General Computing Executive Commentary

  1. The Top 5 Ways Universities Confirm Student Identity Through Access Control

    As students return to school, packing lecture halls and moving into dorm rooms in the colleges and universities, officials behind the scenes look for ways to safeguard the students, faculty, and assets. To accomplish this feat, today’s higher education organizations look for a combination of policies and new technology solutions.

  2. Beyond The Headlines: Taking A Holistic Approach To Data Security

    It seems as if a week doesn’t go by without a data breach making headlines. From recent news of backup tapes gone missing from a Massachusetts-based hospital to a phishing attack at an Indiana-based healthcare system to a malware incident involving payment cards at several upscale hotels in California, the reasons for these data breaches vary widely. While each of these incidents offers a cautionary tale for businesses of all sizes, they don’t fully illustrate what’s needed to successfully fill the security gaps that exist today.

  3. 2015: The Year of Mobile

    As you have probably heard, mid April of this year, Google made big changes to their search engine algorithm, giving priority to websites that are optimized for mobile devices. Over the past few months, many companies (our clients included) have started taking a closer look at their site traffic and refreshing their websites to make them mobile friendly.

  4. How To Balance The Tech Side And The Human Side Of Data Security

    When it comes to a business’ data security strategy, it’s still a huge challenge to protect workers from their own carelessness, poor decision-making, and (occasionally) even their maliciousness, while also staying out of a worker’s way and avoiding data security becoming a cumbersome burden that harms productivity and leaves them irritated.

  5. The Smart Way To Make The MSP-To-CSP Transition

    Just about every VAR, MSP, or IT solutions provider I’ve talked to who’s not currently selling cloud solutions and services tells me they’d like to start doing so. But although you can sign up for a free cloud service in less than two minutes, becoming a successful cloud service provider (CSP) isn’t so easy. What’s more, selling cloud requires a different skill set than selling traditional hardware or software, and it’s different than selling managed services, too.

  6. Watermarks Flow Naturally From Digital Video Innovations

    It’s rare that something invisible can become a tool powerful enough to change an industry, but that’s precisely the case with digital watermarks. This technology is rooted in digital video innovations and poised to take a giant leap forward, providing a sophisticated way for advertisers to reach a targeted audience.

  7. 3 Reasons MSPs, ISVs, And VARs Need To Carefully Consider Data Governance

    The way the world uses data has changed. In a short span of time, the amount of data created globally has increased at a geometric rate. We’re no longer thinking in terms of gigabytes, terabytes or even petabytes — we’re in the age of a data universe measured in exabytes and zettabytes (that’s one trillion gigabytes, if you can believe it).

  8. The ROI Of Quality Audio In Unified Communications Environments

    Businesses pour a sizable investment into their telephony systems and telecom resellers and dealers want to profit from those opportunities. Dealers are under pressure to compete, and are typically motivated to cut costs on their systems to capture the sale. Sadly, this often leads to less-than-adequate choices when ordering headsets, even for sophisticated unified communications environments.

  9. How Your IT Clients Can Leverage The Power Of The IoT For Access Control Systems

    The Internet of Things (IoT) and interconnectivity are having a sizeable impact on the physical security industry. Among those technologies where it is having the most effect are access control systems.

  10. Shark Tales And Monolithic IT Vendors — But Good News For The IT Channel

    Back in my home country of Australia a recent series of shark attacks, far above average, are causing distress among swimmers and attracting a lot of media attention. The reason for the change in shark patterns however is because the fish schools are coming in closer to shore, apparently a result of warming sea currents, bringing the predator sharks with them.