Industry insider news for New Zealand's technology resellers
These search results are from across the Techday Network of sites
Apple Supreme Court case could have ‘far-reaching ramifications’
A GlobalData analyst says that the outcome of the Apple v Pepper case could impact the app development market at all levels.
Spark facing court proceedings after Commerce Commission alleges it misled customers
Spark has addressed the charges, saying it is disappointed by the commission's decision to file proceedings.
PB Tech raked over coals by ComCom for dodgy practices
PB Technologies has pleaded guilty for poor extended warranty practice and warned over bait advertising.
Telstra to front federal court over direct billing services
The company faces a $10 million fine and additional customer refunds as the ACCC alleges that it "misled" consumers.
Second workplace bullying case filed against TechnologyOne
Ana Monteiro filed a case against the company on Monday, alleging bullying, victimisation and discrimination.
Hills and Milestone Systems to trade punches in court
This conflict comes shortly on the heels of a new distribution centre opened by Hills.
Schneider Electric wins court case over DPSA’s unpaid debts - thanks existing partners
“This is a major win for all partners who have paid their bills - we would like to thank our existing distributors."
Six key steps to growing your MSP business
In order to remain competitive, MSPs are being forced to become not just good in their operations, but great - here's some expert advice.
The quick guide to understanding cybercriminals' motivations
Check out this incredibly helpful and interesting guide to exactly what cybercriminals are after, and how you can keep yourself safe.
Whitepaper: How businesses can buff up their cyber defences
By 2020, 60% of digital businesses will suffer major service failures due to the inability of IT security teams to manage digital risk.
The ultimate guide to selling Disaster-Recovery-as-a-Service
The key is being able to steer the discussion towards the business impact the lack of the service may have and work backwards to the offering.
The six golden keys to successful identity assurance
When someone tries to access your internal systems, how can you be sure a user is who they claim to be?