Skip to main content
Main Menu
  • Bonding Cars and Comms

    Let’s face it: our road transport systems are jamming up – and it’s just getting worse! In order to improve transport infrastructures, the global focus is on the merger of physical transport and telecoms to optimise transport volumes, speed, accuracy as well as security, and actually reducing the environmental impact. Smart traffic management needs Software-Defined Networks (SDN) and Software-Defined WAN access (SD-WAN) to manage hefty increases in mobile data traffic.

    Read Blog
  • 8 steps for implementing a successful print security plan

    Amidst the proliferation of Internet of Things (IoT) endpoints, the cybersecurity threat landscape has expanded to every mobile, smart and cloud-enabled device on the network. This threatens the resilience of organisations not only from the disruption of business operations, but also the potential ramifications of a data breach can lead to financial loss, brand and reputational damage and loss credibility in the market place. Printers and multifunction printers (MFPs) are not immune to the security threat and are vulnerable to the same risks as any device on the network.

    Read Blog
  • The convergence of AV and IT

    Developments in both audio visual (AV) and information technology (IT) are leading to a ‘convergence’ of the two sectors. This is similar to what has already happened in other markets once open, connected and scalable internet technology became pervasive. Those working in IT and AV need to better understand each other and the consequences of technology advances in each sector, to plan effectively for the future.

    Read Blog
  • Protecting web sites from web scrapers

    If you sell something, it makes sense that news of what you are selling spreads far and wide to attract as many buyers as possible. To this end, e-commerce sites want to be found near the top of relevant search lists and to be included on price comparison sites. It is accepted that automated software robots (bots) must access web sites to achieve this, including the web crawlers used by search engines and web scrapers used by price comparison sites; these are so-called good-bots.

    Read Blog
  • Expense spared – the cost of replacing legacy things

    A previous Quocirca blog post (The Internet of Everything – the need to manage external things) looked at how Internet of Things (IoT) deployments will mostly need to include access to at least some external devices. One of the problems this throws up, especially for network security teams, is the need to verify the safety of devices joining networks, over which they have little or no on-device control.

    Read Blog
  • Xerox Turns a Page: Pledges Commitment to Core Markets

    On 7th December 2016, Xerox held an Investor Conference to outline its business strategy and long-term financial model as a standalone company. It expects the separation of the two companies – Xerox Corporation and Conduent – to be completed on 31st December of this year.

    A new Xerox

    Read Blog
  • The Internet of Everything – the need to manage external things

    Research commissioned by Quocirca in July 2016, as background to its Reference Architecture for the IoE (Internet of Everything), shows that most businesses in the UK and Germany believe the Internet of Things (IoT) is already having a major impact (43%) or expect that it will do so soon (44%).

    Read Blog
  • SD-WAN handles fleet management and passenger services

    Driven by traffic congestion, pollution levels and rising infrastructure costs, the future of public transport is being technology-enhanced on many levels. Thus major initiatives include: Mobile Internet access; GPS and intelligent fleet management; App-driven taxi and shared car services and; Fully integrated metropolitan ground transport systems.

    Read Blog
  • How reliant is your organisation on IT?

    Day-by-day the world becomes more reliant on IT systems and the networks that connect them. However, be it direct or indirect, the degree of reliance varies from one business to another and this is reflected in the way IT systems and applications are managed and the way IT problems are dealt with, especially the most serious, often termed critical IT events.

    Read Blog
  • SD-WAN access bonding for rural high-speed connectivity

    There is an inverse relationship between our ability to live and work remotely and the quality of the Internet connections from those remote locations. Every country has its metropolitan areas with dense population and 100Mbps fiber connectivity, and every country has its outlying areas with flaky Internet connections. It’s really difficult for any network-reliant company (and that’s pretty much everyone these days) in those areas to operate at the connection speeds required by most business processes.

    Read Blog