Featured Blog Post

Seven Steps You Can Take Today to Transform IT

Read More

#CarouselCrew

#CarouselCrew: Meet Rachel Nordquist, Finance Operations Manager

Get to know us! At Carousel, we’re more than 1,300 #CarouselCrew members strong, spanning 27 locations across the country. Each week, we’re excited to share a glimpse of our talented team members. This week, meet Rachel Nordquist, finance operations manager for nearly six years. We sat down with Rachel to learn more about her and […]

08.17.2017

Client Spotlight

Surviving the IT Talent Deficit: Build a Bridge to Success

This article originally appeared in ON Magazine. It’s long been documented that attracting, retaining, and nourishing IT talent is the biggest barrier to a CIO’s success. In fact, according to Gartner’s 2017 CIO report, CIOs across the board identify lack of skills and other human resources as their No. 1 barrier to success. “The IT […]

08.15.2017

Get Carousel Blog updates delivered to your inbox.

Join 8 other subscribers

Cloud computing

Cloud

Five Reasons to Explore a Hybrid Cloud Strategy

Cloud services are a great alternative for almost every company for many compute needs. Access to such services can be easy and rapid to obtain—many will even accept your credit card. Many tasks come to mind as being better from cloud sources like payroll and employee benefits, expense management and even CRM for smaller companies.  […]

01.24.2017

Business team discussing progress of the company

Professional Services

IT Directors and CIOs: Spend More Time Focusing On Leadership

It’s a well-known fact that the IT talent pool is ever-shrinking. In fact, just last year in Gartner’s 2016 CIO report, talent became recognized globally as the “single biggest issue” preventing CIOs from achieving their objectives. The story does not appear to be looking much better as we head into 2017. You May Also Like: […]

01.17.2017

Security concept with businessman and hacker hands on laptop keyboard.

Security

Assumption of Breach, Part II—The People Element

In the first installment of this series I discussed the need for organizations to change their approach to cyber security to an “assumption of breach model,” or an understanding that in today’s threat landscape, it is unrealistic to thwart 100 percent of malicious attacks. That previous post also mentioned that this new approach should focus […]

01.16.2017

Rear view of two partially unrecognizable men sitting in front of a computer. One of them is pointing at a screen where are several lines of computer code.

Security

Assumption of Breach, Part I: A New Approach to Cyber Security

Target. Home Depot. J.P. Morgan. These are just a few of the large enterprises that have been victimized by catastrophic cyber security incidents over the past two years, the kinds of events that cause executives to resign and profits to disappear. The Home Depot data breach cost credit unions nearly $60 million according to a […]

01.12.2017

Woman with Tablet

UC&C

Video Engagement in a Customer Centric World

The widespread adoption of consumer video communication services such as Microsoft Skype, Google Hangouts, Facebook Messenger or Apple FaceTime has democratized video calling. Together with the development of WebRTC, it created the expectation that video chat can be easily added as an interaction channel for customer engagement and support. At Vidyo we learned with our […]

11.16.2016

Sunny american football stadium

Announcements

It’s Game Time!

People who know me understand that my passions revolve around my family and friends, our business, the success of our clients…and of course, college football. For me, the core areas of my day-to-day possess an intensity that can be defined only by the excitement of the Southeastern Conference (SEC) Football Championship. The season of change […]

11.08.2016

Security

Understanding Adversary Intent

In the spirit of the first Presidential debate, I would like discuss the topic of cybersecurity, which was one of only a few words NBC moderator Lester Holt was able to squeeze in. Even though at times the debate seemed less like a diplomatic dispute and more like a drunken quarrel between two sports fans […]

10.18.2016

Security

Aligning IT and School Administrators for Security Success in Higher Education

A decade, or even a few years ago, cyber security issues would not have been on most university and college presidents’ minds. In this new world, however, where major American political parties and government agencies are being compromised, these educational leaders must be focused on protecting their institutions from malicious actors. Like leaders of large […]

06.23.2016