BLOG

Read our blog about the latest trends on mobile computing and best practices on safe and secure computing

Are you commited to digital marketing rethink or get left behind

Are you commited to digital marketing rethink or get left behind

Just how serious is your business about digital channels? The pervasiveness of smartphones (iPhone, Android, BlackBerry), tablets (iPad, Samsung, Dell) and the app economy that surrounds them is quickly becoming a dominant business force. We also can’t ignore the growth of Facebook. During the holiday break, Facebook was named the most visited site in 2010,Read more about Are you commited to digital marketing rethink or get left behind[…]

The road ahead… 2011 Internet threats

The road ahead… 2011 Internet threats

Hacktivism A denial-of-service attack was launched against the WikiLeaks site. WikiLeaks supporters retaliated. Credit: Sophos.com In the second half of 2010, no single topic dominated cybersecurity news more than WikiLeaks. From the initial document leak to the subsequent denial-of-service attacks launched against PayPal, Amazon, MasterCard and Visa, even the least tech-savvy person seemed to haveRead more about The road ahead… 2011 Internet threats[…]

If virtual desktops are great, why are so few used?

If virtual desktops are great, why are so few used?

Virtualization analyst Brian Madden asks an excellent question: If VDI (virtual desktop infrastructure) is so great, then why aren’t you using it? It’s a really good question, isn’t it? Brian observes that however encouraged we are by the progress VDI has made, and however enthused we may be about extending the wins of server virtualizationRead more about If virtual desktops are great, why are so few used?[…]