General Computing Executive Commentary

  1. The State Of Cloud

    Cloud is about a decade old now and has seen vast improvements in stability and reliability, with a steady increase on breadth of offerings from IaaS to PaaS to SaaS. Certainly the lion’s share of cloud was taken up by SaaS, but that has changed recently with a definite movement — driven by developers and engineers — to IaaS and PaaS with a focus on creating new apps using services from public providers like Amazon Web Services. By Deirdre Mahon, CMO, Cloud Cruiser

  2. 3 Steps To Armor Your Computer Against Hackers & Ransomware

    Ransomware has become a lucrative business for hackers operating worldwide with the river of money flowing into their coffers fueling a cyber security arms race — good versus criminal — and putting you squarely in the crosshairs.

  3. The Process Bulldog

    The Process Bulldog is a lynchpin role at the heart of a healthy process culture. This role is the connection layer of your process governance structure —linking the vision of the leadership team with the creativity of the process owners and participants, the people who are involved in process challenges every day. Every organization needs one.

  4. 5 Simple Security Habits For Your K-12 Education Customers

    In the world of cybercrime where hackers are generally one step ahead of everybody else, good security practices can literally be the difference between protecting critical computer data and exposing the personal and confidential information of school staff, students, parents, and third-party contractors.

  5. 4 Ways Automation Improves Business Productivity

    Productivity is something everyone aims to improve upon. Whether you are a business owner, part of the sales team, handle customer service, or manage the organization’s IT infrastructure, there is always room to improve.

  6. The Risk Of Dis-Unified Communications

    There is little doubt the cloud has come to the forefront of information technology. As such, more and more businesses are adopting the cloud for communications applications. By Scott Kinka, CTO, Evolve IP

  7. Demand For Cloud Services Is Ascendant As Dominance Of On Premises Email Hosting Comes To A Close

    For service providers like ISPs, HSPs, and telcos that provide email solutions to end users — and even for businesses managing their own email servers in-house — the message is clear. By Ben Duncan, Founder & CTO, atmail

  8. Helping Customers Overcome SSH User Key Compliance Concerns

    SSH has been doing its job of providing encrypted, trusted access for the last two decades. By Matthew McKenna, Chief Strategy Officer, SSH Communications Security

  9. Selling Cloud Communications As A Service: 6 Solution Must-Haves

    Communications is the lifeblood of any enterprise. By Carlos Roman, Head of Global Partner Marketing, 8x8, Inc.

  10. Staffing Cybersecurity Means Managing Insanity

    To nurture your cybersecurity talent, prove you are working to nurture a productive workplace. By Barbara Kay, senior director of strategic solutions, Intel Security