X

All is not lost: Dealing with data corruption at your organization

When data corruption occurs at any organization, it can be a crisis of immense proportions.…

Twain Taylor

The Xtreme Minute: Mind your P’s — Android P, privacy policies, and password managers

In this week’s TechGenix Xtreme Podcast, we talk about Android P, why you must read…

Louise Chalupiak

Microsoft announces new Azure networking services

Microsoft has rolled out several new Azure networking services along with some enhancements for existing…

Annie Pilon

Sci-fi or way too real? Google’s creepy ‘Selfish Ledger’ video and your digital DNA

A leaked Google video brings up the specter of Hollywood’s most frightening sci-fi movies. What…

Brien Posey

Don’t fear the journey: How these companies ditched their datacenters for Kubernetes in the cloud

Many companies are making the transition from datacenters to Kubernetes in the cloud. Here is…

Twain Taylor

Microsoft’s GitHub acquisition: What it means for you

Microsoft's GitHub acquisition was greeted with disdain by many in the open source world. But…

Twain Taylor

Key technologies you must know for effective mobile app strategies

Yes, there’s an app for that. But is there an app for your business? Using…

Benjamin Roussey

Data protection: Be aggressive and be smart — or be a victim

Data protection is not the IT manager’s or even the IT team’s responsibility alone. If…

Monique Magalhaes

You can’t afford to stand still: Embracing change as a business strategy

Many MSPs thought the cloud wouldn’t involve them. I own an MSP and know they…

Amy Babinchak

Using business impact analysis to supercharge your IT decisions

Business impact analysis is not merely about checking boxes to keep regulators and quality boards…

Benjamin Roussey