Articles

  • Top 3 Reasons Why Now is the Time for Surface

    Top 3 Reasons Why Now is the Time for Surface

    Read Article
  • The Benefits of a Self-encrypting Drive

    The Benefits of a Self-encrypting Drive

    Read Article
  • Hyperconvergence and the Bottom Line

    Hyperconvergence and the Bottom Line

    One of the most common questions organizations have regarding hyperconverged infrastructure is how it affects the bottom line. With hyperconverged infrastructure, you combine storage, computing,...

    Read Article
  • Build a Layered Security Solution

    Build a Layered Security Solution

    Modern cyber attacks are increasing and are becoming more sophisticated. In addition to existing malware, security experts are seeing an increase in never-seen-before malware. For the average...

    Read Article
  • Barco Clickshare wireless presentation system for collaboration rooms [Video]

    Barco Clickshare wireless presentation system for collaboration rooms [Video]

    Read Article
  • 5 Public Cloud Computing Trends to Watch for 2019

    5 Public Cloud Computing Trends to Watch for 2019

    2019 promises to be an exciting year for cloud computing in general, and for emerging public cloud computing trends in particular. Organizations are highly focused on investing in their...

    Read Article
  • How Managed Print Services Can Benefit Your Business

    How Managed Print Services Can Benefit Your Business

    Managing a fleet of printers can take a significant amount of work—especially since printer management is rarely centralized. Typically, IT oversees printer maintenance and security. Office...

    Read Article
  • Are Printers Your Security Weak Spot?

    Are Printers Your Security Weak Spot?

    Does your organization have networked printers? If the answer is yes, they may be one of your organization’s most critical—and most overlooked—cyber security weak spots. The Ponemon Institute is...

    Read Article
  • The Knowledge You Need to Migrate from Exchange to Office 365

    The Knowledge You Need to Migrate from Exchange to Office 365

    If you currently have a Microsoft Exchange deployment and are considering migrating to Office 365, you might find yourself faced with the dilemma of whether to use a separate (non-Active... The...

    Read Article
  • Three Reasons to Change How You Adopt Software

    Three Reasons to Change How You Adopt Software

    When it comes to the new options for purchasing software, the way we purchase music comes to mind. Before, if you wanted one single song, you had to buy the... The post Three Reasons to Change How...

    Read Article
  • Connection LIVE 2019 - Event Wrap-up

    Connection LIVE 2019 - Event Wrap-up

    Read Article
  • HP Z Workstations - Telemedicine Solutions for Emergency Care Providers

    HP Z Workstations - Telemedicine Solutions for Emergency Care Providers

    Read Article
  • Make Your Life Easier with Software-Defined Networking

    Make Your Life Easier with Software-Defined Networking

    Software-defined wide area networking (SD-WAN) is the next big thing since cloud. Every enterprise is talking about SD-WAN to optimize and manage expensive WAN circuits. I recently attended a...

    Read Article
  • Citrix NetScaler Security

    Citrix NetScaler Security

    Recently, I had an opportunity to learn and work with one of Citrix’s flagship products called NetScaler. In this two-part article, I am writing a broad overview on the NetScaler’s... The post...

    Read Article
  • Understanding the Internet of Things and Security Threats You Never Knew Existed

    Understanding the Internet of Things and Security Threats You Never Knew Existed

    It’s the dawn of a new era for a set of networking protocols known as universal plug and play (UPnN) and Internet of Things plug and play. The Internet of... The post Understanding the Internet of...

    Read Article
  • My Work Should Work for Me Too: Workplace Technology for Digital Natives

    My Work Should Work for Me Too: Workplace Technology for Digital Natives

    It’s the end (yeah, right) of another (twelve-hour) day as I settle into my recliner (seat 6C of a 737) to relax (catch up on several hundred unread emails). En... The post My Work Should Work for...

    Read Article
  • Build Your Cloud Security Program with Microsoft Secure Score

    Build Your Cloud Security Program with Microsoft Secure Score

    The latest Microsoft Intelligence Security Report shared some interesting statistics that had me thinking for several days. The report shows how businesses lose $1M per minute to cybercrime around...

    Read Article
  • How Edge Computing in Healthcare Is Transforming IoT Implementation

    How Edge Computing in Healthcare Is Transforming IoT Implementation

    While most industries grapple with how to leverage Internet of Things (IoT) technologies, healthcare—as a whole—already has embarked on digital transformation to achieve operational efficiencies...

    Read Article
  • A Network Engineer’s Perspective of Virtual Extensible LAN (VXLAN)

    A Network Engineer’s Perspective of Virtual Extensible LAN (VXLAN)

    What Is VXLAN? Virtual Extensible LAN (VXLAN) has been around for a few years now, but still may be unknown to many. As a person in the IT field, getting... The post A Network Engineer’s...

    Read Article
  • Why Retail Needs to Leverage Edge Computing Solutions

    Why Retail Needs to Leverage Edge Computing Solutions

    Retailers are no strangers to disruption, having been forced by online shopping to innovate and adjust their strategies to new consumer habits. The disruption is far from over, as the... The post...

    Read Article
  • loading