Networking Articles

  1. Are Wristbands Passé? Keep An Eye On The Wearables Revolution
    12/1/2015

    Even in the healthcare space, where innovative applications of mHealth are far from uncommon, the discussion of wearables generally centers on wristbands and watches. A recent event in Finland, however, is pushing us all to look beyond that.

  2. FTC Emphasizes Need For IoT Security
    11/30/2015

    The Federal Trade Commission is stressing the importance of security with Internet of Things (IoT) solutions.

  3. Jim Collins Talks Greatness At Ingram Micro ONE
    11/27/2015

    Jim Collins’ books are pretty much required reading for the business world. The man’s works, including Good to Great, are highly regarded as some of the best continuing ed for aspiring business leaders. Last week I was lucky to be among the 2,000 Ingram Micro ONE attendees to be able to hear Collins speak for almost two hours. During that time, his presentation covered 12 questions to ask yourself, your team, and business that can help the business reach “greatness.”

  4. What You Missed At Ingram Micro ONE Fall 2015
    11/25/2015

    Last week I was one of 2,000 people who attended the Ingram Micro ONE fall conference in Nashville. I have 10 full pages of notes from the event. Following are some highlights I thought you’d find valuable, along with my commentary.

  5. Storage Automation Benefits Include IT-As-A-Service Delivery
    11/24/2015

    SolidFire, a provider of all-flash storage systems, released survey results that offer insights into how IT professionals are benefitting from automation of the storage layer. The 2015 Storage Automation Report is based on the survey that was conducted by independent research organization TechValidate of more than 300 global IT professionals.

  6. Intel Security: 2016 Cybercrime Predictions And What VARs Can Do For Their Clients
    11/24/2015

    Intel Security’s McAfee Labs released predictions for cybercrime next year and beyond to 2020 in the McAfee Labs Threat Predictions Report.

  7. Research Finds $30 Billion Wasted In U.S. On Unused Software
    11/20/2015

    Global organizations are wasting money on software that is not used, according to a new report from Software Lifecycle Automation company 1E. The report The Real Cost of Unused Software analyzed the results of a four-year study of more than 1,800 software titles deployed on 3.6 million desktops, in 129 enterprises, across 14 industries.

  8. CompTIA: Lack Of Cyber Security Knowledge Is Harmful To Organizations
    11/20/2015

    In a recent experiment designed to discern common attitudes and behaviors regarding cybersecurity, CompTIA revealed that nearly one in five people who found a random USB stick in a public setting would use it, opening themselves — and possibly their employers — to cybersecurity risk. By Christine Kern, contributing writer

  9. How Cloud-Based Applications And Services Can Grow — And Protect — Your Business
    11/19/2015

    In this exclusive interview with Business Solutions, David Byrd, CMO and VP of Operations for CloudRoute, lists benefits of delivering cloud-based applications and services, and also explains why this may be necessary to protect your IT solutions provider business.

  10. Attention VARs: Benefits Administration Is Ready For The Cloud
    11/19/2015

    Cloud computing is continually popping up as a welcome entrant in different areas in the world of healthcare, and this time, it’s benefits administration.