Blog

For years, setting up a new computer, whether it’s for new employees or rebuilding a computer due to a failure or loss, has been a very tedious process. Employees are impacted by the time it takes to recover. Companies are pained by the cost it takes to build these computers. User licenses are not always available,...

Voice calls are still the backbone of internal and external communication for organizations across any industry. To ensure this communication is effective, it often needs to be transcribed. For example, if you have an important meeting with a client, somebody would have to take notes throughout the meeting for future reference, correct?...

Dreamforce is exactly one week away, and soon hundreds of thousands of people will be walking around downtown San Francisco for the biggest event in the Salesforce ecosystem. This year will be my sixth Dreamforce… Yes, that number shocked me too! I feel lucky my job has allowed me to attend all these years, initially...

Do you have the (great) problem of drowning in gifts that need to be processed? These might be pouring in from your end-of-year direct mail campaign, or you might have collected onsite donations at a recent gala event. Either way, you need to get these gifts into Salesforce and FAST.   With the biggest fundraising...

It’s time for another “ECHO Star” blog. This month’s ECHO Star is Hristo Yordanov, a dedicated system engineer who is looked upon as the in-house security expert. During his four-year (and growing!) tenure at ECHO, Hristo has proven to be one of our most dependable and technically knowledgeable security experts that we have! He is...

This month there are 61 unique CVE’s, 10 critical and 1 being exploited. Out of these we pay close attention to CVE-2019-1367 . CVE-2019-1367 | Scripting Engine Memory Corruption Vulnerability A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory...