General Computing Executive Commentary

  1. Shared Service Management Required In The Era Of “The Google Effect”
    10/4/2016

    Supporting departments within organizations have traditionally focused on managing and continually improving their own services. By Nancy Van Elsacker, president, TOPdesk USA

  2. Avoiding A Hatton Garden-Style Data Center Heist
    10/3/2016

    In April 2015, one of the world’s biggest jewelry heists occurred at the Hatton Garden Safe Deposit Company in London. Posing as workmen, criminals entered the building through a lift shaft and cut through a 50-cm thick concrete wall with an industrial power drill. Donald Meyer, Head of Product Marketing, Data Center at Check Point Software

  3. How To Use Ransomware To Drive BDR Sales
    9/29/2016

    The concept of ransomware is not new — it has been a part of the cyber threat landscape for more than 20 years. But, what makes it important to today’s cyber-security conversation is the emergence of “crypto” ransomware, i.e. CryptoLocker, CryptoWall, Locky, TeslaCrypt, and more recently Cerber. By Neal Bradbury, Senior Director of Business Development, Intronis MSP Solutions by Barracuda

  4. 6 Ways To Drive Greater Return On Your Process Improvement Investment
    9/28/2016

    Improving processes isn’t just about creating new flowcharts and Word documents; it’s about improving the consistency and quality of execution, increasing efficiency, and facilitating innovation within your organization. These are the guidelines and workflows that, when managed effectively, can define and improve how your company operates from the C-Suite to the server room.

  5. Access Governance And The Cloud: The Reasons Why
    9/26/2016

    Access governance continues its climb toward becoming a dominant force in a growing market in a plethora of industries throughout the U.S. and beyond. Organizations now more than ever investing resources in access governance solutions so they can improve process efficiency and the security of their networks without much effort. By Dean Wiech, managing director, Tools4ever

  6. How To Keep The Best Staffers
    9/19/2016

    How to keep great teammates. We’ve all had it happen, great people that we love to work with come in to your office with a nervous look on their face: “can I uh….can I talk to you for a second?”.

  7. Archiving Electronic Communications For Business Value
    9/14/2016

    It’s no secret email and social media archiving can be used to ease the compliance headache of meeting regulatory, privacy, and e-discovery requirements. But the real potential value it affords remains largely undiscovered. By Mike Pagani, Chief Evangelist, Smarsh

  8. 5 Cloud-Based Service Fallacies
    9/13/2016

    What is it about the cloud that seems to confound the small to midsize business (SMB) IT consulting space? You can’t escape cloud-computing advertising unless you are stranded on a desert island. By Andrew Harrover, CEO, Matrix Computer Consulting and ASCII Group Member since 2012

  9. How To Create Augmented And Virtual Reality Implementations For Retail
    9/12/2016

    Augmented reality (AR) and virtual reality (VR) have been growing in popularity among consumers and are currently poised for explosive growth in the retail industry. By Shaun Kirby, Chief Technology Officer for Rapid Prototyping, Cisco

  10. Building A Next-Gen Managed Security Practice
    9/6/2016

    Managed Service Providers (MSPs) have long served as their customers’ IT security experts. Small- and medium-sized businesses typically do not have the IT expertise or resources in-house, and so rely on their MSPs to provide the high level of IT support they could not create on their own. As the security landscape evolves and becomes more complex, MSPs also find themselves managing multiple vendors for different product areas, from endpoint security, email, disk encryption, network and mobile security, and wireless capabilities.