Articles
Perspectives on the technology
shaping modern business.
News, analysis, and commentary for business leaders navigating a changing technology landscape.
Latest Article
Why We Kick AI Notetakers Out of Our Client Meetings
May 11, 2026
When a client joins one of our discovery or technical sessions with Read.ai, Otter, or Fireflies running in the background, we remove the bot. That’s a default position, not an exception, and we don’t soften how we explain it. Most IT companies don’t do this; given what tends to come up in technical conversations, most of them probably should. The reasoning fits in a sentence….

Why We Kick AI Notetakers Out of Our Client Meetings
May 11, 2026
When a client joins one of our discovery or technical sessions with Read.ai, Otter, or Fireflies running in the background, we remove the bot. That’s a default position, not an exception, and we don’t soften…

A Third of Your Employees Are Using AI at Work
May 4, 2026
We pulled DNS data from 2,000 user devices across our client base to see what AI use actually looks like inside Calgary businesses right now. The headline number is that 27.9% of users had hit…

AI Isn’t Taking Your Job Any Time Soon
April 27, 2026
If you’ve spent any time on LinkedIn or in a business magazine over the past year, you’ve been told that AI is about to do your job. Maybe it’s already replacing the person next to…

Why Most IT Providers Don’t Fix Hardware
March 20, 2026
MSPs don’t usually repair hardware themselves. When a drive dies, a power supply pops, or a laptop screen cracks, what usually happens is a warranty claim — your provider files the ticket with Dell or…

Zero Tolerance for CSAM
March 2, 2026
This month, we published a formal policy on how Lumitiv handles any discovery of child sexual abuse material (CSAM) during the course of our work. The full document is available here, but the short version…

When the Phishing Email Comes From Your Own Inbox
January 15, 2026
A Calgary business recently discovered that several of its customers and vendors had received what looked like a routine invoice email from one of its staff. The sender address was real, the branding was real,…

Why Business IT Hardware Costs Are Rising
November 25, 2025
Hardware costs have climbed across every category that businesses rely on, from servers to laptops to desktop systems. Many organizations assume this trend is tied to tariffs, inflation, or lingering supply chain problems. Those factors…

Should You Be Buying Vendor Warranties on Every Device?
September 1, 2025
Every time you order new hardware, someone is going to ask if you want the extended warranty. Three years, four years, accidental damage, next-business-day on-site service — there’s usually a tier for everyone. The pitch…

Business Internet in Calgary: More Choices
August 25, 2025
When Calgary businesses start looking for internet service, the search often begins with Telus or Rogers. These are the two most visible providers, and their marketing makes them seem like the only real options. In…

Time to Rethink Remote Access?
August 18, 2025
Yet another security flaw in SSL VPN technology has made headlines, and it’s raising an important question: is the traditional VPN model still the right fit for most businesses? For years, SSL VPNs built into…

Are IT Companies Forgetting the Basics of Security?
August 13, 2025
If your IT company has ever walked you through a slide deck full of vendor logos — endpoint protection, SIEM, EDR, dark web monitoring, threat intelligence feeds — and you came away thinking you were…

Abuse of Trusted Platforms: A Case Study on Trello Invite Email Payloads
July 23, 2025
An end user recently received an email that looked completely legitimate on the surface. It invited them to join a Trello board and appeared to come from a known sender within their own company. The…
