Category Archives: Workforce/Workplace Computing

Data encryption must be a priority for the digital business

Organizations large and small are investing in digital transformation programs, cloud migration projects, and enterprise[...]

AMZN, AAPL, GOOGL, FB, and MSFT

With a combined market capitalization of $2.3 trillion, Amazon, Apple, Google, Facebook, and Microsoft hold[...]

Taking Sales Performance to the Next Level

So you’ve invested in CRM, and maybe a set of sophisticated modelling and analytics tools[...]

Facebook CIO says: “Microsoft got cool again”

Microsoft used day two of its Worldwide Partner Conference (WPC) to focus on announcements related[...]

iPad Pro as a laptop replacement? WRONG QUESTION. Ditch that paper notebook!

I have used iPads for many years, but they have always been ’nice to have’[...]

Experience with the iPad Pro

The rumour mill says that that Apple will soon launch a smaller (9.7 inch) version[...]

APIs and the Digital Enterprise

Application programming interfaces (APIs) have been around for decades. In the early days of IT[...]

Building a Curated Digital Hub

In a nutshell In today’s online business environment, with data spread broadly and widely, making[...]

Tackling End User Content Sprawl

In a nutshell The problem of content sprawl has been around since the early days[...]

Surface Pro 4 – The Good, The Bad and The Frustrating

I recently acquired a Surface Pro 4 as part of an equipment refresh here at[...]

Readers of The Register speak out on Thin Client technology

Managing PC estates is a time-consuming, expensive and thankless task. Better provisioning and management tools[...]

Thin Client Devices Revisited

Technology best forgotten or time for a renaissance?

Mobile Security Infographic

Content Contributors: Dale Vile & Jack Vile

Safe and Secure Mobile Working

For many of us, our work life and social life are becoming intermingled. We can[...]

The Escalating Mobile Security Challenge

Just as IT professionals and others responsible for mobile security have come to terms with[...]

Mobile Security and the Challenge of User Resistance

Mobile security is becoming more of a headache as the crossover between business and personal[...]

User-Centric Mobile Security

Not so long ago, many were speculating that ‘Bring Your Own Device’ (BYOD) would define[...]

Future Proofing Your Network

Network traffic flows have become pretty complex in today’s distributed business environment, and not just[...]

Mobile Working without the Tears

As both company and personally owned mobile devices are increasingly used in business, understanding and[...]

Evolution of the OpenText portfolio

A few days into my first software sales role back in the 90’s, I was[...]

Justifying end user computing investments

In a nutshell Device proliferation and loss of control over at least some end user[...]

Virgin Media Business and its SMB proposition

Over the years, I have grown increasingly sceptical about the ability of most Telcos to[...]

The ’feel-good’ factor is good for business

People who feel good while doing their job tend to work better, contribute more and[...]

Devices, recruitment and staff retention

In a nutshell Some say it’s not possible to recruit and retain good staff nowadays[...]