Author Archives: Tony Lock

Surface Pro 4 – The Good, The Bad and The Frustrating

I recently acquired a Surface Pro 4 as part of an equipment refresh here at[...]

IBM’s Spectrum Suite of storage tools is going to be a hard sell

IBM’s announcement of a storage suite with per Tb pricing is a natural move following[...]

Network Security Solutions

IT Security is complex and trying to work out whether it is better to use[...]

What changes will have the biggest impact on your IT in the next three years?

The rate of change in IT and business has never been more rapid. Standing still[...]

Enterprise Storage Architectures

Enterprise scale up storage arrays have traditionally been expensive to acquire and complex to manage.[...]

Key Advances in Storage Technology

While your storage infrastructure may be meeting current needs, you will almost certainly be investing[...]

Cloud and Security Challenges

Cloud adoption is taking place in organisations of all sizes. Internal cloud systems are being[...]

The Role of Cloud Storage

The chances are that your storage systems are subject to a range of pressures, almost[...]

The Impact of VMware VVOLs on Storage

VMware Virtual Volumes (VVOLs) are due to be released in 2015 and have been designed[...]

Is your storage ready for the future?

In a recent research study we looked at the challenge of building a storage infrastructure[...]

Justifying end user computing investments

In a nutshell Device proliferation and loss of control over at least some end user[...]

Are data centres heading towards a future of technology hardware monocultures?

You have probably heard the representatives of at least a few vendors say IT is moving[...]

Data Protection and RAID

Rapid data growth, a greater emphasis on operational risk and developments in storage hardware are[...]

Storage Infrastructure Wakeup Call

The storage solutions you run today face many challenges, of which the explosive growth in[...]

Snooper-proofing laptops and tablets?

Given how important the company’s data is and the ever more stringent nature of the[...]

A new approach to verifying user identity

By Tony Lock We all know that trying to authenticate our users when they access[...]

Inertia has its virtues, but change is happening

As the old year draws to a close it’s time for CIOs and analysts to[...]

21st century data protection: Get back up to date

In this webcast discover how you create a new architecture for backup and recovery, how[...]

Disaster Recovery for the masses

Most organisations, even SMBs, have some sort of plans to deal with recovery from disasters,[...]

Manage security in real time

You face more, and more dangerous threats every day – drive-by infections, APTs, executive targeted[...]