Blog

Citrix’s XenApp gets a cloud boost from Azure

Microsoft’s Azure and Citrix’s XenApp have done a lot to move virtualization services into the mainstream over the years. So, with the announcement that the two companies will work together to combine their platforms into a new cloud-based application delivery system, it’s understandable why there is so much excitement within the industry.

Beware of these social engineering tactics

As the spectacle and competitive atmosphere of the Rio Olympic Games have drawn the world’s attention, hackers who use social engineering are inching closer to our private information. Although our systems may be prepared for the likes of malware and worms, social engineering is a different beast of its own.

The keyboard checklist for 2016

What part of your computer can be more hands-on than the keyboard? No pun intended. A keyboards is like a lover; you spend time with it, you caress it, and you fight with it. After kissing and making up time and again, it still types at a snail’s pace, and executing simple keyboard commands becomes virtually impossible.

Network virtualization: why you should care

As difficult as virtualization may be to understand, it continues to march toward widespread adoption. Up until now, the service was mostly limited to making hardware and software resources better allocated based on needs. However, corporate bigwigs AT&T and Verizon are jumping into the game by adding the option to virtualize network services.

Office 365’s e-appointment app: Bookings

We all undeniably have hectic schedules, and they’re made even worse with unorganized meetings, impromptu playdates, and unscheduled yoga classes you were forced to attend. In order to move or cancel appointments, you’d generally have to pick up the phone and call someone, which can be a drag.

The fundamentals of EHR hardware

Having to “check the files” without the aid of computers can be quite cumbersome. In the healthcare industry in particular, patient files are practically libraries unto themselves with medical history, allergies, vaccine status, lab test results, personal statistics, billing info, etc.

Two new tools for defeating ransomware

A simple Google search of “ransomware” returns just over 9 million results. So, too, does a search for “Three Mile Island,” the location of the late-70’s Pennsylvania nuclear meltdown. And while we don’t mean to equate the near catastrophe of the latter to having your company’s data hijacked by computer hackers, ransomware can in many cases end in disaster for your business.

Hardware-as-a-Service and its benefits

The new flashy set of PCs your company just bought last year are becoming outdated, and you don’t have enough IT staff to maintain them. The same goes with servers, wireless printers and faxes. If this is your current situation, it might be time to consider changing the way you obtain and manage your hardware.