Array
(
    [1536x1536] => Array
        (
            [width] => 1536
            [height] => 1536
            [crop] => 
        )

    [2048x2048] => Array
        (
            [width] => 2048
            [height] => 2048
            [crop] => 
        )

    [rta_thumb_no_cropped_420x] => Array
        (
            [width] => 420
            [height] => 0
            [crop] => 
        )

    [et-pb-gallery-module-image-portrait] => Array
        (
            [width] => 400
            [height] => 300
            [crop] => 1
        )

    [et-pb-post-main-image-fullwidth-large] => Array
        (
            [width] => 0
            [height] => 0
            [crop] => 1
        )

    [et-pb-image--responsive--desktop] => Array
        (
            [width] => 1280
            [height] => 720
            [crop] => 1
        )

    [et-pb-image--responsive--tablet] => Array
        (
            [width] => 980
            [height] => 551
            [crop] => 1
        )

    [et-pb-image--responsive--phone] => Array
        (
            [width] => 480
            [height] => 270
            [crop] => 1
        )

)

Designing A Blueprint for Proactive IT Support

Designing A Blueprint for Proactive IT Support

When an oil and gas-focused engineering and design firm needed to absorb a new business and outsource its IT support services, it upped its relationship with CTECH Consulting Group, and achieved the competitive edge it desired. Automated Rig Technologies (ART) Ltd.’s...
Discover More
How Your Small Business Can Outsmart Hackers

How Your Small Business Can Outsmart Hackers

If big brand names like Target or Home Depot can become victims of a cyber attack, then what about your small business? Don’t think you aren’t susceptible because cyber criminals don’t discriminate and might target you simply because your security system is likely to...
Discover More