Blog

bigstock digital transformatio 147207563

FIVE REASONS YOU NEED TO DO DIGITAL TRANSFORMATION IN 2018

Source: Tech Revolution. (www.techrevolution.asia)   Has your company entered the digital revolution yet? If not, you may soon be left behind. Harvard Business Review’s recent prediction about the Asia Pacific region was: “Expect to see the pace of innovation accelerate, with established organisations and startups vying to capture and retain the increasingly tech-savvy consumers driving digital transformation.” …

FIVE REASONS YOU NEED TO DO DIGITAL TRANSFORMATION IN 2018 Read More »

bigstock computer security 75958241

PROTECTING YOUR BUSINESS FROM CYBER THREATS

Posted Feb 1, 2018 by Jim Carnes It’s Friday afternoon (it always happens on Friday afternoon) and the phone rings — there’s a breach. Your internet provider has called and malware associated with the latest botnet has been detected coming from your corporate network. The incident response plans are triggered and everyone goes into high alert, looking for the …

PROTECTING YOUR BUSINESS FROM CYBER THREATS Read More »

mobilecommerce

HOW TO BUILD A BUSINESS-FOCUSED “CLOUD-COMMERCE” MARKETPLACE FOR THE LESS SEXY ECONOMY

Posted Jan 11, 2018 by Ben Johnston (@BHJbenjohnston), Elena Painter (@lainypainter) For consumers, huge new internet marketplaces have upended industries ranging from taxis (Uber) to hotels (Airbnb) and even some types of consumer loans (LendingClub). Now, new types of online marketplaces — we call them “cloud-commerce” companies — are popping up to serve businesses. We think they have the potential to …

HOW TO BUILD A BUSINESS-FOCUSED “CLOUD-COMMERCE” MARKETPLACE FOR THE LESS SEXY ECONOMY Read More »

newblog

WHO SHOULD BE RESPONSIBLE FOR CYBERSECURITY?

By Andrew Douthwaite, Contributor, CSO | JAN 16, 2018 6:20 AM PT. Clearly, cybersecurity is everybody’s problem. It’s high time this truth was recognized, starting with the executive suite on down. The news today is flush with salacious stories of cyber-security breaches, data held hostage in brazen ransomware attacks, and compromised records and consumer information. So too has the fallout …

WHO SHOULD BE RESPONSIBLE FOR CYBERSECURITY? Read More »

Cloud phones

5 BENEFITS OF CLOUD-BASED VoIP

posted in INFORMATION TECHNOLOGY by IVAN WIDJAYA Although many companies have already begun to use the cloud for their everyday business needs, this tool’s capabilities expand far beyond the day-to-day operational processes. By integrating cloud-based VoIP into your firm, IT professionals can spend more time tending to core business technologies instead of having to troubleshoot and maintain phone systems. …

5 BENEFITS OF CLOUD-BASED VoIP Read More »

CLOUD TA

GOOGLE, AMAZON FIND NOT EVERYONE IS READY FOR AI

EXECUTIVES AT ASCENDANT tech titans like Amazon and Google tend to look down on their predecessor IBM. The fading giant of Armonk, New York, once sustained itself inventing and selling cutting-edge technology, but now leans heavily on consulting. Renting out people to help other companies with tech projects is a messier and less scalable business than …

GOOGLE, AMAZON FIND NOT EVERYONE IS READY FOR AI Read More »

bananapeel

9 MISTAKES THAT KILL YOUR AWS RDS REPLICATION

What you should avoid when using AWS RDS replication If you’re using Amazon’s relational database service, AWS RDS, you can leverage its powerful replication capabilities for a variety of cloud applications, particularly when implementing disaster recovery (DR) or migration. Although AWS did a great job of providing a robust feature-set, even IT veterans find it …

9 MISTAKES THAT KILL YOUR AWS RDS REPLICATION Read More »