Last week I was one of 2,000 people who attended the Ingram Micro ONE fall conference in Nashville. I have 10 full pages of notes from the event. Following are some highlights I thought you’d find valuable, along with my commentary.
This cloud services provider is beating out huge competitors — and realizing double-digit revenue growth — by being a stickler on the basics.
An MSP performs a $350,000 network infrastructure, virtualization, and off-site replication install for a media production company with high-availability and capacity needs.
This IT solution provider beats out premises-based IP telephony resellers by offering cloud-based VoIP (voice over Internet Protocol) solutions with all the same features and functions.
Ian Trump is a fan of ransomware; not because of what it does but because of how it’s refocused our attention on security. Here he offers four quick wins that will help you build a hard-to-hack fortress.
Conventional wisdom in the security industry says that as security is increased, productivity decreases proportionately. Everyone’s experienced it. Access to a certain application or server is denied unless the user is within the confines of the organization. Employees are required to log in to a virtual private network (VPN) when working remotely in order to access key corporate IT assets.
Shadow IT, information-technology systems and solutions built and used inside organizations without explicit organizational approval, can be lurking in any company’s infrastructure. In today’s modern cloud era with easy-to-leverage applications and devices, the IT department —or you, as an IT solutions provider — can very easily lose control.
Big Data has become one of the most reliable tools for businesses to discover more about their audience, focus their marketing plans, and boost their sales. Although it’s a complicated process, once it’s understood and harnessed, the benefits are immediate and long lasting.
Since my first presentation representing IBM on Pervasive Computing in 1995, I have had a keen interest on how the market would evolve. Using my trusty Wi-Fi-enabled toothbrush as a prop, I would try to paint a picture of a world with billions of devices and sensors changing our everyday lives, disrupting industries, and ushering in the end of client/server computing.
eFolder has found that, despite the clear demarcation between the needs of “casual” users and working professionals, especially in security and collaboration, many businesspeople still select consumer-grade file sync services because they don’t understand the key differences between consumer-grade and business-grade file sync solutions.
Zebra Technologies is introducing the industry’s first complete, ruggedized enterprise-grade hardware and software Direct Data Exchange (DEX) solution that connects Direct Store Delivery (DSD) drivers to stores without a rugged DEX cable. With the introduction of Zebra’s new DX30 DEX Bluetooth-enabled wireless key fob – no bigger than a typical automobile key – Zebra has removed physical cables and eliminated common failure points at the wall jack or device.
Barilla Group, the makers of Barilla brand pastas and sauces, wanted to provide consumers with the ability to trace the chain of production — from where food for ingredients is grown to the product on the store shelf.
|ASCII Success Summit||October 22-23||Irvine, CA|
|Tigerpaw Partner Conference||October 28-30||Omaha, NE|
|Channel Transitions — Southeast||November 5||Orlando, FL|
|HTG Peer Groups Centralized Meeting||November 9-11||Orlando, FL|
|ConnectWise IT Nation||November 11-13||Orlando, FL|
|SYNNEX Fall VARNEX||November 8-11||Anaheim, CA|
|ISV IQ Live! West||February 24, 2016||Santa Ana, CA|
|Channel Transitions||June 2, 2016||Philadelphia|
|Channel Transitions||September 14, 2016||Boston|
|ISV IQ Live! East||October 6, 2016||Philadelphia|
Networking refers to the range of hardware, software, processes, regulations, and protocols that make up computer and other networks. A network is a telecommunications system that allows connected devices to exchange data via cables or wirelessly (Wi-Fi). Networks provide shared access to systems, services, applications, and devices such as the World Wide Web, servers, printers, storage devices, email, messaging, and many more.
Security on networks is controlled by a network administrator through a set of provisions and policies that prevent unauthorized access to the network and network-accessible resources. Access to secured networks requires authentication usually via username and password (one-factor authentication), but can be augmented to include additional steps based on something a user 'has' such as generating a code via a security token, card, or mobile phone (two-factor authentication), and further augmented to include something a user 'is' such as a retinal or fingerprint scan. Firewalls enforce access policies on the network and anti-virus software or intrusion prevention systems (IPS) help to detect and inhibit malware and other potential threats.
Networks can be connected by electrical cable, radio waves, and optical fiber which are defined as layers 1 (physical layer) and 2 (data link layer) in the OSI model. Types of wired technologies include twisted pair wire, coaxial cable, ITU-T G.hn, and optical fiber. Wireless technologies include terrestrial microwave, satellite, cellular and PCS, radio and spread spectrum, and infrared. The basic hardware components of a network include network interface controllers (NIC), repeaters and hubs, network bridges, network switches, routers, and firewalls.
Ethernet is the most widely-adopted and used family of communications media used in local area networks (LAN), encompassing both wired and wireless network communications. IEEE 802 defines the standards and protocols that enable networked device communications. Networks can be classified by physical capacity or purpose such as personal area networks (PAN), local area network (LAN), storage area network (SAN), wide area network (WAN), virtual private network (VPN), and others.
The Smart VAR Summit: Age Of Intelligence — IoT, Cloud, & Mobility Convergence, powered by ScanSource, Zebra Technologies, and Business Solutions, was filled with advice for integrators and solutions providers on how to deliver Internet of Things (IoT) solutions to their clients.
Business Solutions president Jim Roddy interviewed Health IT Outcomes chief editor Ken Congdon at the Smart VAR Healthcare Summit on Aug. 11, 2015, at the Renaissance Dallas Richardson Hotel.
At Channel Transitions Midwest on October 7, 2014 at the DoubleTree by Hilton Hotel, Chicago-Oak Brook, Jonathan Kos, VP of sales at CloudFounders, tells how managed services providers can leverage CloudFounders’ white-labeled products to offer privately hosted cloud solutions.
At Channel Transitions Midwest on October 7, 2014 at the DoubleTree by Hilton Hotel, Chicago-Oak Brook, Chester Ritchie, senior VP of strategic partnerships at WorldPay, displays payment solutions and discusses how solutions providers can establish recurring revenue streams.