Featured Blog Post

Three Reasons to Attend This Year’s AlwaysOn Leadership Symposium

Read More
Group of female students coding on laptops in a computer lab. Close up of asian and afro american young women discussing.

Client Spotlight

A Very IT School Vacation

Unlike some seeking R&R during school vacation week, I didn’t jet down to Florida to visit Mickey Mouse, binge watch Netflix, or tackle the ever-growing list of projects around the house. As district technology coordinator for South Amboy Public Schools, in South Amboy, NJ, I instead spent my break working with the fine folks at […]

04.26.2017

Group of people meeting with technology.

Cloud

Power of 3: Moving to a UCaaS Model

Power of 3 is a quick snapshot of tech knowledge delivered in three bullets that can be read in three minutes or less. Gartner predicts the UC market will grow to $42.4 billion by 2019, showing the plethora of options when it comes to platforms and the networks that support them. The cloud has made […]

04.20.2017

Get Carousel Blog updates delivered to your inbox.

Join 6 other subscribers

Cloud computing

Cloud

Five Reasons to Explore a Hybrid Cloud Strategy

Cloud services are a great alternative for almost every company for many compute needs. Access to such services can be easy and rapid to obtain—many will even accept your credit card. Many tasks come to mind as being better from cloud sources like payroll and employee benefits, expense management and even CRM for smaller companies.  […]

01.24.2017

Business team discussing progress of the company

Professional Services

IT Directors and CIOs: Spend More Time Focusing On Leadership

It’s a well-known fact that the IT talent pool is ever-shrinking. In fact, just last year in Gartner’s 2016 CIO report, talent became recognized globally as the “single biggest issue” preventing CIOs from achieving their objectives. The story does not appear to be looking much better as we head into 2017. You May Also Like: […]

01.17.2017

Security concept with businessman and hacker hands on laptop keyboard.

Security

Assumption of Breach, Part II—The People Element

In the first installment of this series I discussed the need for organizations to change their approach to cyber security to an “assumption of breach model,” or an understanding that in today’s threat landscape, it is unrealistic to thwart 100 percent of malicious attacks. That previous post also mentioned that this new approach should focus […]

01.16.2017

Rear view of two partially unrecognizable men sitting in front of a computer. One of them is pointing at a screen where are several lines of computer code.

Security

Assumption of Breach, Part I: A New Approach to Cyber Security

Target. Home Depot. J.P. Morgan. These are just a few of the large enterprises that have been victimized by catastrophic cyber security incidents over the past two years, the kinds of events that cause executives to resign and profits to disappear. The Home Depot data breach cost credit unions nearly $60 million according to a […]

01.12.2017

Woman with Tablet

UC&C

Video Engagement in a Customer Centric World

The widespread adoption of consumer video communication services such as Microsoft Skype, Google Hangouts, Facebook Messenger or Apple FaceTime has democratized video calling. Together with the development of WebRTC, it created the expectation that video chat can be easily added as an interaction channel for customer engagement and support. At Vidyo we learned with our […]

11.16.2016

Sunny american football stadium

Announcements

It’s Game Time!

People who know me understand that my passions revolve around my family and friends, our business, the success of our clients…and of course, college football. For me, the core areas of my day-to-day possess an intensity that can be defined only by the excitement of the Southeastern Conference (SEC) Football Championship. The season of change […]

11.08.2016

Security

Understanding Adversary Intent

In the spirit of the first Presidential debate, I would like discuss the topic of cybersecurity, which was one of only a few words NBC moderator Lester Holt was able to squeeze in. Even though at times the debate seemed less like a diplomatic dispute and more like a drunken quarrel between two sports fans […]

10.18.2016

Security

Aligning IT and School Administrators for Security Success in Higher Education

A decade, or even a few years ago, cyber security issues would not have been on most university and college presidents’ minds. In this new world, however, where major American political parties and government agencies are being compromised, these educational leaders must be focused on protecting their institutions from malicious actors. Like leaders of large […]

06.23.2016