Condusiv: 25% Virtual Machine Boost with V-Locity 4

By Steven Burke   / CRNDecember 07, 2012    4:19 PM ET Condusiv Technologies is upping the ante in the virtualization market with a guaranteed performance boost of at least 25 percent on virtual machines for its new V-locity 4 product. The virtual storage software, which will be formally announced on Monday, comes with a money back • Read More »

George Jon Named A Top-Performing SMB Channel Partner by Ingram Micro

CHICAGO, IL, October 9, 2012 — George Jon today announced it has been named to the Ingram Micro SMB 500. Unveiled at the Ingram Micro 2012 “Turn the Tables” Fall SMB Invitational in Rancho Mirage, CA, the inaugural list celebrates the top 500 fastestgrowing Ingram Micro U.S. channel partners focused on small and midsize businesses • Read More »

George Jon is Hiring For Tech Positions!

We are currently hiring for tech positions. Visit our careers page at to view all available positions. If you have what it takes to be a part of our team, please submit your resume along with a cover letter to  

12 Steps for Staying 1 Step Ahead of Online Security Threats

By Andrew Browne / TechNewsWorld Pop-up windows are a common form of online advertising and often appear so quickly that users are caught offguard. However, some pop-ups, when clicked, trigger spyware that can cause serious damage to computers. That’s why it’s important to never click “agree” or “OK” to close a pop-up window, and only • Read More »

Windows 8 Server Core Promises Cheaper Clouds

By Paul McDougall / InformationWeek  March 21, 2012  Stripped down version of Windows Server 8 aims to significantly reduce storage costs for organizations building private clouds. Microsoft has enhanced Server Core in Windows Server 8 to make it more flexible and user friendly, and as a result the company says organizations can save thousands of dollars – • Read More »

Detect and prevent today’s sophisticated malware threats

By Dennis O’Reilly March 20, 2012 10:49 AM PDT Internet thieves are more organized and more technically savvy than ever before as they concoct insidious software designed to let them separate you from your valuables. Users and ISPs must work together to keep them at bay. Today’s malware purveyor bears little resemblance to the outcast-teenage-loner caricature • Read More »