Network Cable Management refers to the way cables are organized and structured in a technical system. Cable management is an essential step in many sectors, including IT, telecommunications, power distribution, LANs, etc. Cable management aims at preventing cable clutter caused
Read more →Archive for the blog Category
The first time I saw a ‘Phablet’ (a genetic mutation of the PHone and the tABLET), I thought: “Wow, that’s…useless.” Come to think of it, I thought something remarkably similar when Steve Jobs showed off the first iPad… So I
Read more →“The name’s Bond. …” Well, you know the rest—explosions, fast women, faster cars, one-liners, and gadgets…lots of gadgets… One of the reasons for the enduring popularity of James Bond movies are the super-cool gadgets, a set-piece since Ian Fleming’s Bond-novels
Read more →Whether your enterprise is large or small, or even if you are self-employed, ensuring your IT project will be successful can be difficult, and depends on your IT project management strategy. Here are some steps that can be taken to
Read more →Talking is just so much faster than typing and reading e-mails, and especially so when working in the same office. But what if your conversational partner is in a distant time zone? Or worse: you obtain information verbally, and then
Read more →Besides cost-cutting, one of the main goals of outsourcing (especially IT) business functions has been to redeploy resources to focus on your firms core competencies, this is often referred to IT outsourcing. However, many companies have found that outsourcing anything
Read more →The semantic web looks set to be the Next Big Thing in IT, depending on who you ask. It involves Big Data personalising your web experience to give us not what we search for, but what we really want. Here’s
Read more →With intra-business IT starting to mirror the personal IT revolution, the demands placed on Chief Information Officers (CIOs) look set to change, from enabling business activities and deploying devices to driving the business in adding more to the bottom line
Read more →Hacked accounts and stolen passwords are a nuisance to consumers—and they can be extremely costly if not detected early on as part of a computer security policy. For companies, if their database (with all their passwords) gets hacked, it may
Read more →In Ireland, many people seem to have a soft-focus picture of the working life of that peculiar species known as “IT people”: tapping happily away at their laptops, drinking fair trade lattes while enjoying the view from their window over
Read more →