New Policies Could Prevent Law Enforcement From Accessing Mobile Device Data

Director of the U.S. Federal Bureau of Investigation James Comey’s recent appearance on CBS News’ 60 Minutes provided a look at the conflict brewing between the FBI and mobile device manufacturers. Comey explains that data on Apple’s iPhone and, in the future, devices running Android can contain data that is inaccessible by law enforcement.

  • Wi-Fi Alliance Adds New Wi-Fi CERTIFIED Passpoint Features
    Wi-Fi Alliance Adds New Wi-Fi CERTIFIED Passpoint Features

    The Wi-Fi Alliance has expanded its Wi-Fi CERTIFIED Passpoint program and states new program features “expand the program’s strategic value to mobile and fixed operators, and open opportunities for other sectors as they invest in Wi-Fi to meet business challenges.”

  • The BYOD Disconnect: Complying With Mobile Device Security At Work
    The BYOD Disconnect: Complying With Mobile Device Security At Work

    Businesses are increasingly implementing bring-your-own-device (BYOD) policies at work. These programs encourage employees to use their own smartphones and tablets within the office to help spur productivity — just how secure are these devices?

More Featured Content

CURRENT ISSUE

  • Serving Up Success With Cloud POS

    Providing multiple layers of services has helped this VAR succeed without relying on support contracts.

  • Sell Cloud BDR You Can Count On

    An MSP’s cloud BDR (backup and disaster recovery) is put to a true test within a week of implementation and saves a lumber company customer from total data loss.

More From The Current Issue

PREMIUM CONTENT

5 Tips To Maximize Your Managed Services Marketing Potential

Some of the best leads you’ll ever get come from referrals. When someone introduces you to a new prospect, and talks up how good your company is and the expertise you have — it’s priceless. And, it usually means a much shorter sales cycle compared to leads generated from marketing outreach campaigns.

Unified Communication: Technology For Now And The Future

Unified communications can be defined as a set of capabilities used to integrate real-time communication services. They enable a person to send a message on one medium and the recipient to receive it on another. Wikipedia defines Unified Communications (UC) as the integration of real-time communication services such as instant messaging (chat), presence information, telephony (including IP telephony), video conferencing, call control, and speech recognition with non-real-time communication services such as unified messaging (integrated voicemail, email, SMS and fax).

How Open Architecture Access Control Impacts The Channel

Network video has drastically changed the video surveillance market over the last few years and now many believe that we are on the verge of a similar breakthrough with IP access control, which could happen much faster than video, due to the IT acceptance of devices residing on their infrastructure.

Pitfalls To Avoid With Cloud Migration

There are a lot of things to consider while migrating data from one cloud service to another. Some important key points to keep in mind are cloud security, storage cost, back-end recovery options, vendor reliability, data transfer speed, and SLA (service level agreement) terms. Being knowledgeable in all of these areas can help you prepare for a smooth transition and will ensure data stays in a safe and secure.

After Chip And PIN Is Deployed, What Will The Next Security Challenge Be?

Two women caught on surveillance cameras are questioned for alleged receipt fraud. Sources say the women entered the store together, one left with the purchased goods and an original receipt while the other approached a staff member stating she had not received a receipt for her transaction. The duplicate receipt was printed and the women used both receipts to claim a refund. 

Manufacturers Look Deeper Into Their Sales Channels To Improve Quality And Market Responsiveness

Your IT clients in manufacturing are increasingly relying on technology to operate more efficiently, to enhance product quality — and to compete. In this article, Bernard Leikind, PhD, explains how manufacturers can also benefit by leveraging market intelligence collected through IT and data management solutions along the supply chain.

Best Practices To Choose PACS VNA Or Storage VNA For Healthcare

Healthcare organizations are often encouraged to acquire and implement a vendor neutral archive (VNA) as an enterprise medical imaging data repository. The idea is simple — migrate DICOM (digital imaging and communications in medicine) images archived in departmental picture archiving and communications system (PACS) applications into a centralized PACS VNA.

Make Sure Your Decision To Rebrand Is For The Right Reasons

Branding refers to the identity of a company or a product in its desired market. Branding is more than a logo or a product on its own. It is a promise of quality and reputation. It encompasses everything about a company, sometimes good and sometimes bad, depending on the public’s perception.

More Premium Content

SPECIAL REPORTS

Partner Program
Insider

POS & Payment Processing Guide

Best Channel
Vendors 2014

Partner Program Insider 2014 BSM Annual POS Guide 2014 Best Channel Vendor 2014 Home
Vendors share how their partner
programs can help VARs, MSPs,
and ISVs grow their businesses.
What you’ll find in this guide is an assortment of advice from leaders in the industry to help motivate you and, hopefully, stimulate action. Thousands of VARs, MSPs, and ISVs rate their vendor partners on 7 key criteria. Which vendors rated the best?
 

