Blog
-
Things you need to know about the recent CPU vulnerability issue
January 19, 2018
Recently, an industrywide vulnerability was identified by Google that involves modern microprocessor architectures. Based on new security research, there are software analysis methods that, when used for malicious purposes, have the potential to improperly gather sensitive data from computing devices… Read more
-
10 Reasons companies are moving communications to the Cloud today
April 10, 2017
There’s lots of buzz around the cloud these days and cloud communications is no exception. But buzz isn’t always an indicator of a business case for technology purchases. Smart businesses are asking what’s driving the rush to the cloud—and they’re… Read more
-
Options for Avaya Customers: Do Nothing. Change Everything. Or Evolve. Confused? Read On…
April 7, 2017
Close to 3 months have passed since Avaya’s January 19 filing for Chapter 11 protection in the US bankruptcy courts. This petition marked the next step in a long journey of uncertainty for Avaya that started in 2009 when it… Read more
-
Why Early Detection Of Ransomware Is Essential
January 24, 2017
Many people assume that ransomware, once it enters a computer, only locks the files on said device. While this was the case in the early days, today’s ransomware is much more vicious, designed to spread itself out across entire networks,… Read more
-
The challenge of print in schools
January 16, 2017
As mobile devices seem to be surgically attached to the palms of children these days, it follows that schools and colleges are increasingly looking to offer mobile printing solutions. After all, today’s youngsters are more tech savvy than ever before… Read more