Month: February 2013

10 essential elements of BYOD training

User training is integral to the success of any Bring Your Own Device (BYOD) initiative. The training needs to educate users on your BYOD policies, device access, device security, and any other particulars for using personal devices inside your enterprise.

Tagged with: , , , , , ,

What’s in and out of Office 2013

Best STL has produced an infographic describing which features have been added to Microsoft Office 2013 and which features have been removed. Office 365 and Office 2013 differ from previous versions of the productivity suite in many ways. We highly

Tagged with: , , , , , , , , , ,

The myth of the always-on cloud

One of the big promises of cloud computing is the idea of always-on. The cloud as a whole – infrastructure, platform and software – is supposed to be available at all times. Service providers from every layer give 99% and

Tagged with: , ,

Secure your personal cloud information with BoxCryptor

Personal data includes cloud drives like Google Drive, Microsoft SkyDrive, and Dropbox. If you connect your tablet to those services, your cloud data is ready for prying eyes — unless you make use of a handy tool like BoxCryptor for

Tagged with: , , , ,
Top