• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Partner Newsletter Content

Choose any story to insert into your company newsletter!

The Title: How Internet of Things Will Affect SMBs


(Choose between one of two photo sizes)

The Link:
https://mytechdecisions.com/it-infrastructure/internet-things-will-affect-smbs/?utm_source=integrator-newsletter&utm_medium=email&utm_campaign=IntegratorNewsletters

The Summary:

The Internet of Things (IoT) is changing the way we live and work. Let’s take a look at how the Internet of Things will affect SMBs.

The Excerpt:

The Internet of Things (IoT) is already here and is likely to stick around in future, whether you like it or not. By 2021, there will be more than 7.5 billion connected devices or things in the world. The ever-increasing network of internet-enabled devices and ...


The Title: The Ins and Outs of Building and Scaling a Data Center


(Choose between one of two photo sizes)

The Link:
https://mytechdecisions.com/it-infrastructure/building-scaling-data-center/?utm_source=integrator-newsletter&utm_medium=email&utm_campaign=IntegratorNewsletters

The Summary:

Learn how to build a data center, whether building or outsourcing is a better option, and how to scale your data center as your company grows.

The Excerpt:

Building or scaling a data center is no small undertaking – in fact, building one from scratch could be the largest project a company ever undertakes. A data center is a facility used for data computing, processing, and storage, so all businesses need one. The facility includes high-performance servers, storage devices, virtualization and networking solutions that support enterprise computing n...


The Title: The Risks and Mitigations of the Internet of Things (IoT) in Supply Chain


(Choose between one of two photo sizes)

The Link:
https://mytechdecisions.com/network-security/internet-things-iot-supply-chain/?utm_source=integrator-newsletter&utm_medium=email&utm_campaign=IntegratorNewsletters

The Summary:

When it comes to product delivery, many companies are introducing the Internet of Things (IoT) into the supply chain through connected devices.

The Excerpt:

In an increasingly digital world, every aspect of product development and delivery is being transformed, facilitated, and made more efficient through automation and integrated intelligence. The supply chain is no exception; today, many firms are extending Internet of Things (IoT) devices into their supply chain to improve productivity and customer service. Sensors, communication devices, analyt...


The Title: My TechDecisions Podcast – Episode 36, Scot Whigham of IHG


(Choose between one of two photo sizes)

The Link:
https://mytechdecisions.com/podcast/techdecisions-podcast-episode-36-scot-whigham-ihg/?utm_source=integrator-newsletter&utm_medium=email&utm_campaign=IntegratorNewsletters

The Summary:

Host Jonathan Blackwood speaks with Scot Whigham of InterContinental Hotels Group about how he implemented an artificial intelligence solution into his company’s IT stack.

The Excerpt:

In this episode of My TechDecisions Podcast, host and TD Managing Editor Jonathan Blackwood speaks with Scot Whigham, Director of Global IT Service and Support for InterContinental Hotels Group (IHG), about his experience implementing an artificial intelligence solution called Amelia into the IHG IT stack....


The Title: Hacking is a Lucrative Endeavor on Both Sides of the Law

Cyber Security
Cyber Security

(Choose between one of two photo sizes)

The Link:
https://mytechdecisions.com/network-security/hacking-lucrative-endeavor-sides-law/?utm_source=integrator-newsletter&utm_medium=email&utm_campaign=IntegratorNewsletters

The Summary:

While black-hat hacking is leading to some of the most costly ransomware attacks in history, companies are shelling out money for white-hat hacking to improve cybersecurity.

The Excerpt:

Cybercrime is big business for hackers and cybersecurity professionals alike. Black-hat hackers, a computer hacker who carries out illegal malicious hacking work, cashes in by way of gleaning company and individual bank account information, or by preventing someone from accessing his computer data and then charging a fee (ransom) to unlock it. On the other hand, white hat hackers, a computer ha...


