General Computing Executive Commentary

  1. The Importance Of Social Media And Digital Marketing For VARs And ISVs
    3/31/2016

    Success for a VAR and ISV depends primarily on the amount of customers they gain and keep. Like many other industries, one of the biggest challenges VARs and ISVs face is finding the most effective way to market their business to drive customer acquisition. Past marketing tactics included advertisements within industry related magazines, websites, events, and direct mail campaigns.

  2. Attributes Of Successful MSPs
    3/29/2016

    I’m fortunate to work with hundreds of MSP’s through our HTG Peer Groups each quarter, both here in North America as well as Europe and Australia/New Zealand.  Not only do we facilitate two-day interactions with these great leaders, but we benchmark their financials and have them follow a rigorous framework of planning, goal setting and accountability. 

  3. Selling Versus Telling
    3/28/2016

    There seems to be an age-old debate regarding the differences between selling and telling. When I make sales calls with my clients’ salespeople, I’ve noted an increase in the number of sales calls which are inappropriately identified as selling. More often than not, these people are telling.

  4. Making Cloud Less Cloudy
    3/24/2016

    It’s neither a secret nor a surprise that cloud computing is a big focus for small and medium-sized enterprises. After all, the average company expects to dedicate 25 percent of its IT budget to cloud computing this year, according to IDC.

  5. The Future Of The Internet — CDN And The Investments Your Site Requires
    3/24/2016

    When you think of the future of the internet, you probably think one thing: life will be spectacular. A social media platform that identifies when people are lying about how awesome their lives are and iPads that double as hover boards would be spectacular, indeed.

  6. A Cloudy Situation: Meeting The Security Needs Of SMEs
    3/23/2016

    Fear, Uncertainty, and Doubt (FUD) have been used by IT security vendors to scare customers into buying their products for many years. This continues to be an effective tactic even now, but the only difference is that vendors don’t have to try very hard — the stream of cyber-attack and global data breach headlines does the job for them.

  7. Data Protection Without Borders
    3/18/2016

    Data sovereignty has garnered a lot of press and discussion over the last few months. But ask data owners, data creators, and those who process data what data sovereignty truly means and you will probably get many unique answers.

  8. Using Business Rules To Find New Revenue
    3/18/2016

    While the widespread adoption of cloud computing and Software-as-a-Service (SaaS) is a threat to existing on-premise applications and independent software vendor (ISV) business models. It’s also an opportunity for ISVs to step up and meet market needs as there are numerous ways ISVs can work to not only meet those needs, but boost overall revenue.

  9. Regulatory Tug-Of-War And The Rise Of The Hybrid Cloud
    3/15/2016

    The tug-of-war between regulatory compliance and operational efficiency is causing companies to turn to the “hybrid cloud” for their business applications. Companies want the benefits of the cloud but need to control confidential customer data. This is particularly true in the financial sector, where security regulations often require that sensitive customer data remain in a company’s local country.

  10. What I Learned From Working In Failed Platforms
    3/14/2016

    Recently, Adobe announced the end of Flash (sort of), as well as the end of their Edge tools and services. This marked a milestone of sorts for me — the end of a number of products that played important roles in my career.