Hardware vendors may not want to sell you a device, they may, however want to provide you a “device as a Service”. What is this? What should you look out for in utilizing these offerings. Continue reading
I have been working on customers – bids and consulting – and when I do that I try not to blog – the last thing I would want is a customer I am dealing with today thinking, however obtusely, they are being referenced in a post.
Where are all the files that your users create ?
On their hard disk ? On some storage somewhere ? In the cloud ? the answer, is more than likely, all of the above – what is this about and can an enterprise hope to manage the great morass of files that user create.
Here’s a great question – one that I have been asked a few times;-
What should our BYOD policy say ?
I am not going to produce one here, as it has many different ways in which it can be answered, what follows is what I would suggest you need to include.
This is a question I am pondering over recently, in the main because there seems to be a lake of understanding, or more to the point, a sense of misplaced expectation on IT and the roles of IT professionals. As an IT Architect I think the role I play is important, so here is my thoughts on the subject
IT Personas are a very useful way of describing the IT provision for common groups across an enterprise.
One of the common questions asked is how many personas should I have ? Too few and they become far too generic, too many and it becomes cumbersome and time consuming to explain the differences between some of them.
One of the roles I use to do was PC support for a mid size insurance company – as the new IBM PS/2 pc’s were being rolled, out one of the things that was new was that they had a hardware or boot password. I was called to look at a problem with Word Perfect (and does that date me!). On a sticky note on the PC was “the password is whatever”.
This was in the early 90’s and cyber security was no where where it is today as a top of mind issues, but it does illustrate the issue that just a password alone is not that secure.
Can you both improve security and simplify the user experience ?
“The Internet is the new data centre”
Microsoft has made a fundamental change to the desktop version of Windows with Windows 10, with Microsoft stating it is a service, not a product.
How does this change in the fundamentals of windows desktop operating systems change the way enterprises deploy and update Windows 10 as compared to previous versions like Windows 7 ? Continue reading
Leveraging mobility and cutting-edge technology is essential to the productivity of today’s enterprise. Measuring the effectiveness of your digital workplace implementation as it evolves is key to gauging the business value of this transformation.