Author Archives: Dale Vile

Experience with the iPad Pro

The rumour mill says that that Apple will soon launch a smaller (9.7 inch) version[...]

APIs and the Digital Enterprise

Application programming interfaces (APIs) have been around for decades. In the early days of IT[...]

If you think DevOps is BS, you may be a victim of bandwagon marketing

I’ve been coming across more DevOps naysayers and sceptics recently. Whether online or face-to-face, I[...]

Readers of The Register speak out on Thin Client technology

Managing PC estates is a time-consuming, expensive and thankless task. Better provisioning and management tools[...]

Thin Client Devices Revisited

Technology best forgotten or time for a renaissance?

Stressed Networks Create a Channel Opportunity

No one needs telling that the pressure on their network infrastructure is growing. In fact[...]

Mobile Security Infographic

Content Contributors: Dale Vile & Jack Vile

Assembling the DevOps Jigsaw

The world we live in is increasingly digital. As the smart use of technology leads[...]

Exploiting the Software Advantage

Advances in digital technology create significant opportunities to transform both customer engagement and business operations.[...]

Infrastructure Readiness Temperature Check

IT infrastructures are often coping pretty well with current business requirements, but many IT professionals[...]

Modern Storage Options for Small and Mid-Sized Businesses

If you work in a small or medium-sized business environment, storage is probably something you[...]

Data Protection and Management in a Box

In today’s fast-moving, information-intensive business environment, data management is more of a challenge than ever.[...]

Ceph as an Enabler of Growth and Scalability

A perennial problem with storage is how to deal with escalating requirements in a smooth,[...]

Taking Cyber Security to the Next Level

As cyber security threats become more sophisticated, targeted and persistent, it’s no longer possible to[...]

Safe and Secure Mobile Working

For many of us, our work life and social life are becoming intermingled. We can[...]

The Escalating Mobile Security Challenge

Just as IT professionals and others responsible for mobile security have come to terms with[...]

Mobile Security and the Challenge of User Resistance

Mobile security is becoming more of a headache as the crossover between business and personal[...]

User-Centric Mobile Security

Not so long ago, many were speculating that ‘Bring Your Own Device’ (BYOD) would define[...]

Future Proofing Your Network

Network traffic flows have become pretty complex in today’s distributed business environment, and not just[...]

Mobile Working without the Tears

As both company and personally owned mobile devices are increasingly used in business, understanding and[...]

Windows Server 2003 end of support – Don’t panic, do something secure, now

Webcast recorded 12th June 2015 Firstly, Tony Lock and Dale Vile show you where your[...]

Cloud Security Temperature Check

In a recent online survey in which responses were gathered from almost three hundred IT[...]

What scares you most about ‘the cloud’?

Cloud computing has gone mainstream. While a hard-core of naysayers still exists, the black-and-white negative[...]

Evolution of the OpenText portfolio

A few days into my first software sales role back in the 90’s, I was[...]