-
Mar 17, 2015, 13:00
by
qaisar khalifa
With the series of winter storms that have swept through much of the Northeast and Midwest over the past two months, thousands of flights and countless numbers of business and leisure travelers have been stranded or delayed in many cities around the country.
Full story
-
Mar 16, 2015, 10:14
by
qaisar khalifa
My colleague, Ben Baker, is intrigued by “the network effect” and shares his thoughts on what that means for the IT kind of network.
Full story
-
Mar 13, 2015, 09:16
by
qaisar khalifa
Here are four technology trends that restaurants and bars should be exploring today.
Full story
-
Mar 11, 2015, 09:00
by
qaisar khalifa
There are broadly four approaches for cloud migration that have been taken effectively by vendors, which is normally alongside their existing on-premise business.
Full story
-
Mar 9, 2015, 00:00
by
Michele Blankemeyer
Staying “up to date” with customers in small business waiting rooms now means much more than rotating out past issues of magazines. A recent survey by Bredin Research showed that providing free Wi-Fi goes much further than offering reading materials, candy or water.
Full story
-
Mar 4, 2015, 00:00
by
Michele Blankemeyer
In business, success flows from ideas and innovation. But it also requires the means to execute new plans efficiently, effectively, and rapidly. Do that, and you won’t just satisfy customers and develop deeper, stronger relationships. You’ll do it better, and sooner, than the competition.
Full story
-
Mar 2, 2015, 00:00
by
Michele Blankemeyer
Not much is better than chocolate, but when it comes to creating a workplace environment that sets employees up for success and makes patrons feel welcome, there is one clear winner: Wi-Fi.
Full story
-
Feb 27, 2015, 00:00
by
Michele Blankemeyer
Struggling with the increasing number of mobile devices within the enterprise? You’re not alone.
Full story
-
Feb 25, 2015, 00:00
by
Michele Blankemeyer
Managing a corporate network, with the myriad of attached devices and Internet-facing facets is a daily compromise. It’s a delicate balancing act between legitimate access and opportunity for malicious exploit. Unfortunately finding that balance is only going to get harder.
Full story
-
Feb 23, 2015, 00:00
by
Michele Blankemeyer
Every Wednesday we’ll tap our extensive network of business and technology experts to bring you the information you need to stay on top of new and emerging technology developments, and to help you architect your network for maximum business benefit.
Full story
-
Feb 18, 2015, 00:00
by
Michele Blankemeyer
Marc Andreesen famously said in 2011 that “software is eating the world.” I believe that’s only the case because of underlying changes to the hardware that’s facilitated it.
Full story
-
Feb 17, 2015, 00:00
by
Michele Blankemeyer
Be aware: You probably have access to too much data! That’s right: you can access data you’re unauthorized to see.
Full story
-
Feb 16, 2015, 00:00
by
Michele Blankemeyer
Intimidated by the words “cloud computing”? You shouldn’t be. While the “cloud” might instill fear in some, for a growing number of companies it means increased operational efficiency and significant cost savings.
Full story
-
Feb 11, 2015, 00:00
by
Michele Blankemeyer
The cloud has been one of the most popular buzzwords in computing for some time now, and it’s one that has plenty of reason to deserve the attention it has been getting.
Full story
-
Feb 9, 2015, 00:00
by
Michele Blankemeyer
BYOD, short for “bring your own device,” is an increasingly popular trend for employees who want to stay connected 24/7 by bringing their favorite mobile devices, such as smartphones and tablets, to the workplace.
Full story
-
Feb 5, 2015, 00:00
by
Michele Blankemeyer
Connecting your office networks used to involve choosing between a host of different packet-switching and frame-based technologies that could take data over much longer distances than the internal Ethernet system was capable of.
Full story
-
Feb 5, 2015, 00:00
by
Michele Blankemeyer
Hacked social media accounts are so common that Facebook, Twitter, LinkedIn, and just about every social networking site actually have long had SOPs for this. While the sites insist they constantly update security, users need to take better care of their accounts and make them less vulnerable to hackers.
Full story
-
Jan 28, 2015, 00:00
by
Michele Blankemeyer
Thanks to ubiquitous corporate Ethernet and WiFi, we can happily share files with other users in the office, and make use of network resources almost as if they are running locally.
Full story
-
Jan 21, 2015, 00:00
by
Michele Blankemeyer
The digitization of health and medical data holds great promise in battling against an epidemic, but the key to success lies in the ability to get the right information to the right people at the right time.
Full story
-
Jan 15, 2015, 00:00
by
Michele Blankemeyer
Ethernet used to just be the technology for the local area network. Once you reached the boundaries of a particular building, a different technology would need to be employed for connections between distant buildings and to the outside world in general.
Full story