Blog

  • Things you need to know about the recent CPU vulnerability issue

    January 19, 2018

    Recently, an industrywide vulnerability was identified by Google that involves modern microprocessor architectures. Based on new security research, there are software analysis methods that, when used for malicious purposes, have the potential to improperly gather sensitive data from computing devices… Read more

  • 10 Reasons companies are moving communications to the Cloud today

    April 10, 2017

    There’s lots of buzz around the cloud these days and cloud communications is no exception. But buzz isn’t always an indicator of a business case for technology purchases. Smart businesses are asking what’s driving the rush to the cloud—and they’re… Read more

  • Options for Avaya Customers: Do Nothing. Change Everything. Or Evolve. Confused? Read On…

    April 7, 2017

    Close to 3 months have passed since Avaya’s January 19 filing for Chapter 11 protection in the US bankruptcy courts. This petition marked the next step in a long journey of uncertainty for Avaya that started in 2009 when it… Read more

  • Why Early Detection Of Ransomware Is Essential

    January 24, 2017

    Many people assume that ransomware, once it enters a computer, only locks the files on said device. While this was the case in the early days, today’s ransomware is much more vicious, designed to spread itself out across entire networks,… Read more

  • The challenge of print in schools

    January 16, 2017

    As mobile devices seem to be surgically attached to the palms of children these days, it follows that schools and colleges are increasingly looking to offer mobile printing solutions. After all, today’s youngsters are more tech savvy than ever before… Read more