Does your business need a dedicated server?

Does your business need a dedicated server?

Are you feeling constrained running your business from your desktop or laptop?   Chances are if you have more than a couple of users, the time has come to invest in your own server. It might feel like a big step for a small to medium business (business) to take, but the functionality, time savings, […]

Read More »
Modern workstations for modern healthcare

Modern workstations for modern healthcare

Modern healthcare facilities take many different forms. From hospitals to neighbourhood clinics to home visits, different ecosystems require different workstations. Some require the power and stability of desktop PCs, while others need the portability of laptops or the ease of tablets.   However, some important conclusions can be drawn when designing a workstation fleet. Desktops […]

Read More »
Where to spend on IT in 2017

Where to spend on IT in 2017

Uncertain times call for wise planning in IT. Global political uncertainty and flat company revenues mean budgets will be stalled for the near future, affecting investment in not just products but people. It sounds dire; however, four clear themes remain relevant in governing IT budget spend for 2017.   Hardware and software Research from Spiceworks, […]

Read More »
3 Steps that Protect Your Business

3 Steps that Protect Your Business

Keep your business running with three IT best practices Today’s advanced technologies, such as cloud computing, mobility, and Big Data analytics, are key enablers to improving your productivity. While they provide distinct advantages to your business, if not supported by the right infrastructure, they can expose your business to security risks.   Smaller businesses are […]

Read More »
Get ready for the worst

Get ready for the worst

Bad things happen to good organisations. In any disaster, whether natural or man made, there are businesses that close because of the physical conditions and never manage to reopen. Here’s how to figure out your weak points and how to avoid common pitfalls in making that assessment.   1. Assess your risk Don’t make risk […]

Read More »
The corporate coffee shop laptop

The corporate coffee shop laptop

Have you noticed that no matter how nice the office you provide for employees, they seem to like working at the local coffee shop more than working at their desk? You’re not alone: Around the world, work is being done on small tables filled with laptop computers and fancy coffee.   Many workplaces are swapping […]

Read More »
No entry-level stigma

No entry-level stigma

There’s something about that label. “Entry level” systems are seen as insufficiently powerful, marginally useful, and utterly degrading when placed on a professional’s office desktop.   This characterisation might have been accurate years ago. But today, even entry-level systems can be capable, powerful computing devices that, under the right circumstances, can be “cool” for users […]

Read More »
Five ways to stop data theft

Five ways to stop data theft

Look around the office. One in four of the people will take or share sensitive company information when they leave their job. The findings from a 2016 survey of 600 employees in seven industries by Biscom show that employees are the greatest risk when it comes to data theft.   The survey also found the […]

Read More »
Convertibles make health care IT flexible

Convertibles make health care IT flexible

Computers have traditionally come in one of a few carefully defined forms. Desktop computers are systems that you go somewhere to use. Laptop computers are machines you can carry different places to use. Tablets are devices you can use while standing up.   Health care professionals and administrators would choose the platform that would be […]

Read More »
Do you need more security features?

Do you need more security features?

Security is one of the areas of spending in which the budget rarely gets smaller, because security is important to every organisation. It’s critical that only authorised users are able to access enterprise applications and information.   As phishing and other social engineering attacks proliferate, IT departments look for new ways to ensure the person […]

Read More »