General Computing Executive Commentary

  1. Why You Should Take The Time To Implement EMV With Layered Security
    8/31/2015

    October marks the liability shift date, when the four major credit card brands, Visa, MasterCard, Discover, and American Express, will begin shifting the financial liability for credit and debit card fraud to organizations that do not support EMV chip cards.

  2. The Top 5 Ways Universities Confirm Student Identity Through Access Control
    8/31/2015

    As students return to school, packing lecture halls and moving into dorm rooms in the colleges and universities, officials behind the scenes look for ways to safeguard the students, faculty, and assets. To accomplish this feat, today’s higher education organizations look for a combination of policies and new technology solutions.

  3. Beyond The Headlines: Taking A Holistic Approach To Data Security
    8/31/2015

    It seems as if a week doesn’t go by without a data breach making headlines. From recent news of backup tapes gone missing from a Massachusetts-based hospital to a phishing attack at an Indiana-based healthcare system to a malware incident involving payment cards at several upscale hotels in California, the reasons for these data breaches vary widely. While each of these incidents offers a cautionary tale for businesses of all sizes, they don’t fully illustrate what’s needed to successfully fill the security gaps that exist today.

  4. 2015: The Year of Mobile
    8/28/2015

    As you have probably heard, mid April of this year, Google made big changes to their search engine algorithm, giving priority to websites that are optimized for mobile devices. Over the past few months, many companies (our clients included) have started taking a closer look at their site traffic and refreshing their websites to make them mobile friendly.

  5. How To Balance The Tech Side And The Human Side Of Data Security
    8/27/2015

    When it comes to a business’ data security strategy, it’s still a huge challenge to protect workers from their own carelessness, poor decision-making, and (occasionally) even their maliciousness, while also staying out of a worker’s way and avoiding data security becoming a cumbersome burden that harms productivity and leaves them irritated.

  6. The Smart Way To Make The MSP-To-CSP Transition
    8/27/2015

    Just about every VAR, MSP, or IT solutions provider I’ve talked to who’s not currently selling cloud solutions and services tells me they’d like to start doing so. But although you can sign up for a free cloud service in less than two minutes, becoming a successful cloud service provider (CSP) isn’t so easy. What’s more, selling cloud requires a different skill set than selling traditional hardware or software, and it’s different than selling managed services, too.

  7. Watermarks Flow Naturally From Digital Video Innovations
    8/26/2015

    It’s rare that something invisible can become a tool powerful enough to change an industry, but that’s precisely the case with digital watermarks. This technology is rooted in digital video innovations and poised to take a giant leap forward, providing a sophisticated way for advertisers to reach a targeted audience.

  8. 3 Reasons MSPs, ISVs, And VARs Need To Carefully Consider Data Governance
    8/26/2015

    The way the world uses data has changed. In a short span of time, the amount of data created globally has increased at a geometric rate. We’re no longer thinking in terms of gigabytes, terabytes or even petabytes — we’re in the age of a data universe measured in exabytes and zettabytes (that’s one trillion gigabytes, if you can believe it).

  9. The ROI Of Quality Audio In Unified Communications Environments
    8/26/2015

    Businesses pour a sizable investment into their telephony systems and telecom resellers and dealers want to profit from those opportunities. Dealers are under pressure to compete, and are typically motivated to cut costs on their systems to capture the sale. Sadly, this often leads to less-than-adequate choices when ordering headsets, even for sophisticated unified communications environments.

  10. How Your IT Clients Can Leverage The Power Of The IoT For Access Control Systems
    8/25/2015

    The Internet of Things (IoT) and interconnectivity are having a sizeable impact on the physical security industry. Among those technologies where it is having the most effect are access control systems.

Newsletter Signup
Newsletter Signup
Get the latest channel trends, news, and insights
By clicking Sign Me Up, you agree to our Terms and that you have read our Privacy Policy.