Category Archives: Workforce/Workplace Computing
Justifying end user computing investments
In a nutshell Device proliferation and loss of control over at least some end user[...]
Virgin Media Business and its SMB proposition
Over the years, I have grown increasingly sceptical about the ability of most Telcos to[...]
The ’feel-good’ factor is good for business
People who feel good while doing their job tend to work better, contribute more and[...]
Devices, recruitment and staff retention
In a nutshell Some say it’s not possible to recruit and retain good staff nowadays[...]
Snooper-proofing laptops and tablets?
Given how important the company’s data is and the ever more stringent nature of the[...]
A new approach to verifying user identity
By Tony Lock We all know that trying to authenticate our users when they access[...]
Inertia has its virtues, but change is happening
As the old year draws to a close it’s time for CIOs and analysts to[...]
Creating more harmony around end user computing
In a nutshell Tensions frequently arise between business units and the IT teams as users[...]
Rethinking desktop delivery
In a nutshell Many IT professionals are weary of the relentless Windows upgrade spiral and[...]
User flexibility without the risk
In a nutshell Most organisations are seeing users and business groups starting to make their[...]
The Politics and Practicalities of End User Computing
With the phenomenal rise in the adoption of smartphones, tablets and other desirable devices, many[...]
How much of your mainstream IT capacity does mobility consume?
Few doubt the increasing popularity of mobile devices, specifically smartphones and tablets. Their numbers grow[...]
User desires versus business needs
Much has been written about the rise of user influence and power. Some of it[...]
The IT vendor empathy gap
Industry analysts, CIOs and others involved in the IT decision making process are on the[...]
Accommodating increased user influence
Business people often complain that the IT department is not keeping up with their needs.[...]
IT-Business Alignment Revisited
In some organisations, the tension between IT and business teams has come to a head[...]
Social media and why businesses need to embrace it
As a teenager just entering the world of business I had to go through a[...]
Wake up, grandad: All the techies use social media
Ever since I passed the big five-o, I have noticed more and more youngsters who[...]
User Access – Time for a change?
User expectations and the range of devices they use to access IT systems are growing[...]
End User Computing:
This paper is written for business executives and managers with an interest in how technology[...]
Mobile security is more than protecting local data
By now we’ve all heard the term Bring Your Own Device (BYOD). This phenomenon is[...]
What are APT’s?
What is an APT? APT stands for Advanced Persistent Threat. The goal of this form[...]
Say What?
Recently I attended the IBM Security Systems Analyst Meet the Experts day in Heathrow. With[...]