Author Archives: Tony Lock
The industrialisation of the IT Threat Landscape
Business and IT are now changing with a rapidity never before seen while at the[...]
Just how special are Power Users?
Power users are often at the cutting edge of an organisation’s revenue generation, product development,[...]
The True Cost of Desktop Support
Desktop support is something every organisation does using a variety of tools, people and processes,[...]
CIOs and ’Data Protection’
By Tony Lock The rapid growth in the amount of stored data means that the[...]
Is your server estate becoming too complex to manage?
In earlier articles in this workshop we reported on research carried out by Freeform Dynamics[...]
Are you delivering IT and creating wiggle room?
According to Freeform Dynamics research, many IT departments are seeking to become better aligned with[...]
Automation – one step closer to lights out?
In an earlier article in this workshop we considered the challenges associated with procuring system[...]
Desktop virtualisation: The control-plus-flexibility problem
Desktop virtualisation is attracting serious attention as organisations consider the future potential directions for delivering[...]
The Time has come for “Chargeback”
Ever since the industrial revolution there have been periods when businesses have prospered simply on[...]
Managing IT and business risk in the times of eroding enterprise boundaries
Managing risk in business has always been more of an art form than a science.[...]
Systems monitoring: what’s possible, and what really happens
IT increasingly plays a pivotal role in business processes. The importance of systems to the[...]
Storage Technology Evolution and Alignment
By Jon Collins and Tony Lock Executive summary Few organisations today would deny their absolute[...]
Desktop virtualisation: The control-plus-flexibility problem
Desktop virtualisation is attracting serious attention as organisations consider the future potential directions for delivering[...]
Your desktop virtualisation reality check
Migrating desktops is never easy. The promise of better management and security that is offered[...]
Desktop virtualisation: why, how, and how much?
As anyone who has started down the path will confirm, desktop virtualisation is not a[...]
The Mainframe Extends its Reach
Over the course of the last decade there has been considerable discussion about the future[...]
Streamlining the network
Ethernet networks have evolved dramatically in capabilities and scale over the past decade. Networks have[...]
How can Organisations be helped to exploit Storage Management Solutions?
The amount of data stored by organisations continues to grow at a very fast rate.[...]
The cloud’s impact on security?
We tried to get through this workshop without using the five letter C-word, but we[...]
Time for action on storage management
The amount of data stored by organisations continues to grow very fast. It has become[...]
Cloud Confusion
By Tony Lock In this article we revisit some research conducted in 2008, covering perceptions[...]
Is it possible to measure IT Security?
It is a commonly held principle in many areas of business that if you can’t[...]
The joy of software licensing on the desktop
One of the joys of working as a manager of desktop and laptop systems is[...]
Using systems management tools in IT security
Every IT professional recognises the importance of securing the IT systems that are now at[...]