<img src="https://secure.seem3pick.com/198073.png" style="display:none;">

The New World of BYOD

Posted by Nick Deluca on Fri, May 18, 2012

The New World of BYOD (Bring Your Own Device) -- Good for Your Company?

Bring Your Own DeviceBYOD is a concept that is rapidly gaining steam throughout the IT business industry. By “gaining steam” I mean two things. It could reference the cartoon-like explosion of hot gaseous vapor from a person’s ears due to incessant aggravation; or it could simply be defined as an increase in positive momentum. The notion is rudimentary and obvious, almost intuitive: Should employees utilize their personal devices (phones, tablets, laptops, etc.) to complete work-related tasks while on the clock? Though the idea may be basic, the answer is a bit more complicated.

Read More

Topics: Cloud Computing, Mobile Device Management, 201CMR17.00, Managed Services

Choosing a Cloud Service Provider for Backup Recovery

Posted by Nick Deluca on Wed, Mar 21, 2012

I recently stumbled across an article describing data loss horror stories from 2011. The most disastrous occurrence described a server being struck by lightning, subsequently set on fire, and incurring water damage from the fire department’s attempt to extinguish the fire. Amazingly, the provider was able to recover all of the data from the charred servers because the company had their data backed up through a cloud service as part of their disaster recovery. Unfortunately, not everyone has a back up recovery plan or is subscribed to a cloud provider who can restore data after such a detrimental disaster. Choosing the right provider who offers the right services is a matter of patience, rationale, meticulousness, and a little bit of common sense.

Read More

Topics: Cloud Computing, Disaster Recovery

Become SAS 70 Type II, SSAE 16 Compliant in the Cloud

Posted by Nick Deluca on Fri, Mar 16, 2012

cloudsecurity

When it comes to cloud security, one of the most popular features offered by providers is security auditing.  Security audits are what a provider uses as a method of inspecting and maintaining a company’s internal controls, which consist of policies, procedures, and safeguards. The renowned audit, SAS 70 type II, was conceived in 1992 and has since evolved to form SSAE 16. Though both of these audits are commonplace in the security realm, like most other features they do not come without disadvantages that need to be addressed and weighed against advantages by the person or company utilizing the audits.

Read More

Topics: Cloud Computing, Disaster Recovery, Cloud Security

Is Cloud Technology also Green Technology?

Posted by Nick Deluca on Wed, Feb 22, 2012


Going green is not just a movement; it is a standard of living. In recent years, the intertwined ideas of going green and reducing carbon footprints have been elevated far above a personal level to that of a state and federal level. There are constant talks and pushes for reducing reliance on fossil fuels and increasing research and applications for renewable energies. After all, nobody wants gas prices to remain in their current price range and nobody likes a litter bug. With all of the attempts to make our physical world a “greener” place, it seems pertinent to do the same thing in the cloud.

Read More

Topics: Cloud Computing

Cloud Computing – What is it? Do I need it? Where do I get it

Posted by Cathie Briggette on Thu, Feb 16, 2012

The rise of cloud computing is shifting the center of gravity. It is changing the nature of competition within the computer industry. Technological developments have up until this moment pushed computing power away from central hubs: first from mainframes to minicomputers, and then to PCs and laptops. Now a combination of cheaper and more powerful processors, and ever faster and more ever present networks, is pushing power back to the center in some respects, and even further away in others. The cloud's data centers are, in effect, outsourced public mainframes that users do not have to keep up, or update.[1]

Read More

Topics: Cloud Computing