Esther Rutter
As a former Marketing Manager in the IT sector, Esther is an experienced writer with an interest and insight in cloud computing, shadow IT and our ever-changing relationship with technology.
Stay connected:
Featured Stories:
cybersecurity
Strategy and anticipation are key to securing against cyber threats
With technological progress comes increased security risks. Sophisticated and co-ordinated cyber groups are working every day to find potential entry points into organisations’ networks.
Business
Raising talent attraction and retention with IT investment
To be at the centre of talent attraction and retention, businesses should make use of workplace technology that enables them to integrate collaborative, secure and sustainable measures into their operations.
Cloud Computing
How NIST started the countdown on the long journey to quantum safety
Leading the charge to develop a post-quantum cryptographic standard for organisations is the US government’s National Institute of Standards and Technology (NIST).
Cloud
Overcoming economic uncertainty with cloud flexibility
Particularly for companies that jumped into the cloud headfirst, taking the time to optimise existing processes is a remarkable way to reduce infrastructure costs and free up OPEX for delivering business value.
News
Reduction is as important as renewables
As the demand for storage and capacity increases data centre energy consumption, Esther looks at Kingston Technology's new DDR SDRAM, DDR4.
Security
Safer than our selfies?
Apple chases the cloud's silver linings with Apple Pay - Esther Rutter takes a closer look.
Comms
Productivity Wars
The battle for supremacy in the document-sharing/ office productivity space opened up another front in the war.
Storage
The battle for your online data
In the race to provide online storage in cloud where does all this free storage lead?
Security
Is BYOD an Opportunity or Threat?
Esther Rutter looks at the challenges afoot for BYOD policies and asks whether Cloud Service Providers are best placed to provide solutions. Sometimes, it seems like every man and his dog is talking about the relentless march towards mobile and BYOD...
Cloud
Carrot, stick or lockdown? How to approach BYOD
To tap the productivity benefits of BYOD businesses need to consider how to reconcile IT and access. Esther Rutter looks at the options. Here at Compare the Cloud, we've already taken a look at the factors to consider before implementing a BYOD scheme: cost, productivity, employee morale, acceptable use, security, and availability...
Subscribe
Popular articles
cybersecurity
Strategy and anticipation are key to securing against cyber threats
With technological progress comes increased security risks. Sophisticated and co-ordinated cyber groups are working every day to find potential entry points into organisations’ networks.
Business
Raising talent attraction and retention with IT investment
To be at the centre of talent attraction and retention, businesses should make use of workplace technology that enables them to integrate collaborative, secure and sustainable measures into their operations.
Cloud Computing
How NIST started the countdown on the long journey to quantum safety
Leading the charge to develop a post-quantum cryptographic standard for organisations is the US government’s National Institute of Standards and Technology (NIST).
Cloud
Overcoming economic uncertainty with cloud flexibility
Particularly for companies that jumped into the cloud headfirst, taking the time to optimise existing processes is a remarkable way to reduce infrastructure costs and free up OPEX for delivering business value.
Business
“The need for speed” – Finding a way to unlock agility for today’s businesses
To fully support agility, the solutions chosen will need to enshrine all the latest innovations in areas like artificial intelligence, machine learning or prescriptive analytics.