Selecting an Available Domain Name

Back in the dark ages (1990s) selecting a website domain name was kind of random. Some names were obvious. Others were simple contractions – like The Computing Center becoming www.compcenter.com. Today, it’s a lot more complicated and sometimes it appears that all the good domain names are already taken. Not so…read on.

 

I'd be a zillionaire if I earned a dollar each time someone complains that all the great domain names are already taken. It's just not true, however. Even in a highly competitive industry, you can think up original, appealing domain names for businesses by using naming tactics that few people use, such as these:

1. Focus on results. What is the outcome or end result that people want to have from buying a certain product or service? How do they feel when they have finished the transaction? My own company name, Named At Last, falls into this category.

[More]

What Girl Scouts Can Teach You about Blockchain

Having trouble getting your head around how blockchain IT works and why it’s important for business?

In order to help simplify things for you (and in the spirit of it being Girl Scout cookie season), let’s look back at a model that any former Girl or Boy Scout knows well: the fire triangle.

The fire triangle is a simple way of understanding the conditions to create fire. Specifically, you need heat, oxygen, and fuel combined in order for a fire to be able to start. Similarly, you can use this model to understand how blockchain helps create the conditions necessary for digital transformation to happen.

But first, the basics.

[More]

Business Trends for 2018 and Beyond

A number of trends are beginning to take shape for this year and into the future. Here are some of the trends that our friends at Hewlett Packard are beginning to see.

Community engagement over social media interaction

Despite the proliferation of smartphones and connected devices, companies are recognizing that social media and virtual connections cannot replace the value of live, in-person interaction with their customers, or the communities they’ve created.

Smart companies will recognize that social media and technology can enhance the value, and effectiveness, of face-to-face interactions, making them even more meaningful.

Generation Z making waves in the talent pool

Generation Z – those born after 1998 – reaching an age where they’re entering the workforce, and their influence on business is starting to be felt. Estimated at nearly 70 million strong, the upper reaches of this group are into college or joining the workforce, and will soon outnumber their Millennial predecessors.

This influx in the newest generation of adults will require companies to quickly understand – and adapt – to them, not only as consumers, but also as employees.

Livestream is becoming Mainstream

Having been steadily developed and improved over the last several years, live streaming video is now poised to become a powerful tool for businesses in the years to come. It offers a chance to create a “live” component to business, giving customers access and visibility to real people and real environments in real-time, regardless of location.

Research from Livestream shows that 80% of audiences would rather watch a live video from a brand than read a blog post, and 82% prefer live video from a brand over social media posts.

Buzzword bingo will remain a popular game

Virtual Reality (VR), Internet-of-Things (IoT), Artificial Intelligence (AI), Machine Learning (ML), Augmented Reality (AR) – the buzzword list goes on and on. But behind these buzzwords and acronyms are real, tangible technologies that have the potential to significantly impact businesses. Smart companies will begin to see through the hype, and recognize how these technologies can directly impact their businesses, such as improvements to network and device security with printers that can identify, prevent, and heal from attacks.

On-demand services meet automation

On-demand services have been a staple of the B2C market for the past several years, and they’re beginning to make their way into the B2B space. From recurring delivery of cleaning supplies to printers that automatically reorder in when they run low, on-demand services will continue their integration and adoption in the B2B space.

The war for talent

As the economy continues to grow and evolve, recruiting and retention will continue to be a critical focus area for businesses. The growth of the gig economy continues to be a force to be reckoned with. MBO Partners predicts that by 2027, 60% of the U.S. workforce will be part of the gig economy, and a ManpowerGroup survey found that 94% of respondents are open to the idea of working independently.

As these trends continue to evolve, so must the approach to recruiting, hiring, and retaining top talent.

Putting the security in data security

We’ve all seen the news and heard the reports. Large, well-known corporations have been hacked. Customer data has been compromised. And each one seems to be worse than the last. In the year – and years – to come, smart companies will focus not only on data security, but also network security, physical security, and even device security.

Communication is key

With customers. With employees. With suppliers. With everyone. The pace of business in 2018 and beyond will be faster than ever. And it will take careful, purposeful, and thoughtful communication at all levels to keep it running that way. It is said that silence speaks louder than words, but communication is key to prevent misunderstandings, or misinterpretations. And in an age where perception is reality, effective communication is critical.

Are Passwords Passé? Not Quite Yet.

We've been seeing significant changes in the way we are all working with passwords. Some say passwords will be a thing of the past in a few years. A number of Computing Center clients as well as ourselves are using multi-factor authentications and biometrics to access our most important information. 

Is my password still enough, or do I need more?

Without question, security is critical these days. Whether it’s device, online, or mobile security, the need for protection is obvious, and the risk can’t be ignored. For years, that protection has centered on a login…and a password. But has that changed?

Oh, that password. We’ve been reminded us for years not to write it down. Not to keep it anywhere that someone could find it. Which has made more than a few people prone to forgetting it. Show of hands, anyone?

[More]

Secure Remote Access to Your Network

Remote access to your network and your data. Everyone wants it and we install a lot of it. Access is one thing, securing that access is something else. This is a good article that describes in general terms the security requirements of remote access. We can talk about the specific products and services to get the job done.

Ask a business person where their office is located and the likely answer is “everywhere.” They’re working from home, staying in the loop while traveling, and catching up on email between sales calls. For productivity’s sake, many companies give their employees – and perhaps clients or service providers – remote access to their networks. Are you taking steps to ensure those outside entryways into your systems are sensibly defended?

If your business wants to start with security, it’s important to secure remote access to your network. Here are some examples based on FTC investigations, law enforcement actions, and questions that businesses have asked us.

[More]

Previous Entries / More Entries