New Policies Could Prevent Law Enforcement From Accessing Mobile Device Data

Director of the U.S. Federal Bureau of Investigation James Comey’s recent appearance on CBS News’ 60 Minutes provided a look at the conflict brewing between the FBI and mobile device manufacturers. Comey explains that data on Apple’s iPhone and, in the future, devices running Android can contain data that is inaccessible by law enforcement.

  • Wi-Fi Alliance Adds New Wi-Fi CERTIFIED Passpoint Features
    Wi-Fi Alliance Adds New Wi-Fi CERTIFIED Passpoint Features

    The Wi-Fi Alliance has expanded its Wi-Fi CERTIFIED Passpoint program and states new program features “expand the program’s strategic value to mobile and fixed operators, and open opportunities for other sectors as they invest in Wi-Fi to meet business challenges.”

  • The BYOD Disconnect: Complying With Mobile Device Security At Work
    The BYOD Disconnect: Complying With Mobile Device Security At Work

    Businesses are increasingly implementing bring-your-own-device (BYOD) policies at work. These programs encourage employees to use their own smartphones and tablets within the office to help spur productivity — just how secure are these devices?

More Featured Content

CURRENT ISSUE

More From The Current Issue

PREMIUM CONTENT

How Mobile Engagement Is Reinventing Brick And Mortar Retail

What are retailers learning about the influence of mobile POS, clienteling, and other apps on the way associates perform and consumers shop?

5 Tips To Maximize Your Managed Services Marketing Potential

Some of the best leads you’ll ever get come from referrals. When someone introduces you to a new prospect, and talks up how good your company is and the expertise you have — it’s priceless. And, it usually means a much shorter sales cycle compared to leads generated from marketing outreach campaigns.

Unified Communication: Technology For Now And The Future

Unified communications can be defined as a set of capabilities used to integrate real-time communication services. They enable a person to send a message on one medium and the recipient to receive it on another. Wikipedia defines Unified Communications (UC) as the integration of real-time communication services such as instant messaging (chat), presence information, telephony (including IP telephony), video conferencing, call control, and speech recognition with non-real-time communication services such as unified messaging (integrated voicemail, email, SMS and fax).

How Open Architecture Access Control Impacts The Channel

Network video has drastically changed the video surveillance market over the last few years and now many believe that we are on the verge of a similar breakthrough with IP access control, which could happen much faster than video, due to the IT acceptance of devices residing on their infrastructure.

Pitfalls To Avoid With Cloud Migration

There are a lot of things to consider while migrating data from one cloud service to another. Some important key points to keep in mind are cloud security, storage cost, back-end recovery options, vendor reliability, data transfer speed, and SLA (service level agreement) terms. Being knowledgeable in all of these areas can help you prepare for a smooth transition and will ensure data stays in a safe and secure.

After Chip And PIN Is Deployed, What Will The Next Security Challenge Be?

Two women caught on surveillance cameras are questioned for alleged receipt fraud. Sources say the women entered the store together, one left with the purchased goods and an original receipt while the other approached a staff member stating she had not received a receipt for her transaction. The duplicate receipt was printed and the women used both receipts to claim a refund. 

Manufacturers Look Deeper Into Their Sales Channels To Improve Quality And Market Responsiveness

Your IT clients in manufacturing are increasingly relying on technology to operate more efficiently, to enhance product quality — and to compete. In this article, Bernard Leikind, PhD, explains how manufacturers can also benefit by leveraging market intelligence collected through IT and data management solutions along the supply chain.

Best Practices To Choose PACS VNA Or Storage VNA For Healthcare

Healthcare organizations are often encouraged to acquire and implement a vendor neutral archive (VNA) as an enterprise medical imaging data repository. The idea is simple — migrate DICOM (digital imaging and communications in medicine) images archived in departmental picture archiving and communications system (PACS) applications into a centralized PACS VNA.

More Premium Content

SPECIAL REPORTS

Partner Program
Insider

POS & Payment Processing Guide

Best Channel
Vendors 2014

Partner Program Insider 2014 BSM Annual POS Guide 2014 Best Channel Vendor 2014 Home
Vendors share how their partner
programs can help VARs, MSPs,
and ISVs grow their businesses.
What you’ll find in this guide is an assortment of advice from leaders in the industry to help motivate you and, hopefully, stimulate action. Thousands of VARs, MSPs, and ISVs rate their vendor partners on 7 key criteria. Which vendors rated the best?
 

A VAR & MSP's Guide To Health IT Trends

A VAR & ISV's Guide To EMV

Business Solutions Executive Insight 2013

A VAR & MSP's Guide To Health IT Trends EMV for VARs Channel Executive Insights
See how you can expand your business by taking advantage of the rapidly changing healthcare IT industry. If you feel like EMV is currently a point of frustration with the distant hope of turning into something lucrative, you’re not alone. Channel leaders discuss trends you can take advantage of to help grow your business.

