
How a disaster recovery plan could save retailers
Over the past decade no other industry has been disrupted by technology quite as much as retail; so much so, consumers now consider retailers without up-to-date technology to be untrustworthy....
Over the past decade no other industry has been disrupted by technology quite as much as retail; so much so, consumers now consider retailers without up-to-date technology to be untrustworthy....
2017 will be the adoption tipping point for Bring Your Own Device (BYOD) policies according to a recent Gartner report. In just three years from now we’ll see more employees accessing corporate...
According to market analyst company, The 451 Group, the market for virtualised desktop environments (VDI) is estimated to reach $5.6billion by next year. With the ability to provide high performance...
Twenty years ago many organisations were looking at the Microsoft and Citrix combination to help them engineer a server back-end that could simplify and streamline sysadmin, extend the life of ageing...
Unified Communications (UC) solutions are moving into the cloud, at pace, and this year, with particular focus on collaboration as a UC adjunct, will function as the tipping point for this migration....
Combining LDRS, STPS and the Nhs Five Year Forward View As the NHS continues its program of digital transformation, technology strategies also have to change and mould in order to adhere to the...
Welcome to Redcentric’s guide to server room air conditioning and cooling in a data centre. Even if you’ve never looked into cooling options before, by the end of this guide, you’ll...
In this article we’re going to be talking about the different data centre tier levels, what they cover and whether they’re still relevant. The data centre tier levels were first started by...
As global use of the internet rises sharply each year, data centres might be the only way to keep this enormous industry energy efficient. Why is internet use such an impact on energy consumption?...
Firewalls are an essential part of a company’s cyber security, but there are different types of firewall available and you need to deploy the correct firewall for your company to ensure you are...
What is the cloud? Think of your own personal computer (PC) and all the data (documents, images, videos, applications etc.) that is stored on it, as well as the programs (email, games, word processor)...
DDoS (Distributed Denial of Service) is an effective and dangerous form of cyber attack that requires specific protections in place to defend your IT. How does a DDoS attack work? DDoS attacks flood...