Skip to main content
Main Menu
  • Why consumers need to care about the IoT

    ip-camera-004-500x500The rece

    Read Blog
  • When IT goes critical

    A new Quocirca research report, Masters of Machines III, sponsored by operational intelligence tools vendor Splunk, shows that European organisations are suffering an average of three critical IT events a month. When the cost to the IT department and the broader business are added together, on average each incident runs up costs of over €100K. Do the sums – that is tens of millions of Euros per year.

    Read Blog
  • Business Continuity and networking resilience

    Problematic events happen and organisations need to be able to cope when things go wrong. Business resilience has always required organisations to consider many diverse elements – premises, people, suppliers, equipment and tools. However, IT has become such an important component of almost every business process that it merits special attention. Where once the primary focus was data backup or keeping systems running in the event of component failure, attention has now shifted to networks.

    Read Blog
  • The shape of things to come – advanced networking security for the IoT

    There is all sort of potential for IoT-related (Internet of Things) applications to streamline business processes and provide new ways of interacting with customers. This was recognised by a cross section of industry sectors surveyed in a new Quocirca report that covered the UK and German speaking region (European Perceptions, Preparedness and Strategies for IoT Security, Oct 2016). 68% said the IoT was already having an impact or would do soon.

    Read Blog
  • Red Hat – the open source conglomerate

    As successful companies grow, they accumulate products; new ones are developed and additional ones are acquired. Managing diverse portfolios is a challenge, not least when it comes to putting it all together on a single presentation slide to make it appear there is an overall coherent product strategy.

    Read Blog
  • The Yahoo hack – a numbers game

    Have you got a Yahoo email account? Was it one of the 500 million accounts compromised by the breach disclosed by Yahoo in September 2016? Does it matter if it was?

    Those who use Yahoo to provide their principal email account should have been concerned by news of the leak. Many others, with an old Yahoo account that they do not use much, may not have been that bothered. Is such complacency justified? That depends, to gauge the risk you need to understand the cyber-crime opportunity represented by 500 million accounts.

    Read Blog
  • Nok Nok adds a risk engine for FIDO driven authentication

    In February 2014, Quocirca reviewed the FIDO (Fast IDentity Online) standard for authenticating consumers to web service providers (I am not a dog, FIDO a new standard for user authentication). In 2014, the FIDO Alliance had attracted over 100 supporters; the site now lists around 250.

    Read Blog
  • DRM 2.0

    There nothing new about the need for digital rights management (DRM). However, what DRM tools are expected to achieve has changed over the last decade or so. DRM aims to limit what can be done with copy-righted and sensitive material through asserting access controls.

    Read Blog
  • Observations from Hitachi Strategy Session day.

    Hitachi-EH5000-e1342006114266Hitachi recently invited around 40 analysts and influencers to an event in Las Vegas to hear what i

    Read Blog
  • A ‘Smart’ Product is not a ‘Smart’ Solution

    The term ‘smart’ suggests that a product helps the user solve an everyday problem. However, solutions to problems mostly require a number of different man-machine systems to interact. they must register, analyse, take action and monitor outcomes. Data from health monitors data needs to feed into a professional decision system such as the family doctor, the hospital specialist or an AI system. This ensures that examination, diagnosis and treatment regime  result in the beneficial outcome. That requires a lot more than just a ‘smart’ product.

    Read Blog