General Computing Executive Commentary

  1. 5 Factors To Consider When Devising A Data Auditing Policy
    1/27/2015

    In today’s world, satisfying external regulations is a necessity that we all must fulfill. Staying complaint with these regulations is only possible if every change to data — either by human or machine — is thoroughly recorded. Following are the factors involved in devising an effective auditing policy.

  2. Why Should You And Your IT Customers Be In Compliance?
    1/27/2015

    Compliances are playing a big role in today’s industry — and not just for security. The rules and regulations of compliances like PCI DSS, HIPAA, GLBA, FISMA, etc. let organizations be more responsible when it comes to the handling the data storing the information about their business, operations, products, employees, and consumers. Not only storage, the sharing and treatment guidelines for precious data could be clearly defined using compliances.

  3. In 2014 Hacking Surge Wake, Survey Shows Network Security Priorities In 2015
    1/26/2015

    While the security community was still roiling in the wake of the Target breach in late 2013, the continuing parade of breaches in 2014 cast a harsh light on inadequate security architectures and poorly implemented security practices.

  4. 5 Must-Have Mobile Computing Features For Manufacturing And Warehousing
    1/22/2015

    Mobility provides a number of advantages for manufacturing and warehousing applications, including everything from reduced manual errors to increased employee productivity to faster time to market. As warehouse and factory operators are increasingly realizing these benefits, they are turning to mobile solutions in growing numbers.

  5. How To Monetize IoT: Build Great App Experiences
    1/22/2015

    Like many phenomena, the Internet of Things (IoT) is sweeping across the planet like a polar vortex, leaving businesses scurrying to prepare. The buzz is not so much about the here and now, but in the boundless potential it represents — and how to best tap it. So how do you prepare for a concept?

  6. Is Your Client’s Medical Information Safe?
    1/21/2015

    Five data security pitfalls for healthcare organizations to avoid.

  7. The Benefits And Challenges Of Cloud And Mobile
    1/21/2015

    The convergence of mobile devices and the cloud-powered workspace present today’s companies with a myriad of opportunities for efficiency, flexibility, and connectivity.  With this paradigm shift, however, comes some important considerations for the IT staff and managed services providers (MSPs) supporting these businesses.

  8. 4 Ways IoT Will Transform E-Commerce
    1/21/2015

    There’s a moment of panic when we can’t find our phones. There is somehow a sense of security that comes from feeling that electronic rectangle in our pockets. The rise of mobile technology has made our smartphones and tablets the head of our personal nerve centers. They take pictures, notes, connect us to social media and even now allow us to lock our doors and turn off our thermostats remotely. We live in an era of smart technology where everything connects to everything, and we’re constantly on the grid.

  9. How Resellers Can Use Machine Learning To Connect With Millennials
    1/16/2015

    Members of the millennial generation are increasingly filling the workforce in prominent roles as IT managers and CIOs. This demographic trend is forcing technology resellers and solutions providers to rethink how they connect with this younger audience.

  10. 2015 DaaS Predictions: Business-Specific DaaS, Hosted Workspaces Will Thrive
    1/16/2015

    Commodity DaaS platforms, though, will stall.

Newsletter Signup
Newsletter Signup
Get the latest channel trends, news, and insights
By clicking Sign Me Up, you agree to our Terms and that you have read our Privacy Policy.