IT and Business Insights for SMB Solution Providers

Article
September 17th, 2018 | Rich Freeman
According to channel chief Joyce Mullen (pictured), listening intently to partners is a key reason Dell has gained traction with channel pros in the two years since its epic merger with EMC. - Read More
 
Blog Entry
September 17th, 2018 | Karl Palachuk
 
Video
September 17th, 2018 | ChannelPro
Erick and Rich have Ingram Micro, the Internet of Things, turning team members into team leaders, and the filthiest surface at most airports (which may surprise you) on their minds. Listen in as they talk it out! - Read More
 
Blog Entry
September 16th, 2018 | Karl Palachuk
Last time (see Part One) I mentioned that you should create job descriptions that encourage the habits that allow people to excel and enjoy their jobs. People seek challenges. And they excel when the challenges have clear goals and good feedback mechanisms. - Read More
 
Blog Entry
September 16th, 2018 | Karl Palachuk
Let me just start by stating that you can't make other people happy. Trust me on this. I've spent far too much of my life learning that lesson. - Read More
 
Blog Entry
September 15th, 2018 | Jay Ferron
Draft Cybersecurity Practice Guide SP 1800-14, Protecting the Integrity of Internet Routing: Border Gateway Protocol (BGP) Route Origin Validation, is Available for Comment - Read More
 
Blog Entry
September 15th, 2018 | Karl Palachuk
Just added a totally new SOP-related product to the Small Biz Thoughts Community: The Internet Domain Documentation Kit. - Read More
 
Blog Entry
September 15th, 2018 | Jay Ferron
Here are a group of articles on Mitigating Ransomware Using the Rapid Cyberattack Assessment Tool, by Microsoft. - Read More
 
Blog Entry
September 15th, 2018 | Jay Ferron
Here is a link to a video on Deep dive on Windows Server 2019 updates.. Link is here - Read More
 
Blog Entry
September 15th, 2018 | Jay Ferron
During the 26th DEFCON conference this past week McAfee researchers showed how they have successfully been able to falsify patient vitals that are reported to the central monitoring stations. Two variations of the attack are possible due to weak communication protocols between client devices and the central monitoring station. - Read More
 

Pages