Category Archives: IT Strategy/Transformation
Devices, recruitment and staff retention
In a nutshell Some say it’s not possible to recruit and retain good staff nowadays[...]
Build a DevOps culture
Everyone’s talking about DevOps, but not everyone can do it. This webcast covers the balance[...]
Snooper-proofing laptops and tablets?
Given how important the company’s data is and the ever more stringent nature of the[...]
A new approach to verifying user identity
By Tony Lock We all know that trying to authenticate our users when they access[...]
Inertia has its virtues, but change is happening
As the old year draws to a close it’s time for CIOs and analysts to[...]
Creating more harmony around end user computing
In a nutshell Tensions frequently arise between business units and the IT teams as users[...]
Rethinking desktop delivery
In a nutshell Many IT professionals are weary of the relentless Windows upgrade spiral and[...]
User flexibility without the risk
In a nutshell Most organisations are seeing users and business groups starting to make their[...]
The Politics and Practicalities of End User Computing
With the phenomenal rise in the adoption of smartphones, tablets and other desirable devices, many[...]
So what you gonna do about DevOps?
Having to deal with the ‘next big thing’ once or twice a year is a[...]
Avoiding the runaway code train
More and more code, delivered faster and faster. According to many, that’s the imperative if[...]
How much of your mainstream IT capacity does mobility consume?
Few doubt the increasing popularity of mobile devices, specifically smartphones and tablets. Their numbers grow[...]
Flexible IT governance
We want flexibility but, if we’re not careful, we get governance confusion as well. In[...]
Do more of your apps deserve better DR?
What does IT disaster recovery (DR) mean to you? Does it bring to mind racks[...]
User desires versus business needs
Much has been written about the rise of user influence and power. Some of it[...]
The IT vendor empathy gap
Industry analysts, CIOs and others involved in the IT decision making process are on the[...]
Have you planned for a ’friendly’ DDoS attack?
Malicious Distributed Denial of Service (DDoS) attacks do not occur often. Nevertheless, for an enterprise[...]
Accommodating increased user influence
Business people often complain that the IT department is not keeping up with their needs.[...]
IT-Business Alignment Revisited
In some organisations, the tension between IT and business teams has come to a head[...]
Social media and why businesses need to embrace it
As a teenager just entering the world of business I had to go through a[...]
Wake up, grandad: All the techies use social media
Ever since I passed the big five-o, I have noticed more and more youngsters who[...]