When you’re running a small business, quality control is the most critical aspect of management. Often, it’s also the fastest skill you’ll learn. The risk of alienating a profitable customer is compounded by the risk of a bad review. But happy customers essentially do your marketing for you.
For utility companies, like many other businesses that have long had legacy systems in place, their infrastructure is no longer suitable for requirements and it ever faster reaching end of life. Gone are the days when connecting machines to each other by using analogue circuits was a suitable solution, and instead utility companies, water in particular, need to find a new method of connectivity – whilst attempting to avoid the requirement to ‘rip and replace’ Scada and sensor systems.
The Unified communications market saw a lot of progress in 2016 and showed positive signs for the year ahead. However, since Christmas we have experienced engineering works, snow, fog, frost, train network and tube strikes causing delayed trains, commuter traffic, and grounded planes. All the more reason that there is no better time for Unified Communications and Collaboration.
The 2017 Thales data threat report presents the corporate view of security very well. And as any enterprise security team will tell you the report is entirely reflective of what they are having to live through.
Has the smartphone finally found its voice? After decades of dreaming of a time when home appliances and gadgets could talk to one another, the electronics industry has come up with two solutions that, when used together, could be the missing pieces of the smart home jigsaw; voice control, and the cloud.
Like most businesses, you may be worried about call quality when moving your phones lines from traditional lines such as ISDN and it is absolutely something that you should think about when planning your migration. However, this should only be one of the service criteria you need to consider when it comes to the internet connection your calls will be routing over.
The adoption and proliferation of the Internet of Things (IoT) is unstoppable. Even though we have had massive DDoS attacks orchestrated using IoT, IP enabled CCTV Devices have been compromised and marshalled into a bot army of significant breadth and size; even though the implication of poor or shared cryptography of these IoT devices is well documented and a fantastic risk to any user/owner of these devices they are still being adopted.