Industry insider news for New Zealand's technology resellers
These search results are from across the Techday Network of sites
Here is the Marvel’s Spider-Man PS4 media kit unboxing
PlayStation NZ were kind enough to give FutureFiveNZ a media kit for Marvel’s Spider-Man PS4. This is our unboxing of it.
Video: SIGGRAPH 2018 - The art and innovation
A five-minute video highlighting some of the most interesting moments in art and innovation at SIGGRAPH 2018 in Vancouver.
Marvel villain Thanos is invading Fortnite for a limited time
If you have watched Avengers: Infinity War, you may have seen how evil Thanos can really be. Well now the evil Marvel bad guy is invading Fortnite
All hands aboard the hype-train: The Infinity Wars have finally arrived
Marvel fans rejoice as the moment we have all been waiting for has finally arrived...
Unleash your inner superhero with Marvel’s new VR game
Step into the shoes of your favourite Marvel heroes and rage through epic battles with up to three friends...
Marvel: Ultimate Alliance games releasing for PC, PS4 and Xbox One
Activision has announced that it will be re-releasing the two Marvel: Ultimate Alliance games as one package for the new consoles and PC.
Six key steps to growing your MSP business
In order to remain competitive, MSPs are being forced to become not just good in their operations, but great - here's some expert advice.
The quick guide to understanding cybercriminals' motivations
Check out this incredibly helpful and interesting guide to exactly what cybercriminals are after, and how you can keep yourself safe.
Whitepaper: How businesses can buff up their cyber defences
By 2020, 60% of digital businesses will suffer major service failures due to the inability of IT security teams to manage digital risk.
The ultimate guide to selling Disaster-Recovery-as-a-Service
The key is being able to steer the discussion towards the business impact the lack of the service may have and work backwards to the offering.
The six golden keys to successful identity assurance
When someone tries to access your internal systems, how can you be sure a user is who they claim to be?