Skip to main content
Main Menu

Clarifying the business impact of technology


Featured Content

The Internet of Things (IoT) is changing the way business is done; it is recognised by the majority of organisations as an opportunity to improve and streamline business processes and a new way to interact with customers. The impact and growth of IoT has the potential to be as big as the Internet was in the 1990s with device numbers expected to at least triple by 2020. However, the large number and wide range of devices involved expands network attack surfaces and requires existing security measures to be adapted and scaled.



Featured Content

Most people, when thinking of enterprise storage, will think of SAN and NAS, with a few going as far as DAS.  However, the growth of server-side storage, where specialised flash-based PCIe and M2 cards is leading to a far more complex estate of different non-volatile storage platforms.  Pulling all of these together along with using volatile storage (i.e. DIMM memory) can provide massive improvements in data performance - for little outlay.  This presentation, given by Clive Longbottom at an event with Viadex and PernixData, shows how different storage platforms are positioned in their means to adequately present data to the compute environment in terms of latency, and then looks at what is required to manage a highly complex and heterogeneous storage platform.


Featured Content

Not set in concrete – tailoring IoT to the business

Tailored services and personalised advertising is great isn’t it? People and organisations are no longer bombarded by things they are not interested in or can not respond to, only those things that are relevant.

Latest Content


Bob Tarzey has been invited to join the judging panel for the 2017 SC Magazine Awards Europe, to be awarded in London on June 6th 2017. For more info and to submit and entry follow this link 


A previous Quocirca blog post (The Internet of Everything – the need to manage external things) looked at how Internet of Things (IoT) deployments will mostly need to include access to at least some external devices. One of the problems this throws up, especially for network security teams, is the need to verify the safety of devices joining networks, over which they have little or no on-device control.