• July 29, 2014 29 Jul'14

    Enabling the secure use of RFID

    UHF radio frequency identification (RFID) promises vastly improved data collection and the analysis of physical objects from consumables to patients. Before its full potential can be exploited, it is critical that security surrounding its use is ...  Continue Reading

  • July 29, 2014 29 Jul'14

    53% of G-Cloud spend on is on SMEs

    Just over half of G-Cloud spend is with SMEs, according to June sales figures released by the Cabinet Office  Continue Reading

  • July 29, 2014 29 Jul'14

    Think customer first, not technology first

    CIOs need to be thinking about the end customer and their experience of technology, not just technology for technology's sake, said Eamonn O'Hare, ex-CFO of Virgin Media and Tesco. Talking to ...  Continue Reading

  • July 29, 2014 29 Jul'14

    Effective print management

    More businesses are now adopting a print management strategy to tackle rising print costs, enhance document security and reduce environmental impact. Intelligent print management features such as secure document release, rules-based printing and ...  Continue Reading

  • July 29, 2014 29 Jul'14

    Can social media giants move money around better than banks?

    I have written quite a lot about the new competitors in financial services. Large internet companies as well as social media giants are looking into how they can provide transactional financial ...  Continue Reading

  • July 29, 2014 29 Jul'14

    Effective print security for SMBs

    Businesses of all sizes have data of value, such as employee and customer information, which must be protected. While many businesses have secured their IT infrastructure to minimise unauthorised access to confidential or sensitive data, unsecured ...  Continue Reading

  • July 29, 2014 29 Jul'14

    How to configure Mac OS X Server

    In the previous article in this series, we showed you how to secure a Mac using the functions built into its operating system, OS X. These functions range from simple password protection and patch management through to full-disk encryption. ...  Continue Reading

SearchCIO
SearchSecurity
SearchNetworking
SearchDataCenter
SearchDataManagement
Close