Supply Chain Executive Commentary

  1. 2015: The Year of Mobile
    8/28/2015

    As you have probably heard, mid April of this year, Google made big changes to their search engine algorithm, giving priority to websites that are optimized for mobile devices. Over the past few months, many companies (our clients included) have started taking a closer look at their site traffic and refreshing their websites to make them mobile friendly.

  2. How To Balance The Tech Side And The Human Side Of Data Security
    8/27/2015

    When it comes to a business’ data security strategy, it’s still a huge challenge to protect workers from their own carelessness, poor decision-making, and (occasionally) even their maliciousness, while also staying out of a worker’s way and avoiding data security becoming a cumbersome burden that harms productivity and leaves them irritated.

  3. 4 Mobility Trends Transforming The Manufacturing Industry
    8/26/2015

    From business decision-making to process workflows, user interfaces, and proactive maintenance, new utilizations of mobile devices and apps are drastically changing the way manufacturing gets done.

  4. Workplace BYOD: Delivering Services Is The Key
    8/25/2015

    I’m often asked what I’d recommend for the surge in bring your own device business technology, especially for mobile workforce productivity.

  5. How Your IT Clients Can Leverage The Power Of The IoT For Access Control Systems
    8/25/2015

    The Internet of Things (IoT) and interconnectivity are having a sizeable impact on the physical security industry. Among those technologies where it is having the most effect are access control systems.

  6. Shark Tales And Monolithic IT Vendors — But Good News For The IT Channel
    8/25/2015

    Back in my home country of Australia a recent series of shark attacks, far above average, are causing distress among swimmers and attracting a lot of media attention. The reason for the change in shark patterns however is because the fish schools are coming in closer to shore, apparently a result of warming sea currents, bringing the predator sharks with them.

  7. 5 Ways IT Service Providers Can Win With SMB Mobile Security
    8/25/2015

    When the mobility wave hit, data security got way more complicated for IT services providers and their SMB customers. Indeed, as mobile devices have infiltrated the SMB market in a big way, hackers have kept pace, waging full-blown attacks against the mobile landscape. Studies have shown that mobile malware assaults rose by 58 percent in 2012, making mobile data security one of the biggest threats for businesses today. 

  8. 7 Reasons To Use 2D Bar Code Scanners
    8/24/2015

    By now you are probably familiar with 2D bar codes — such as the ubiquitous QR (quick response) code — if not by name, then by sight. Your clients are probably even using QR codes for their businesses (and if they aren’t, they should be.) While QR codes can be easily read by most cell phones and mobile devices, they are not the only 2D bar codes.

  9. What SMBs Are Looking For From Their IT Solutions Providers
    8/20/2015

    I do coaching for one of our member’s sales executives. Their owner asked for some feedback on a blog we were reviewing. One of the sales executives replied with the following...

  10. MSP Sales Teams: Not Just From IT Backgrounds Anymore
    8/20/2015

    I read an interesting interview by Jill Konrath of Brent Adamson, coauthor of “The Challenger Sale.” In the interview, Mr. Adamson talks about some of the research they have done around the point in the sale when the purchaser engages with the supplier.

Newsletter Signup
Newsletter Signup
Get the latest channel trends, news, and insights
By clicking Sign Me Up, you agree to our Terms and that you have read our Privacy Policy.