Featured Blog Post

Tips for Attending Cisco Live!

Read More
carousel-were-more-than-just-technology-edited-2.jpg

Carrier Services

UC&C Migration on the Horizon? Don’t Forget Telecom and Carrier

If your organization is in the planning stages of a unified communications & collaboration (UC&C) migration and is nearing the execution phase, now is a great time to take a brief pause to consider if you have checked all the most important items off your migration to-do list. Have you thoroughly vetted all the available […]

06.20.2017

Computer technician in server room

Cloud

3 Signs It’s Time to Migrate to a Newer Platform

Maybe your email server is nearing end of life and you’re stuck trying to figure out what’s next—do you upgrade or move to Office 365? There are some instances when updating existing hardware isn’t as cost effective or efficient than migrating to a new platform—like the cloud or a hybrid data center—altogether. In this post, […]

06.15.2017

Get Carousel Blog updates delivered to your inbox.

Join 7 other subscribers

Business People Planning Strategy Analysis Office Concept

Security

Assumption of Breach Part III—Policy and Process

In my last blog entry, I discussed the first of three foundational elements for a security program: all of the people who interact with your organization’s systems and data. In this post we’ll tackle the next element of cyber security—policy and process. For the purposes of this post, I am going to use these two […]

01.30.2017

Cloud computing

Cloud

Five Reasons to Explore a Hybrid Cloud Strategy

Cloud services are a great alternative for almost every company for many compute needs. Access to such services can be easy and rapid to obtain—many will even accept your credit card. Many tasks come to mind as being better from cloud sources like payroll and employee benefits, expense management and even CRM for smaller companies.  […]

01.24.2017

Business team discussing progress of the company

Professional Services

IT Directors and CIOs: Spend More Time Focusing On Leadership

It’s a well-known fact that the IT talent pool is ever-shrinking. In fact, just last year in Gartner’s 2016 CIO report, talent became recognized globally as the “single biggest issue” preventing CIOs from achieving their objectives. The story does not appear to be looking much better as we head into 2017. You May Also Like: […]

01.17.2017

Security concept with businessman and hacker hands on laptop keyboard.

Security

Assumption of Breach, Part II—The People Element

In the first installment of this series I discussed the need for organizations to change their approach to cyber security to an “assumption of breach model,” or an understanding that in today’s threat landscape, it is unrealistic to thwart 100 percent of malicious attacks. That previous post also mentioned that this new approach should focus […]

01.16.2017

Rear view of two partially unrecognizable men sitting in front of a computer. One of them is pointing at a screen where are several lines of computer code.

Security

Assumption of Breach, Part I: A New Approach to Cyber Security

Target. Home Depot. J.P. Morgan. These are just a few of the large enterprises that have been victimized by catastrophic cyber security incidents over the past two years, the kinds of events that cause executives to resign and profits to disappear. The Home Depot data breach cost credit unions nearly $60 million according to a […]

01.12.2017

Woman with Tablet

UC&C

Video Engagement in a Customer Centric World

The widespread adoption of consumer video communication services such as Microsoft Skype, Google Hangouts, Facebook Messenger or Apple FaceTime has democratized video calling. Together with the development of WebRTC, it created the expectation that video chat can be easily added as an interaction channel for customer engagement and support. At Vidyo we learned with our […]

11.16.2016

Sunny american football stadium

Announcements

It’s Game Time!

People who know me understand that my passions revolve around my family and friends, our business, the success of our clients…and of course, college football. For me, the core areas of my day-to-day possess an intensity that can be defined only by the excitement of the Southeastern Conference (SEC) Football Championship. The season of change […]

11.08.2016

Security

Understanding Adversary Intent

In the spirit of the first Presidential debate, I would like discuss the topic of cybersecurity, which was one of only a few words NBC moderator Lester Holt was able to squeeze in. Even though at times the debate seemed less like a diplomatic dispute and more like a drunken quarrel between two sports fans […]

10.18.2016