Feeds

The pace of change parts 1, 2 and 3

Or, what cloud means for your company

  • alert
  • submit to reddit

Secure remote control for conventional and virtual desktops

On demand Vendors are always talking about cloud this and cloud that, as if you're all the same. Well, maybe to them, you are but wavy company in every sector has different needs for IT, and so different needs for cloud technology.

The Reg got together with UK cloud provider Star to create a Regcast - or, to be more accurate, three standalone Regcastlets - about how cloud works in three types of business: retail, media, and professional services. Star's Grant Tanner takes us through what those businesses lack, where they can use cloud effectively, and what the business and IT problems that they will need to solve will be.

Enjoy each Regcastlet as a tasty Reg-flavoured snack, or order up the full three-course blowout. At 20 minutes each you can easily fit one in during half time in a game of football, or watch one over a quiet pint in the pub while you wait for your useless mates to show up. Of course we recommend you stay in, make a night of it and do all three - but it's up to you.

In part one, Grant explains how retailers need to keep track of customers through a number of channels; how shops have computers, but not support engineers and the problems that causes; and how cloud can take care of the basics, leaving IT staff time to innovate.

In part two, we turn to media, where Star's customers need to share large files efficiently, work with different virtual teams under short deadlines, and cope with a wave of mergers and acquisitions without missing a beat.

Finally in part three, Grant talks about those clients who need to bill by the hour for high-value work. Often they're not in the same location, don't have a dedicated IT staff, and yet still have to comply with security and compliance standards. If you don't want to spend your life managing software licenses rather than client relationships, this might be for you.

Secure remote control for conventional and virtual desktops

More from The Register

next story
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
Turnbull should spare us all airline-magazine-grade cloud hype
Box-hugger is not a dirty word, Minister. Box-huggers make the cloud WORK
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
Microsoft adds video offering to Office 365. Oh NOES, you'll need Adobe Flash
Lovely presentations... but not on your Flash-hating mobe
prev story

Whitepapers

Free virtual appliance for wire data analytics
The ExtraHop Discovery Edition is a free virtual appliance will help you to discover the performance of your applications across the network, web, VDI, database, and storage tiers.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.