Top 5 IT Trends
The top 5 IT trends for 2015
What IT trends should you keep an eye out for in 2015 ?
Lenovo cloud future
The Future of IT Professionals: Is Cloud Computing the End of IT?
Cloud computing is bringing sweeping changes to IT departments around the world. What does this mean for the future of IT professionals?
How cloud IT is saving lives
How Healthcare Cloud IT is Saving Lives
The NHS deals with over one million patients every 36 hours, and its net expenditure is expected to hit more than £120bn in 2016-17. To handle this growing demand, the organisation's IT operations have been forced to adapt
Microsoft Azure Stack
Microsoft Azure Stack: Migrate to the cloud without giving up control
Public cloud adoption is soaring. McAfee estimates claim Australia (33 per cent) and Canada (32 per cent) are leading the way, with Japanese (25 per cent) and French organisations (23 per cent) not far behind in using only public cloud installations. Gart

Other topics based on your interest

Innovation Articles

The 6 Stages of Disruption- Lessons from The All Too-Common Mistakes of Companies that Didn’t Spot It Coming
The 6 Stages of Disruption: Lessons from The All Too-Common Mistakes of Companies that Didn’t Spot It Coming
Disruption: New behaviours, trends and beliefs that make the old behaviours, trends and beliefs obsolete. One of the most over-used but also...
Where Next for AI In Business? An overview for C-level executives
Where Next for AI In Business? An overview for C-level executives
Artificial intelligence (AI), as it relates to business, is a term used to describe a field of technologies and practical applications that give...
Adopting a new model for personal security
Adopting a new model for personal security
In 2017, the news media reported that every single Yahoo! account had been hacked. Instead of learning about this at the time of the hack, and 3...

Transforming Productivity Articles

Move Beyond Passwords to Multi-Factor Authentication
Move Beyond Passwords to Multi-Factor Authentication
The next level in device and identity protection is multi-factor authentication (MFA). It requires two or more layers of authentication - any combination of fingerprint, facial recognition, PIN number...
Enabling a BYOD Program
Enabling a BYOD Program
While Bring Your Own Device (BYOD) may reduce upfront costs, it can also expose you to greater security risks and more complexity. Therefore, we recommend PCs should be owned and managed by IT under a...
Best Practices to Support Users Across Multiple Locations
Best Practices to Support Users Across Multiple Locations
Whether you're opening a new location or supporting remote users, it's up to IT to optimize workplace efficiency. Reliable endpoint devices and a robust remote management toolbox make it much easier.