Home / Archives For Analysis

Analysis

Forget That Flash Is Fast: The Real Business Benefit Is Yet To Come

Flash memory is massively disruptive technology. Surely, the companies that make 35mm film for cameras know this. In fact, enterprise storage vendors that are still reliant today on hard disks for performance storage are in a position eerily similar to that of Kodak a decade ago: confronted with a new technology that can dramatically improve what they bring to the market. Flash provides greater scalability and application consistency while consuming fewer data centre resources than anything possible with disk-based storage. But it’s not as simple as a new broom sweeping older technologies out of the way in an instant. In the case of enterprise flash, cost has been the barrier to broad market adoption. Flash is expensive and thus most vendors implement it in small quantities alongside disk ......

The Impact Of Consumerisation On Network Capacity

IT consumerisation is not a new phrase. The tendency for new information technology to emerge first in the consumer market and then spread to business and government organisations has been a trend for years. Business applications continue to mimic the social and mobile traits that define the consumer technology market. While IT consumerisation continues to evolve the way workers engage with applications and each other in the business world, it has also increased the demand for reliable and efficient network performance. Here are three examples of how IT consumerisation has impacted the network world: 1. Increased Collaboration = More Traffic I first heard the term “systems of engagement” while working on a presentation with Geoffrey Moore, technology consultant and best-selling author of &......

5 Top Tips For BYOD: A Legal Perspective

There has been a significant rise in businesses implementing Bring Your Own Device (BYOD) strategies. This comes as no surprise following research by Cisco which revealed that of today’s Generation Y; around 90% check their smartphones first thing in the morning – reinforcing the fact that today we are in an ‘always on’ environment. Whilst BYOD can bring a number of benefits to businesses, including cost savings, there are some steps every organisation should take before implementing it organisation-wide: 1. Put A Policy In Place The first step is to draw up a reasonable, binding policy on BYOD to protect both businesses and employees. This will ensure that all risks are addressed and managed effectively. For example – what will happen if there is a data breach; who will be liable? W......

Security Intelligence: Moving From A Reactive To Proactive Defence

As cyber attacks continue to soar to unprecedented levels, organisations are slowly starting to realise that data breaches have become inevitable. Indeed, cyber criminals have become more and more sophisticated and underhand in their techniques, leaving organisations continuously playing cat and mouse in a bid to keep up. As a result, there is already a shift in the way network security is being addressed – organisations are becoming increasingly aware that traditional defences are incapable of quickly adapting to emerging threats, rendering them inadequate when faced with today’s rapidly evolving threat landscape. While perimeter security measures undoubtedly still have a role to play in reactively defending networks, they will not stop sophisticated hacks aimed at gaining control of crit......

Getting Data Recovery Off The Sidelines

Results from the Disaster Recovery Preparedness 2014 Annual Report show almost three quarters of organisations worldwide have relegated their disaster recovery initiatives to the sidelines by not taking adequate steps to protect their data and IT systems. According to participants, poor planning, testing and technological deficiencies have led to instances in which more than $5M worth of critical applications failure, data centre outages and data loss have occurred. At a time when application outages such as those experienced in the financial sector by the likes of HSBC and RBS are grabbing front page headlines, it’s very surprising that this many organisations haven’t gotten themselves enough into the game to sort out their disaster recovery strategies. The study polled more than 1,......

Reducing IT Costs With Flash Memory

It’s no secret that flash memory is changing data centre architectures today. In less than a decade, flash has gone from being viewed as a new, unproven technology, to being used in nearly every consumer electronic device as well as numerous data centres. Flash is now accepted by most IT professionals as an ideal way to add application acceleration to the data centre, but some organisations still view adding flash to their architectures as a costly endeavour. If you view flash from a cost-per-operation perspective, it is actually far more cost effective than disk drive storage. In fact, in a recent survey, 33 percent of my company’s customers reported that they saved close to £60,000 by adding flash to their data centres whilst 14 percent saved close to £150,000, which showcases the ......

