Tags


Latest Posts


Latest Comments


Authors

Blog

Database as a Service : Delivering a first class solution

Posted by Stefan Haase | 26 Jan 2015, 11:33 AM

stefan-haase.jpg

In the follow-up to his blog looking at Oracle's philosophy and how Redcentric mirrors it to provide our own first rate Database-as-a-Service solution, Stefan Haase now looks at the differentiators that sets Redcentric apart from the competition and is resulting in serious interest from Government departments and the wider public sector.

read more

From virtual to reality: what you need to know about persistent and non persistent virtual desktops

Posted by Stefan Haase | 20 Jan 2015, 12:04 PM

stefan-haase.jpg

With the use of virtualised desktop environments (VDI) growing year on year, Stefan Haase looks at why they are an attractive proposition for IT departments, what the differences between the two approaches to virtual desktop environments are and, most importantly, how you can decide which is the best option for your organisation.

read more

Database as a Service : Learning from Oracle's philosophy

Posted by Stefan Haase | 14 Jan 2015, 14:41 PM

stefan-haase.jpg

In the first of a series of blogs, Redcentric's Stefan Haase looks at Oracle's journey to becoming IT giants and their current ongoing success of their engineered systems approach by delivering an optimised, maximum performance system. Stefan looks at Oracle's philosophy and how Redcentric has done the same for their own DBaaS solution.

read more

'Not-spots': A thing of the past, thanks to national roaming?

Posted by Richard Allgate | 7 Jan 2015, 14:25 PM

richard-allgate.jpg

With the government recently announcing plans to take a long overdue look at the problem of mobile 'not-spots', Redcentric's mobile specialist, Richard Allgate, explores some of the numerous options that are available to mobile network operators, including networking roaming and mast sharing.

read more

My Redcentric Symposium experience

Posted by Graham Francis | 5 Jan 2015, 14:02 PM

graham-francis.jpg

When Graham Francis, Director of I.T. Services, M.I.S. and Examinations at Havering Sixth Form College, attended the Redcentric symposium in November he decided to let us know his experiences and thoughts on the day after attending sessions such as Internet of Things and Hybrid Cloud & Disaster Recovery as a Service.

read more

'If you can't beat them, join them': What does Blackberry's partnership with Samsung mean for businesses?

Posted by Richard Allgate | 29 Dec 2014, 10:01 AM

richard-allgate.jpg

Following the recent announcement of a strategic partnership tie up between BlackBerry and Samsung, Redcentric's mobile specialist Richard Allgate looks at what this means for both businesses as well as how the deal will help address some of the mobile challenges currently being faced by businesses.

read more

What will be big in 2015

Posted by Simon Michie | 23 Dec 2014, 11:26 AM

homepage-update.jpg

As the New Year approaches Simon Michie, CTO of Redcentric, looks at his predictions for the enterprise IT industry during 2015. He reflects briefly on some of the technology that saw an increased uptake during 2014 that he feels may also have a pivotal role during 2015 as well.

read more

For now and into the future: what our customers learnt at the Redcentric Symposium

Posted by Simon Michie | 19 Dec 2014, 12:34 PM

homepage-update.jpg

Following the huge success of the recent Redcentric Symposium event held in London, Simon Michie reflects on some of the key sessions held by our technology partners throughout the day. With topics ranging from the Internet of Things to Data Security, Simon looks at what the future holds for Redcentric's customers.

read more

How Apple will change the way enterprises manage their mobile fleets

Posted by Richard Allgate | 17 Dec 2014, 10:00 AM

richard-allgate.jpg

At Apple’s recent launch of the iPad Air 2 a new design element has caught many people’s eyes as being able to change the way enterprises manage their mobile fleets, the soft SIM. Richard Allgate looks at how Apple’s soft SIM increases flexibility for contracts allowing them to leverage the best deals and cheapest minutes from different carriers.

read more

Are you information assured? What you need to know about the new EU Data Protection Regulation

Posted by Mark Hall | 5 Dec 2014, 17:13 PM

mark-hall.jpg

Following the recently introduced reforms to the EU Data Protection Regulation, Mark Hall looks at what they mean to your data, how the changes will affect both large and small companies and the penalties you could face for non-compliance.

