How consumerisation is driving cloud acceptance

There has been a thunderstorm of growing noise surrounding Cloud Computing in the past 24 months. Vendors, analysts, journalists and membership groups have all rushed to cover the Cloud medium - although everyone seems to have their own opinion and differing definition of cloud computing. According to the most common definition, it is Internet-based computing where shared resources, software and information are supplied to users on demand, rather like a utility company would supply electricity, water or...

By Ian Moyse, 13 March 2012, 0 comments. Categories: Adoption, Applications, Consumer, Security.

How cloud is rewriting IT market channels

The big C when it comes to Cloud for the Channel is Conflict. I have been presenting and visiting partners around Europe for the past several years and listening to the opinions and input from vendors, Vars, Resellers, MSP’s, ISP’s and a variety of channels by varying name definitions and one things for sure, the Cloud has certainly stimulated debate. 

Whether it be concern, nervousness, confusion or mistrust, a lot of negative feelings have been generated in the channel by the C word. And...

By Ian Moyse, 08 March 2012, 0 comments. Categories: Enterprise, Industry, SaaS , Vendors.

How scammers use your personal data against you

Ever received an email unsolicited (yes we know you get spam) to your work or personal email address? Found an account of yours compromised and that you can’t log in? Gone onto messenger and had messages from someone you don’t know popping up? So just how do they do that? how do they know who you are and how do they get your email or messenger IDs, and is there anything you can truly do about this?

I often see an email in my Hotmail inbox from someone I know that looks out of context, not...

By Ian Moyse, 02 March 2012, 0 comments. Categories: Security, Trends.

Why selecting a 'safe bet' cloud vendor is critical

The cloud delivery model gives vendors a great amount of power. It is easier to create, deploy, maintain and enhance a service than it has been at any other point in computing history. Just look at Facebook, which grew to 500 million members in a very short period of time. People readily share within it, many with a limited understanding of the potential risks to their private information.

The ability to make an enhancement and almost instantly put it into the customer’s hands is immensely powerful...

By Ian Moyse, 02 March 2012, 0 comments. Categories: Security, Vendors.