a A A+

Articles

Are you the Master of the Machines?

Having a flexible IT infrastructure can help provide the business agility needed to be a transaction driven business but, supporting operational intelligence tools being used by the right people are needed to make it all work. ...

read more

18/07/2014 | OI article for The Stack for web.pdf | VIEW

The Stack

Big Data business insight from IT shows telcos ahead of the pack

Telco providers have the greatest understanding of how machine data generated by IT systems can be turned in to IT operational intelligence for business use. ...

read more

15/07/2014 | GTB OI July 2014.pdf | VIEW

Global Telecoms Business

Managing Apple in the enterprise

Apple’s products were once niche devices. Now, following a consumer-led initiative, they are widely used across the enterprise. ...

read more

14/07/2014 | Quo apple in E BG.pdf | VIEW

Computer Weekly

Xerox Progresses Next Generation MPS Strategy

The market for enterprise managed print services (MPS) is a competitive space dominated by a small number of large vendors. With little to differentiate core services, such as fleet optimisation and proactive management, vendors such as Xerox are expanding their focus beyond MPS, to lucrative business workflow services. ...

read more

02/05/2014 | Quocirca Xerox Progresses MPS strategy 2014 Final.pdf | VIEW

Quocirca

Buyer's guide: IT security analytics – the before, during and after

The capability of IT security analysis tools is converging both in capability and the time they are used ...

read more

28/04/2014 | IT security analytics BG for web.pdf | VIEW

Computer Weekly

Internet of Things - Architectures of Jelly

In today’s world of acronyms and jargon, there are increasing references to the Internet of things (IoT), machine to machine (M2M) or a ‘steel collar’ workforce. It doesn’t really matter what you call it, as long as you recognise it’s going to be BIG. That is certainly the way the hype is looking – billions of connected devices all generating information – no wonder some call it ‘big data’, although really volume is only part of the equation. ...

read more

17/04/2014 | Quo IoTdatascale.pdf | VIEW

Computer Weekly

TV, phone, tablet, watch - are we smart yet?

At one time things were pretty straightforward; entertainment centred on a TV, computing around a PC, communication around a phone. Now, convergence has blurred so many lines; it should be no surprise that everything looks like a cloud. ...

read more

27/03/2014 | Quo formfactors.pdf | VIEW

Computer Weekly

Bow to the inevitable

The use of cloud services is becoming unavoidable, so the focus needs to be an supporting security capability. An opportunity for resellers. ...

read more

20/03/2014 | CRN cl-sec for web - Mar 2014.pdf | VIEW

CRN

Mobile security – there’s something in the air

In the physical world, 'security' for any business involves a whole spectrum of defensive measures; choosing a safer location, putting up warning signs and notices, monitoring and cameras, locks, identity passes, alarms and ultimately, insurance. IT really should be no different, and many do apply security measures, although pre-mobility and the internet, most organisations would have relied heavily on physical security to defend their IT, in addition to some form of system login, particularly on larger systems ...

read more

03/03/2014 | Quo mobile security.pdf | VIEW

Computer Weekly

How CMO/CIO alignment can bridge print/digital gap

The traditional boundary between chief marketing officers (CMOs) and chief information officers (CIOs) is blurring as marketing and technology increasingly overlap. One area where better alignment can transform a business is improving customer engagement. ...

read more

14/02/2014 | VIEW

Quocirca