scroll

Why recruiting Linux IT support in-house may not be the best option

Finding the right Linux IT support for your systems can be a challenge. The open source and functional advantages of Linux have traditionally made this system a value-added, ‘go-to’ type solution for many small to mid-size enterprises, but larger organisations utilise Linux for its IT performance as well. However, the current tech talent shortage is changing […]

Read More

Why Connected Schools are like “Hide – And – Seek”

Connected schools are faced with a challenge: how do you balance the need to protect children from accessing unsuitable content on the one hand, while granting the freedom necessary for students to harness the potential of the internet as a learning tool? To put this another way, how should you go about hiding what shouldn’t be […]

Read More

When Cheap Becomes Expensive: 5 reasons to consult an IT service professional

What’s your definition of a professional? Think of it this way: rather than trying to offload the latest gimmick on you, a professional will act with the best interests of your business at heart. When you instruct your solicitor, accountant – or even your recruitment consultant, professionalism comes as par for the course. When you […]

Read More

What are the Dangers of Out-of-the-Box Cloud Services?

So, you’ve decided that the cloud is the best route to take your company’s IT strategy. But have you decided exactly what it is you need and which service provider is best placed to deliver? Many small business owners will undoubtedly look towards the plethora of generic ‘out-of-the-box’ solutions offering affordable, easy-to-adopt services.   And […]

Read More

The DIY IT Audit Checklist and How to Conduct It

An internal IT audit is often overlooked, misunderstood or even ignored by businesses until one of two things tend to happen. Either, they experience a negative impact from poorly provisioned or deployed IT, or they already use a responsible IT provider. If your business is working within a regulatory framework, this IT audit checklist should […]

Read More

The 4 Best ways to improve your Linux desktop security

You don’t have to search too far through the pages of Google to find historic articles, such as this one from 2010, aimed at highlighting how secure the Linux operating system is, in comparison to rival systems – in particular Windows. And while there’s a historic truth to the fact that Linux has been a […]

Read More

The Tablet Age – How to inspire the next generation of Smart Users?

When Ofcom looked at mobile device ownership among children in 2013, it found that almost 18% of 8-11 year-olds own a smartphone, with a similar proportion owning a tablet. Almost two thirds of 12-15-year-olds are smartphone owners and more than a quarter own a tablet. The current crop of under-16s have been characterised as the […]

Read More