The Title: Blurring the Line Between the Digital and the Physical – the Digical World


(Choose between one of two photo sizes)

The Link:
https://mytechdecisions.com/facility/blurring-line-digital-physical-digical-world/?utm_source=integrator-newsletter&utm_medium=email&utm_campaign=IntegratorNewsletters

The Summary:

The digical world is the one we are currently living in – where lines between online and digital media blur with the physical real world.

The Excerpt:

We aren’t all walking around with computers in our bodies (though some people think that day will come), but people today rely on mobile technological devices for many things. The lines between the physical and digital worlds are blurring faster and faster, so much so that it might make sense to talk about a new hybrid digical world. There’s a term in use about this change – dig...


The Title: What is a Physical Security Information Management (PSIM) System?


(Choose between one of two photo sizes)

The Link:
https://mytechdecisions.com/physical-security/physical-security-information-management-psim-system/?utm_source=integrator-newsletter&utm_medium=email&utm_campaign=IntegratorNewsletters

The Summary:

A physical security information management system, or PSIM, can unify all physical security systems and make management simple.

The Excerpt:

Security has quickly become a major concern for many businesses. Tech decision makers want to make sure not only that their employees are safe, but that their offices, and important information held within them, are safe as well. For many it’s worth the capital for peace of mind. This has led to a number of security systems being installed in many companies. Access control systems allow for ...


The Title: Best Practices for Cybersecurity: Stay Cyber SMART

Cyber Security
Cyber Security

(Choose between one of two photo sizes)

The Link:
https://mytechdecisions.com/network-security/best-practices-cybersecurity-stay-cyber-smart/?utm_source=integrator-newsletter&utm_medium=email&utm_campaign=IntegratorNewsletters

The Summary:

When it comes to best practices for cybersecurity, you want to be SMART. The CTO of Abacode explains exactly what that means.

The Excerpt:

The usual advice we provide to companies on best practices for cybersecurity boils down to a 5-pronged approach we call Cyber SMART:

  1. S = Self-governance: Make sure you have the proper cybersecurity framework in place with governing policies & procedures.
  2. M = Monitoring: You need to have visibility into your IT infrastructure and always be watching for potential atta...

The Title: How Cybersecurity Professionals Help Companies

Cyber Security
Cyber Security

(Choose between one of two photo sizes)

The Link:
https://mytechdecisions.com/network-security/cybersecurity-professionals-help-companies/?utm_source=integrator-newsletter&utm_medium=email&utm_campaign=IntegratorNewsletters

The Summary:

A working cybersecurity CISSP explains how a cybersecurity professional can help companies secure their networks from unwanted attacks.

The Excerpt:

For me or any cybersecurity professional to help you, we need to understand your infrastructure (networking hardware, operating systems, peripheral devices, application software in use, host-based security solutions in use, mobile devices in use, number of users, etc.). We will also need to look at the training needs for your workforce and policies that you have in place for your workers in reg...


The Title: Quiz: Are You Ready to Write a Technology RFP (Request for Proposal)?


(Choose between one of two photo sizes)

The Link:
https://mytechdecisions.com/compliance/quiz-ready-write-technology-rfp-request-proposal/?utm_source=integrator-newsletter&utm_medium=email&utm_campaign=IntegratorNewsletters

The Summary:

When it comes to implementing a new AV, IT, or Security technology in your organization, the success of the project will be determined by the strength of your technology RFP (Request for Proposal). Are you ready to write it?

The Excerpt:

When you’re a technology manager in charge of implementing a new technology in your organization, the first major step you’ll need to take is created a Technology RFP (Request for Proposal). The Technology RFP will be sent to a number of installers, depending on what type of technology you want to install.

  • If you need technology that includes audio, video, or collaboration – vid...

  • « Go to Previous Page
  • Page 1
  • Page 2
  • Page 3
  • Page 4
  • Page 5
  • Interim pages omitted …
  • Page 29
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSEVENT STANDARDS OF CONDUCTYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2026 Emerald X, LLC. All rights reserved.