By Kevin Goodman & Petar Bojovic Today’s fast-paced and ever-changing technology landscape requires a company to build an association with a complete end-to-end facility-based solutions provider with a range of products for the data center to maximize network performance, energy efficiency, and capacity for today and tomorrow’s demands. Our team at BlueBridge Networks over the […]
The Summer of ’15 Internships — A Positive Impact on Both the Business and the Participants
Many times we are so busy in our businesses doing what we have to do that we don’t take the time to slow down and do what we should do. One of the things businesses of all types and sizes should do is bring interns into their day-to-day environments. There are many compelling reasons to […]
Summer Prose 2015
Sometimes when I see His works, I have a strange sensation of being both found out and set free… The startling beauty assaults my complacency while it gives comfort and solace to my soul, reminding me of a larger more inclusive reality of which we are all a part… Despite seeming evidence to the contrary- […]
Successful entrepreneurs always find a way to help the less fortunate
I decided that as a corporate citizen I could come up with a strategy that would align myself and our company’s time, talent, and treasure with the Missions of the United Way – Education, Income, and Health as a way to help move the needle and eradicate poverty and improve the overall quality of life […]
IT in the Sky: Is the Cloud Right for Your Business
What is the “cloud” phenomenon all about? You hear it constantly, but what does it mean and how can it be used to help small business owners? The cloud has been a buzzword for several years, and with good reason. The cloud is rapidly reducing costs and improving efficiencies for businesses globally. In its simplest […]
“Talking SMAC” (Social, Mobile, Analytics, Cloud)
The fact of the matter is that , at some point, you will suffer a security breach; you may even have a breach right now . Forrester predicts that in 2015, at least 60% of enterprises will discover a breach of sensitive data. Most breaches are not even discovered by the breached party. Inadequate incident […]