read more

The rise of DRaaS

Posted by Stefan Haase | 1 Dec 2014, 16:24 PM

stefan-haase.jpg

In this blog, Stefan Haase explains how Disaster Recovery as a Service (DRaaS) can help customers avoid the headache of getting their business back up and running in the event of a data loss. He explains how tailored Cloud services can protect against the whole stack to provide a 'pay as you go' DR service.

read more

How SMEs can unlock the public sector’s collaborative future

Posted by Mark Hall | 19 Nov 2014, 09:22 AM

mark-hall.jpg

There is so much more potential for IT as an enabler in the Public Sector. However, even if the government is ready to move away from its traditional ‘silo’ mindset, the IT infrastructure isn’t. The advent of G-Cloud and the government's Cloud first strategy has allowed SMEs to compete for public sector contracts. This has not only driven competition, which can only be good for the government, but the resulting move to Cloud services offers the benefits of improved agility and the flexibility to share data and collaborate more effectively.

read more

How to Implement a Strong Password Policy

Posted by Stuart Brown | 18 Nov 2014, 15:52 PM

stuart-brown.jpg

Stuart Brown looks at why computer security is important for your business and how to staff password policies. Stuart gives a broad outline of the factors that business owners need to consider when securing their business data.

read more

A Guide to Creating the Perfect Password

Posted by Stuart Brown | 13 Nov 2014, 12:41 PM

stuart-brown.jpg

How do you educate your employees to ensure that account details aren’t hacked due to simpler/more commonly used passwords? Stuart Brown looks at Redcentric’s recently launched security e-books which takes you through the basics of computer security.

read more

The trouble with telephony...

Posted by Paul Storey | 10 Nov 2014, 10:53 AM

paul-storey.jpg

At a time when businesses are looking to streamline their IT costs, Redcentric's Paul Storey suggest that it might also be time for those same businesses to look at their telephony costs and see how the 'Cloud' can also help to not only reduce costs but provide a better quality of service.

read more

Business Impact Levels

Posted by Mark Hall | 4 Nov 2014, 11:02 AM

mark-hall.jpg

Mark Hall discusses BIL (Business Impact Levels) security controls, looking at what the levels mean, the type of data classified at each level, and the difficulties faced with the BIL data classification model. As the government moves away from the current BIL system to a new three tiered model for data labeling, Mark discusses how this simplifies data classification and allows SME providers the opportunity to compete for these government contracts.

read more

Stairway to SQL Server High Availability (HA) solutions – level 1: Overview of all SQL Server’s HA offerings

Posted by Louis Ozougwu – MCITP - OCP - Oracle RAC | 27 Oct 2014, 18:12 PM

louis-ozougwu.jpg

This is the first in a series of blogs by Louis Ozougwu, Senior Database Consultant at Redcentric. Louis looks to unmask the various SQL Server High Availability solutions. This first blog in the series presents an overview of the SQL Server High Availability solutions currently on offer.

read more

Blurred lines – who owns the data on your mobile phone?

Posted by Richard Allgate | 20 Oct 2014, 15:37 PM

richard-allgate.jpg

Redcentric’s mobile specialist, Richard Allgate, looks at the ownership of data on a mobile device in a BYOD scenario and an example on how personal data on a mobile device could be wiped in a MDM situation. Richard looks at how to plan for such scenarios within a corporate BYOD policy and solutions to ensure that business and personal data are ring fenced.

read more

Managing Malware - part 2

Posted by Stuart Brown | 15 Oct 2014, 16:40 PM

stuart-brown.jpg

As the Advance Persistent Threat (APT) landscape continues to evolve, even small companies are now at risk. In the second of his two blogs, Redcentric’s Director of Consulting Stuart Brown looks at the steps SMEs can take to improve their security.

read more

Managing malware – part 1

Posted by Stuart Brown | 8 Oct 2014, 15:52 PM

stuart-brown.jpg

As the Advance Persistent Threat (APT) landscape continues to evolve, even small companies are now at risk. In a series of two blogs, Redcentric’s Principal Solutions Architect Stuart Brown examines why traditional approaches to network security aren’t working and offers advice on what can be done to reduce the threat to your business.

read more