We can’t afford to ignore the myriad of mobile devices and apps currently saturating our attention and wireless connections.
In my last post, I laid out some of the industry’s eye-popping numbers. This time, I’m offering up just one graphic (from Cisco’s recent Global Mobile Data Traffic Forecast Update) showing why you must upgrade your network infrastructure. Pronto. Continue reading
Wireless chatter really is everywhere: I recently saw an ad from a major pain relief company touting the benefits of its latest product, a “wireless” pain patch
But wireless implementations can be plenty painful, and there’s no magic patch to ease the strain.
When clients ask us the best way to ensure that a wireless service performs as desired, we advise them to begin by asking — in non-technical terms — what they’re trying to accomplish. Continue reading
In many companies, the wireless capability added on to their enterprise network a few years ago has become some employees’ primary network.
It’s a development that signals just how quickly mobile devices are proliferating the workplace. The so-called “consumerization of business” changes the way we work — and our data networks have to keep up.
This transformation has been in the works for a while. In 2011, market analyst firm Gartner predicted 80% of corporate wireless network technologies would be obsolete by 2015. Gartner may well be right, given the findings of more recent research. Continue reading
When it comes to choosing a firm to help with your IT staffing efforts, it’s important to remember that some IT staffing firms do a better job than others. Here’s what you have a right to expect:
1. An IT staffing company should be able to help you strategically plan your IT hiring
This involves a thorough examination of budget priorities, workloads, the skillsets of current team members, and future projects — all with an eye on flexibly meeting both your short- and long-term goals. Look for an IT staffing company that helps you determine what types of special skills you need for your IT projects, the best mix of permanent IT staff and contractors, when you’ll see workload spikes, etc.
According to Computer Economics’ 2014/2015 IT Spending & Staffing Benchmarks report, hiring of IT professionals is finally on the upswing — yet another indication that our long-declining economy continues to improve.
Even so, you may not have an easy time finding the right IT expertise when you need it. That’s because there’s something of a squeeze going on (you know, the one that puts you between a rock and a hard place):
In my last post I focused on the first two steps in planning for a hybrid cloud: Making sure your IT infrastructure is “cloudified” and assessing your current environment and workloads. In this post, I’ll lay out the final four steps: Continue reading
By some accounts, better than 50% of organizations are now deploying hybrid clouds — and for some very good reasons:
- Improved security, because sensitive data can remain behind your private cloud firewall while less sensitive data can be permitted onto a public cloud.
- Ability to specify where and under what terms and conditions your data is stored.
- Effective workload balancing without breaking the bank, since using a public cloud to, say, handle peak loads can be far cheaper than keeping everything in-house or moving everything to a public cloud.
To get a hybrid cloud up and running, you need to begin with planning — specifically, a six-step planning process that, fortunately, you do not have to undertake alone. In this post, I’ll focus on the first two steps: Continue reading
Most security experts — including ours at Quest — will tell you that it’s no longer a question of if attempts to compromise your data, apps, and/or technology infrastructure will happen, it’s now only a question of when.
So what can you do to protect your business in this age when it’s so tough to distinguish between trusted and threatening network traffic, when there’s no longer such a thing as a secure perimeter around your data, when the “attack surface” has never been greater? Continue reading
Imagine discovering that for the last 12 months none of your company data had been backed up at your designated co-lo.
Worse, you only found this out because your corporate site has suffered a catastrophic failure. All your data has been lost — and you have no way to retrieve it.
You’re outraged, of course, and you want answers. How could your co-lo provider fail to back up your data? What about your provider’s vaunted disaster recovery service? Who is responsible for allowing this to happen? Continue reading
Information technology has become a business essential. We’ve reached the point where our ability to thrive and succeed depends on key software apps and the technology (wherever it may be) that runs them, our access-from-anywhere to the Internet, and our ability to gather and analyze troves of digitized data.
The easiest targets
So important are these capabilities that we often put them into use before we’ve figured out the myriad of ways they’re vulnerable to those with malicious intent. And while smaller enterprises used to be able to escape the worst of these vulnerabilities simply by slipping beneath cybercriminals’ radar, those days are gone. Continue reading