November 27, 2013 at 4:20 PM
October 20, 2011 at 10:02 AM
Mobile devices may have started as gadgets for personal use but their benefits for business use are so widely recognized and accepted that they are now the norm in the workplace. Which mobile devices are leading the pack for business use? Answering this question shows how rapidly the mobile technology landscape changes. The answers today could be very different from the answers tomorrow.
September 29, 2011 at 9:30 AM
While small businesses may often recognize the importance of IT to their growth and success there is an apparent gap between having this awareness and taking the necessary action to realize the benefits that IT can contribute. The lack of a viable small business IT strategy or the IT support necessary to put one to fruition can stand in the way. More common challenges include limited cash flow and a smaller margin for error when making crucial decisions.
September 26, 2011 at 9:01 AM
Are you using software that you’re so comfortable with you don’t see the need to upgrade, much less, replace it? Things could go fine until one day it hits you – your software is out of date. You can no longer get product support. Either the version you’re using is no longer supported, or worse, the company where you got it from no longer exists. To top it off, your old, slow computer has given up the ghost and you’ve bought a new one to keep up with your growing needs. You want to install the old software that for years has been smoothly running the applications for your small business but you cannot find the installation disc. And even if you did, your old software still can’t run on your new hardware. Gradually you learn to accept that the only viable long-term solution is to bite the bullet and purchase new software.
September 22, 2011 at 9:51 AM
IT consulting firms in Los Angeles now offer hosted VoIP among their services. What does hosted VoIP mean to you as a small business? Is it right for you? What benefits can you expect from using hosted VoIP?
September 19, 2011 at 9:20 AM
Looking for tips to speed up your document printing? A relaxed approach usually leads to a faster solution and an operable printer (as in you don't smash it with a nearby stapler). While there may be cases where you need help from your local IT support, there may be others where all that’s needed is for you to heed the old saying “Haste makes waste”.
September 15, 2011 at 10:51 AM
Mmm, nothing like a hot mocha latte, a tasty bagel and a side of stolen information. That bagel just tastes so much better knowing that while you're emailing sensitive company info, Sir Shady Ripoff just bought a sweet ski boat with that vital information. Perhaps this is an exaggeration and unrealistic but not quite. Because while Sir Shady is kicking it with his bros on the lake, you'll be eating ketchup sandwiches for lunch trying to figure out what went wrong. Recognizing the vulnerabilities of wireless networking is a necessary first step to ensuring shared Wi-Fi security and protecting your info (and quality of lunch choices). Let's take a look.
September 12, 2011 at 8:39 AM
The Flood of 1998 in Central Texas almost completely wiped out my father's business in San Antonio. The same storm that ultimately caused $750 million in damages also forced its way into his office, destroying everything. He had been in business since 1985 and fortunately learned a great deal about preparation, so while his office was soaking in two feet of water, his valuable data was high and dry. A couple of the neighboring businesses weren't so lucky.
September 6, 2011 at 10:50 AM
Getting a small business on the road to success requires overcoming some common roadblocks. In general, the most common obstacles are due to lack of management skills and lack of capitalization. Thus, there are small businesses that do not survive very long due to plenty of other problems including poor inventory management, poor credit arrangements and the list goes on and on. Let’s take a look a 5 of the more common issues.
August 22, 2011 at 10:00 AM
Bob, your leading sales rep, is most likely not a Russian spy. Most Likely. And Cindy, your favorite bubbly intern, is probably not a covert operative hired by your competitors to infiltrate your defenses. But, Bob and Cindy may have unknowingly compromised the security of your data several times this week anyway. And if just one of those slips should place your data in the wrong hands, you can expect to not sleep for weeks just trying to recoup. Why would they do such terrible things? Odds are they have no idea they’re even doing it. Here are 3 common causes and solutions to this dismal data dilemma.