Our Blog

Featured Article

Motor Neurone Disease Association Charity Sailing Event

Stephen Hawking once said: "My advice to other disabled people would be, concentrate on things your disability doesn't prevent you doing well, and don't regret the things it interferes with. Don't be
Learn More

Featured Article

Citrix Cloud Access Layer

When we look at a Cloud deployment – in this instance Citrix Cloud, there are many ways of hosting the access layer components. But how can you make an informed choice about where to deploy your
Learn More

Featured Article

Our Work For Beazley Wins Citrix Approval

Our work with customer Beazley, the UK’s A-rated specialist insurer, has been nominated for a Citrix Global Customer Innovation Award. Beazley is one of only three companies in the world to be put
Learn More

Featured Article

Citrix & Microsoft: Enabling user-centric security

The Citrix Software Defined Perimeter model means treating the user to the centre of your security world: The user is the new edge of your environment. 
Learn More

Featured Article

Citrix XenApp 6.5 is going EOL - seize the opportunity

The time has come to say goodbye as XenApp 6.5 goes EOL soon. But fortunately, 30th June 2018 marks the start of a new chapter. It may initially seem daunting - and there certainly are some
Learn More

Featured Article

The Express Bus to the Future with NVMe?

There have been some rumblings in the tech jungle about NVMe; people are saying that it is the future of flash. With every vendor saying they are doing something with the tech, what is it and does it
Learn More

Featured Article

Citrix Secure Digital Perimeter: Securing the modern workspace

One of the new concepts announced at Citrix Summit 2017 was Secure Digital Perimeter. Technology has caught up and rather than being an aspirational concept, it is something that companies could and
Learn More

Featured Article

Cyber Threats: National Cyber Security Centre Issues Guidance

Following the news and warnings of a Russian cyber threat, the National Cyber Security Centre (NCSC) has issued guidance for all organisations to ensure technical security controls have been
Learn More

Featured Article

Essential Microsoft tools to improve professional productivity in your organisation

If you’re looking to use technology to increase productivity in your business, the place to start is mobility.
Learn More

Charity

Motor Neurone Disease Association Charity Sailing Event

Stephen Hawking once said: "My advice to other disabled people would be, concentrate on things your disability doesn't prevent you doing well, and don't regret the things it interferes with. Don't be ...

Citrix, Cloud

Citrix Cloud Access Layer

When we look at a Cloud deployment – in this instance Citrix Cloud, there are many ways of hosting the access layer components. But how can you make an informed choice about where to deploy your ...

Citrix, Security, Cloud, Transformation, Innovation

Our Work For Beazley Wins Citrix Approval

Our work with customer Beazley, the UK’s A-rated specialist insurer, has been nominated for a Citrix Global Customer Innovation Award. Beazley is one of only three companies in the world to be put ...

Citrix, Security, Cloud

Citrix & Microsoft: Enabling user-centric security

The Citrix Software Defined Perimeter model means treating the user to the centre of your security world: The user is the new edge of your environment. 

Citrix, XenApp, Cloud

Citrix XenApp 6.5 is going EOL - seize the opportunity

The time has come to say goodbye as XenApp 6.5 goes EOL soon. But fortunately, 30th June 2018 marks the start of a new chapter. It may initially seem daunting - and there certainly are some ...

Storage

The Express Bus to the Future with NVMe?

There have been some rumblings in the tech jungle about NVMe; people are saying that it is the future of flash. With every vendor saying they are doing something with the tech, what is it and does it ...

Citrix, Cloud

Citrix Secure Digital Perimeter: Securing the modern workspace

One of the new concepts announced at Citrix Summit 2017 was Secure Digital Perimeter. Technology has caught up and rather than being an aspirational concept, it is something that companies could and ...

GDPR, Cyber Security, Cyber Attack, Security

Cyber Threats: National Cyber Security Centre Issues Guidance

Following the news and warnings of a Russian cyber threat, the National Cyber Security Centre (NCSC) has issued guidance for all organisations to ensure technical security controls have been ...

Microsoft, End User Computing

Essential Microsoft tools to improve professional productivity in your organisation

If you’re looking to use technology to increase productivity in your business, the place to start is mobility.
1 ...
2 3 4 5 6