Business cards have long been part of business etiquette. In the late Renaissance period, visitors were announced with special cards that signified the arrival of the guest and reminding the recipient of their social obligations. The Industrial Revolution transformed these into trade cards, and the professional business card as we know it got its start. Today, the business card is a useful networking tool, even though transferring the information into a phone can be a hassle.
Mobile? Grab this Article!
Tip of the Week Security Technology Best Practices Network Security Business Computing Data Productivity Malware Privacy Hackers Efficiency User Tips Google Microsoft Communication Tech Term Cybersecurity Smartphones Innovation Computer IT Support Internet Mobile Device Hardware Email Ransomware Windows 10 Managed IT Services Users Passwords Workplace Tips Software Communications Android Small Business Mobile Devices Business Collaboration Browser Business Management IT Services Data Backup Outsourced IT Cloud VoIp Network Miscellaneous Data Recovery Upgrade Social Media Managed Service Applications Hosted Solutions Apps Backup Gadgets Information Wi-Fi Internet of Things Smartphone Wireless Microsoft Office Holiday Value Gmail Windows Managed IT services Saving Money Blockchain Business Intelligence Bandwidth Cloud Computing Employer-Employee Relationship Word Phishing Marketing Data security Government Compliance Office 365 Save Money Cybercrime Laptop Networking Chrome VPN Business Continuity Managed IT Service Artificial Intelligence Settings Connectivity Computers Telephony BDR Office Company Culture Batteries Tech Terms Mobility How To Employee-Employer Relationship Facebook Voice over Internet Protocol Data Breach Automation Excel Patch Management Access Control Operating System G Suite Router Payment Cards Apple Password Law Enforcement Wireless Charging Avoiding Downtime Remote Computing Medical IT Remote Monitoring and Management Analytics Virtual Assistant RAM Going Green Paperless Office Virtualization Data Protection Processor Cortana Net Neutrality Quick Tips Healthcare Data Management Cost Management Display Data loss Start Menu Sales GDPR Human Resources Mobile Office Tip of the week Cables Profitability Remote Monitoring User Security Paper Cryptocurrency Project Management Big Data HIPAA Taskbar Tactics Personal Information Edge Websites Movies Microsoft Office 365 Hard Disk Drive Environment Workers Benchmarks Spyware Spam Tablet Storage Managed Services Provider IT budget Botnet User Tip Eliminating Downtime Maintenance Voice over IP Ink Windows 7 Search Physical Security Technology Tips Content Filtering Hard Drive Managing Stress National Security Millennials Plug-In E-Commerce Bitcoin Safety Vulnerability Video Network Attached Storage e-waste File Sharing Training Risk Management HP Virus Battery Streaming Media Dark Web Electronic Health Records Vendor Twitter Travel BYOD Machine Learning Internet Explorer Mobile Device Management PowerPoint Reporting Time Management Insurance Backup and Disaster Recovery Processors Troubleshooting Proactive IT Payment Comparison Lead Generation Unified Communications Authentication Customer Service disposal Security Cameras Document Management Antivirus Recovery Knowledge Downloads Error Health Inventory Wireless Internet Business Technology eCommerce Sports Chrome OS File Management Hard Drives Managed IT Bring Your Own Device Update Updates Threat instant Messaging Threats Dongle Tools iPhone Specifications Authorization OneNote Wearables Staff Trends Employees IT Management Mobile Security Telecommuting Amazon Help Desk Telecommute Redundancy Online Shopping SaaS Current Events SSD Hybrid Cloud Outlook Printing Analysis Vulnerabilities Scams Conferencing WannaCry Microsoft Teams Windows Server 2008 R2 Server Management Database Certification Recycling Digital Server A.I. Touchscreen Solid State Drive Thank You WiFi Disaster Recovery Emergency Congratulations Printers Financial Alert