Feeds

What happens when users are left to their own devices?

The changing shape of practices

  • alert
  • submit to reddit

Beginner's guide to SSL certificates

Broadcast It's clear that there are fundamental changes happening in the way people, and businesses, want to work. The relentless pace of technology developments has given us ever better and more connected notebooks, and now smartphones and tablets. This means we can work wherever and whenever it suits.

That's all well and good, but just because the devices and technology allow us to work more flexibly doesn't just magically make it effective. Allowing users with technology to develop with a free reign is just as likely to end in chaos and confusion rather than order, productivity and effectiveness.

It's been difficult enough to galvanise people and organise them into teams with them working closely together. Having them far apart brings a whole set of management and psychological issues to the table. Too often companies don't recognise the importance of the human factors and expect the IT department to be able to sort out what is a business problem with IT systems and budgets. What is it that companies need to do to turn the mess into success?

Fortunately, on November 24th at 11:00 GMT we have a live broadcast that aims to piece together useful solutions to this pressing subject. El Reg broadcast editor Tim Phillips asks Tim Stone from Cisco and Andrew Buss from Freeform Dynamics to show us their blueprints.

We would love you to share your experiences in this area via our on-going live Q&A window. Together we are sure to come up with a practical evaluation on how to achieve the flexibility that’s needed in your business’ IT department.

Sound interesting? Good, you can join us for this free event right here.

Top 5 reasons to deploy VMware with Tegile

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
The Heartbleed Bug: how to protect your business with Symantec
What happens when the next Heartbleed (or worse) comes along, and what can you do to weather another chapter in an all-too-familiar string of debilitating attacks?