The Real Cost of Software Non-Compliance (and what to do about it)

The Real Cost of Software Non-Compliance (and what to do about it)

Software compliance is one of those aspects of business that exists safely in the back of your mind until, suddenly, it rears its ugly head. Issues of software non-compliance rarely occur intentionally, and are often the result of a company expanding beyond the scale of their original licensing agreements.

In short, while it may be a good problem to have, it becomes a huge headache if left unchecked for too long. Our team digs into the real costs of software non-compliance – and how to address it.

[Read more…]

5 Communication Tool Rollout Tips For Happier Employees

5 communication tool rollout tips for happier employees

Employees today have more ways to communicate and collaborate than ever before, from desk phones and email to productivity apps in the cloud, instant messaging, video conferencing and smartphones. Many IT managers, however, are hesitant to invest in new collaboration technology, most claiming the tools they’ve already implemented to help employees work faster, smarter and happier are not being used to their potential.

As we’ve seen before, what end users want is rarely in perfect alignment with what IT departments provide. When selecting and introducing new office communication tools – which employees rely on regularly – even small discrepancies in priorities can result in major gaps in user adoption and even job satisfaction.

In our recent study, Working Hard or Hardly Networked we surveyed employees and IT managers to explore IT departments’ processes around unified communication (UC) and collaboration tool rollouts, and their impact on employee user habits and overall happiness.

[Read more…]

Why the Shellshock Vulnerability Is A Perfect 10

Why the Shellshock Vulnerability Is A Perfect 10

Another big buzz in the media again. Looks like there has been another dangerous vulnerability identified and rated a 10 for impact, and a 10 for exploitability. This is the threat we now know as the Shellshock Vulnerability.

The major concern is that, if an attacker has the skill to craft a packet to take advantage of the vulnerability, they can inject code that compromises a target machine.

That seems simple enough – and from a conceptual perspective, it is. So why it is rated so high? And how does it compare to the Heartbleed bug we recently heard so much about?

[Read more…]

Telemerge Talks Telepresence With PrintFleet CCO David Morrow

Telemerge Talks Telepresence With PrintFleet CCO David Morrow

Previously employed with Xerox, KPMG, Telus and Konica Minolta, David Morrow is currently a creative and goal-oriented Chief Commerical Officer at PrintFleet Inc. During his career he has been recognized as an expert in sales, performance management and a motivator of teams. We were able to steal 45 minutes out of his busy day to discuss how technology solves for the challenges he’s experienced in the sales management process.
[Read more…]

Are you protected from password security breaches?

password securityThere have been a lot of headlines in the news recently about password security breaches.

From “Russian Hackers Amass Over a Billion Internet Passwords” to “Stolen Passwords at Core of Breach”, or “New Vulnerabilities Expose User Passwords for Sites You Use.”, you should be alarmed. [Read more…]

Are You Ready to Join the Revolution Against Outdated Data Centers? – UPDATED

Are You Ready to Join the Revolution Against Outdated Data Centers?

Editor’s note: our virtualization expert Stephen Akuffo weighs in on the Virtual Space Race Study blog series – see his notes below.

Do you remember the days of dial up – when you had the patience to wait minutes for the information you wanted? Fast forward 20 years. We now live in an era that demands immediate results, requiring much more agility from our IT infrastructure. This progression has forced us to streamline processes and leverage systems in ways that were unheard of years ago.

[Read more…]