Premium Content

  1. Bridging The Gap: Driving New Levels Of Intelligence And Risk Mitigation
    4/25/2016

    Today, security and risk are large business issues, reaching high into the C-suite. Executive leadership teams recognize the potential of costly and damaging disruptions if risk is not appropriately controlled. As a result, IT, physical, and cyber security teams must collaborate to best manage and address risk.

  2. Why It’s Okay For CIOs To Make Decisions Based On Feelings
    4/25/2016

    One of life’s most hilariously, ironic aspects is that, wherever you go, you’ll notice personal exceptionalism is by far the most ordinary expression of human behavior. If you understand that concept to be true, then the self-assessment data gathered by the well-known leadership and management coach, Mark Goldsmith won’t surprise you either. By Ariel Amster, Qubole

  3. The Impact Of M&A On The MSP Market
    4/22/2016

    It’s all the rage right now.  Everyone seems to be a buyer or seller; some are even trying to play both sides of the M&A puzzle.  It is hard to find anyone who is not actively considering M&A as a strategy for growth or exit.  And while it may be exciting and the seemingly best option for growing or transition, it also comes with some baggage that can become detrimental if not managed well.

  4. Values And Culture
    4/22/2016

    Our core values are posted all over the office, and we take the time to go over them with every new employee; but, I still see behavior inconsistent with our values. What can I do?

  5. The Cloud Wars May No Longer Focus On Price
    4/22/2016

    The cloud wars are an ongoing battle for supremacy of cloud services. The competition is fierce and intense, as can be assumed regarding what is a multi-billion dollar market. Cloud providers come in many varieties, but the most popular are names known to most people and businesses out there. The likes of Amazon, Google, Microsoft, and IBM all have products and services to offer and, for many years, much of the focus has been on slashing prices whenever or wherever possible.

  6. Redefining Technology Solution Providers In The Cloud
    4/21/2016

    Welcome to the brave new world that is cloud services, where there’s no such thing as business as usual. Small-to-midsize businesses (SMBs) represent a significant section of most technology solution provider (TSP) customers, and those SMBs are turning to the cloud more than ever before. They are going to be asking you about the cloud and whether you can support their needs. If you aren’t prepared, you stand to lose big.

  7. Old School Ties Are Not The Fashion In Enterprise Mobility
    4/21/2016

    My lunch companion was the Director of Innovation at a large telecommunications company, a new role in the past two years which reflected a desire for effective change and the internal frustration that it was not being achieved. I just did not understand why he was not embarrassed — he had just told me he had not submitted our tender response to the CIO because, “It is hard enough getting proposals through IT so I only put up two proposals from two old school large logo IT vendors.”

  8. Can EMV Chip Cards Protect Shoppers’ Loyalty And Security?
    4/20/2016

    In response to continued retail hacks, several technologies are being introduced that promise to help keep consumers' financial information more secure. The most notable include EMV chip cards.

  9. Breaking Into New Space, Out Of The Old
    4/19/2016

    Dear IT’ers, Everything I’ve done over the past 40 years with folks like you – business guys – had to do with the huge discomfort that comes from being asked to think differently than my audience is used to think.

  10. Combating The Human Component Of Data Security Vulnerabilities: Don’t Let Print Be An Afterthought
    4/19/2016

    In today’s digital world, there are countless ways in which sensitive corporate data can find its way into the wrong hands. But while your customers are focused on protecting information with email encryption and network firewalls, one of their employees could have left a physical document unattended in the printer tray — a major (and completely avoidable) security risk.