• CompTIA Members Stress Access to Capital, Skilled Workers in D.C.

    by Leslie Hague  | November 04, 2011
    Access to capital and a skilled workforce are critical to the success of small- and medium-sized IT businesses, CompTIA members told Congressional members and Administration officials today. On the final day of CompTIA's Washington D.C. Fly-In event, CompTIA members from across the country met with policymakers to stress the issues that are important to small- and medium-sized tech businesses.Meeting with officials at the White House Office of Science and Technology Policy, members said access t ...
    Full Story
  • CompTIA Members Stress IT Industry's Importance to Policymakers

    by Leslie Hague  | November 02, 2011
    In more than 50 meetings on Capitol Hill today, CompTIA members from across the country stressed how instrumental small- and medium-sized IT companies are to the nation's economy.Members who attended CompTIA's Washington DC Fly-In event discussed specific legislation with elected officials and legislative staff, as well as the recurring themes of access to capital for small- and medium-sized companies, cybersecurity, and IT workforce development.Even in a down economy, IT worker unemployment is ...
    Full Story
  • SaaS and Security: Is your Data Safe? CompTIA EMEA Conference panelists discuss

    by Patti Moran  | October 27, 2010
    After a short discussion on the definition of cloud and SaaS (Software as a Service), leading panelists at the CompTIA EMEA Member Conference took to discussing the guidelines and best practices companies can engage in to help educate customers when implementing SaaS.Vlad Mazek, CEO of Own Web Now, shared that building a cloud service offering should be done, ironically enough, brick by brick. As service providers must build their authentication model over the cloud – so they must ask customers, ...
    Full Story
  • Six Virtualization Trends to Watch

    by Larry Walsh  | August 31, 2010
    The cloud isn’t the most disruptive technology to sweep across the IT marketplace. It’s virtualization, for virtualization is the underlying technology that is enabling new architectures and delivery mechanisms for IT infrastructure, applications and data. Through virtualization, solution providers are delivering and end users are adopting new techniques for maximizing their IT investments and capabilities.We’ll be getting a steady stream of reports out of San Francisco as the virtualization zea ...
    Full Story
  • Making Sense of Security Breach Cost Numbers

    by Larry Walsh  | August 16, 2010
    What is the most expensive security breach ever? Before you answer, read the rest of this blog (trust me, you’re probably wrong).According to a recent report by the Ponemon Institute, the mean corporate loss to IT security breaches last year was $3.8 million. During the four-week study period, participating companies reported being the subjected to at least 50 known attacks. And these companies reported taking as long as 14 days at a cost of nearly $18,000 per day to remediate a security breach. ...
    Full Story
  • IT Security: The Call for Business-Centric Training Programs

    by Bob Biddle  | June 10, 2010
    I have had the opportunity to speak with many leading, solution providers, security vendors and more over the coming months and one thing is clear—there is a definite need for training programs across the channel. Not just any training program will do; programs that are focused on developing and nurturing better partners are truly needed, including those that cover multiple facets of a company’s business. It only makes sense that the best channel partners are running their business with optimal ...
    Full Story
  • SBA Resources Available for IT Providers

    by Brian Sherman  | April 08, 2010
    The Small Business Owners Community had the opportunity to learn more about the government services available to support their company growth and projects. While most people are aware of the loans supported by the United States Small Business Administration (SBA), Carole Harris of the Illinois office pointed out they actually provide other services to support small business. The three areas that the SBA focuses on include: 1.  Counseling and training The SBA works with an allian ...
    Full Story
  • Cloud Computing: The Call for Standardization, Definitions, and the Need for Certification

    by Bob Biddle  | March 01, 2010
    There has been a lot of talk lately about the cloud….pick up just about any tech journal, business publication, or even the newspaper (online or even the old print format!) and there are articles and analysis discussing everything moving to “the cloud.”  What does that really mean?  Is the end of the desktop/laptop, as we know it today, coming sooner than we thought?  Is it all about being connected 24/7 so that no applications reside locally anymore? Accordin ...
    Full Story
  • For Government IT Professionals, Training = Success

    by Tim Herbert  | February 22, 2010
    Unless you are skier Bode Miller, who can apparently win the trifecta of Olympic medals with relatively little preparation, success requires hard work and lots of training. CompTIA’s recent study Government IT Buying Plans confirms that government IT professionals recognize the need for on-going training as an important step in ensuring success on the job.According to the survey of over 500 government IT decision makers, approximately 3 in 4 expect to invest in IT training in 2010. The data reve ...
    Full Story
  • E-Discovery: A Growing Opportunity for VARs

    by Brenda Chan  | February 18, 2010
    Popular crime TV shows like CSI and Law and Order often portray fictional investigators discovering and using evidence in e-mails and other computer files when conducting investigations. While these shows often exaggerate and misrepresent the ease of electronic discovery, they have nevertheless sparked interest in the field.Digital forensics refers to a branch of forensic science pertaining to legal evidence found in computers and digital storage media. Closely associated with digital forensics, ...
    Full Story
First PagePrevious Page
Next PageLast Page
Page: of 10