• Today we are announcing changes to our commercial pricing for Microsoft 365—the first substantive pricing update since we launched Office 365 a decade ago. This updated pricing reflects the increased value we have delivered to our customers over the past 10 years.

    Read Article
  • According to security researcher Sam Thomas, the log4sh shell vulnerability in Windows has been rated as critical, as it could potentially allow attackers to exploit this weakness and remotely execute malicious commands on targeted systems

    Read Article
  • A lot of people have heard of ERC721 tokens (ERC-721 is the technical standard used to issue non-fungible tokens). But what are they, and how do they work?

    Read Article
  • Are you tired of sending emails with multiple attachments? Sending large files over the internet can be a pain, but it doesn’t have to be if you know how to take advantage of modern cloud storage and online collaboration tools

    Read Article
  • One of the best and most popular cloud-based systems available today is 3CX (also known as the 3CX Phone System)

    Read Article
  • If you’re an IT manager, you’ve probably heard the term Shadow IT before. Shadow IT refers to technology that your company doesn’t officially use, but that employees are using anyway

    Read Article
  • So, you’ve decided that your organization needs to move to Citrix, but how do you know if you need to use published apps or terminal servers? What are the benefits of each, and what are the disadvantages?

    Read Article
  • As a growing company, you have to decide whether to go with an in-house hosting solution or use a cloud-based solution

    Read Article
  • Docker and Kubernetes are two of the most popular and powerful tools in the DevOps arsenal right now, and they both have their place in your organization’s infrastructure

    Read Article
  • You’ve probably heard it said that if something seems too good to be true, it probably is. In the world of online sales, that statement couldn’t be more accurate

    Read Article
  • Penetration testing can mean several different things, depending on who you ask and how they approach it. Generally speaking, penetration testing involves working with your team to see if there are any vulnerabilities

    Read Article
  • Are you thinking about switching to co-managed IT services? You have come to the right place! Co-managed IT services are becoming very popular these days,

    Read Article
  • Today we are announcing changes to our commercial pricing for Microsoft 365—the first substantive pricing update since we launched Office 365 a decade ago. This updated pricing reflects the increased value we have delivered to our customers over the past 10 years.

    Read Article
  • According to security researcher Sam Thomas, the log4sh shell vulnerability in Windows has been rated as critical, as it could potentially allow attackers to exploit this weakness and remotely execute malicious commands on targeted systems

    Read Article
  • A lot of people have heard of ERC721 tokens (ERC-721 is the technical standard used to issue non-fungible tokens). But what are they, and how do they work?

    Read Article
  • Are you tired of sending emails with multiple attachments? Sending large files over the internet can be a pain, but it doesn’t have to be if you know how to take advantage of modern cloud storage and online collaboration tools

    Read Article
  • One of the best and most popular cloud-based systems available today is 3CX (also known as the 3CX Phone System)

    Read Article
  • If you’re an IT manager, you’ve probably heard the term Shadow IT before. Shadow IT refers to technology that your company doesn’t officially use, but that employees are using anyway

    Read Article
  • So, you’ve decided that your organization needs to move to Citrix, but how do you know if you need to use published apps or terminal servers? What are the benefits of each, and what are the disadvantages?

    Read Article
  • As a growing company, you have to decide whether to go with an in-house hosting solution or use a cloud-based solution

    Read Article
  • Docker and Kubernetes are two of the most popular and powerful tools in the DevOps arsenal right now, and they both have their place in your organization’s infrastructure

    Read Article
  • You’ve probably heard it said that if something seems too good to be true, it probably is. In the world of online sales, that statement couldn’t be more accurate

    Read Article
  • Penetration testing can mean several different things, depending on who you ask and how they approach it. Generally speaking, penetration testing involves working with your team to see if there are any vulnerabilities

    Read Article
  • Are you thinking about switching to co-managed IT services? You have come to the right place! Co-managed IT services are becoming very popular these days,

    Read Article