Skip to main content
Main Menu
  • There’s more to a container than, well, a container.

    It seems that virtual machines (VMs) are so last year. A new ship has sailed in and docked – it’s a container ship and it is full of Dockers (as well as Rkts and Mesos). The idea of containerisation is taking hold – the promise of a lighter means of dealing with applications enabling much higher workload densities and lower storage costs seems to attract developers, sysadmins and line of business people like moths to a flame.

    Read Blog
  • IoT in the enterprise – a pragmatic approach

    There is a degree of hype surrounding the internet of things (IoT) with many wild ideas reminiscent of ideas for internet businesses during the dot com boom. Despite this, the combination of exuberant innovation and pragmatism is already paying off with some practical and tangible business benefits. However, it is important for businesses not to solely focus on the shiny nature of ‘things’ but to take a broader view with their digital connected strategy.

    Read Blog
  • IoT design, security and PKI

    In a 2015 blog post – Securing the Internet of Things – time for another look at PKI? – Quocirca outlined why Public Key Infrastructure (PKI) is likely to see a new lease of life from the increasing deployment of applications that fit the general heading Internet of Things (IoT). As the first blog pointed out, IoT applications will only be a success if underlying security is ensured.

    Read Blog
  • Why EU data protection will still apply to post-Brexit UK

    The General Data Protection Regulation (GDPR) is expected to come in to force for EU member states in early 2018. It could be some time later that year that the UK finally severs its links with the EU. So for UK citizens will the GDPR be a short-lived regulation that can largely be ignored? The answer is no and the reasons fairly obvious; they are commercial, legal and moral.

    Read Blog
  • Come spy with me: drones and info-sec

    UASs (unmanned aircraft system) or drones, as they are known in common rather than legal parlance, can easily cross physical barriers. As drone use increases, both for commercial applications and for recreational purposes, new challenges are emerging with regard to privacy and information security.

    Read Blog
  • SD-WAN: Take a good look at the outliers

    Is management cutting your IT budget in 2017?

    From recent conversations with UK service providers, CIOs and telco analysts, the general perception is that enterprise IT budgets will face 30% cut in their operating expenses in 2017, counter balanced by a 20% increase in innovation spending. Such budget realignments require radical rethinking and can certainly not be achieved unless ops and innovation go hand in hand.

    SDN and SD-WAN into the breach

    Read Blog
  • Working with giants – 25 years of IT security

    The IT security industry as we know it could be said to be enjoying its 25 anniversary. Of course, there has been a need for IT security for longer than this, but the release of HTML and the birth of the web in 1991, which saw widespread internet use take-off, was a game changer. Device-based security measures from existing anti-virus vendors like Norton (acquired by Symantec in 1990) and McAfee (acquired by Intel in 2011) had to be adapted from monitoring the occasional arrival of new content via portable media to the internet as a major new threat source.

    Read Blog
  • NetApp/SolidFire – a new powerhouse, or straws grasping at each other?

    fas (3)_480x384In December 2015, NetApp made its bid for SolidFire at $870m.

    Read Blog
  • Updates, updates – hares and tortoises in the software vulnerability race

    To penetrate a target organisation’s IT systems hackers often make use of vulnerabilities in application and/or infrastructure software. Quocirca research published in 2015 (sponsored by Trend Micro) shows that scanning for software vulnerabilities is a high priority for European organisations in the on-going battle against cybercrime.

    Read Blog