General Computing Executive Commentary

  1. 3 Reasons Hybrid Cloud Solutions Make The Most Sense For Financial Institutions
    7/18/2016

    Cloud data vaulting services have become increasingly prevalent in the financial services market, especially with the growing digitalization of customer transactions and low tolerance for downtime, but there is no one-size-fits-all cloud model for financial institutions. By Brandon Tanner, Senior Manager, Rentsys and ASCII Group Member Since 2016

  2. Top 5 Issues To Consider Before Customizing Technology
    7/15/2016

    Customization used to be a bad word to many business owners. It was viewed as encumbering higher costs and depending on complex IT infrastructure. However, with the availability of more outsourced technology resources and the increased drive for innovation and marketplace gains, customization is becoming a more common business practice. By Kristen McAlister, President, Cerius Executives

  3. Channel Partners Chasing Profitability Due To Lack Of Product Support
    7/14/2016

    Cloud sales have skyrocketed in recent years, but if the Software-as-a-Service (SaaS) industry expects to hit Forbes’ projected $67 billion by 2018, someone needs to address a very significant user abandonment problem. By Dave Hauser, General Manager, Cloud and Managed Services, PlumChoice

  4. Warning: What You Need To Know About Malware
    7/14/2016

    Most people think if they have a firewall and some kind of anti-virus program they are good, thumbs up, no need to worry about all that cyber stuff. Unfortunately, it is this kind of thinking that makes cyber criminals so wealthy and the rate of cybercrime go up. By David Nathans, director of security, SOCSoter

  5. 10 Ways To Create And Retain Engagement With Process Improvement
    7/13/2016

    Is your business struggling to get staff involved in process improvement initiatives? If so, you can take solace in knowing you’re not alone. By Ivan Seselj, CEO, Promapp

  6. Healthcare Technologies: An Important Investment
    7/13/2016

    The demand for medical services is present across all geographies. By Paul Constantine, president, ScanSource POS and Barcode

  7. Applying Machine Learning To Identify Compromised Credentials
    7/8/2016

    It’s not uncommon for large enterprises to have hundreds or perhaps hundreds of thousands of databases — many out of date, many no longer used, and the vast majority not monitored or properly secured from possible attacks. Unauthorized databases access is increasingly a result of credential theft, and IT personnel are urgently trying to get their arms around the situation. They know they need to not only discover all their own databases, but must figure out how to secure them once they do.

  8. The Best Management Advice I Ever Received
    7/7/2016

    When I first started managing, I thought a lot about myself: how I was doing with my team, how I didn’t want to be a terrible manager, things I could do to become a great manager. Yet when I first started out, the advice I got was “it’s not about you anymore.”

  9. 5 Ways To Protect A Law Firm’s Data
    7/6/2016

    Cybercriminals are everywhere, and they target everyone — from SMBs to large enterprises, government agencies, nation states, and even political organizations including the Democratic National Committee (DNC), which announced in June its networks had been breached. Hackers are working 24 hours a day, seven days a week, 365 days a year to find and exploit vulnerabilities that allow them to steal confidential and sensitive data and sell it to the highest bidder. Are some more at risk than others? You bet.

  10. Strategies Bosses Use To Avoid Apologizing
    7/6/2016

    Where in the world is the school where managers study apology avoidance. It always surprises me when perpetrator-like managers have already built an impressive array of personal apology avoidance habits and language. They don’t get this from their mothers, I know that. I also know those who ignore their mom’s advice deserve what they get.