Gr€€ner For You & Your Environment

Archive for the ‘blog’ Category

Emerging Technology: The Future of the Phablet

The first time I saw a ‘Phablet’ (a genetic mutation of the PHone and the tABLET), I thought: “Wow, that’s…useless.” Come to think of it, I thought something remarkably similar when Steve Jobs showed off the first iPad… So I […]

Read more

Wearable Devices: Now, Anyone Can Be James Bond…

“The name’s Bond. …” Well, you know the rest—explosions, fast women, faster cars, one-liners, and gadgets…lots of gadgets… One of the reasons for the enduring popularity of James Bond movies are the super-cool gadgets, a set-piece since Ian Fleming’s Bond-novels […]

Read more

IT Project Management: Key Steps to a Successful IT Project

Whether your enterprise is large or small, or even if you are self-employed, ensuring your IT project will be successful can be difficult, and depends on your IT project management strategy. Here are some steps that can be taken to […]

Read more

Emerging Technology: Dictating The Internet

Cloud Computing

Talking is just so much faster than typing and reading e-mails, and especially so when working in the same office. But what if your conversational partner is in a distant time zone? Or worse: you obtain information verbally, and then […]

Read more

IT Outsourcing: ‘Rightsourcing’—In-House or Out?

business computing

Besides cost-cutting, one of the main goals of outsourcing (especially IT) business functions has been to redeploy resources to focus on your firms core competencies, this is often referred to IT outsourcing. However, many companies have found that outsourcing anything […]

Read more

The Semantic Web—Technology Getting to Know You

The semantic web looks set to be the Next Big Thing in IT, depending on who you ask. It involves Big Data personalising your web experience to give us not what we search for, but what we really want. Here’s […]

Read more

IT Strategy: Everybody wins: humanising your IT vision

With intra-business IT starting to mirror the personal IT revolution, the demands placed on Chief Information Officers (CIOs) look set to change, from enabling business activities and deploying devices to driving the business in adding more to the bottom line […]

Read more

Computer Security: ‘Honeywords’: Creating a Fake Password Honeypot

Hacked accounts and stolen passwords are a nuisance to consumers—and they can be extremely costly if not detected early on as part of a computer security policy. For companies, if their database (with all their passwords) gets hacked, it may […]

Read more

Computer Repairs Meath: Business? Isn’t there an app for that?

Slow PC

In Ireland, many people seem to have a soft-focus picture of the working life of that peculiar species known as “IT people”: tapping happily away at their laptops, drinking fair trade lattes while enjoying the view from their window over […]

Read more

Apple Woos Business With iOS 7 Security

Apple revamped their operating system earlier this year, launching iOS 7—which Apple CEO Tim Cook referred to as “the biggest change to iOS since the introduction of the iPhone.” Apple have stated that their goal is to attract more business […]

Read more
Page 1 of 3123

Contact:


Website: http://www.greencloudcomputers.com
E-mail: info@greencloudcomputers.com