Supply Chain Executive Commentary

  1. How To Balance The Tech Side And The Human Side Of Data Security
    8/27/2015

    When it comes to a business’ data security strategy, it’s still a huge challenge to protect workers from their own carelessness, poor decision-making, and (occasionally) even their maliciousness, while also staying out of a worker’s way and avoiding data security becoming a cumbersome burden that harms productivity and leaves them irritated.

  2. 4 Mobility Trends Transforming The Manufacturing Industry
    8/26/2015

    From business decision-making to process workflows, user interfaces, and proactive maintenance, new utilizations of mobile devices and apps are drastically changing the way manufacturing gets done.

  3. Workplace BYOD: Delivering Services Is The Key
    8/25/2015

    I’m often asked what I’d recommend for the surge in bring your own device business technology, especially for mobile workforce productivity.

  4. How Your IT Clients Can Leverage The Power Of The IoT For Access Control Systems
    8/25/2015

    The Internet of Things (IoT) and interconnectivity are having a sizeable impact on the physical security industry. Among those technologies where it is having the most effect are access control systems.

  5. Shark Tales And Monolithic IT Vendors — But Good News For The IT Channel
    8/25/2015

    Back in my home country of Australia a recent series of shark attacks, far above average, are causing distress among swimmers and attracting a lot of media attention. The reason for the change in shark patterns however is because the fish schools are coming in closer to shore, apparently a result of warming sea currents, bringing the predator sharks with them.

  6. 5 Ways IT Service Providers Can Win With SMB Mobile Security
    8/25/2015

    When the mobility wave hit, data security got way more complicated for IT services providers and their SMB customers. Indeed, as mobile devices have infiltrated the SMB market in a big way, hackers have kept pace, waging full-blown attacks against the mobile landscape. Studies have shown that mobile malware assaults rose by 58 percent in 2012, making mobile data security one of the biggest threats for businesses today. 

  7. 7 Reasons To Use 2D Bar Code Scanners
    8/24/2015

    By now you are probably familiar with 2D bar codes — such as the ubiquitous QR (quick response) code — if not by name, then by sight. Your clients are probably even using QR codes for their businesses (and if they aren’t, they should be.) While QR codes can be easily read by most cell phones and mobile devices, they are not the only 2D bar codes.

  8. What SMBs Are Looking For From Their IT Solutions Providers
    8/20/2015

    I do coaching for one of our member’s sales executives. Their owner asked for some feedback on a blog we were reviewing. One of the sales executives replied with the following...

  9. MSP Sales Teams Are Not Just From IT Backgrounds Anymore
    8/20/2015

    I read an interesting interview by Jill Konrath of Brent Adamson, coauthor of “The Challenger Sale.” In the interview, Mr. Adamson talks about some of the research they have done around the point in the sale when the purchaser engages with the supplier.

  10. What To Consider When Planning Your Business Exit Strategy (Part II)
    8/20/2015

    In the first post of this series, I talked about the financial preparation required to maximize your outcome when you exit your business. Of course, that assumes you will sell or value the company at exit.