Three quarters of UK businesses are now officially ‘in the cloud’ in one form or another. The universal, horizontal cloud benefits of agility and utility are undeniable and compelling, but businesses still need to be able to translate these into enablement and competitive advantage.
‘Big Data’ is a term popularly used to describe the exponential growth and availability of data in recent years, and can range in size across sectors from a few dozen terabytes to multiple petabytes (thousands of terabytes).
We all know that mobile phones have been a force for both good and bad. We have all experienced that moment when someone is so engrossed in their phone that they walk into us; unaware of the world happening around them. Mobiles have been responsible for causing the decline of companies like Kodak and HMV by changing the way people consume, create and share.
A commonly quoted principle concerning fraud states: “there is no such thing as a new fraud, only new ways of committing old fraud.” The advent of scanners, laser printers and desktop publishing software has made the forging of documents and signatures as simple as a few mouse clicks. However the underlying fraud remains the same — forgery; and some of the less sophisticated frauds such as forging cheque signatures are still as popular as ever.
It is not uncommon to find IT departments in small businesses weighed down by the job of maintaining software, hardware and infrastructures which grow increasingly unwieldy. Just keeping the lights on in the data centre is a real burden. This has a massive impact on the ability of IT teams to drive innovation that can deliver competitive advantage for the business.
We live in a world which was shaped by the first industrial revolution, which saw manual power eclipsed by the intelligence and skill of human craftsmen automated by machinery. Today we are in the midst of a revolution potentially just as momentous, often referred to as the ‘digital revolution’.
Scarcely a day goes by without a new viewpoint on the Bring Your Device (BYOD) to work trend. Is it going to reshape the workplace, drive productivity, or redefine IT budgets as individual employees take control of how they access corporate IT resources?
Stephen Midgley, Vice President, Global Marketing at Absolute Software shares his top tips on how to avoid business security mishaps.
Today’s business environment is continually changing, in part to keep up with numerous technological advancements and the shifting demands of the modern workforce.
Some organisations have acted fast to implement a mobility business model in order to remain competitive and meet employee expectations, which are often strongly rooted in consumer experiences; but for those that have yet to invest in alternative mobility strategies and/or devices, a technological innovation gap between user experiences and business IT requirements has appeared.
A certain major sporting event is currently underway with the eyes of the world glued to their televisions, smartphones, tablets and laptops looking for the latest news coming out of Brazil and the fate of their national sides and favourite players.
You’ve no doubt seen news reports about hacking incidents at large companies — from eBay to Domino’s. It’s a growing problem, but generally, only the major incidents that affect millions get media attention.
In the 1940s, IMB President Thomas Watson allegedly predicted the world would need only five computers. Over the past decade, this statement has been recirculated and mocked as the consumerisation of technology has led to the creation of an estimated 2.35 billion devices (PCs, tablets and mobile phones) as of 2013. Indeed, there are toddlers who own the five devices Watson believed would satisfy the world’s computing needs!