Skip to main content
Main Menu
  • IBM - A new behemoth, or a wounded beast?

    IBM recently held its first major event for industry analysts since its announcement of the divestment of its x86 server and product line to Lenovo.  At the event, Tom Rosamilia (SVP IBM Systems and Technology Group) and Steve Mills (SVP, Software and Systems) and their teams provided an up-beat view of where IBM currently is and where it is going.
    Read Blog
  • It's all about the platform

    Content sync and share systems are available from many players - Dropbox, Box, Microsoft OneDrive are just a few of the many for those

    Read Blog
  • Time and place: related, or inextricably linked?

    High rainfall over the last week has led to flooding.  Last night, there was a large number of burglaries.  An escape of toxic gases this morning has led to emergency services requesting everyone to evacuate their premises.  There are billions of barrels of crude oil that can be recovered over the next decade.

    Notice something missing with all of this?  They may all be factually correct; they all discuss time - and yet they are all pretty useless to the reader due to one small thing missing - the "where?" aspect.

    Read Blog
  • It's in the net: The value of big data

    Talking with a journalist friend of mine a few weeks back, we got talking about how to possibly place some actual hard pounds and pence value on data.  It got me thinking - and this is my take on it.
    Read Blog
  • The security and visibility of critical national infrastructure: ViaSat's mega-SIEM

    There has been plenty of talk about the threat of cyber-attacks on critical national infrastructure (CNI). So what's the risk, what's involved in protecting CNI and why, to date, do attacks seem to have been limited?

     

    Read Blog
  • Do increasing worries about insider threats mean it is time to take another look at DRM?

    The encryption vendor SafeNet publishes a Breach Level Index which records actual reported incidents of data loss. Whilst the number of losses attributed to malicious outsiders (58%) exceeds those attributed to malicious insiders (13%), SafeNet claims that insiders account for more than half of the actual information lost. This is because insiders will also be

    Read Blog
  • Top 10 characteristics of high performing MPS providers

    Quocirca's research reveals that almost half of enterprises plan to expand their use of managed print services (MPS). MPS has emerged as a proven approach to reducing operational costs and improving the efficiency and reliability of a business's print infrastructure at a time when in-house resources are increasingly stretched. 

    Read Blog
  • What is happening to the boring world of storage?

    Storage suddenly seems to have got interesting again.  As the interest moves from increasing spin speeds and applying ever more intelligent means to get a disk head over the right part of a disk in the fastest possible time to flash-based systems where completely different approaches can be taken, a feeding frenzy seems to be underway.  The big vendors are in high-acquisition mode, while the new kids on the block are mixing things up and keeping the incumbents on their toes.

    Read Blog
  • Cloud infrastructure services, find a niche or die?

    Back in May it was reported that Morgan Stanley had been appointed to explore options for the sale of hosted? services provider Rackspace. Business Week, May 16th reported the story with the headline Who Might Buy Rackspace? It's a Big List. 24/7 WALLST reported analysis from Credit Suisse that narrowed this

    Read Blog
  • Cloud orchestration - will a solution come from SCM?

    Serena Software is a software change and configuration management vendor, right?  It has recently released its Dimensions CM 14 product, with additional functionality driving Serena more into the DevOps space, as well as making life easier for distributed development groups to be able to work collaboratively through synchronised libraries with peer review capabilities.

    Read Blog

Pages