Networking Articles

  1. Don't Leave Your SMB Customers Unprotected
    4/29/2015

    Last week I wrote an article urging VARs to provide their SMB retailers with technologies that allow those retailers to act like the big chains. I still stand by that recommendation, but now realize that such an idea doesn’t have to be limited to SMB retailers. Coincidentally, Business Solutions Editor Jay McCall just interviewed Jensen Information Technologies for an upcoming issue of the magazine. In the article, the MSP’s director of sales shares how they provide SMB customers in manufacturing and professional services an enterprise experience.

  2. Videos Provide Insight Into Techniques, Motives For Hacking Apps
    4/29/2015

    Arxan Technologies, a mobile app security solutions provider, believes the first step in defending yourself from hackers it to think like one. The company has created a video series to help enterprises make it more difficult for hackers and fraudsters to tamper with apps.

  3. NFL Teams Use EHR Systems To Streamline Care
    4/29/2015

    EHRs are useful beyond just the world of hospitals and the military. Anywhere a human body is treated, they can bring benefits and innovation. This includes athletic spaces.

  4. Senators Urge Congress To Update Technology Policies
    4/29/2015

    In the wake of the Senate’s unanimous approval of a resolution to push greater adoption of the Internet of Things last month, two U.S. Senators have urged the Senate Committee on Rules and Administration to update Senate policies pertaining to the use of digital media and technology.

  5. $1 Million HHS Grant Meant To Encourage Health Information Sharing
    4/29/2015

    Your health IT clients could be candidates to apply for a recent grant offering aims to encourage interoperability at the community level.

  6. 2015 Verizon Data Breach Report: 9 Basic Patterns Cause Most Security Incidents
    4/28/2015

    Verizon released its 2015 Data Breach Investigations Report (DBIR), which found that, while cybercriminals are using increasingly sophisticated means in their attacks, security breaches are precipitated in nine basic ways. By Christine Kern, contributing writer

  7. HIT Storage Challenges Addressed At HIMSS15
    4/27/2015

    One of HIMSS15’s presentations came from DataCore Software, a provider of software-defined storage. The presentation was timely — data is becoming bigger, ever more important, and ever more difficult to contain and protect.

  8. Experts: Flash Net Cost Is Less Than Disk
    4/27/2015

    Experts predict that enterprise-flash adoption will increase as new, cheaper and denser technologies emerge to help drive down costs. New research from Wikibon’s latest 2015 Storage Cost Assumptions has demonstrated that flash has already surpassed magnetic disk as the most cost-effective medium for performance-driven applications and soon will be cheaper than disk as well.

  9. Facial Recognition, Beacon-Based Geofencing, Liquid Metal Technology Among New Apple Patents
    4/24/2015

    A few weeks ago, Apple received 36 separate patents, covering technology including facial recognition, beacon-based geofencing, and liquid metal technology according to Patently Apple. A complete list may be found here, on Latest Patents.

  10. Insider Perspective On Potential IT Spend In The Health Vertical
    4/24/2015

    It’s beneficial to have the insight of insiders to understand the healthcare vertical.

Newsletter Signup
Newsletter Signup
Get the latest channel trends, news, and insights
By clicking Sign Me Up, you agree to our Terms and that you have read our Privacy Policy.