buy lipitor online
  • JUser: :_load: Unable to load user with ID: 700
Hurwitz & Associates - Insight is Action

Hurwitz & Associates Blog

As thought leaders in the IT industry, Hurwitz blogs are a wealth of knowledge and insight into trending technologies.

  • Home
    Home This is where you can find all the blog posts throughout the site.
  • Categories
    Categories Displays a list of categories from this blog.
  • Tags
    Tags Displays a list of tags that have been used in the blog.
  • Bloggers
    Bloggers Search for your favorite blogger from this site.
  • Login
    Login Login form
Subscribe to this list via RSS Blog posts tagged in Mobile

Predicting 2016: What's Old is New Again

Posted by on in Vendor Strategy
Hurwitz & Associates expects 2016 to be an interesting year with a combination of innovative new offerings and a resurgence of existing technologies in the forefront. 2016 will be the year when the old is new again; customers will continue to absorb and deploy technologies such as cloud, microservices, IoT, and advanced analytics. Businesses will select technologies based on the offering’s ability to provide both efficiency and the ability to improve customer relationships. We also expect to see continued consolidation in the market. Large enterprise vendors will continue to purchase innovative companies as both “tuck-in” acquisitions and a fast way to...
Last modified on
Hits: 4373
Continue reading 0 Comments
The Rise of BYOD Workplaces Bring your own device (BYOD) to work is a growing trend across all industries.  The idea that an employee, customer, or partner will access your network with any device they choose was unheard of only a few years ago it wasn’t long ago that companies had strict policies on what devices could and couldn’t connect to the company’s network.  Today many companies still try to enforce these policies without much success. Now the tables are turned, when executives or partners want to use their iPads or smart phones on the corporate network, IT is forced to...
Last modified on
Hits: 4050
Continue reading 2 Comments

Holes in Endpoint Security

Posted by on in Security
There is an avalanche of devices and end points that employees, customers and partners are beginning to utilize as they conduct even routine business transactions. An end point device might be a PC, smart phone or even a flash drive. The challenges of IT security are complicating the ability of organizations to protect their intellectual property as well as their reputations in the market.  And it isn’t just IT that is concerned. IT security has grabbed the attention of governmental bodies and the boards of directors of many companies.  Clearly, passwords – even when they are frequently changed and made more...
Last modified on
Hits: 3848
Continue reading 0 Comments