On-Demand Capacity
Business Continuity

Bring Your Own Device
Bring Your Own Wearables

Extreme Flexibility
Demonstrably Simple
Continual Improvements

  topic image  

Bring Your Own Device (BYOD)

Some IT people are fighting a trend towards users being able to use their own computers, smart phones and tablets as part of their normal working procedures.   It is inevitable that these IT people will loose the fight and eventually everybody will be able to use many different devices for doing their daily work.
While obsolete IT departments fight for survival with complex regulation of user devices, these web services at well able to support any kind of computer, tablet or smart phone without any specially installed software and without any regulation.   Since 2004, all our application services have been browser independent and can be used by any kind of computer with any operating system, any browser, any tablet and any smart phone without the need to install any special software.

  topic image  

Commodity Devices

In the near future, free of charge tablets may be provided to users as a 100% secure means to access our cloud based application services.   Each tablet has a built in identity chip that cannot be hacked - this avoids the need to sign in as the ownership of the tablet is authentication of the user.   If the tablet is lost or stolen, the tablet identity is removed from our servers so it cannot be used for any purpose - the tablet has no commercial value to minimise theft.
The tablet is locked down with a wired operating system that does not permit any software to be installed - it is designed for 100% secure cloud services and cannot be hacked.   Our cloud based virtual desktop provides normal email, photos, movies, TV and application services from any tablet, smart phone or computing device without the need to install or download any software.   The storage of any data on the tablet is not needed and any photo is instantly uploaded to the cloud - theft is minimised when the device cannot hold any business data.
To complete this improved way of working, the virtual desktop needs to be upgraded to support email, photos, music and TV services.

  topic image  


The major problem with all tablets and smart phones is the application store - these are installed software with many privacy and data theft capabilities.   The real business requirement is to eliminate installed software, but all tablet vendors are intent on perpetuating legacy software development with their own app-store.
The best method of working is to deploy tablets and smart phones that do NOT have access to an application download capability.   The effective apps are just links to cloud based services, so this is not a major change in strategic direction, its just a safer implementation.
  topic image  

Internet of Things (IoT)

All new cars are becoming wireless connected and then home equipment will become wireless connected.   A major new business opportunity is IoT where everything is connected, but consultants are needed to create order out of the chaos created by patents making things incompatible.

  topic image  


In many cases, the last reason that IT exists in a corporation is to install special software on all user computers so users can access in-house software systems.   As long as the IT people can resist the trend towards Cloud services and impose in-house software systems that needs to be installed and maintained on all user computers, then IT people will continue to be an overhead on the business.
IT people can use the term "security" as the reason that obsolete in-house software systems must be used and why cloud based services should not be used - this is a myth perpetuated by people who should be trying to reduce business costs.   As the old in-house server business case is replaced by more effective cloud based services, it has to be expected that the old way of working will fight back and try to delay what is inevitable.

  topic image  

Advanced Persistent Threats

With government sponsored cyber crime employing many thousands of very intelligent experts to take years to socially engineer back doors into corporate in-house servers, it is possible that not a single significant company has not been hacked and data stolen.   Governments may have spent large amounts to engineer APT methods that will eventually find one weak link into a corporation and then that device can be used to build silent data export facilities that do not impact on the business in any way.   Every company with in-house servers and many client computers have many social weak points where a data leak may/will have been installed and cannot be detected.   APT cannot be detected any anti-virus software because signatures continually evolve and where a user installed a new printer driver, they may also have installed a government sponsored data leak.
The solution to avoid APT data leaks is to totally separate local user computers from corporate data servers by moving all corporate applications to the cloud - very secure data centres with no local computers.   The cloud is inherently many times more secure than any in-house solution because cloud based servers do not have locally attached user computers that create a massive attack surface.

  topic image  


European ISP and mobile operators are obliged to record everything that you view, say and send - and provide that private information to overseas media companies.   By encrypting your desktop in the cloud, companies will have to pay to (try to) break your encrypted information for political reasons.   The UK Government have estimated this cost at 1.8 billion pounds, so expect £6 billion.
  topic image  


IT people would like to control user devices to make sure that they has adequate and up to date anti-virus software installed.   This can only be because in-house software systems are not secure enough to cope with viruses on user devices.
A better solution is to evolve to a cloud based service, where it is of no concern if the user device has adequate anti-virus or has a computer infected with all kinds of virus.   By employing many layers of security, our application services cannot be impacted by any kind of computer virus.

  topic image  


IT people have traditionally installed Office on user computers and pushed emails containing critical business information to a private inbox that is not secure.   This is a violation of basic data protection regulation that demand that all business information is encrypted and held in a physically secure location - a laptop with Office is not a safe or secure location.   To perpetuate this poor working practice, laptops disks can be encrypted at a high cost that perpetuates the need for expensive IT support.
The better (cheaper) way of working is to employ web-mail where all emails are securely held in the cloud and accessed from any user device without the need to store critical business data on the local computer.   The business is then able to comply with Data Protection regulation without the need for expensive IT support of encrypted disk computers that have a reason to be stolen.   It is said that the typical RSA encryption used can be broken by a criminal gang in about 15 minutes - encryption is a sticking plaster not a solution.

  topic image  

Installed Software

Any computing device that permits software to be downloaded will be attacked by hackers.   It is said that a significant number of games and social applications are simply personal identity data capture software.   The way to reduce business costs is to eliminate the need to install software on any computer - Office is no longer a cost effective method of working.   If software can be installed, then viruses that steal corporate data can be installed.   When software cannot be installed, then viruses that steal corporate data are no longer a risk.
Privacy Byod 24 Sep 2018 : 10:49Copyright © 2018 LeXica Ltd54.196.13.210 request 1 in 0.05 seconds