COVID-19 Resources (ARCH)

  • Featured Image

    6 Questions To Ask Before You Move To VoIP

    11/21/2016
    Submitted by Beth Hill TechSage Solutions Thanks to Voice over Internet Protocol (VoIP) and ever-improving cloud technologies, the phone-service options available to you as a small business are plentiful, with more features at a lower cost than were ever available before. However, with all the options and vendors, separating the good from the bad and navigating the hype can be difficu...
    Learn More >>
  • Featured Image

    Retail trends to watch in 2016; Mobile First and Digital Strategy

    Submitted by Bryan Guinn Entrust Technology Consulting Services This article excerpt originally appeared here The retail industry no longer looks at omnichannel as a revelation, in fact, the term has become somewhat ordinary within the industry. In 2016, the rise of mobile devices and accessibility will see retailers accelerate to mobile-first strategies, alongside other new growing t...
    Learn More >>
  • Featured Image

    Key Licensing Considerations

    Submitted by Derrick Pizarro & Court Allen Dykema Like most things these days, licenses come in many different varieties. Depending on the license and the parties’ circumstances, several different considerations may come into play. Here are a few of the important provisions that frequently need to be considered in a license. 1. License Grant The license grant provision sets out ...
    Learn More >>
  • Featured Image

    OIT Research Computing Support Group Supports University’s Tier One Mission

    08/15/2016
    Submitted by Rosalind Ong De Treviño UTSA - Office of Information Technology Technology departments have moved far beyond break fix solutions. Across industries, IT is asked to develop innovative solutions that support enterprise needs surpassing standard computing to support the mission and vision of the organization. At UTSA this often means research. The Office of Information Techn...
    Learn More >>
  • Featured Image

    Mobile And Cloud Computing: Benefit Or Threat?

    Submitted by Beth Hill TechSage Solutions There’s no doubt about it – the Internet and mobile and cloud computing have made our lives easier and our businesses more productive, cost-effective and competitive. But make no mistake about it: the Internet is also a breeding ground for thieves and predators, not to mention an enormous distraction and liability if not used properly. It is caus...
    Learn More >>
  • Featured Image

    Virtual Reality is here!

    Submitted by Andy Kabbe Modis According to SuperData Research in 2016, investment in Virtual Reality (VR) will be $3 Billion. This is up from $1.9 Billion in 2015. Consider 60% of investment funds target Gaming Development. Other investment funds target immersive and cinematic VR. With this level of investment, the future use of virtual reality will almost certainly become a main stream e...
    Learn More >>
  • Featured Image

    Don‘t Be Held Hostage! 4 Ways to Prevent Ransomware Attacks

    Submitted by Tom DeSot Digital Defense, Inc. News headlines are rampant with accounts of ransomware attacks shutting down schools, hospitals and businesses across the country. Cyber criminals are infecting machines with malicious code, and then executing the code to encrypt and hold the data “hostage”. Once the ransom is paid, the attacker decrypts the data and returns the files to the u...
    Learn More >>
  • Featured Image

    InnoTech – San Antonio’s Technology & Innovation Conference & Expo

    04/12/2016
    Presented by Presidio Wednesday, May 11, 2016 Henry B. Gonzalez Convention Center The 9th annual InnoTech San Antonio returns to the Henry B. Gonzalez Convention Center on May 11. Join over 1,300 technology and IT professionals for a full day of conference sessions, networking and tech demos. InnoTech San Antonio will host 30+ conference sessions presented by a number of national and loc...
    Learn More >>
  • Featured Image

    The Needs of the Small Business

    Submitted by Kevin Pate The Helpful Computer Guy For the past eight years we have served small businesses as an outsourced IT provider. We have learned how they operate and how they view their IT needs. These businesses are too small to need or pay for an in-house IT employee so they look to an outside source to service them. So what is it that they need? The needs of the small busines...
    Learn More >>
  • Featured Image

    Scam of the Week: Phish with Hidden Sting

    Submitted by Gary O’Hara Hi Impact Technology, Inc. There is a particular type of Phishing attack which research teams see more and more often. This attack plays out as follows: Employees receive an email with an attachment — usually PDF or DOC. The body of the email contains no malicious links and consists only of a social engineering ruse to open the attached doc. The attached d...
    Learn More >>