• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Best of Tech Decisions

Who Got Hacked

Who Got Hacked This Week? Jan. 28 Edition

January 28, 2017 Jonathan Blackwood Leave a Comment

Note: Each week we bring you the latest hacking news on the internet. Read on to find out who and what was hacked this week.   Android Malware Returns to Google Play Store The Android Malware that infected over 10 million devices last year has returned. A new form of the HummingBad malware has been […]

Read More

BMC Software Collaborative Culture Change

January 27, 2017 TechDecisions Staff Leave a Comment

BMC Software recently completed a Unified Communications and Collaboration (UCC) deployment across 50 locations worldwide. The Tech Decision BMC CIO Scott Crowder was charged with restructuring his company’s communications architecture. Before 2013, BMC was spending $380,000 a month for 5-6 million minutes of conference calling with the previous conference provider. Associated expenses cost BMC an […]

Read More

How Mobile Applications Can Improve Workplace Communication

January 26, 2017 Chris Pautsch Leave a Comment

As a centerpiece of our modern lives, mobile devices have made communication easier than ever. Communicating with friends hundreds of miles away is as simple as sending a text or chatting via video apps like Snapchat and FaceTime. Even so, mobile applications are not reduced to enhancing just the communication in our personal lives. A […]

Read More

Agile Methodology in Large Enterprises

January 23, 2017 Hamesh Chawla Leave a Comment

How can you transition your large company into an agile framework? Below are simple and effective techniques for scaling agile methodology to your specific project, team and enterprise. Start with a MVP Continuous Delivery is a software development strategy that provides high-quality, accessible software to customers. The process of releasing minimum viable product (MVP) is […]

Read More

Who Got Hacked

Who Got Hacked This Week? Jan. 21 Edition

January 21, 2017 Jonathan Blackwood Leave a Comment

Note: Each week we bring you the latest hacking news on the internet. Read on to find out who and what was hacked this week.   Ongoing Phishing Attack Threatens on Gmail Users A new phishing attack targeting Gmail users has been tricking even tech-savvy users. First, attackers compromise a separate Gmail account. The hackers […]

Read More

Portland State University “Decision Theater” Collaboration Space

January 20, 2017 TechDecisions Staff Leave a Comment

Four years ago, Portland State University—in the heart of downtown Portland, OR—embarked on a mission to create a meeting and collaboration space for university researchers and regional stakeholders. The Tech Decision The university envisioned a place for local government and private companies to work alongside PSU researchers on a variety of projects that link data […]

Read More

10 Design Tips for Better PowerPoint Presentations

January 19, 2017 Debbie DeWitt Leave a Comment

Over 100 million people use PowerPoint to create business and education presentations. Yet, so often, slideshows come across as confusing or monotonous to audiences. The best PowerPoints have great content, presented clearly, in a beautiful design. Use these simple tips to create better PowerPoint presentations that will wow your audience: 1. Understand Aspect Ratios We’ve […]

Read More

Cyber Attack

How Does a Cyber Attack Work?

January 17, 2017 Colleen Frye Leave a Comment

You work in the financial department of your company and you just got an email from a C-level executive. It tells you to pay an invoice of $78,000 before 1 p.m., and includes instructions for how to wire the money to your vendor’s bank. You send the money, as requested, and it quickly moves to […]

Read More

How to Protect Your Business from Dangerous Spam and Phishing Emails

January 16, 2017 Jeff Olejnik Leave a Comment

There are not many ways to break into a bank; however, gaining access to personal bank accounts is becoming a very common way for criminals to get in.  One way this is achieved is by clicking on a link within an email.  Spam is very cost effective for cyber criminals, as emailing is a near […]

Read More

The Dos and Don’ts of Writing a Technology RFP (Request for Proposal)

January 16, 2017 Jonathan Blackwood Leave a Comment

Writing a request for proposal is the first step to getting a new technology integrated into your enterprise. We spoke with leading integrators to learn what to do and what not to do when writing an RFP.

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 162
  • Page 163
  • Page 164
  • Page 165
  • Page 166
  • Interim pages omitted …
  • Page 171
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.