With the rapid advancement of technology, comes the undeniable fear of malware and threats on company networks. An article in Network World explains that IT departments are having difficulties securing new domains such as cloud computing, mobile devices and social media applications. Mobile devices are one of the more serious concerns for businesses these days. […]
Completing the VMWare Patch Process
Occasionally, I have encountered an issue when working with larger enterprises in which the VMWare engineer will be under the impression that, once updates or patches are applied to the VMWare host servers, that the patch process is complete. This is not always a true. The patch or update is not complete until all the […]
Enter, The Laplet
For a decade we have seen a series of devices enter the portable computer market in an attempt to unseat the laptop as the primary portable personal computer. Although laptops function fairly well, they are essentially desktop computers in a more transportable form. As a result, they tend to be large, clunky, and expensive. Some […]
CRN Recognizes 3CX as an Emerging Technology Vendor
Earlier this year, it was announced that 3CX, the telecommunications developer of Windows-based PBX software and CrossRealms partner for telephony solutions, was selected by UBM Channel and CRN as a 2012 Emerging Technology Vendor. Each year, CRN recognizes the most innovative vendors whose technologies are forcefully impacting their market segments. 3CX is an inexpensive, software-based […]
SIP hackers succeed in bringing down multiple voice providers – Analysis and prevention measures
SIP hackers succeed in bringing down multiple voice providers – Analysis and prevention measures For the past three weeks, we’ve been engaged in dealing with SIP and traditional telephony providers who’ve been attacked by International hackers. These hackers’ techniques have proven to be incredibly powerful and almost impossible to detect. Prevention is complicated because the […]