Cloud is an integral part of almost every company's strategic technology portfolio. As legacy migrations continue and cloud spend increases across every industry, its never been more critical to understand both your specific cloud investments, and the suppliers (AWS) that drive them. Only those that fully understand these market dynamics will enjoy the competitive advantage that comes with informed insight. Conversely, those who fail to comprehend their waste, overspend and the market dynamics behind it, are doomed to escalating spend, blown budgets, and lagging transformation efforts. Below we give you that market insight, updates on AWS as ...
Read More
“The biggest risk is not taking any risk. In a world that’s changing quickly, the only strategy that is guaranteed to fail is not taking risks.” – Mark Zuckerberg, Founder and CEO, Facebook If you’ve been avoiding risk or waiting for the right time to take bold action in reducing both your reliance and cost structure with Cisco – the wait should be over. The market readiness to reduce or eliminate your Cisco dependence is at an all time high with suppliers who are stable, reliable, innovative and eager to win your business. Below we’ll outline how: The Cisco ecosystem is set up to work against the economics of its own customers Why their ...
Read More
If you are like me, you have been receiving an avalanche of email notifications from every company you’ve ever done business with letting you know how they are responding to the Covid-19 crisis. Did I really need to know how my auto mechanic is responding to the epidemic? Probably not at the top of my list. However, if you can get through the noise, there have been some legitimate offers to help companies support their teams and customers through the crisis. Most of these offers are in the form of free services and software for an extended period of time (30-60-90 days and more). Below, we’ve compiled a list of twenty-three companies and ...
Read More
Most clients today use a complicated procedure for processing supplier payments to ensure the process is not only accurate and complete, but also: comports with the terms of the commercial agreement performs in compliance with the conditions of the contractual agreement is done with authenticated trading partners isn’t fraudulent or illicit in any way is fully auditable An Example of This Authentication Process: A Purchase Requisition is made, signifying the internal demand for the seller’s products and services. The terms of a Commercial Arrangement are agreed to, including product, service, and pricing information. A Contractual Agreement ...
Read More
The latest casualty in what some consider the emerging trade showdown between the USA and China has come in the form of ZTE, who has announced they have ceased ‘major operations’. On April 16th, 2018, the U.S. Department of Commerce banned American companies from exporting parts to ZTE. Given that 25%+ of the components that make up ZTE equipment comes from U.S. manufacturers, ZTE was forced to shut down its production lines. While most people are aware that ZTE manufactures mobile handsets, most were not fully aware that the bulk of their revenue comes from telecom exchange, optical transmission, and other tier one communications equipment. ...
Read More
Many client executives are currently working to become compliant with the new General Data Protection Regulation (“GDPR”). The GDPR regulation goes into effect on 25 May, 2018, and while GDPR is a European Union regulation, it is expected to be implemented worldwide due to its wide reaching or near universal regulatory umbrella. Around 20 years ago, pretty much all data was stored in the corporate datacenter. Today, that data could be in multiple locations, stored on the edge in branch offices as well as in the public cloud. Critically, Personal Identifiable Information (“PII”) could exist outside primary systems. GDPR represents “the law ...
Read More