Bridging The Replication Gap
Disaster recovery is not what it used to be.In the event of a flood or fire, for example, organisations have restored tape-based backup data from a remote location. This option is becoming less...
View ArticleApplied Desktop Virtualisation
We asked the illustrious readers of The Register to tell us about their experiences with desktop virtualisation. We wanted to know, based on adoption experiences from the readers, the practical...
View ArticleServer Virtualisation Scale-Up
The majority of IT professionals consistently report they are happy with their knowledge of server virtualisation. They are comfortable with their understanding of where solutions are well suited in...
View ArticleMobile computing checkpoint
The last decade has seen a significant increase in adoption of laptop and notebook PCs in business.This is a Reg reader Tech Panel piece of research that examines the present and future shape of the...
View ArticleReg Reader Research: Cloud connectivity
One of the most frequent concerns raised when looking at the risk of adopting Cloud services and SaaS - along with security and privacy - is that the underlying communications infrastructure (internal...
View ArticleThe Consumerisation of IT
The ‘consumerisation of IT’ is real, and it’s not just about ‘hot’ gadgets.Feedback from over 1,600 participants from The Register's dear readers confirmed that many organisations are seeing...
View ArticleInformation management in financial services
Making sure that the right information is available at the right time to the right people is more important than ever in today’s volatile economic and political environment. But how are financial...
View ArticleReg Reader Research: SaaS based Email and Office Productivity Tools
Much has been made in the media about the Software as a Service (SaaS) options challenging the traditional dominance of desktop office tools and the back-end systems that drive them. Indeed, a number...
View ArticleReg Reader Research: The Links between Public and Private Cloud
If ‘cloud’ is all about services based on shared public infrastructure, isn’t ‘private cloud’ a contradiction in terms?Nevertheless, the term ’Private Cloud’ has become widely accepted, and indications...
View ArticleReg Reader Research: Private Cloud and IT Service Delivery
There’s a lot of talk about budget pressures, and the need to do ’more for less’. But what’s really going on ‘at the coalface’? How are IT departments doing in their quest to deliver services more...
View ArticleFrom virtualisation to private cloud
Lots of people are talking about private cloud as the next natural step from virtualisation. While some companies have managed to implement private cloud, for many it can seem to be a giant leap.By...
View ArticleThe Business of Security
Big companies invest a lot of time and energy in IT security. That’s because they have a lot to protect: customer databases, business leads, valuable intellectual property.They also have good reason to...
View ArticleFast Forward to Big Data
The pools of data available to organisations continue to grow in size and complexity, yielding both new opportunities and challenges. How should organisations be thinking about their data analytics and...
View ArticleA Vision for the Data Centre
While the imminent death of on-premise computing as a result of hosted cloud services has been greatly exaggerated, this doesn’t mean that the enterprise data centre can remain as it is. Stakeholders...
View ArticleThe changing shape of the desktop
The desktop computing element is one of the most important aspects of any IT infrastructure, and keeping it in good shape is the key to maintaining end user productivity and satisfaction.But with...
View ArticleOffice 365 in Context
Gone are the days when office productivity revolved around the word processing, spreadsheet and presentation suite running on your desktop PC.Users today are working in a highly connected manner, often...
View ArticleThe Register guide to hosted apps
This guide will help you to use the appropriate amount of brain if you are considering hosted apps in your business and want to be sure that your data is protected, that you can get service and manage...
View ArticleReg Reader Research: SaaS based Email and Office Productivity Tools
Much has been made in the media about the Software as a Service (SaaS) options challenging the traditional dominance of desktop office tools and the back-end systems that drive them. Indeed, a number...
View ArticleBridging The Replication Gap
Disaster recovery is not what it used to be.In the event of a flood or fire, for example, organisations have restored tape-based backup data from a remote location. This option is becoming less...
View ArticleThe End User Security Jigsaw
Risk management is not about absolutes or certainty; it’s about playing the odds. This principle is particularly relevant when it comes to securing end user computing activity.We have no shortage of...
View Article
More Pages to Explore .....