General Computing Executive Commentary

  1. 5 Ways To Protect Your SMB Customers’ VoIP Networks From Getting Hacked
    7/9/2014

    The term “security through obscurity” once may have applied to Voice over Internet Protocol (VoIP). Several years ago, few individuals and even fewer businesses relied on VoIP. But in recent years, business VoIP adoption has exploded. The potential downside is that Internet services, in the past, have been much more vulnerable to attack and exploitation than copper wires and fiber optic cables. Fortunately, VoIP security has also increased as VoIP has gained market share. Here are five ways to make sure your customers’ VoIP networks are safe.

  2. How MDM Benefits Your Education Clients
    7/8/2014

    Dave Saltmarsh, education evangelist at JAMF Software, tells how mobile device management (MDM) can enhance users’ productivity, help protect students’ privacy, and limit shadow IT and access to certain websites and apps.

  3. Why You Should Embrace Commoditization
    7/8/2014

    Is commoditization actually fueling innovation? Yes — I’m actually suggesting that solution providers should be embracing commoditization. Before you call that crazy, or think that I’m just trying to sensationalize, give me a chance to explain.

  4. 4 Things To Consider When Selecting Cloud Service Providers And On-Premise Solutions
    7/3/2014

    For many years cloud service providers worked to overcome the notion that enterprise security for premises-based infrastructure was superior to that offered by cloud-based solutions. Recently, however, firms like Salesforce.com, NetSuite — as well as West — have been recognized as truly viable solutions for organizations of all sizes. These cloud-based tools have reached broad market acceptance, in part, by consistently delivering on their security promise.

  5. 7 Reasons NOT To Offer Service Package Options
    7/3/2014

    When I started Triada Networks in 2008, I had to decide which billing model made the most sense for me. Since I knew that I didn’t want to trade dollars for hours, fixed-price plans seemed to make the most sense, which ultimately led me to embrace the concept of managed services. By Raffi Jamgotchian President/CTO of Triada Networks

  6. Now Is the Right Time To Push Security Solutions
    7/2/2014

    Securely disseminating information on a regular basis is an absolute necessity and of critical concern for countless enterprises throughout the globe — especially those in the healthcare, legal, and financial industries. 

  7. How To Fire A Client
    7/2/2014

    As a business owner, one of the hardest things I have had to learn is when it is time to fire a client. I know that I am not the only business owner to face this challenge. The need to find and retain clients is driven by the crucible of those early days when you did not have very many clients — when the business was struggling to survive. One cannot abide to lose a client — even if they are a lousy client. You fret and worry, maybe if you do a better job next time around they will pay their bills on time or be less argumentative?

  8. Imaged-Based Backup And Disaster Recovery: 4 Keys To Keeping It Simple
    7/2/2014

    Few organizations can afford downtime at any level today. When things go wrong, there simply isn’t time to wait because, as we all know, time is money. While just about every business recognizes the need for backup and disaster recovery (BDR), many resellers are now finding that image-based backup offers an efficient and cost effective way to handle the task, especially for small and mid-sized organizations.

  9. 4 Ways To Keep Your Customers Safe From A Cyber Attack
    6/30/2014

    The threat landscape has seldom been more risky for small businesses than it is today. Cyber criminals have figured out that most small businesses are holding extremely valuable customer and financial data. They also know that most small businesses are less well equipped to deal with attacks than larger enterprises.

  10. Creating Fully Accessible Web Content: The Industrial Approach
    6/26/2014

    How are your clients — or you — dealing with the challenge of accessibility? Chances are, you are doing a fine job in terms of accessible facilities and architecture, perhaps with your internal hiring policies and maybe even with your website. It’s a lot less certain whether you and your clients are doing as good — and legally compliant — a job around the content on your websites.

Newsletter Signup
Newsletter Signup
Get the latest channel trends, news, and insights
By clicking Sign Me Up, you agree to our Terms and that you have read our Privacy Policy.