Need Assistance? Call us at (512) 814-8044, or submit a ticket

Is The Desktop Really (Pretty Much) Dead?

I read an article recently claiming that “The desktop is (pretty much) dead” and I could not help but wonder if this was just an attempt at riling people up, drawing readership (they got me to read it), or just plain fantasy that “cloud” providers cook up to justify their continued push for ever increasing budgets with limited returns.

Sure, they bombard us with International Data Corporation (IDC) statistics and charts to bolster their arguments. But like sports analysts who glowingly call U.S. MLB, NBA & NFL champions “World” champions, one is forced to ask “what “World” are they referring to?” (more…)

Share

Continue Reading

How To Cut Costs With Hosted Digital Phones

This is the Internet Age. Broadband and high-speed connections in the small to midsize business environment is now the norm as opposed to the exception it was a few years ago. What does that mean for the small and midsize business owner? Huge cost savings for one, in the area of communication. With the many offerings available today, it is not uncommon for businesses to reduce telephone costs by as much as eighty (80) percent. Here’s the rundown.

VoIP is a term that refers to Voice over Internet Protocol. It is a technology that allows phone calls to be made using high-speed Internet connections like cable, T1 or high-end DSL. Other common names for VoIP are IP, digital and Internet phones. The unique thing about digital phone technology is that it works with regular analog phones and this is important because since not everyone may have this technology in place, your calls will still be received whether the party you are calling has VoIP in place or not. (more…)

Share

Continue Reading

The RSA Breach: Time for Full Disclosure?

As more companies with national security interests come forward with admission of breaches related to the hacking of RSA’s SecurID technology, one wonders if it is time for RSA to break its stubborn refusal to tell the public what exactly was stolen or when the breach actually occurred. At this stage, it is not just enough to tell the public that it had been hit by a phishing email exploiting a zero-day vulnerability in Adobe Reader. (more…)

Share

Continue Reading
Close Menu
Share
Share