General Computing Executive Commentary

  1. A Reseller's Guide: Unique Challenges Of Network Management In The University Marketplace
    4/17/2014

    Universities and colleges are besieged by a growing number of wireless devices and increased demands on the capacity of the network. Resellers need to serve as partners as these universities struggle to find the right balance for providing service and containing costs.

  2. 5 Features All Cloud Platforms Should Possess
    4/16/2014

    Managed services providers (MSPs) face an array of complex questions as they decide whether to migrate workloads to and between clouds.

  3. 4 Reasons Healthcare Facilities Need New Wireless Applications
    4/16/2014

    Generally speaking, healthcare has been a laggard in the adoption of mobile wireless technologies compared to other industries such as retail and hospitality. But with the introduction of smaller devices, smartphones, and tablets, the need for increased mobility in hospitals has accelerated dramatically in the past few years.

  4. Cyber Surveillance: 4 Things Every Healthcare Solutions Provider Should Know
    4/11/2014

    Hospitals must evolve their cybersecurity to match the security standards and procedures they have developed and honed for their physical facilities. One key aspect of their physical security is 24/7 video surveillance: the ability to see who did what in their hospitals and the ability to go back in time to investigate incidents is an absolutely essential component of their security procedures.

  5. MSPs And The Cloud: Finding The Right Vendor Partner
    4/11/2014

    It’s no secret that the managed services provider (MSP) business is a large market and has been growing steadily. In recent years, it grew by 13-16 percent to reach US$60-65 billion. The shape of the market continues to evolve and mature. As this happens, MSPs are demanding more, not just from the technology and tools that power their businesses, but also from the vendors that supply them. 

  6. The Top 3 Things To Look For In A Partner Program
    4/10/2014

    IT distribution isn’t just about products anymore — there’s an increasing focus on leading with services and solutions to drive results. Distributors are going beyond their name and becoming trusted advisors to resellers.As part of this evolution, it’s more important than ever to develop strong relationships in the channel and engage in events that provide collaboration, networking, and education. Every recipe for success looks different, but here are a few things to consider when looking for a partner program.

  7. Thwarting Cyber-Induced External Business Disruptions
    4/10/2014

    Global dependence on the Internet as the backbone for conducting business is leading to a surge in malicious and sophisticated cyber attack activity aimed at interrupting or compromising these economically-critical online activities. These threats are frequently referred to as distributed denial-of-service, or DDoS, attacks.

  8. What IT Channel Executives Can Learn From Legendary Basketball Coach John Wooden
    4/10/2014

    The legendary John Wooden, arguably the greatest basketball coach of all time, once said, “Never confuse activity with accomplishment.” Whether you’re a vendor or a reseller, that statement resonates — because one of the most difficult aspects of managing a start-up is dealing with the excitement level of the new venture and reining in the tendency to believe that activity for activity’s sake is critical at all times.

  9. Windows Event Logs: Things Every Solutions Provider Should Know
    4/7/2014

    Windows Event Logs (WELs) for Active Directory provide information that helps reduce unwanted events — or that signals a cyberattack. Effective usage of WELs requires two important ingredients.

  10. 4 Things You Have To Know About Encryption For Backup
    4/4/2014

    Encryption is becoming a more significant topic as many companies struggle to meet compliance requirements and keep their data secure. It is in demand more than you might expect, including for various website security functions and backups — which are another important area to consider using encryption on. To completely protect data and backup, you should consider encrypting both the data in motion and at rest. Here are a few facts about encryption that will help you understand the landscape.