Mid-Sized Businesses

If you work in a small or medium-sized business environment, storage is probably something you[...]

Data Protection and Management in a Box

In today’s fast-moving, information-intensive business environment, data management is more of a challenge than ever.[...]

Ceph as an Enabler of Growth and Scalability

A perennial problem with storage is how to deal with escalating requirements in a smooth,[...]

Taking Cyber Security to the Next Level

As cyber security threats become more sophisticated, targeted and persistent, it’s no longer possible to[...]

Safe and Secure Mobile Working

For many of us, our work life and social life are becoming intermingled. We can[...]

The Escalating Mobile Security Challenge

Just as IT professionals and others responsible for mobile security have come to terms with[...]

Mobile Security and the Challenge of User Resistance

Mobile security is becoming more of a headache as the crossover between business and personal[...]

User-Centric Mobile Security

Not so long ago, many were speculating that ‘Bring Your Own Device’ (BYOD) would define[...]

Future Proofing Your Network

Network traffic flows have become pretty complex in today’s distributed business environment, and not just[...]

Mobile Working without the Tears

As both company and personally owned mobile devices are increasingly used in business, understanding and[...]