Poor Servants of the Mother of God (PSMG) is a charitable organisation working out of a number of locations throughout the UK. We initially approached IT Corporation, who were highly recommended to us by a trusted associate, as we needed help embracing a better way to use IT to help make our work more efficient and to enable better collaboration throughout the charity.
Testimonial
Blog
Why has the migration phase between Windows 10 and 11 been so… stagnant?
As Windows 10 takes its final bow and Microsoft confirms support for the operating system will end next year, we look at the challenges facing businesses that are yet to migrate to its successor, Windows 11.
Read more >Does WiFi 7 signal a new era of businesses connectivity?
A new generation of super-fast WiFi is on the horizon, and businesses are keen to see what it has to offer. WiFi 7 promises incredible speeds and low latency amongst other benefits, but what else can we expect?
Read more >The cloud is greener on the other side: How to be more sustainable in your IT practices
Gartner predicts that a quarter of CIOs will see their personal compensation linked to sustainable technology impact by 2027. As concern rises regarding the energy use and environmental impact of technology, it’s increasingly critical for organisations to ensure IT becomes more efficient, circular, and sustainable. Cloud plays an ever more central role in IT strategy, and which public clouds you choose to work with and how you continue to run and manage your private cloud has a big say in your green credentials.
Read more >How NaaS is shaping the future of network operations
The traditional ‘buy, build, operate’ (BBO) approach for enterprise networks once promised agility and flexibility. However, it poses increasing challenges in the modern cloud-first, distributed world.
Read more >Empower your users, wherever they are, with HP Anyware
With remote and hybrid work continuing to be the order of the day for many organisations, virtual desktop solutions have gone from “nice to have” to an essential part of many businesses’ IT environments.
Read more >Day-to-DAI life part II: The rise of enterprise AI
We’ve previously written about the use of AI in the workplace and what is driving the increased adoption of solutions like Microsoft Copilot across organisations today. More and more businesses want to leverage the creative and operational advantages of generative AI platforms for their users. As such, the field of business-focused AI is an area of fast-paced innovation, with existing solutions being updated, and new ones being announced. With that in mind, what are these new AI offerings, how do they differ, and what do they mean for businesses?
Read more >Life after Windows 10: are your devices ready for what’s next?
Support for Windows 10 is ending on 14 October 2025. The current release (22H2), which became available in October 2022 is the final one – there will be no more features, no more updates, and of course, no more security patches.
Read more >Help new devices take flight with Windows Autopilot
For a long-time, the configuration and deployment of new devices has been a source of frustration for IT teams. Typically a manual process, blank devices are unboxed and individually configured with a pre-defined image. This requires a significant investment of both time and resource, especially when you consider the different profiles required for the various user types within a single organisation.
Read more >Day-to-DAI life: AI adoption in business
AI adoption in businesses took its time, but there’s been a major shift over the last couple of years thanks to the democratisation of the technology behind it. Where AI used to sound like something far-off that happened in labs, it now touches nearly every aspect of our daily lives.
Read more >Malvertising – What is it, and how can you protect yourself?
Cybercriminals are always trying to innovate – looking for new ways to compromise user devices and extract valuable business data in the hope of achieving a pay-out. One of their favourite methods for doing so is social engineering, where bad actors look to exploit and mislead legitimate users into providing them with access.
Read more >