General Computing Executive Commentary

  1. Is Biometric Identification Ready For Payment Technologies?
    1/30/2015

    Reading the term “biometric” takes us towards the biological connection between the subject and the term. It is named biometric, because it uses metrics related to human characteristics. Biometric identifiers are mainly categorized into two categories, physiological and behavioral characteristics. Physiological characteristics may include fingerprints, palms, veins, face recognition, DNA, iris recognition, or anything used for identifying a person physically. Behavioral characteristics can involve characteristics related to the pattern of behavior of a person, like typing rhythm, voice, etc.

  2. The Cloud: The Channel’s Biggest Threat And Opportunity In 2015
    1/30/2015

    The cloud is changing the shape of the channel as we have traditionally known it. The increasing need for managed IT services is driving new opportunities for solutions providers that have once been considered to be VARs to a new era of the managed services provider (MSP). The enabler for this shift? The cloud.

  3. 4 BDR Solution Must-Haves
    1/30/2015

    Business critical data has to be backed up frequently. Traditionally, business critical data have been stored on tape drives and data can be recovered from the tape when required. But you cannot trust tape completely — there may be chance for data corruption and recovering years of data from tape storage is a cumbersome process.

  4. How To Pick The Right Partner And Build A Successful Connectivity Practice
    1/30/2015

    If you’re a managed services provider (MSP) looking to jump into the lucrative world of connectivity and telecommunications solutions and services, here’s my advice: Don’t go at it alone. Teaming up with the right business partner or master agent is a proven and profitable way for an MSP to achieve success in this market with minimal investment.

  5. Retail Or Healthcare: Which Is The Bigger Breach Threat?
    1/29/2015

    Pssst! I have something for you. It is perhaps the worst-kept secret in healthcare. Surely, that grabbed your attention — and here’s what should hold it: Many of the industry’s vendors have done a poor job ensuring their applications are properly patched and up-to-date. And the sheer volume of devices running those applications to access and share confidential patient records complicates matters considerably.

  6. Using Opportunities In Your PSA To Track Leads
    1/27/2015

    The most common business issue we hear in serving our HTG peer group members is far and away: “How do we generate more business?” The marketing and sales functions are viewed as a necessary evil to people who get more excited designing, building, and fixing technology solutions. We all know the lifeblood of a business is generating new opportunities from prospects as well as our existing clients. It is critical to the success of the business.

  7. 5 Factors To Consider When Devising A Data Auditing Policy
    1/27/2015

    In today’s world, satisfying external regulations is a necessity that we all must fulfill. Staying complaint with these regulations is only possible if every change to data — either by human or machine — is thoroughly recorded. Following are the factors involved in devising an effective auditing policy.

  8. Why Should You And Your IT Customers Be In Compliance?
    1/27/2015

    Compliances are playing a big role in today’s industry — and not just for security. The rules and regulations of compliances like PCI DSS, HIPAA, GLBA, FISMA, etc. let organizations be more responsible when it comes to the handling the data storing the information about their business, operations, products, employees, and consumers. Not only storage, the sharing and treatment guidelines for precious data could be clearly defined using compliances.

  9. In 2014 Hacking Surge Wake, Survey Shows Network Security Priorities In 2015
    1/26/2015

    While the security community was still roiling in the wake of the Target breach in late 2013, the continuing parade of breaches in 2014 cast a harsh light on inadequate security architectures and poorly implemented security practices.

  10. 5 Must-Have Mobile Computing Features For Manufacturing And Warehousing
    1/22/2015

    Mobility provides a number of advantages for manufacturing and warehousing applications, including everything from reduced manual errors to increased employee productivity to faster time to market. As warehouse and factory operators are increasingly realizing these benefits, they are turning to mobile solutions in growing numbers.

Newsletter Signup
Newsletter Signup
Get the latest channel trends, news, and insights
By clicking Sign Me Up, you agree to our Terms and that you have read our Privacy Policy.