This week Box Inc. is using its virtual user summit, BoxWorks 2022, as a way to map out the future of work — which it views as hybrid for good.

Box today announced the general availability of the revamped Box Notes for real-time content collaboration and project management, the upcoming beta of Box Canvas, for visual collaboration and whiteboarding, and the pending release of Content Insights, which provides visibility on how content is being accessed, consumed and used.

Read More About
The way we work: Box brings new capabilities to its Content Cloud

Earlier this year, I interviewed Jonathan Guy, VP of Engineering for RF Code regarding its new Sentry product, which promises to make management of remote locations easier.

After being briefed on the product, I decided to have the company send me a Sentry device and try it out myself. As a former IT pro, I’m familiar with the challenges that companies have when they need to manage locations with no local IT staff.

Read More About
Remote IT Monitoring Product Review: Code Sentry

Communications provider Mitel has made it a strategic priority to focus on customer lifecycle management (CLM) principles to ensure its customers are getting full value from their investments in its technology.

For Mitel, this is a key initiative as CLM in unified communication (UC) is important in making sure customers are maximizing business value and, at the same time, future proofing themselves. Hybrid work has shifted UC requirements in favor of collaboration platforms that connect people who are dispersed across many remote locations.

Read More About
Mitel Embraces CLM to Add Value to Communications

When you think of Arista Networks, mid-market is not what comes to mind. Yet the provider of software-driven cloud networking solutions for enterprise environments has recently moved into the mid-market to address some of the challenges smaller companies face today.

Read More About
Arista Brings Cognitive Campus to the Mid-Market

Over the past couple of years there has been a significant focus on phishing, ransomware and other threats that attack online users. While this focus is certainly prudent given the rise in those types of activities, it’s important to not take your eye off more “traditional” type attacks, such as distributed denial of service (DDoS).

Read More About
Report: Cybercriminals Use Cloud for DDoS Attacks