Category Archives: IT Security, Risk & ESG
The Big Data Revolution
Big Data suffers misuse but at its heart is really about getting more value from[...]
What should CIOs be demanding of Storage Vendors?
In most organisations the acquisition of storage and its associated management tools was, until recently,[...]
Personal Use of a Windows Tablet in Business – It’s ready for operational use
There is no doubt that “Tablet” devices and “Slates” are attracting a lot of attention[...]
Agility without anxiety
Dale Vile met up with Perforce’s Mark Warren to discuss how to do agile development[...]
The Rise of User Centric IT – Is the consumerisation of IT a benefit to anyone?
There is a long history of end users wanting, or ‘needing’, to have ‘different’ tools[...]
Balancing storage efficiency and data security
We know from our many studies that most IT organisations are stretched operationally while having[...]
Siloed approach to IT security increases business risk
It is said that the technology at the heart of IT changes at a bewildering[...]
Playing the SLA long game
By Dale Vile When IT is your day job it’s easy to lose sight of[...]
Private Cloud Forecast – Sunny or Stormy times ahead for CIOs?
Businesses are still operating under enormous economic pressure and, as would be expected, this continues[...]
Analyst Headlines: Securing the Data Center
Andrew Buss share’s his views on the significance of a simplified Data Center architecture. This[...]
Behind the Headlines: Securing the Data Center
Andrew Buss share’s his views on the significance of a simplified Data Center architecture. This[...]
Analyst Headlines: Securing the Access
Andrew Buss discusses the impact of the mega trends such as the Consumerization of IT[...]
Behind the Headlines: Securing the Access
Andrew Buss discusses the impact of the mega trends such as the Consumerization of IT[...]
Analyst Headlines: Securing the Wide Area
Andrew Buss discusses how security needs to become embedded and automated within the network and[...]
Behind the Headlines: Securing the Wide Area
Andrew Buss discusses how security needs to become embedded and automated within the network and[...]
BPM from back office to front office and beyond
Are you tough enough to take on BPM and win? Someone has to. It has[...]
Energy Aware Planning and Decision Making
Energy availability and management is increasingly becoming an important agenda item for IT leaders, but[...]
Seven enablers of effective disaster recovery for SMEs
By Tony Lock In a nutshell: Recent research carried out by Freeform Dynamics identified seven[...]
Key points to highlight when selling storage
Organisations of all shapes and sizes are struggling to deal with the rapid growth of[...]
Fast Forward to Big Data
Does ’cloud’ have a roll in providing customers with access to new data sources to[...]
The great DR divide
Business continuity solutions only for large organisations? IT vendors and consulting firms who sell disaster[...]
User Virtualization – Moving beyond device-centric computing
When business IT was young and channel partners had plenty of hardware margins to play[...]
Winners and losers in the information race
The mainstream media generally portrays the financial services industry as being in a total mess,[...]
The secrets of effective disaster recovery
There’s no magic bullet, but there’s a formula Many IT and business executives groan when[...]