Brian Livingston

Protect Your E-Mail Address

Like most e-mail users, you probably get a ton of unsolicited messages, and you may be getting more and more every month. Filtering software can help you sort out...

A Smarter Identity

Viruses. Worms. Spam. Identity theft. What do all these things have in common (besides the fact that you hate them)? The people behind these crimes dont want to be...

Google Grumbles

Google.com is such a sacred cow in the search business that I hate to be anything other than worshipful. But its beginning to appear that Googles results pages have...

The Future of E-Mail

Wouldnt it be great if you could get rid of the lions share of your e-mail but still get a coherent flow of the information you need? Some companies...

ASP Musical Chairs

Remember ASPs? Providing applications remotely to enterprises, usually over the Internet, was once a hot business model, but it cooled off fast. Survivors are emerging, though, and its beginning...

Latest Posts

Coming to Security Mandate Near You: SBOMs

The recent executive order will expand what companies must disclose to the government when a data breach occurs. Like the California Consumer Privacy Act (CCPA), these...

Using Data and Tech to Boost Your Customer Service Center: 5 Tips

Customer satisfaction is the umbrella metric of any contact center. Our industry thrives on happy customers and top-notch experiences. Delivering on that overarching goal has...

Making the Shift to a Hybrid Work Environment

Contrary to what many believed prior to early 2020, we now know the concept of the home office actually works. This is one of...

The Asus ROG Strix G15 Advantage Laptop: For When You Want Pure Power

Last week I talked about the HP Zbook Firefly and how it compared to the HP Dragonfly Max. This week, I’d like to talk...

Precisely CEO Josh Rogers: Understanding Data Integrity

I spoke with Josh Rogers, CEO of Precisely, about the concept of data integrity: what it means, why it's so critical to effective data...