Category Archives: Workforce/Workplace Computing
Adobe Genesis addresses real needs
Breaking ranks with the ’browser-only’ brigade, Adobe is planning to introduces a desktop client to[...]
Encrypt your memory sticks (HMG)
Yet another security breach fo the Home Secretary to wrestle with. This time PA Consulting[...]
Time To Take the Tablet – Vista’s unsung platform
Several years ago Microsoft launched its Tablet software with much fanfare. Today the platform has[...]
iPhone: First impressions of a Blackberry user
For a while now, I have maintained two mobile phones – one for business use[...]
Do UC it?
There is a lot of focus currently on unified communications (UC) – the integration of[...]
Is your data safe on US visits?
Over the weekend, I was invited to attend the Office 2.0 conference in San Francisco[...]
Webslides are go
I’ve noticed a couple of new(ish) web services recently. Each allows you to create a[...]
Secure USB
by Jon Collins When the USB standard was first launched, few would have imagined the[...]
Desktop Virtualisation – Where to Begin
There is increasing discussion in many organisations, across a broad range of geographies, industry verticals[...]
R. Todd Stephens on Enterprise 2.0
Sometimes it’s easy to be overwhelmed by new ways of working. Enterprise 2.0, for example,[...]
To change your world, put yourself in the boss’s shoes
Last month the National Computing Centre held its annual conference. Opening the event, which was[...]
Desktop power management
It’s encouraging that many of the conversations we are having at the moment in relation[...]
Sustainability winner: SOAK
I’m not totally sold on the Microsoft environmental story (hint: lifecycle costs of replacing kit)[...]
Is There a Business Case To Be Made In Favour of Virtualising the Desktop?
If you are looking at desktop/notebook replacement or optimisation now, what are the options and[...]
Home working: does it make sense?
When we did our environmental IT research earlier this year, we looked at how IT[...]
Justifying a large scale Vista migration
Over the past couple of months, I have had in-depth conversations with five CIOs that[...]
LinkedIn: an espionage tool?
I have no idea why Aladdin Knowledge Systems decided to attack LinkedIn, the business networking[...]
Who controls your personal information?
Doc Searls is a long time blogger, a deep thinker, a co-author of the seminal[...]
Behind the scenes at the National Gallery provides plenty of food for thought.
I recently had the pleasure of attending an event which took a group of analysts[...]
Desktops still have a purpose.
by Jon Collins Desktop computing is where the rubber hits the road, as far as[...]
Business Intelligence and the bolting horse
There appears to be a revival of interest in Business Intelligence (BI) among IT vendors[...]
A quick route to unified communications?
A cheeky little outsider from Spain has been quietly snitching large unified communication (UC) deals[...]
Cloud Computing and Web 2.0
Don’t you just hate it when another woolly ambiguous term is forced upon us? When[...]
Can computers really extract knowlege?
Knowledge management is theoretically impossible. Real knowledge sits between your ears, unseen until it is[...]