The hidden dangers of legacy technology – and how to resolve them

(c)iStock.com/TiSanti

Every business has that one legacy system they can’t seem to let go of. You know you’ve got one - a relic hidden away in some dusty server room. But are you aware of the damage these outdated systems can, will and may already be having on your organisation?

The damage inflicted by legacy technology can range from minor systems issues through to major events that could put your organisation out of business – and it’s important to know the hidden dangers.

Increased downtime...

By Ed Jones, 10 October 2016, 1 comment. Categories: Compliance, Data & Analytics, Data Management, Security.

The top five in-demand cloud security skills for 2016

(c)iStock.com/Jirsak

The cloud computing market continues to expand at a phenomenal rate. According to a recent report from IDC, worldwide spending on public cloud services will grow 19.4% annually through to 2019. Six times the rate of overall IT spend growth, this will double the current spend from $70 billion to $141 billion.

As more businesses transition to the cloud this will drive up demand for IT professionals with the skills to make the most of the technology. A market, which...

By Ed Jones, 20 April 2016, 0 comments. Categories: Compliance, Security, Vulnerabilities.

The top five in-demand cloud skills for 2016

(c)iStock.com/sommail

Now acting as the technological cornerstone for businesses across the globe, the growth of cloud computing continues at a phenomenal rate – and as a result, the employer demand for cloud professionals has exploded.

In 2015, there were an estimated 18 million cloud computing jobs globally, according to WANTED Analytics, and it’s a number that is only set to increase with LinkedIn reporting ‘cloud and distributed computing’ as the number one

By Ed Jones, 16 February 2016, 1 comment. Categories: Adoption, Developers, Enterprise.