2020 Fall Newsletter

2020 Fall Newsletter

TCGi Happenings!  We have: Announced our strategic alliance with Connection Enterprise Solutions.  Participated in the NCWIT Black Woman in the Technology Workforce panel.  Hear the replay.  Won the $5 Million+ category of the Pivot Champs Virtual Face Off.  Woo-hoo!  Participated in the virtual 5K Walk for Haiti.   Click Here to View the Newsletter. Check [...]
Our Vendor Card

Our Vendor Card

  In response to the COVID-19 pandemic, we are finding many organizations that are in need of additional IT equipment for those who are working from home. Desktops Laptops Printers Monitors Headsets   Please let me know if you have any immediate needs which TCGi could source for you.  Below is our Vendor Card to [...]
Getac Mobile Devices vs. Boxed Mobile Devices

Getac Mobile Devices vs. Boxed Mobile Devices

We have heard on the street that some businesses are buying non-rugged computers and adding boxes to protect them, because it is “cheaper”. I emphasize the word cheaper because it is not necessarily cost-effective when you look at the total cost of ownership. If these computers are being used inside, they may not need a [...]
TCGi Holiday Newsletter & Year in Review!

TCGi Holiday Newsletter & Year in Review!

2019 has been a whirlwind year for TCGi.  The purchase of BigVar and expansion as a value-added reseller of IT hardware and software has been very successful. TCGi was also excited to be invited to become a member of the 2019 WBENC Conference & Business Fair's Host Committee.  Avis presented part of the orientation for [...]
Rugged vs Non-Rugged Mobile Devices

Rugged vs Non-Rugged Mobile Devices

  Let's face it, regular laptops, tablets and 2-in-1 devices are not made for outdoor work. Most portable devices are at a significantly greater risk of being damaged. Damage can occur in a number of ways: drops, spills, dirt, dust, extreme temperatures and vibration. Yet those companies who employ workers in the field need reliable [...]
Authentication vs. Access Controls vs. Authorization

Authentication vs. Access Controls vs. Authorization

An excerpt from "Authentication vs. Access Controls vs. Authorization" Blog - December 7, 2019 - CloudKnox team   Understanding identity security:  In the past, access control has largely been synonymous with authorization. However, the highly automated and dynamic nature of cloud infrastructure demands that we reexamine these concepts by deconstructing their true differences as follows: [...]