Strengthen your workplace culture through random acts of kindness

Over the past few years the annual calendar has been populated with many ‘National’ days of celebrations - but one that has a resounding effect to everyone, everywhere is the ... Read more

The IT leader’s stress-free guide to managing and securing meeting rooms

Meeting room technology, such as conferencing and AV equipment, used to be outside of IT’s realm. But as the tech has evolved to the point of being a network and security conc... Read more

Get your small business out of the 80s

Is your business still using outdated business processes that were put in place years ago? A surprising number of businesses are still using them. Here are three common vestig... Read more

Big data deployment: It’s never “one size fits all”

By George Dearing We've gone data crazy. Data lakes, dark data, data scientists — anything that helps us conjure up insights from our information is, well, big. But there are... Read more

The future is now: How augmented reality can revolutionize the way you do busine...

The shiny eevee. The snorlax. The snubbull. Yup, they’re characters from Pokemon Go, the viral mobile game that took the world by storm in the summer of 2016. But they’re also... Read more

5 steps to make your work life more meaningful in 2020

With the onset of a new decade, many of us will begin the new year by setting resolutions for the year ahead. Resolutions can apply to both our personal and professional lives... Read more

Hey you, get off my cloud: Top business tips for cloud security

Your business has realized that it can save money, time, and physical real estate by moving data storage to a cloud system. Your CIO is on board with the move, but within you... Read more

What will office print look like in 2025?

Traditional office print is a thing of the past. A new world of work is here and it’s digital, connected and constantly changing. Organizations are evolving at an unprecedente... Read more

Is Ransomware Malware’s Killer App?

Computer viruses has been around for almost as long as computers themselves. Like many of the early tinkerers of computing, the motivations of early virus authors ran the gamu... Read more

Best Practices: Avoiding a Spam or Phishing Attack

A criminal is planning his next heist. He's looking for the easiest target—the path of least resistance, where he can win big without much effort. Only today, he isn't lookin... Read more