General Computing Executive Commentary

  1. Disaster Strikes: 3 Critical Factors That Should Be A Part Of A Recovery Plan

    In the darkest days after a tornado in early May damaged 30 percent of Van, Texas, (a city outside of Dallas) residents were provided some relief when the Van High School “Vandals” baseball team beat North Lamar High School to go on to the state semifinals for the first time in program history.

  2. What IT Solutions Providers Need To Know About Bitcoins And Cryptocurrency

    Bitcoins are a form of cryptocurrency, meaning they do not have a physical representation. Instead they are stored in an online exchange in anonymous wallets. They can be transferred anywhere in the world via the Internet. They can be paid from anywhere, to anywhere with total anonymity. The long and short of it is: They are the ideal form of payment for illicit activities and hackers.

  3. What To Consider When Planning Your Business Exit Strategy, Part I

    One of the areas I spend considerable time on is helping business owners prepare for and then complete an exit from the business they often founded and have worked in for decades. Let’s get one thing straight:  It is a big deal for an entrepreneurial owner to exit his or her business. In fact, it is a very big deal. The saddest call I receive comes from a small business owner that has worked in their company for decades. It was their creation, and they have poured sweat and blood into building it to where it is today.

  4. 6 Reasons Every MSP Should Sell VoIP

    Remember the days when the most integration your computer and your telephone had was when you connected to the Internet via dial-up modem?  It was really more like the occasional meet-up than a full-fledged marriage between two critical pieces of technology. Phone systems, like mainframe computers, were highly specialized, cumbersome, and expensive long-term commitments — and there was an equally specialized and highly trained sector of people who sold and serviced them. 

  5. The Appeal Of Open Source And The Opportunities For VARS

    Enterprise IT decision makers are now among the ranks of those taking a long look at what open source software can offer their organizations. Given the advantages, this transition comes as no surprise. VARs would do well to pay attention to this trend and be prepared to offer strategic advice and solutions that will help their enterprise customers address current and future needs.

  6. With Windows Server 2003 Reaching Its EOS, What’s Next For Data Centers?

    With its July 14 end-of-service date just past, Windows Server 2003 leaves many data center operators considering what’s next for their networks. The imminent server migration will impact support, security, and cloud functionality for data centers still operating on the expiring server, so it is critical for them to evaluate power management and virtualization strategies.

  7. Leadership Lessons Learned By A Systems Integrator On A 7,500-Mile Rally To Mongolia

    The most important leadership lessons come from the least likely scenarios. I’ve found this to be true throughout my career as an entrepreneur and executive, and it’s part of the reason I’ll spend a few weeks this summer driving thousands of miles across Europe in a tiny car I rescued from the scrap heap.

  8. 4 Traits SMBs Look For In An IT Solutions Provider

    In today’s tech-driven economy, businesses, regardless of their size, require IT support in some capacity. Even though the resources which are available for small and medium-sized businesses might be fewer than larger corporations, they often have similar, if not the very same, IT needs as enterprises.

  9. 4 Non-Negotiables In Any Endpoint Management Solution Evaluation

    Mobile phones have grown in prominence as productivity devices, and enterprises are increasingly using them to execute various business functions. In the early stages of mobility adoption, some enterprises have experimented with separate systems to manage mobile devices.

  10. When Employees Put Data At Risk: Medical IT Client Horror Tales That Will Convince You To Encrypt (Part 2)

    Previously, we chilled you with a haunting tale of a medical practice that would not listen to warnings to encrypt, even after an ex-contractor stole a computer holding unprotected private medical information. It caused our IT and security services company to end that relationship rather than risk being arty to a damaging HIPAA violation.