General Computing Executive Commentary

  1. How To Balance The Tech Side And The Human Side Of Data Security

    When it comes to a business’ data security strategy, it’s still a huge challenge to protect workers from their own carelessness, poor decision-making, and (occasionally) even their maliciousness, while also staying out of a worker’s way and avoiding data security becoming a cumbersome burden that harms productivity and leaves them irritated.

  2. The Smart Way To Make The MSP-To-CSP Transition

    Just about every VAR, MSP, or IT solutions provider I’ve talked to who’s not currently selling cloud solutions and services tells me they’d like to start doing so. But although you can sign up for a free cloud service in less than two minutes, becoming a successful cloud service provider (CSP) isn’t so easy. What’s more, selling cloud requires a different skill set than selling traditional hardware or software, and it’s different than selling managed services, too.

  3. Watermarks Flow Naturally From Digital Video Innovations

    It’s rare that something invisible can become a tool powerful enough to change an industry, but that’s precisely the case with digital watermarks. This technology is rooted in digital video innovations and poised to take a giant leap forward, providing a sophisticated way for advertisers to reach a targeted audience.

  4. 3 Reasons MSPs, ISVs, And VARs Need To Carefully Consider Data Governance

    The way the world uses data has changed. In a short span of time, the amount of data created globally has increased at a geometric rate. We’re no longer thinking in terms of gigabytes, terabytes or even petabytes — we’re in the age of a data universe measured in exabytes and zettabytes (that’s one trillion gigabytes, if you can believe it).

  5. The ROI Of Quality Audio In Unified Communications Environments

    Businesses pour a sizable investment into their telephony systems and telecom resellers and dealers want to profit from those opportunities. Dealers are under pressure to compete, and are typically motivated to cut costs on their systems to capture the sale. Sadly, this often leads to less-than-adequate choices when ordering headsets, even for sophisticated unified communications environments.

  6. How Your IT Clients Can Leverage The Power Of The IoT For Access Control Systems

    The Internet of Things (IoT) and interconnectivity are having a sizeable impact on the physical security industry. Among those technologies where it is having the most effect are access control systems.

  7. Shark Tales And Monolithic IT Vendors — But Good News For The IT Channel

    Back in my home country of Australia a recent series of shark attacks, far above average, are causing distress among swimmers and attracting a lot of media attention. The reason for the change in shark patterns however is because the fish schools are coming in closer to shore, apparently a result of warming sea currents, bringing the predator sharks with them.

  8. 5 Ways IT Service Providers Can Win With SMB Mobile Security

    When the mobility wave hit, data security got way more complicated for IT services providers and their SMB customers. Indeed, as mobile devices have infiltrated the SMB market in a big way, hackers have kept pace, waging full-blown attacks against the mobile landscape. Studies have shown that mobile malware assaults rose by 58 percent in 2012, making mobile data security one of the biggest threats for businesses today. 

  9. Help Your Clients Remove The Dangers Of BYOD

    Today, our working lives have become virtually 24/7 (of course, there are a few hours left for sleep, sometimes). People working away from the traditional office have become the new normal.

  10. What SMBs Are Looking For From Their IT Solutions Providers

    I do coaching for one of our member’s sales executives. Their owner asked for some feedback on a blog we were reviewing. One of the sales executives replied with the following...