Mobile Device Management (MDM) is only one part of the broader Enterprise Mobility Management (EMM) jigsaw, albeit it a starting point. Now that Microsoft has joined heavyweights like CA, Dell, Good/Boxtone, Fujitsu, IBM, SAP, Symantec and VMware in offering more than MDM for enterprises organisations will need to identify which vendors offer what that enterprise... (read more)

Malicious Distributed Denial of Service (DDoS) attacks do not occur often. Nevertheless, for an enterprise trying to stay in business they are difficult to resist. The concept of a ’friendly’ DDoS attack may, therefore, seem fanciful or even impossible. But it can occur in highly specific circumstances (and not ones simulating a malicious DDoS attack).... (read more)

Computer security is a hot topic today, and much talked about. There are endless emanations of new and sparkly technologies, each of which aspires to solve security problems, though most (sadly) turn out to be: incompetent require too much of too many prescriptive to a level that is impossible to deliver. Yet, throughout all the... (read more)

Until relatively recently most in IT looked upon Graphics Processing Units (GPUs[1]) as specialty technology with dozens or hundreds of cores optimized to run complex mathematical modelling and analysis, numerically intense calculations or for driving sophisticated graphics and rendering. In effect GPUs were for where conventional processors did not have the horsepower to solve specific... (read more)