Skip to main content
Main Menu
  • Sensory overload - M2M needs to smarten up

    M2M and the internet of things offer great promise - at least that's what a lot of marketing messages are saying. The key is to focus more on the applications and the benefits they deliver, and less on the platforms and hype.

    View this presentation
  • Mobile, Social and Wearable

    Small smart devices are not just creating an internet of things, but building personal and social connections with people. This 'Social Network of Whatever' will increasingly stimulate new applications and ideas.

    View this presentation
  • IT security in the “Superfast Mobile Age”

    This presentation was given at EE's November 2013 Business Customer Forum. The impact that 4G has on IT security, is not so much about the speed itself, but the fact that it will exacerbate existing issues by creating more and more of everything through extending the reach of IT systems further than ever before.

    View this presentation
  • Implications of BYOD and the Cloud for Enterprises

    BYOD and Cloud computing continue to have impacts on organisations. Being too prescriptive or being too laissez faire can both lead to problems. What is the best strategic approach to BYOD?

    View this presentation
  • Sizing up Big Data? Hitting the "V"s

    "Big Data" is the latest bandwagon to hit the trail, with vendors bending their product portfolios to get the term "big data" into their marketing spiels. But, what is big data really - and what are the options for dealing with it?

    View this presentation
  • Modern-day NAC

    The influx of personal mobile devices in to the work place (or BYOD/bring your own device) needs policy on usage to be enforced. One of the enabling technologies is network access control (NAC). NAC serves to provide real-time visibility and control of all users and systems attempting to access network resources using managed, unmanaged, wired and wireless devices.

    View this presentation
  • Advanced IT security intelligence

    For a long time there has been a need to gather and store log files for compliance purposes. Early log management products evolved in to SIEM (security information and event management) as their scope was extended to include a broader range of events across a wide range of IT devices from the data centre, across the network to the desktop. Typically, this information was use retrospectively to prepare reports for auditors etc. More recently some of the vendors have souped up their products to enable them to act on data in real time. This enables advanced cyber security protection measures to be put in place that can identity anomalies that may be missed by point security products such as firewalls, anti-malware and data loss prevention (DPL); some are calling this next generation SIEM.

    View this presentation
  • Building an open vision for the cloud

    This Quocirca presentation was given at Rackspace's Summer Sizzler event in June 2012 and discusses why open cloud platforms are the key to flexible application delivery.

    View this presentation
  • Privacy, compliance and the EU

    An update on UK/EU data protection including the growing pressure to disclose data losses

    View this presentation
  • Cloud Computing: The Good, the Bad, and the Downright Ugly

    Cloud computing has been heavily hyped - but what can it really do, and where could there be problems?

    View this presentation

Pages