End users around the globe are calling their respective help desks today reporting issues with popular internet services, including streaming services, Amazon’s Alexa, Ring, and Kindle devices, and many well known iPhone and Android Apps. Users who attempted to console themselves with a cheeseburger found that the McDonalds app is also unavailable.
Read MoreWhether data is recovered from backup or recovered by using a decryption key purchased from criminals, the time to recover for something as extensive as a public utility can be significant.
Read MoreUsing a low-code/no-code platform to create internal business apps is a major revenue opportunity and way to increase stickiness with customers, according to TrueIT CEO Zac Paulson.
Read MoreHow do you know that coffee is really from Columbia? I mean, they’re spending a lot on advertising to make you believe that, but is there really any way to know? What about contracts, land titles, or marriage certificates? What about your identification? Can we use technology to prove something is authentic? Can we know that those beans are really 100% pure Colombian Coffee?
Read MoreTraditionally, businesses have automatically trusted anyone and anything inside the corporate network. In a digital world, most are now adopting a zero-trust architecture that trusts no one and nothing. But some companies are still using the traditional approach, making them more vulnerable to attacks in trusted applications.
Read MoreLast year we were finishing the construction of our new headquarters. During this process we needed to pick an access control solution (physical door system) that gave us more flexibility.
Openpath was exactly what we were looking for. It provided a cloud based door locking system that allowed us to have touchless entry, ditching the cards and using our phones to authenticate to unlock doors. Once the system identified we should be allowed in, you can just waive your hand over the door sensors and they would unlock.
Read MoreNothing is as difficult as traveling on planes with small children.
I was recently on a long plane ride with my four children, and my youngest had to use the bathroom, which with two people inside feels like a sky-high coffin with a flush button.
Read MoreAnyone who types “What is SD WAN?” into the search bar, looking for a simple definition, might soon stumble headlong into a sea of vendors, carriers, and providers touting diverse features and benefits, Gartner magic quadrants, and the sort of security concerns that accompany new technology. Our engineers explained that SD-WAN is a marketing term that can mean several things. On the surface, SD-WAN stands for “Software Defined Wide Area Network” which is proof that technical people are bad at naming things. We apologize for this. To make it up to you, let’s demystify this a little bit together.
Read MoreLet’s face it, taking notes during meetings is tough. If you’re on a computer it’s often perceived as you’re not engaged. The alternative is handwritten notes that end up in a pile, get lost or never get converted to a digital format.
Read MoreAt Datapath we’re seeing a mix of working from home and from offices. Even with our own team, we have some team members working from the office while others are continuing to work from home for a variety of reasons.
Read MoreWe’re a big fan of calendar tools. It’s estimated that we can lose 20-25 minutes trying to schedule meetings with other people, particularly those outside our organization.
Read MoreDatapath’s core values help us make decisions every day. Hiring decisions, sales decisions, and everything in between. Any member of the Datapath team is well aware of these values and understands what it means to make them part of their core.
Read MoreAs cyber security breaches increase the requirements to ensure the compliance of your organizations and those that you work with is going to increase. Datapath believes it’s important to use processes such as the SOC certification to ensure your processes and procedures are compliant and aligning with safe cyber security best practices.
Read MoreTake a virtual tour of our new headquarters in Downtown Modesto and see what new state-of-the-art tech we’ve invested in.
Read MoreWith over 40% of Americans working from home full-time, network security is of especially paramount importance. Two-factor (or multifactor) authentication is an essential piece of the security pie. Read on for valuable information and our trusted recommendations.
Read MoreThis year has brought on changes: changes in how we work, where we work and maybe even how many people are now working with us. Your organization has likely shifted to your team members working from home or maybe from a different state than before.
Read MoreAt Datapath, certain changes to our tools and practices have helped us manage our teams, our customers, and our operations with increased efficiency and success.
Here’s our guide for managers to help your virtual team perform to its full potential. These are five actions you can take as a leader to manage your remote team more effectively.
Read More