Featured Articles

  1. Don't Leave Your SMB Customers Unprotected
    4/29/2015

    Last week I wrote an article urging VARs to provide their SMB retailers with technologies that allow those retailers to act like the big chains. I still stand by that recommendation, but now realize that such an idea doesn’t have to be limited to SMB retailers. Coincidentally, Business Solutions Editor Jay McCall just interviewed Jensen Information Technologies for an upcoming issue of the magazine. In the article, the MSP’s director of sales shares how they provide SMB customers in manufacturing and professional services an enterprise experience.

  2. Videos Provide Insight Into Techniques, Motives For Hacking Apps
    4/29/2015

    Arxan Technologies, a mobile app security solutions provider, believes the first step in defending yourself from hackers it to think like one. The company has created a video series to help enterprises make it more difficult for hackers and fraudsters to tamper with apps.

  3. NFL Teams Use EHR Systems To Streamline Care
    4/29/2015

    EHRs are useful beyond just the world of hospitals and the military. Anywhere a human body is treated, they can bring benefits and innovation. This includes athletic spaces.

  4. Senators Urge Congress To Update Technology Policies
    4/29/2015

    In the wake of the Senate’s unanimous approval of a resolution to push greater adoption of the Internet of Things last month, two U.S. Senators have urged the Senate Committee on Rules and Administration to update Senate policies pertaining to the use of digital media and technology.

  5. $1 Million HHS Grant Meant To Encourage Health Information Sharing
    4/29/2015

    Your health IT clients could be candidates to apply for a recent grant offering aims to encourage interoperability at the community level.

  6. 2015 Verizon Data Breach Report: 9 Basic Patterns Cause Most Security Incidents
    4/28/2015

    Verizon released its 2015 Data Breach Investigations Report (DBIR), which found that, while cybercriminals are using increasingly sophisticated means in their attacks, security breaches are precipitated in nine basic ways. By Christine Kern, contributing writer

  7. PCI DSS 3.1 Data Security Standard Published
    4/27/2015

    The PCI Security Standards Council (PCI SSC) has published PCI DSS Version 3.1 and supporting guidance, designed to help organizations address vulnerabilities that may place their payment data at risk. Version 3.1 is available on the PCI SSC website, and PCI DSS Version 3.0 is set to be retired on June 30, 2015.

  8. HIT Storage Challenges Addressed At HIMSS15
    4/27/2015

    One of HIMSS15’s presentations came from DataCore Software, a provider of software-defined storage. The presentation was timely — data is becoming bigger, ever more important, and ever more difficult to contain and protect.

  9. Experts: Flash Net Cost Is Less Than Disk
    4/27/2015

    Experts predict that enterprise-flash adoption will increase as new, cheaper and denser technologies emerge to help drive down costs. New research from Wikibon’s latest 2015 Storage Cost Assumptions has demonstrated that flash has already surpassed magnetic disk as the most cost-effective medium for performance-driven applications and soon will be cheaper than disk as well.

  10. 5 Trends Driving How Your Retail IT Clients Use Mobility To Connect With Customers
    4/24/2015

    An infographic from staffing organization Randstad examines five trends driving how mobility is used to connect businesses with customers. According to Randstad, enterprise mobility is now transcending BYOD (bring your own device) to encompass better business intelligence, ultra-personalization in mobile marketing, and creating “mobile moments” that mark unique business experiences.

Newsletter Signup
Newsletter Signup
Get the latest channel trends, news, and insights
By clicking Sign Me Up, you agree to our Terms and that you have read our Privacy Policy.