Endpoint security is the weak link in many organization’s security strategy. We spend time securing the network assets, including company-owned endpoint devices and then we allow personal devices access to these same networks. It might be a manufacturing company that hosts a sales meeting for people from across the region. Or it might be a…
Disaster Recovery Business Risk Assessment – Know What Before How
In my last blog post I talked about the first step in Disaster Recovery or High Availability planning, Business Impact Analysis – The First Step in DR Planning. The next step in the process is conducting a Risk Assessment. A risk assessment will help you identify the events that could impact your organization. This will…
Application Modernization – A Conversation
A few weeks ago I wrote a blog post dealing with the specifics of application modernization on the IBM i platform. This inspired a conversation I had with a customer. Our conversation was not focused on any one computing platform but was more of a general industry conversation. At the heart of our conversation were…
IBM i Application Modernization: PHP on IBM i
The IBM Power System running IBM i (and its predecessors) has been a workhorse in the commercial computing environment for decades. Its reliability, security and performance are unmatched in the marketplace. That’s the attitude of our clients. To say there’s an affinity for the platform by those that rely on it is an understatement. Also…
Why are Small and Medium Sized Business using Managed IT Services?
Many Small and Medium Sized Businesses (SMB) have turned to Managed IT Services to manage their IT infrastructure, from desktops to servers and storage. And they are doing it for the same reasons as large firms. While the scope might be different, the results are typically the same and therefore the reasons. We spend a…