A VAR & MSP's Guide To Health IT Trends

A VAR & ISV's Guide To EMV

Business Solutions Executive Insight 2013

A VAR & MSP's Guide To Health IT Trends EMV for VARs Channel Executive Insights
See how you can expand your business by taking advantage of the rapidly changing healthcare IT industry. If you feel like EMV is currently a point of frustration with the distant hope of turning into something lucrative, you’re not alone. Channel leaders discuss trends you can take advantage of to help grow your business.

FEATURED SUPPLIERS

  • Axis Communications
    Axis Communications

    Axis is an IT company offering network video solutions for professional installations. The company is the global market leader in network video, driving the ongoing shift from analog to digital video surveillance. Axis products and solutions focus on security surveillance and remote monitoring, and are based on innovative, open technology platforms.

  • Mercury Payment Systems
    Mercury Payment Systems

    Mercury® provides integrated payment processing solutions that help businesses prosper. Known for secure and reliable processing, Mercury’s solutions are built into the POS, helping merchants reduce errors in data entry, manage cash flow, and minimize risk.

  • Creditcall Corporation
    Creditcall Corporation

    Creditcall makes card acceptance simple from any device, anywhere. Whether attended, unattended, online or mobile payments, our award-winning EMV-ready payment gateway and EMV Migration solutions are at the very heart of our clients’ businesses, ensuring payments flow – all day, every day.

  • Dell Software Inc.
    Dell Software Inc.

    Dell provides end-to-end solutions leveraging our combined breadth and depth of software and system competencies. We enable partners to differentiate their offerings and drive recurring revenue generating IT as a Service (ITaaS). These offerings will accelerate customer onboarding, ensure cost-effective scalability and heterogeneous manageability across a broad range of ITaaS workloads for Enterprise and SMB customers.

  • Harbortouch
    Harbortouch

    Harbortouch is a leading national provider of touch-screen point of sale (POS) systems and payment processing services. As pioneers of the “as a service” model, Harbortouch offers an unprecedented “free” POS program that allows the company’s sales partners to offer a full-featured POS system with no up-front costs.

  • Accu-Time Systems, Inc.
    Accu-Time Systems, Inc.

    Founded in 1991, Accu-Time Systems (ATS) has been a trusted global leader in workforce management, offering state-of-the-art solutions for time and attendance, payroll, and security access. For more than 20 years, Accu-Time Systems has been a global supplier for workforce productivity, planning, human resource data collection, and labor management.

Newsletter Signup
Newsletter Signup
Get the latest channel trends, news, and insights
By clicking Sign Me Up, you agree to our Terms and that you have read our Privacy Policy.

FEATURED PRODUCTS

  • Dell SonicWALL TZ Series
    Dell SonicWALL TZ Series

    The Dell ™ SonicWALL ™ TZ Series is the most secure Unified Threat Management (UTM) firewall for small businesses, retail deployments, remote sites, branch offices and distributed enterprises. Unlike consumer-grade products, the TZ Series delivers the most effective anti-malware, intrusion prevention, content/URL filtering and application control capabilities along with the broadest most secure mobile platform support for laptops, smartphones and tablets. It provides full deep packet inspection (DPI) at very high performance levels, eliminating the network bottleneck that other products introduce, and enabling organizations to realize increased productivity gains. The TZ Series is the most secure, sophisticated and widely-deployed security platform on the market today.

  • HP ProOne 400 G1 All-in-One Business PC
    HP ProOne 400 G1 All-in-One Business PC

    Meet your business needs with style, performance, and security.

  • Honeywell Voyager 1400g Linear/Area-Imaging Scanner
    Honeywell Voyager 1400g Linear/Area-Imaging Scanner

    Honeywell's Voyager® 1400g is the ultimate 2D barcode scanner. This linear imager is capable of reading even poor quality and 2D barcodes.

  • IT As A Service
    IT As A Service

    The new Dell PartnerDirect Services Provider program offers access to heterogeneous management solutions that go both deep and wide. The Program addresses your customers’ IT service delivery quality, compliance, security, availability, and performance expectations – all from a single vendor – through subscription-based licensing, billing in arrears, as well as management and technical resources.

More Featured Products

ABOUT BUSINESS SOLUTIONS

Welcome to BSMinfo, the online presence of Business Solutions magazine. If you are a value-added reseller (VAR), systems integrator, managed services provider (MSP), or independent software vendor (ISV), this is the site for you! Whether here online or in each month's issue of the magazine, we strive to deliver actionable information you can use to add complementary technologies to your portfolio and penetrate thriving vertical markets.

Technologies and topics typically covered include data collection/supply chain, point of sale (POS), payment processing, video surveillance and access control, voice over IP (VoIP), networking, storage, managed services, network security, the cloud, mobile computing, and enterprise content management (ECM). From a market perspective, our articles focus on government, retail, hospitality, healthcare, manufacturing, transportation and logistics, education, legal, banking, and anywhere else solutions providers can find new revenue streams.

Please take a moment to join our online community and discover the benefits (access premium content, free newsletters, product sourcing, etc.) of your FREE membership.

Also, check us out on Google+.

 

BSM is the recipient of the RSPA 2014 Gold Medallion Award.

BSM Wins RSPA Gold Medallion