ENABLE & SECURE YOUR DIGITAL WORKSPACES

Request a Demo

TheRes Tech Blog

A blog for digital workspace automation & security


Blog Menu

Authors


Archives


Category: Tech for Tomorrow

Configure Windows 10 User Settings in Only a Few Clicks, with RES ONE Workspace Templates

March 10, 2016

RES ONE Workspace 2015 SR1 has a lot of great capabilities highlighted in the blog by my colleague Pete Downing. I would like to take a moment to go over another great capability, user settings templates for Windows 10. Recently RES released support for Windows 10, and now it also « Read More

The New Hacking Frontier: Medical Device Vulnerabilities

January 6, 2016

Last month I spoke about ransomware in my blog regarding patient data security. Ransomware is a particularly nasty malware variant where malicious code gets launched into a network and encrypts critical data. Then someone, somewhere requests ransom in return for the decryption key. For healthcare IT, this is an increasingly « Read More

The Future of Enterprise Technology Is Now: Is IT Ready?

December 23, 2015

Trend articles are dangerous. We can lock ourselves into a cycle of touting the next new trend, hoping for something game-changing to happen. But in reality, we find that everything stays much as it was a year later. As someone who writes “trend” articles every year, I want to raise « Read More

For the Service Desk, Self-Service and Face-to-Face Can Go Hand-in-Hand

December 22, 2015

Traditional service desk models are suffering in many organizations.  The complexity of IT environments combined with rising pressures from the workforce to be more agile often result in service desks falling short on expectations. The challenge goes beyond the service desk, though. Forrester reports that IT organizations are spending up « Read More

Who Really Owns Employee Onboarding & Offboarding? Show Me The Ownership!

December 10, 2015

All too often, the complex and critical process of onboarding and offboarding is carved up into pieces, with little real holistic ownership. If no one truly owns the process, who ensures employees have the tools they need to be productive from day one? Or that company access is revoked immediately when employees depart, protecting the company from potentially serious security risks? « Read More

Bringing the “Happy” Back to “Happy Holidays IT”

November 24, 2015

The weather is getting colder, trees are bare and gift commercials are running full steam ahead – the holidays are among us. In the next few days, wallets will flow freely thanks to all of the deals Black Friday have to offer. While this may be ‘the most wonderful time of the year’ for shoppers like me, it can be torture for my friends in IT due to increased workloads, risk and exposure. To keep them from shriveling at the thought of the holidays, there are some tools to reduce the load. This is extremely important during a time when I can name at least 5 reasons why IT could understandably channel the Grinch. I know I would feel the pressure. Here are some of the things that can turn this time of the year into a nightmare for IT, and some ways we can avoid it: « Read More

Extending the App Volumes Ecosystem with RES

November 23, 2015

In our digital economy every worker’s career journey is increasingly centered around the apps they use each day. What they do with those apps is to a great extent how today’s workers deliver value. Which means the delivery of apps at just the right time, configured for the individual needs of each worker, is a crucial element of business value. And here’s another: with security needs ramping up every year, the ability to revoke access to apps has become just as important and, in its own way, valuable to the business as the use of those apps. « Read More

Patient Data Security and the Wall of Shame: Healthcare IT to the Rescue

November 19, 2015

In 2009, the United States enacted the HITECH Act, otherwise known as the Health Information Technology for Economic and Clinical Health Act – but that’s a mouthful. Part of this act requires the US Department of Health and Human Services to maintain a running tally of breaches of unsecured protected « Read More

Driving Digital Business Through Influence, Not Control

November 17, 2015

Last week I had the honor of traveling to Barcelona for the Gartner EMEA Symposium 2015 where there were a number of impactful statements being shared by Gartner, attendees and other industry experts. The theme could not be missed – IT must shift their focus from controlling how technology is deployed « Read More

Ask Ellen Video Blog Series: 3 Ways Tech Has Damaged the Patient-Clinician Experience

November 12, 2015

The Ask Ellen video blog series takes questions that we hear from customers, partners and our social media friends like you to and gets them answered by our own healthcare and life sciences expert Ellen Derrico. You can connect with Ellen here. Today’s question came from one of our customers « Read More