Our Thoughts on IT Matters

Keep Posted on Industry News and Events

   

Your Cisco Technology Investments: It’s Time for Bold Action

“The biggest risk is not taking any risk. In a world that’s changing quickly, the only strategy that is guaranteed to fail is not taking risks.” – Mark Zuckerberg, Founder and CEO, Facebook If you’ve been avoiding risk or waiting for the right time to take bold action in reducing both your reliance and cost structure with Cisco – the wait should be over.  The market readiness to reduce or eliminate your Cisco dependence is at an all time high with suppliers who are stable, reliable, innovative and eager to win your business.  Below we’ll outline how: The Cisco ecosystem is set up to work against the economics of its own customers Why their ...

Read More

Cloud Compute Herd: 4 Myths That Could Save You Millions

Like a migrating herd of Wildebeest across the Serengeti, companies around the globe continue its rush toward that shimmering lake of Cloud Compute that promises lowers costs, increased flexibility and scalability (and more according to the brochures).  As with any panacea, the dream usually falls short of the reality.  Cloud compute for many has hit that ‘middle ground’ where actual benefits and unexpected problems meet.  As the body of problem evidence mounts for Cloud Compute, there are some clear myths that have arisen that need to be ‘debunked’.  Only when these myths are fully understood can organizations minimize the risks and still ...

Read More

Security Operations Center: Insource or Outsource to MSSP?

As technology marches ever forward, the threats to Enterprise Security have seemingly multiplied exponentially.  Our ability as organizations to stay ahead of the risks that technological advancements have brought to the forefront are challenged daily.  Literally.  They are challenged everyday by threats from: Foreign governments trying to access data and networks Cloud security as more and more corporate data is stored outside proprietary networks Shadow IT Ransomware Phishing attacks on unaware employees Internal bad actors (i.e. employees who wish to do harm) Malware installed on endpoints surreptitiously by external bad actors There are ...

Read More

NET(net) Multicloud Series Part III: Application Portability

In Part I we discussed consideration of a multicloud strategy.  Pricing and product transparency were the themes for part II.  In part III we address the last in this series: Application Portability.  To see all three in our Multicloud eBook, please visit here.  The enterprise’s application processing workloads must be compatible to portability between Cloud providers, including technology stacks that are common across all Cloud provider platforms, such as the use of application microservices and open stack services such as containers and Kubernetes.  It is also important to consider how you'll integrate data and applications residing in ...

Read More

NET(net) Multicloud Series, Part II: Pricing and Product Transparency

If you missed Part I - start here. Is a Cloud Broker right for you?  A Cloud Broker by definition is an entity that manages the use, performance and delivery of cloud services, and negotiates relationships between cloud providers and cloud consumers. As cloud computing evolves, the integration of cloud services may be too complex for Cloud consumers to manage alone.  A Cloud Broker can also be in a unique position to collect, analyze and conduct opportunity assessments on pricing that will be key to a multicloud or Cloud Arbitrage strategy. Generally, cloud arbitrage is the practice of taking advantage of a price difference between two or ...

Read More

Multicloud Series Part I: Should you Consider a Multicloud Strategy?

Many enterprises adopt a multicloud strategy out of a desire to avoid Cloud supplier lock-in or to take advantage of innovative solutions with a certain Cloud provider.  There are many rationales for using multiple clouds, as they each have different strengths and weaknesses for performance and functionality, different pricing schemes, and some workloads simply run better on one cloud platform versus another. Although neither provide a financial breakdown of their cloud business, AWS continues to dominate the cloud infrastructure market, but its lead is starting to wane as Microsoft Azure and Google Compute Engine make significant inroads. ...

Read More

Cisco Enterprise Agreements: Where’s the Beef?

The more I work with Cisco lately, the more I’m reminded of the television commercial made famous by the Wendy’s hamburger chain in the United States, wherein an elderly woman and her friends open their giant hamburger bun only to find a tiny piece of meat inside and ask, “Where’s the beef!?”  When I review Cisco EA agreements, our clients and I are asking the same question, but in this case the EA is the giant bun and the beef is the value.  What’s getting presented to us on this nice Cisco plate appears to be a lot of hamburger (i.e. the “best deal!”), but often when we lift the bun, the value (beef) is elusive and hard to find. The “Best ...

Read More

Market Alert: ZTE Future Uncertain

The latest casualty in what some consider the emerging trade showdown between the USA and China has come in the form of ZTE, who has announced they have ceased ‘major operations’.  On April 16th, 2018, the U.S. Department of Commerce banned American companies from exporting parts to ZTE.  Given that 25%+ of the components that make up ZTE equipment comes from U.S. manufacturers, ZTE was forced to shut down its production lines.  While most people are aware that ZTE manufactures mobile handsets, most were not fully aware that the bulk of their revenue comes from telecom exchange, optical transmission, and other tier one communications ...

Read More

IT Security Software Spend: Not Secure

Underinvested?  Overinvested?  Do we have the right supplier(s)?  Are we running the right software?  Are we using the right security technology?  Are our solutions keeping us safe and protected?  Do we have applications and a network infrastructure that can be properly protected? These are the starting questions IT and Financial leaders of any organization face today when they look at the Equifax Security Breach – one the largest and deepest in US history.  If you are unfamiliar or have chosen to forget it on purpose (apologies in advance if that’s the case), it impacted 140 million consumers’ personal information, including social security ...

Read More

If You’re Still Spending on MPLS...You Should Already Have a Plan for SD WAN

Dave Young
Jul. 28,2017 |

The saying that ‘there is a time and a place for that’ can apply to almost anything in our daily lives, but nowhere is it truer than in technology.  The pace of change in some tech areas go at breakneck speed, while others move slower.  But the constant for either is that there is always change.  For example, there was a ‘time and a place’ for 2-way pagers years ago, but that time is gone now replaced by all manner of smartphones, tablets, and even the IoT’s.  Just as there was a ‘time and a place’ for MPLS, it will be - in the not too distant future, added to the historical shelf of technology there was a ‘time and a place for’, just like ...

Read More