Submitted by Beth Hill
Thanks to Voice over Internet Protocol (VoIP) and ever-improving cloud technologies, the phone-service options available to you as a small business are plentiful, with more features at a lower cost than were ever available before.
However, with all the options and vendors, separating the good from the bad and navigating the hype can be difficu...
Submitted by Bryan Guinn
Entrust Technology Consulting Services
This article excerpt originally appeared here
The retail industry no longer looks at omnichannel as a revelation, in fact, the term has become somewhat ordinary within the industry. In 2016, the rise of mobile devices and accessibility will see retailers accelerate to mobile-first strategies, alongside other new growing t...
Submitted by Derrick Pizarro & Court Allen
Like most things these days, licenses come in many different varieties. Depending on the license and the parties’ circumstances, several different considerations may come into play. Here are a few of the important provisions that frequently need to be considered in a license.
1. License Grant
The license grant provision sets out ...
Submitted by Rosalind Ong De Treviño
UTSA - Office of Information Technology
Technology departments have moved far beyond break fix solutions. Across industries, IT is asked to develop innovative solutions that support enterprise needs surpassing standard computing to support the mission and vision of the organization. At UTSA this often means research.
The Office of Information Techn...
Submitted by Beth Hill
There’s no doubt about it – the Internet and mobile and cloud computing have made our lives easier and our businesses more productive, cost-effective and competitive. But make no mistake about it: the Internet is also a breeding ground for thieves and predators, not to mention an enormous distraction and liability if not used properly. It is caus...
Submitted by Andy Kabbe
According to SuperData Research in 2016, investment in Virtual Reality (VR) will be $3 Billion. This is up from $1.9 Billion in 2015. Consider 60% of investment funds target Gaming Development. Other investment funds target immersive and cinematic VR. With this level of investment, the future use of virtual reality will almost certainly become a main stream e...
Submitted by Tom DeSot
Digital Defense, Inc.
News headlines are rampant with accounts of ransomware attacks shutting down schools, hospitals and businesses across the country. Cyber criminals are infecting machines with malicious code, and then executing the code to encrypt and hold the data “hostage”. Once the ransom is paid, the attacker decrypts the data and returns the files to the u...
Presented by Presidio
Wednesday, May 11, 2016
Henry B. Gonzalez Convention Center
The 9th annual InnoTech San Antonio returns to the Henry B. Gonzalez Convention Center on May 11. Join over 1,300 technology and IT professionals for a full day of conference sessions, networking and tech demos. InnoTech San Antonio will host 30+ conference sessions presented by a number of national and loc...
Submitted by Kevin Pate
The Helpful Computer Guy
For the past eight years we have served small businesses as an outsourced IT provider. We have learned how they operate and how they view their IT needs. These businesses are too small to need or pay for an in-house IT employee so they look to an outside source to service them. So what is it that they need?
The needs of the small busines...
Submitted by Gary O’Hara
Hi Impact Technology, Inc.
There is a particular type of Phishing attack which research teams see more and more often. This attack plays out as follows:
Employees receive an email with an attachment — usually PDF or DOC.
The body of the email contains no malicious links and consists only of a social engineering ruse to open the attached doc.
The attached d...