James Nagurney - National Business Development Manager
James Nagurney
National Business Development Manager
Kurt Hildebrand
Director of Practices and Initiatives for Enterprise Storage
Lane Shelton - Vice President of Software Business Development
Lane Shelton
Vice President of Software Business Development
Rich Faille - Director of Mobility Practice
Rich Faille
Director of the Mobility Practice
Tony D'Ancona - Vice President of Professional Services
Tony D'Ancona
Vice President of Professional Services
»See All Authors
  • AwardsIndustry Recognition and More
  • EventsExpos, Conferences, and More
James Nagurney - National Business Development Manager
Featured Story

What's the Deal with Windows 10?

Get the Scoop on the Latest from Microsoft

by James Nagurney | Thursday, October 23, 2014

The biggest news coming out of Microsoft this month is the announcement about Windows 10.  We have to be honest that the name is a bit of a surprise. We were expecting Windows 9 or just “Windows” (you know, like “iPad”), but they got us on this one. Apparently, Microsoft is signifying that this will be their final “major” release of their flagship product, with the future bringing on evolutionary, in-place tweaks and modifications. This is probably a smart move as most customers are prone to skipping versions, at least for the last 15+ years or so. Here’s what we know so far:

 

  • One application platform so our developers have one way to write a universal app that targets everything.
  • One store so there is one way for applications to be discovered, purchased, and updated across devices.
  • One experience across devices that are tailored to each type of device – whether it is a device with no screen or one with an 80" screen and whether it is a touch device in your hand or one that is 10' away that you control with gestures.
  • Automatically refreshes so Windows 10 is always up to date. It also features in-place upgrades that can make device wipe-and-reload scenarios obsolete.
  • Security is core: identity, threat, and malware protections are built-in; protection follows data wherever it resides; and two-factor authentication is easy to use and manage.
Risk Assessment

Don’t Short-Change Your Risk Assessment

Special Risk Circumstances

by Stephen Nardone | 10.21.14

While there are commonalities to most risk assessments, companies in regulated industries that store sensitive customer data must follow additional government-mandated protocols. The overall goal is to gain an understanding, from an end-to-end perspective, of what the current risk is to your environment. However, a full Security Assessment can be targeted against compliance-related areas, like PCI or HIPAA.

Can Your Technology Stand Up to a Barrage of New Security Threats?

Keep Your Network Strong with Dell SonicWALL

by Bill Virtue | 10.16.14

Today, addressing security risk and threats is an ongoing rapid process. Organizations of all sizes need to protect themselves from the constant evolution of threats. My team at PC Connection is working with customers every day to eliminate dangerous gaps in protection and boost employee productivity at the same time.

Technology Blog

Our technology blog, Connected, serves as your one-stop resource for valuable insights from our on-staff technology experts and featured industry leaders regarding the latest news and information on business IT solutions and technology trends.