General Computing Executive Commentary

  1. Data Backup & Recovery: How Big Data Has Changed Things & What Decision-Makers Need To Do About It
    12/9/2016

    Today, companies in all sectors have a massive demand for data. To succeed, they must be able to take in a large amount of data and process it in real-time with no room for delays, lags, or hiccups. As the demand for efficiency and fast processing times has risen, companies around the world have been forced to move beyond the relational databases of yesteryear and into new, more capable data processing methods.

  2. Women In The Channel: Can Women Make It To The Top?
    12/8/2016

    Like most women who have been in the channel for many years, Theresa Caragol, Principal at TCC Consulting & AchieveUnite, began her career at the first link of the channel food chain and worked her way up. Her story is a familiar one for numerous women in the channel. This is the second of a four-part series. Click here for part one.

  3. Protect Your Clients From Holiday Hacking
    12/8/2016

    Now that the holiday season has arrived, the shopping frenzy has begun with retailers offering not-to-be-missed deals shoppers searching online — both at home and on their work devices — for the best deals. But it’s not only consumers gearing up for the buying season. Cybercriminals are entering their busiest time of year, preying on people’s rush to snap up holiday savings anywhere they can.

  4. SIP Trunking Goes Mainstream
    12/6/2016

    Recently, I read an article on Forbes, Adapt or Die: The Dangers of Hanging Onto Legacy Technologies. By Darren DeMartino, co-founder and managing partner, Advanced Technology Consulting

  5. 4 Cloud-Based Services Every MSP Should Offer
    12/5/2016

    It's no secret cloud-based services are in abundance right now. As an MSP, there are certain services that you must have in your arsenal to offer to your clients. By Stanley Louissaint, president, Fluid Designs Inc. and ASCII Group member since 2014

  6. Tape Has Died Many Deaths, Now It Lives In The Cloud
    12/2/2016

    It is easy to understand why tape has been occasionally challenged as a key technology for data retention and why it has stubbornly remained indispensable to industries with a great deal data. By Mark Pastor, director of archive and technical workflow solutions, Quantum

  7. 5 Ransomware Prevention Tactics Your Customers Need To Know
    12/1/2016

    As your customers begin to wind up 2016 and plan ahead, one variable we know will continue into the New Year is the increasing frequency of ransomware attacks. An industry statistic from the Herjavec Group estimates ransomware costs will reach a startling $1 billion for 2016.

  8. Clearing The Fog: A Vision Of Security For Hybrid Clouds
    11/29/2016

    How organizations can ensure visibility, protection, and control for critical data and assets across on premise, private, and public cloud environments By Check Point

  9. Overcoming The 3 Stages Of SSH Key Management Grief
    11/22/2016

    There’s a kind of grief that occurs when small and mid-sized organizations realize that have a gaping hole in their network security because of inconsistent or non-existent SSH user key management. And, like the familiar stages of grief, once the denial is over there are three stages of coming to grips with and rectifying poor key management. By Matthew McKenna, chief strategy officer, SSH Communications Security

  10. How To Keep Your Customers Protected From Constantly Changing Ransomware
    11/18/2016

    If you’re old enough to remember 1989, you might recall two key events: the Berlin Wall came down, and the first ransomware attack appeared on the scene. This was the AIDs Trojan horse, which, upon installation, encrypted users’ files and demanded $189 be sent to a post office box in Panama to “renew the license.”