Category Archives: 6. Evolution of Cybersecurity

Workload placement in a hybrid world

Research shows that you are going to mix your platforms and deployment models in the[...]

Security, privacy and data protection

By Tony Lock Many businesses today are faced with the challenge of rapidly fluctuating operating[...]

Your local Public Cloud

By Andrew Buss A few weeks back we looked at the role that private and[...]

Freedom without Anarchy

Empowering employees through the delegation of authority and trust can enhance innovation and productivity. But[...]

Analytics and Big Data

By Tony Lock ‘Big Data’ is a hot topic receiving considerable attention from the marketing[...]

Why you need an interactive archive

Many organisations today only archive data when there is some external legislative driver forcing their[...]

Big Data and Analytics

Results of a web survey illustrate the state of business information and analytics today. Just[...]

A more intelligent approach to security

At the RSA Conference 2012 in London, one of the key themes to emerge was[...]

Datacentre in a box – Something for everyone?

CIOs have a tough job delivering an expanding range of services to ever more demanding[...]

The Big Data Revolution

Big Data suffers misuse but at its heart is really about getting more value from[...]

What should CIOs be demanding of Storage Vendors?

In most organisations the acquisition of storage and its associated management tools was, until recently,[...]

Personal Use of a Windows Tablet in Business – It’s ready for operational use

There is no doubt that “Tablet” devices and “Slates” are attracting a lot of attention[...]

Agility without anxiety

Dale Vile met up with Perforce’s Mark Warren to discuss how to do agile development[...]

The Rise of User Centric IT – Is the consumerisation of IT a benefit to anyone?

There is a long history of end users wanting, or ‘needing’, to have ‘different’ tools[...]

Balancing storage efficiency and data security

We know from our many studies that most IT organisations are stretched operationally while having[...]

Siloed approach to IT security increases business risk

It is said that the technology at the heart of IT changes at a bewildering[...]

Playing the SLA long game

By Dale Vile When IT is your day job it’s easy to lose sight of[...]

Private Cloud Forecast – Sunny or Stormy times ahead for CIOs?

Businesses are still operating under enormous economic pressure and, as would be expected, this continues[...]

Analyst Headlines: Securing the Data Center

Andrew Buss share’s his views on the significance of a simplified Data Center architecture. This[...]

Behind the Headlines: Securing the Data Center

Andrew Buss share’s his views on the significance of a simplified Data Center architecture. This[...]

Analyst Headlines: Securing the Access

Andrew Buss discusses the impact of the mega trends such as the Consumerization of IT[...]

Behind the Headlines: Securing the Access

Andrew Buss discusses the impact of the mega trends such as the Consumerization of IT[...]

Analyst Headlines: Securing the Wide Area

Andrew Buss discusses how security needs to become embedded and automated within the network and[...]

Behind the Headlines: Securing the Wide Area

Andrew Buss discusses how security needs to become embedded and automated within the network and[...]

© Freeform Dynamics Limited - 2006 - 2024. All rights reserved. Unauthorised use of copy is not permitted.