How To

Why AIM systems will now be included in cabling procurement

Automated infrastructure management systems are not new. They have been around in one shape or form since the early nineties. They also polarise opinion in the structured cabling world like possibly nothing else. The...

What’s wrong with software licensing today and how to fix it

Today’s software end users are increasingly connected and mobile. In addition, they’re looking to have software delivered to them as a service on the device of their choice, and they only want to pay for what they use...

Time to fix security inside critical infrastructure

A couple of months ago I was discussing datacentre security with a panel of IT managers from critical infrastructure providers. One representative from a major energy provider said that he had no intention of...

Building a tap based access control platform

With the move to a mobile and cloud first world, corporate data has become increasingly difficult to protect. Employee expectations have changed – they want to be able to access corporate cloud applications, data and s...

How to cope with IT sprawl, disruption, vulnerability

Car navigation systems that can predict where and when traffic jams might occur, by siphoning data from sensors in roads and other vehicles. Cameras that can spot litter in public places and call in the cleaning crew....

Why designing your data storage architecture is important

Businesses should start paying more attention to data storage as part of their data strategy. As I see it, the cooler analytical tools we use to extract insights from data, which is the new natural resource and get...

Browse our latest issue

Intelligent Tech Channels

View Magazine Archive