General Computing Executive Commentary

  1. The Cybersecurity Horizon: 5 Trends For 2015
    2/5/2015

    With a new year comes new challenges and opportunities, and corporate security is certainly no exception. 2014 was the year of the data breach, with cyberattacks affecting major brands including Sony, Target, and eBay to name a few. Now that’s its clear cybersecurity must be on the 2015 agenda, what can resellers and VARs expect to guide corporate security needs? Below are the top trends that will influence security demands and how resellers communicate their value.

  2. The Top 5 Traits To Look For In A Sales Rep For Your IT Solutions Provider
    2/5/2015

    Love ‘em or hate ‘em. Sales reps run the gamut between all-star and dead weight. What should you look for before you pull the trigger and hire one?

  3. 7 Must-Haves For Retail IP Video Solutions
    2/5/2015

    In today’s retail universe, fully one-third of employees are estimated to commit theft against their employers. As companies cut employee hours, loyalty seems to suffer, and 27 percent of retailers say they are seeing increased levels of employee theft. Amazingly, 37 percent of theft is attributed to managers.

  4. 5 Reasons Channel Partners Can No Longer Ignore Cloud Services
    2/2/2015

    Analysts are predicting cloud computing will grow to $105B and represent 17 percent of the total IT spend by 2017. Add to the mix that cloud services and solutions are on pace to realize an annual growth rate that’s 5x the total IT spend and it’s safe to say cloud computing is officially  mainstream. So why are only a fifth of today’s channel partners selling and supporting cloud-based solution and services?

  5. Left In The Lurch: Survey Shows Lack Of Vendor Support Dampens Partners’ Enthusiasm For Emerging Tech
    2/2/2015

    Despite a steady drumbeat of industry optimism over emerging tech such as Big Data, software-defined networking and the Internet of Things, solutions providers take a generally dim view of opportunities in the most hyped technologies.

  6. Is Biometric Identification Ready For Payment Technologies?
    1/30/2015

    Reading the term “biometric” takes us towards the biological connection between the subject and the term. It is named biometric, because it uses metrics related to human characteristics. Biometric identifiers are mainly categorized into two categories, physiological and behavioral characteristics. Physiological characteristics may include fingerprints, palms, veins, face recognition, DNA, iris recognition, or anything used for identifying a person physically. Behavioral characteristics can involve characteristics related to the pattern of behavior of a person, like typing rhythm, voice, etc.

  7. The Cloud: The Channel’s Biggest Threat And Opportunity In 2015
    1/30/2015

    The cloud is changing the shape of the channel as we have traditionally known it. The increasing need for managed IT services is driving new opportunities for solutions providers that have once been considered to be VARs to a new era of the managed services provider (MSP). The enabler for this shift? The cloud.

  8. 4 BDR Solution Must-Haves
    1/30/2015

    Business critical data has to be backed up frequently. Traditionally, business critical data have been stored on tape drives and data can be recovered from the tape when required. But you cannot trust tape completely — there may be chance for data corruption and recovering years of data from tape storage is a cumbersome process.

  9. How To Pick The Right Partner And Build A Successful Connectivity Practice
    1/30/2015

    If you’re a managed services provider (MSP) looking to jump into the lucrative world of connectivity and telecommunications solutions and services, here’s my advice: Don’t go at it alone. Teaming up with the right business partner or master agent is a proven and profitable way for an MSP to achieve success in this market with minimal investment.

  10. Retail Or Healthcare: Which Is The Bigger Breach Threat?
    1/29/2015

    Pssst! I have something for you. It is perhaps the worst-kept secret in healthcare. Surely, that grabbed your attention — and here’s what should hold it: Many of the industry’s vendors have done a poor job ensuring their applications are properly patched and up-to-date. And the sheer volume of devices running those applications to access and share confidential patient records complicates matters considerably.

Newsletter Signup
Newsletter Signup
Get the latest channel trends, news, and insights
By clicking Sign Me Up, you agree to our Terms and that you have read our Privacy Policy.