Stories by Staff - Page 15
Phone scams: increasing numbers, wider scope
Tue, 28th Jul 2015
#
malware
#
uc
#
cybersecurity
ESET takes a look at phone fraud, the impact of technology in terms of spoofing and VoIP, and the growing use of cell phones.
ESET: How your business can recover from a hack
Tue, 28th Jul 2015
#
malware
#
breach prevention
#
cybersecurity
Businesses reeling from cyber-attacks can bounce back quickly with ESET's recovery guide—maintain trust and security.
Children need imagination...
Fri, 24th Jul 2015
#
edutech
#
gaming
#
digital entertainment
Disney's new toy, Playmation, aims to encourage kids to use their imagination and get active; a positive step in a tech-driven society.
Old servers present cyber criminals an opportunity to compromise your business
Thu, 23rd Jul 2015
#
network infrastructure
#
datacentre infrastructure
#
cybersecurity
Microsoft ends support for Windows Server 2003, leaving businesses vulnerable to cyber attacks. Migration to a new server takes 7 months.
Westcon Group New Zealand to offer full Cisco portfolio under Comstor brand
Mon, 20th Jul 2015
#
cisco
#
comstor
#
westcon-comstor
Westcon Group New Zealand is offering the full Cisco product portfolio under Westcon's Comstor brand from 27 July.
Five top security threats to data centres – and how to counter them
Thu, 16th Jul 2015
#
ddos
#
martech
#
software development
Data centers have become the number one target of cyber criminals, with DDoS attacks and web application attacks among the most dangerous threats.
The evolution of telephony
Mon, 13th Jul 2015
#
uc
#
voip
#
contact centre
From smoke signals to Voice over IP, telephony has evolved from primitive methods to sophisticated digital communications, transforming global connectivity.
Film review: Magic Mike XXL
Fri, 10th Jul 2015
#
gaming
#
digital entertainment
#
film review
Magic Mike XXL dazzles anew with Channing Tatum leading scantily-clad hunks in a sequel that promises more gyrating glory.
A shared transformation start plan works wonders for enterprise
Thu, 9th Jul 2015
#
digital transformation
#
ict
#
ovum
CIOs who align ICT changes with business transformation achieve notable success, Ovum analysts find at NTT Communications' London roundtables.
The truth about working from home
Wed, 8th Jul 2015
#
gaming
#
digital entertainment
#
hybrid & remote work
Home office perks: Flexibility and productivity soar, but stigma and management hurdles loom for remote workers.
SIP trunks – what is the adoption in NZ?
Wed, 8th Jul 2015
#
uc
#
voip
#
contact centre
SIP trunks have been around for a number of years but you could say that New Zealand has been slow to get going with SIP.
Why VoIP resellers become service providers
Fri, 3rd Jul 2015
#
uc
#
voip
#
contact centre
Being a provider allows full control of a business which can bring higher revenue, but at the same time, there are additional responsibility and risks.
Dealing with dumb machines on the way to smart ones
Tue, 30th Jun 2015
#
smart machines
#
analyst report
#
mapp
Smart Machines on the horizon, but first we must navigate the Stupid Valley, warns @Gartner_inc analyst. #artificialintelligence #technology.
Gartner: Jetting technology and 3D printing
Mon, 29th Jun 2015
#
hp
#
3d printing
#
analyst report
Inkjet press manufacturers set to enter the 3D printing market, with HP planning to launch its printer in 15 months.
Microsoft: Electronic Software Delivery is the present
Fri, 26th Jun 2015
#
microsoft
#
resellers
#
ingram micro
Microsoft Electronic software delivery (ESD) is the secure delivery of a product key directly to consumers and small businesses.
Gartner: Big Data is pregnant with analytics
Thu, 25th Jun 2015
#
data analytics
#
martech
#
planning
Gartner declares an analytics era, as data lakes brim with potential insight amidst the IoT surge. Big Data's next leap pivots on smart analysis.
Is Server 2003 end of life 2015's biggest security threat?
Wed, 24th Jun 2015
#
datacentre infrastructure
#
microsoft
#
windows server 2003
As Microsoft ends support for Windows Server 2003 on 14 July, millions of systems remain at risk, posing 2015's biggest security threat.
ESET on the Samsung Galaxy exploit
Tue, 23rd Jun 2015
#
malware
#
cybersecurity
#
samsung
Because Samsung phones grant elevated privileges to update code, a payload delivered in this way bypasses many of the Android system protections.
ESET: What is Cyber Insurance?
Mon, 15th Jun 2015
#
malware
#
cybersecurity insurance
#
cybersecurity
Cyber insurance may be a valuable tool to help mitigate the risks of a cybersecurity breach, but only if used thoughtfully.
Internet Content Providers find new ways to optimise cloud infrastructure
Tue, 9th Jun 2015
#
network infrastructure
#
cloud services
#
infinera
ICPs are caught between unstoppable growth in bandwidth demand, intense competition and relentless pressure to maintain and improve user experience.