What Steps Should Be Taken To Ensure Your Business Is Ready For Flexible Working?

Many companies today are asking themselves the same question. Is our business ready to handle the expectations and technical requirements of a modern workforce that demands ever greater flexibility in where and how it works? Today, to attract and retain the best talent, firms know they must be seen to offer competitive working arrangements that respect employees’ personal time, and also their working habits – especially the freedom to choose their own technology. Employees are, more and more, influencing the terms of engagement. One in three workers under 30 say they would prioritise social media freedom, device flexibility and work mobility over salary when evaluating a job offer. The onus is firmly on businesses to develop a winning formula – mixing enlightened employment policies with r......

Time Is Running Out For Windows XP Users

Microsoft will end support for its Windows XP operating system a week from today (8th April) yet many organisations are yet to upgrade to a newer version of Windows. In fact, recent reports suggest that not only are 30 percent of PCs worldwide running XP, but over half of the UK’s councils and 95 percent of the world’s cash machines run on Microsoft’s fated platform. A huge number of organisations are still using XP and once Microsoft stops supporting it next week they are going to find themselves with gaping security holes. Time is now swiftly running out for those businesses to upgrade to a new operating system and it is likely that hackers will already be planning their attacks to exploit these vulnerabilities. Unless some form of action is taken now, anyone operating XP should be conce......

Plugging The Gap In Cloud Resiliency

Moving core applications and data to the cloud is compelling on many levels – not least anytime, anywhere access to information and services. The flaw in this plan, however, is when ‘anytime, anywhere’ delivery is impacted due to a network outage resulting in the office, shop, factory or wherever staff are located being ‘off-line’. Despite the 100% reliance on real time Internet access, too many organisations with a cloud-based deployment model have confused resiliency and contingency plans. But what happens when the leased line or ADSL fails? How long can the business survive with no information, no email and, quite possibly, no voice calls? Cloud Imperative Growing numbers of SMEs are opting to put core applications in the cloud. The costs are compelling; the flexibility is appealing: wh......

The Advantages Of Embedded Computing In Industry

Embedded computing is the use of a dedicated computer system within a larger system to perform specific functions; these are used very widely in electronic applications everywhere from home electronics all the way up to large industrial applications where each part of a plant may have its own embedded systems to keep processes in check. Embedded solutions are very well suited to industrial applications since they’re typically easier to seal against the elements (and whatever else may be present), which can be key in industrial applications. Industrial workplaces can often be harsh environments for any equipment, with the potential for corrosive or damaging chemicals, large volumes of dust, excessive heat and moisture, each of which could cause big problems for electrical equipment or......

Social Media In The Workplace: Are We Nearly There Yet?

Since Mark Zuckerberg invented Facebook a decade ago it has attracted a billion users worldwide. Twitter now reports 200 million users who send 400 million tweets every day. Compounded by record IPO valuations well into the $billions, there is little doubt that the social media way of life is here for the duration. But while it may seem like social media is still relatively new, it has moved through a number of stages in its 10 year evolution so far. Only a few years ago when its popularity amongst consumers was soaring, its role in a business environment was at best confused, and at worst extremely negative. Reports of Facebook being banned as it was viewed as a distraction, and instances of employees being dismissed because Facebook had revealed to managers that employee absences were no......

Web Hosting And Security: What You Need To Know

Whether you have a personal blogging website or you’re running an eCommerce business, security should be the lynchpin to its operations. Security breaches and data leaks occur on even the biggest websites, so it’s crucial not to become complacent with security checks. So what should you be looking out for as a bare minimum to ensure your website is protected? As a website owner you probably use an FTP (File Transfer Protocol) where you upload your files to be hosted and then published on your site. But for added security it’s best to opt for a secure file transfer protocol, (SFTP) especially if you work with a website that uses this for a large number of sensitive files and images. This will provide your files with an additional layer of protection and make them less vulnerable to intercep......