Filter by: Latest Video

Cloud Computing Delivers IT, You Take Care of Business

by |

The date was June 5th, 1895 and Jedidiah Collinsworth, CFO for General Corporation was having a very perplexing day.  General Corporation was the largest maker of hammers in its time.  However, the greatest cost to the business was generating power onsite via company owned generators.  Every month the bills would stack up to the ceiling to cover the maintenance, new parts and full-time employees it took to generate electric power.  Collinsworth thought to himself, “WE MAKE HAMMERS, NOT ELECTRICITY!”  Three months later, an accountant working for Jedidiah stopped by his office. “Sir, there’s some men at the door, claiming they can sell us power – something called a utility.  We would just flip the switch and only pay for what is consumed.  Is this black magic?”

no limits

An Update from VMworld 2014

by |

A global conference for virtualization and cloud computing hosted by VMware, VMworld kicked off yesterday at the Moscone Center in San Francisco. With over 22,000 attendees representing 85 countries, it was no surprise that VMware took the opportunity to make some major announcements.


Technology and the 21st Century Squad Car

by |

Public safety services have changed dramatically over the years as technology has disrupted our industry. We now operate under a “mobile first” paradigm, where tools and information are extended from the enterprise to the field as their primary function instead of as an add-on feature set. Security – in the past considered a solution unto itself – is now pervasive at every level of system design.


Application Optimization Can Make Efficient Use of Bandwidth and Boost Performance, but Implementation Can Be Tricky

by |

I recently took part in a small executive dinner panel to provide an integrator’s perspective on the topic of application optimization. This event was produced by IDG/CIO magazine and moderated by one of its editors.

CDW hosted the event in partnership with F5 Networks, who also had a subject matter expert on the panel along with a local customer. It was a great evening with about 35 people from the Seattle area attending. I like attending these events, as you get to hear the real-life stories – straight from the trenches – of how IT professionals are dealing with various issues.


What You Need for an Effective HIPAA Security Risk Assessment

by |

Good risk assessments tend to include at least three distinct assessment components of varying complexity, followed by a good reporting system with internal and external checks and balances.

While specifically designed for the Health Insurance Portability and Accountability Act (HIPAA), this general methodology could be used for any assessment project with a compliance component. For example, this could include the Payment Card Industry (PCI) credit card rules or the Gramm–Leach–Bliley Act (GLBA) for financial institutions – with a few minor changes.

photo 1

Microsoft Surface Pro 3: The “Notelet” that’s Bigger, Brighter and Bolder

by |

As promised in a previous blog post, I’ve done some road testing (planes, trains and automobiles) with Microsoft’s new Surface Pro 3. The only way for me to do this right was to use the device as my main computing device. So I finally got my Surface on the company network, installed Symantec Endpoint Protection, Office 365, Adobe Creative Cloud, and I was up and running in no time.

Actually, I probably spent more time downloading software, syncing docs and installing Windows and Office updates than actually doing any setup/customization work. But that was expected since it was a brand new machine.


Getting Your Feet Wet with IT Orchestration

by |

In a prior post I offered the recommendation of surveying your staff before you jump into orchestration.  Did you find any nuggets?  Was your staff excited to hear about the initiatives or were they hesitant?  Were there any organizational changes you could make to better set yourself up for success?

When you got answers, you probably found the good along with the bad.  As I brought up before, this is to be expected and should be that of as your base IT footprint.  You are always better for knowing what your strengths and weaknesses are.  Not facing them for what they are means you would only be stacking the deck against yourself.