IT Transformation: Architecture Includes Security

I recently had a number of consulting conversations about IT transformation and adding new Security as a Service products to companies’ existing clouds and tenancies. This is the beginning of IT transformation in many cases. A company has realized it needs to provide security to its tenants while using clouds more securely at the same …

End User Computing: Using just a Tablet

Recently I have been trying to lighten my conference going load. To do that, I have been thinking about ways to do without my laptop and all the accessories for it, which got me thinking about what it takes to completely use such a device; to fully embrace the next generation of end-user computing using gesture computing and smaller devices. Other than the technical hurdles, there are also training hurdles as full tablet computing, today, has some serious limitations with respect to security, functionality, and in some ways capability. So how does one embrace tablet computing as their next-gen end user computing?

Virtual Environments on a Shoestring

Whether you are building a new or adding to an existing virtual or cloud environment on a shoestring budget, whether for work or for home use, there is quite a bit to consider before you purchase anything and it all boils down to your requirements which will dictate the technology you need for your virtual environment. In addition, this is a perfect time to address any deficiencies in your environment to not only address capacity issues, requirements, and security. Along with those considerations, planning the environment for the next three to five years can help shape the overall design. In fact that design, will be based on the answers from a growing list of questions.