I’ve just returned from a week of IT Conferences and peer group meetings where dozens of IT business owners get together to exchange ideas, best practices and discuss how they can grow their business in a collaborative environment.
If you’re looking to grow your IT business, then time spent at these type of events is invaluable in opening your eyes to potential ideas and inspiring you to take action on them.
Have you ever been “sold to” by somebody? You may be familiar with the experience of chatting to a sales professional and even though that person is very knowledgeable about their product or service, you have a nagging feeling that they are more interested in making the sale to you than doing what is right for you and your business.
If you work in the world of IT, you are no doubt familiar with the term “bloatware.”
Preinstalled bloatware is irritatingly endemic on new PCs and laptops. It can include everything from antivirus software trials to annoying “support adviser” tools and little-known alternative PDF creation utilities.
In a world where we all have ready access to smartphones and Internet connections, it’s hard to imagine a time where we’ve ever had information and personal data so close at hand.
All one needs to do is reach into a pocket, and recent photos are instantly available; Facebook provides a living diary of all we do (or at least all that we share!), and cloud-based storage makes it easy to access important documents from wherever we happen to be.
Is your Television Spying on you?
The term “Orwellian” is referred to a lot these days. It’s defined on Wikipedia as a “societal condition” that is “destructive to the welfare of a free and open society.” Anyone who keeps up to date with what’s going on in the world of IT privacy and security will understand the word’s current pervasiveness in the world’s media.
If the constant succession of IT privacy scandals throughout 2014 left you wondering whether anything you do online is truly private, 2015 may be the year you get your answer.
In the wake of the recent terrorist attacks in Paris, governments appear to be redoubling their efforts to make sure there’s no kind of online communication that remains beyond their prying eyes. The basic message is that if we are to be protected against future atrocities, security services must have the means to monitor all kinds of online activity.
I recently had a conversation with an IT business who worked under the ad-hoc Break/Fix model. They were asking me what value using an Remote Monitoring & Management (RMM) tool would bring to their business, and how they would generate revenue with these tools.
My answer? Any RMM tool worth it’s salt should help you uncover a wealth of opportunities at client sites, opportunities which -- when consistently brought to clients attention -- can help to educate clients that IT is of most value to any business when it’s maintained and not left to break at all.