FEATURED SUPPLIERS

  • Harbortouch
    Harbortouch

    Harbortouch is a leading national provider of touch-screen point of sale (POS) systems and payment processing services. As pioneers of the “as a service” model, Harbortouch offers an unprecedented “free” POS program that allows the company’s sales partners to offer a full-featured POS system with no up-front costs.

  • Axis Communications
    Axis Communications

    Axis is an IT company offering network video solutions for professional installations. The company is the global market leader in network video, driving the ongoing shift from analog to digital video surveillance. Axis products and solutions focus on security surveillance and remote monitoring, and are based on innovative, open technology platforms.

  • Accu-Time Systems, Inc.
    Accu-Time Systems, Inc.

    Founded in 1991, Accu-Time Systems (ATS) has been a trusted global leader in workforce management, offering state-of-the-art solutions for time and attendance, payroll, and security access. For more than 20 years, Accu-Time Systems has been a global supplier for workforce productivity, planning, human resource data collection, and labor management.

  • Dell Software Inc.
    Dell Software Inc.

    Dell provides end-to-end solutions leveraging our combined breadth and depth of software and system competencies. We enable partners to differentiate their offerings and drive recurring revenue generating IT as a Service (ITaaS). These offerings will accelerate customer onboarding, ensure cost-effective scalability and heterogeneous manageability across a broad range of ITaaS workloads for Enterprise and SMB customers.

  • Datto Inc.
    Datto Inc.

    Datto Inc. is an award-winning vendor of backup, disaster recovery (BDR) and intelligent business continuity solutions, providing best-in-class technology and support to its 5,000+ channel Partners throughout North America and Europe.  Datto is the only hybrid-cloud BDR vendor that provides instant on- and off-site virtualization of servers and workstations, achieved through its Inverse Chain Technology.

  • N-able Technologies Inc.
    N-able Technologies Inc.

    N-able Technologies is the global leader in remote monitoring and management automation solutions for managed service providers (MSPs) and IT departments. N-able's award-winning N-central software and complementary toolsets are proven to reduce IT support costs, improve network performance and increase productivity through the proactive monitoring, management and optimization of IP-enabled devices and IT infrastructure.

Newsletter Signup
Newsletter Signup
Get the latest channel trends, news, and insights
By clicking Sign Me Up, you agree to our Terms and that you have read our Privacy Policy.

FEATURED PRODUCTS

  • ErisStation Conference Phone With Wireless Mics
    ErisStation Conference Phone With Wireless Mics

    Take your conference calls to a new level with VTech ErisStation. Unlike traditional conference phones, ErisStation allows everyone to spread out and stay engaged. Wireless microphones, cutting-edge sound quality and all-in-one design make it the ideal solution for every size conference room.

  • AccuTouch Terminal
    AccuTouch Terminal

    Dirty fingerprints, dry fingerprints, wet fingerprints, damaged fingerprints... in the real world nearly any fingerprint condition can be quickly read by the Maximus AccuTouch.

  • MercuryGift
    MercuryGift

    Our gift card service is designed to help you generate new revenue, increase exposure of your brand, and manage gift card sales for one store or an entire chain.

  • Motorola Symbol LS3578-FZ Rugged, Cordless Scanner With Integrated Bluetooth
    Motorola Symbol LS3578-FZ Rugged, Cordless Scanner With Integrated Bluetooth

    The Motorola LS3578 Series of Bluetooth-enabled cordless laser bar code scanners combine superior data capture quality with ergonomic, yet rugged, features to meet the demands of any industrial application - in the yard, warehouse, distribution center or manufacturing plant. With rugged design, integrated Bluetooth capabilities and a wide working range for scanning items at varying distances, these scanners arrive ready for real-time data capture.

More Featured Products

ABOUT BUSINESS SOLUTIONS

Welcome to BSMinfo, the online presence of Business Solutions magazine. If you are a value-added reseller (VAR), systems integrator, managed services provider (MSP), or independent software vendor (ISV), this is the site for you! Whether here online or in each month's issue of the magazine, we strive to deliver actionable information you can use to add complementary technologies to your portfolio and penetrate thriving vertical markets.

Technologies and topics typically covered include data collection/supply chain, point of sale (POS), payment processing, video surveillance and access control, voice over IP (VoIP), networking, storage, managed services, network security, the cloud, mobile computing, and enterprise content management (ECM). From a market perspective, our articles focus on government, retail, hospitality, healthcare, manufacturing, transportation and logistics, education, legal, banking, and anywhere else solutions providers can find new revenue streams.

Please take a moment to join our online community and discover the benefits (access premium content, free newsletters, product sourcing, etc.) of your FREE membership.

Also, check us out on Google+.

 

BSM is the recipient of the RSPA 2014 Gold Medallion Award.

BSM Wins RSPA Gold Medallion