Most Discussed Posts

Ask an MSP Expert: How do I make sure my Office 365 data is safe?

Ask an MSP Expert: How do I make sure my Office 365 data is safe?

Q: We have clients who run almost their entire business on Office 365. However, most of them decline additional security services because they think that “Microsoft has my back,” but how true is that? To answer this question, Smarter MSP...

/ September 3, 2019 / 1 Comment
You can experiment with blockchain development tools for free

You can experiment with blockchain development tools for free

You might easily have missed it this week, when Kadena, a Brooklyn, New York startup, announced a free private Blockchain as a Service tool in the Azure Marketplace, but it could be more relevant to you than you think. When...

/ September 2, 2019 / 1 Comment
Tech Time Warp: Compaq introduces the Presario and dominates the PC market

Tech Time Warp: Compaq introduces the Presario and dominates the PC market

If you owned a home computer in the 1990’s, chances are it was a Compaq Presario. Today, the name Compaq might incite nostalgia, but during the 1980’s and 1990’s, Compaq dominated the personal computer market. Compaq was one of the...

/ August 30, 2019 / 1 Comment
How DevOps savvy is your organization?

How DevOps savvy is your organization?

The term DevOps has been bandied about for several years now, and while its meaning is open to debate, it’s basically a set of principles that help establish roles for developers and IT to build software in a continuous delivery...

/ August 28, 2019 / 1 Comment
VMware Cloud on AWS momentum starts to swell

VMware Cloud on AWS momentum starts to swell

Following a few early VMware missteps, it would appear that cloud momentum surrounding VMware, on the eve of the annual VMworld conference next week, is finally starting to increase. A survey of 1,156 IT and business professionals published today by...

/ August 22, 2019 / 1 Comment
5 steps to adopting a cloud services model

5 steps to adopting a cloud services model

Cloud computing has transformed the way companies do business. It’s no longer a solution for just enterprises, as it’s expected to exceed $270 billion by 2020 and 44 percent of the growth will come from small businesses. And it’s anticipated...

/ August 20, 2019 / 1 Comment
How RPA can help drive automation in legacy businesses

How RPA can help drive automation in legacy businesses

Increasingly, companies are looking for ways to automate repetitive internal processes, but most can’t simply rip and replace the systems that they have in place and go for the latest and greatest AI technologies. It’s simply too risky, disruptive, and...

/ August 19, 2019 / 1 Comment
Supply chain attacks on the rise

Supply chain attacks on the rise

You’ve turned your client’s network into a virtual fortress. There are firewalls, double authentication protocols, an up-to-date patching regimen, and frequent pen-testing. You’ve pretty much eliminated the threat of hackers within your client’s critical network, right? Think again.

/ August 14, 2019 / 1 Comment
Your next hack could arrive by snail mail

Your next hack could arrive by snail mail

When you think about getting hacked, you probably imagine hackers using stolen credentials, undertaking a phishing attack, or exploiting a vulnerability in your network. What you probably don’t expect is for them to come through the front door, and access...

/ August 9, 2019 / 1 Comment
Tech Time Warp: Was the Welchia Worm well-intended?

Tech Time Warp: Was the Welchia Worm well-intended?

As the old saying goes, two wrongs don’t make a right — especially if the second “wrong” is a computer worm, albeit a benevolent one. In August 2003, hundreds of thousands of PCs were infected by the Blaster worm, which...

/ August 9, 2019 / 1 Comment