Category Archives: IT Strategy/Transformation
So what you gonna do about DevOps?
Having to deal with the ‘next big thing’ once or twice a year is a[...]
Avoiding the runaway code train
More and more code, delivered faster and faster. According to many, that’s the imperative if[...]
How much of your mainstream IT capacity does mobility consume?
Few doubt the increasing popularity of mobile devices, specifically smartphones and tablets. Their numbers grow[...]
Flexible IT governance
We want flexibility but, if we’re not careful, we get governance confusion as well. In[...]
Do more of your apps deserve better DR?
What does IT disaster recovery (DR) mean to you? Does it bring to mind racks[...]
User desires versus business needs
Much has been written about the rise of user influence and power. Some of it[...]
The IT vendor empathy gap
Industry analysts, CIOs and others involved in the IT decision making process are on the[...]
Have you planned for a ’friendly’ DDoS attack?
Malicious Distributed Denial of Service (DDoS) attacks do not occur often. Nevertheless, for an enterprise[...]
Accommodating increased user influence
Business people often complain that the IT department is not keeping up with their needs.[...]
IT-Business Alignment Revisited
In some organisations, the tension between IT and business teams has come to a head[...]
Social media and why businesses need to embrace it
As a teenager just entering the world of business I had to go through a[...]
Wake up, grandad: All the techies use social media
Ever since I passed the big five-o, I have noticed more and more youngsters who[...]
User Access – Time for a change?
User expectations and the range of devices they use to access IT systems are growing[...]
Migrating to Windows Server 2012
Extended support for Windows Server 2003 ends on 14 July 2015, so you need to[...]
End User Computing:
This paper is written for business executives and managers with an interest in how technology[...]
Mobile security is more than protecting local data
By now we’ve all heard the term Bring Your Own Device (BYOD). This phenomenon is[...]
What are APT’s?
What is an APT? APT stands for Advanced Persistent Threat. The goal of this form[...]
Say What?
Recently I attended the IBM Security Systems Analyst Meet the Experts day in Heathrow. With[...]
Security: the oft-forgotten dimension
Computer security is a hot topic today, and much talked about. There are endless emanations[...]
Juggling Performance, Availability and Security
By Tony Lock A recent report from Freeform Dynamics illustrates that many corporate networks are[...]
Controlling Application Access
Application performance, availability and security challenges are quietly creeping up in the context of internal[...]