The Mirai Botnet, DDoS and the Future of Security
Dyn asserts that there were more than 100,000 malicious endpoints to the DDoS (distributed denial of service) attack that almost “broke the Internet”. How did this attack occur? And what does...
Four Difficult 2017 IT Budget Items
Most companies have the basics of IT budget planning down, however, many struggle in four areas. Costs of IT, outsourcing, cloud technologies, and contigency planning.
Three Core Essentials of IT Risk Management
In this digital age, there are three fundamental processes critical to maintaining a company's IT long term.
HCI Podcast: Delivering Learning with Authenticity
Listen as Dr. Greg Ketchum, frequent collaborator with HCI, describes his philosophy for making the most out of the expertise residing within your organization.
Top 4 Things to Consider When Selecting an EDI Solution
EDI - electronic data interchange - is the leading solution for automating business to business data exchange for retail and business partners. Here are 4 things to consider when selecting an...
Infographic: The ROI of Good Customer Service
This infographic provides a quick start to understanding the ROI of a good customer experience.
How to protect your PLM Data
PLM Ransomware Attacks and Steps to Help Prevent Attacks
EDI and its Role in Supply Chain Management: Survey Results
EDI - electronic data interchange - remains a key component of many brands’ supply chain management. We conducted a survey of over 100 companies to see how EDI plays a role in their...
Microsoft 365: Changing How Business Software is Sold
Microsoft may be a software leader in most respects, but they have been behind the curve in one: The shift towards a software-as-a-service (SaaS) model. That's changing with the move towards...







