Efficient Computer Networks Reduce Costs and Increase Efficiency

May 16th, 2015

Many companies spend a lot of time and resources on deciding exactly HOW to build and configure their computer networks. There are many choices and considerations, but one of the most important aspects of the decision making process is how the network’s architecture will positively affect the company and its bottom line.

Do Mobile Fingerprint Scanners Truly Protect Your Business?

May 15th, 2015

Apple has added some intriguing features to their latest mobile product lineup, one of which is the fingerprint scanner. Its stated purpose is to heighten the security on the mobile phone. As the smartphone in general becomes increasingly integrated into the mobile office, making it harder to break in seems like a good idea.

Managing Power and Cooling is Still Key to Business IT

May 14th, 2015

You may believe, in the current environment of cloud migration, that the onsite data center has passed into oblivion, or, at least, been severely diminished. Part and parcel of this change would mean managing power and cooling would also be a thing of the past.

Travelers Beware: Hotel Wi-Fi Could be Open to Attack

May 13th, 2015

It’s convenient, it saves you and your company a few dollars over your personal or business mobile hot spots and it just pops up when you flip open your laptop or look at your tablet or smartphone. You may not even think twice before hopping on the Wi-Fi at your hotel, but perhaps you should be more cautious.

Barriers To Small Business Technology Adoption

May 12th, 2015

Speed is life in the business world. That’s true of most every aspect of your business, but it’s especially true of technology, and the speed with which you adopt technological innovations critical to your business’ success.

One of the challenges, of course, is to be able to properly identify the technologies that are critical to your success.

Should Leasing Be Part Of Your Tech Strategy?

May 11th, 2015

One of the major decisions any company must make is whether to lease their technical equipment or to buy it outright. As with most decisions in the business world, there are pros in cons to both sides of the equation.

The Pros of Leasing

Your Equipment Won’t Become Obsolete

One of the major setbacks to buying your equipment vs leasing it is that most of the technical equipment you buy, especially in the area of personal computers, becomes obsolete fairly quickly.

Security A Growing Concern For Business

May 9th, 2015

In 2014 we saw numerous security breaches around the world. We saw the security compromised in such big names as Sony, Target, Goodwill Industries, Home Depot, JP Morgan and Michaels. For 2015, most security analysts are predicting an even greater increase in the number of security breaches and cyber-attacks.

Potential Business Uses of the Apple Watch

May 8th, 2015

The Apple Watch has finally been released and the critics are, of course, following up with their list of failed expectations of the device and the distant observations of how they would do things differently. While the technology has a number of obvious features that attract the average consumer, the question of how businesses can use this mobile device to impact productivity and see that impact reflected on their bottom line, is on many lips.

Does Your Mobile Device Come Complete With Malware?

May 7th, 2015

When you open the box on a new tablet, cell phone, netbook or laptop it is tempting simply to hit the start button and go. Unfortunately, doing that may be a big mistake, not because you need to read the instructional manual or pick out a waterproof case, but because there is a possibility that lurking on that shiny new mobile device is malware.

Hackers Not the Greatest Cloud Security Risk

May 6th, 2015

It is commonplace today to hear businesses voicing concerns about using cloud based services as though the cloud is much less secure than any system you might purchase or devise on site. In reality it is not the cloud or any other platform that determines how much of a security risk you are taking with your data.