The Background: In a previous post, we took an overall look at the “used hardware” option for IT purchases. I reviewed the reasons for buying used and presented some concerns and considerations. One alternative option is the “new/open box” hardware. In this post, I will dive a bit deeper into this option, as well as…
Endpoint Security
Endpoint security is the weak link in many organization’s security strategy. We spend time securing the network assets, including company-owned endpoint devices and then we allow personal devices access to these same networks. It might be a manufacturing company that hosts a sales meeting for people from across the region. Or it might be a…
Is server consolidation always the most cost effective solution?
If you’ve read some of my recent blog articles, you’re probably well aware that I love configuring hardware solutions. It may even be considered by many as a borderline obsession. Even though we still consider it hardware, 90% of the process is spent dialing into the most cost efficient combination of hardware and software to…
Why are Small and Medium Sized Business using Managed IT Services?
Many Small and Medium Sized Businesses (SMB) have turned to Managed IT Services to manage their IT infrastructure, from desktops to servers and storage. And they are doing it for the same reasons as large firms. While the scope might be different, the results are typically the same and therefore the reasons. We spend a…
Choosing a Data Center Provider for Co-location
Choosing the right data center provider to co-locate your IT infrastructure should be done with care and a lot of thought. One thing you don’t want to do is make the wrong choice up front. The cost of making a mistake can be huge. Most contracts are from 36 to 60 months in length. If…