<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=381391698926062&amp;ev=PageView&amp;noscript=1">
//mega nav ctas

OneNeck Blog

October 27, 2020

How to Overcome IT Outsourcing Challenges

Nowadays, many organizations eagerly use IT outsourcing to remediate IT skills shortages, control cost and gain access to world-class capabilities. Statistics show that the market size of the outsourcing industry in the US in 2020 is $132.9 billion and it is going to grow by 1.6% the same year. And while this approach has many benefits, it is not without challenges. 

Continue Reading

October 20, 2020

Why You Should Consider a Managed Backup Service

For any modern organization, protecting business-critical data is vital. Yet protecting data assets has become complex and difficult as the rising tide of data grows in double to even triple digits compounding year over year.

Continue Reading

October 15, 2020

Estimating WAN Latency

As services move into the cloud, more vendors are publishing the latency requirements for their platform or application. These requirements could specify a maximum latency among computing nodes in a cluster, between a computing node and a storage array, or for an application-specific data flow like vMotion. Being able to estimate network latency between locations will help you identify which connectivity options are viable solutions. The following are some items to consider when estimating ...

Continue Reading

September 24, 2020

Patch Now... Your Windows version of Cisco Jabber could be a security risk

On September 2nd, 2020, Cisco issued a Critical Security Advisory announcement regarding Cisco’s Jabber for Windows that customers should be aware of. A vulnerability in Cisco Jabber for Windows could allow an authenticated, remote attackers to execute arbitrary code. Attackers could achieve remote code execution by sending specially crafted chat messages.

Continue Reading

September 17, 2020

Is Your Citrix StoreFront Vulnerable to Exploit?

On September 14, Citrix pushed out an announcement around a high-severity security vulnerability Citrix StoreFront customers should be aware of. An issue has been discovered in Citrix StoreFront (before 2006) that, if exploited, would allow an attacker who is authenticated on the same Microsoft Active Directory domain as a Citrix StoreFront server to read arbitrary files from that server.

Continue Reading

August 31, 2020

Are You Doing What You Can to Protect Your Backups from Ransomware?

Ransomware is at our doorstep. We cannot ignore it any longer or think we are not a target. In recent years at OneNeck, we have seen a significant upward trend of ransomware attacks. And even more troubling is in the last year, we have seen bad actors getting smarter, and they are now targeting your backup server and backup data to prevent you from recovering from the attack. As ZDNet stated, "The number of ransomware strains targeting NAS and backup storage devices is growing, with users ...

Continue Reading

August 18, 2020

Digging Deep into the Dark Web for User Credentials

We’ve all heard of the dark web, but most law-abiding people don’t give it much thought, as we chalk it up to the place shady people go to do shady things. But the truth is that today’s data-driven organizations can no longer ignore the dark web and the possibility that their customer and employee data could be out there with a for-sale sign.

Continue Reading

August 4, 2020

Is it Time to Put Your Office 2013 Out to Pasture?

If you’re one of the organizations that are still using Office 2013 with Microsoft Online Services, then you'll want to know the changes coming this fall.  Microsoft recently announced the following updates…

Continue Reading

July 28, 2020

Anatomy of Ransomware

Ransomware is a type of malware that threat actors use to infect computers and encrypt computer files until a ransom is paid. After the initial infection, ransomware will attempt to spread to as many connected systems as possible, including  file systems and other accessible systems on a business’s network.

Continue Reading

July 8, 2020

The New Normal Makes Work an Activity, Not a Place

Recent months have seen a massive shift towards supporting remote workers, which in turn has created a series of security challenges. IT teams are now not only tasked with quickly providing support for a never-before-seen number of offsite workers and their devices, but they must do it without compromising security – no small task.

Continue Reading

May 22, 2020

Now’s the Time to Put Digital Transformation Initiatives into Hyperdrive

Digital transformation (DX) is not a new initiative. In fact, Forbes states that 70% of companies had a DX initiative in place at the onset of the pandemic but weren’t far enough along to make the crisis a non-issue. As a result of the past couple months where digital has become central to every interaction, DX is back in the forefront for IT leaders.

Continue Reading

May 6, 2020

Hug Your Cloud.
On-Prem Cloud Has Its Place.

Many enterprises are amid a digital transformation, seeking to engage with customers and satisfy their needs through digital technologies.  Many are looking up to the clouds to enable this agility, scalability, and simplicity—but no two models are created equal. And because businesses cannot afford to sacrifice control and security, going all-in on a public cloud only approach isn’t always feasible. To deliver on the promise of digital transformation, you need a unified infrastructure that ...

Continue Reading

April 24, 2020

Do You Know Who’s Responsible for Your Office 365 Data?

No doubt about it, for Microsoft Office 365 (O365), business is booming. At their Q3 FY19 earnings call, Microsoft CEO Satya Nadella said that Office 365 is now used by 180 million monthly active users and growing at more than 4 million users per month – and that was before the recent surge in the demand in collaboration tools!

Continue Reading

April 21, 2020

Microsoft Renames the Office 365 SMB SKUs

As Esther Dyson so eloquently put it, “Change means that what was before wasn’t perfect.” And as we all know in technology, change is a given. Today brings more change. As of today, Microsoft is changing the names of Office 365 SMB SKUs and making way for Microsoft 365.

Continue Reading

April 9, 2020

Collaboration in the Time of COVID-19

Due to the spread of COVID-19 coronavirus, remote work became an overnight requirement for many. Few organizations feel prepared for large-scale remote work, but collaboration tools can help you navigate these unpredictable situations.  

Continue Reading

April 1, 2020

New Microsoft 365 Firstline (F-) SKUs

On March 19, 2020, Microsoft announced a new Microsoft 365 plan designed specifically for Firstline Workers. The offer helps organizations connect their Firstline Workers with the rest of the company and close long-standing technology gaps that often separate these workers from secure apps and services that enable continuous productivity, simplify communication and support greater self-service.

Continue Reading

March 31, 2020

Considerations when Securing a Remote Workforce

As today’s IT teams are scrambling to figure out the logistics of helping their coworkers be productive from their home offices, it’s important to remember that security can’t be an afterthought. Enabling employees to work remote has only broadened the landscape for attackers, giving them even more opportunity to find a way into your organization.

Continue Reading

March 20, 2020

A Remote Workforce Powered by Partners Who Care

We’re living in a very strange and uncertain time - uncharted waters one could say. Sequestered in the relative safety of our homes, unsure of what next week or even tomorrow might bring, business must still go on. But while we may be working in isolation, it’s still people that power the modern business. And in any business, the team is paramount. It’s where creativity, collaboration, and solutions all come together within a group to exceed the sum of its parts.

Continue Reading

January 17, 2020

A Brand that Goes Beyond Technology

By now, you’ve heard them all… “We have the brightest minds in the business.” “You need our expertise.” “Our bench has the most certifications in the industry.” …none of which mean anything in the context of the day-to-day to-do list that any given IT department faces. Which is why, in an attempt to get real, we’ve launched a different approach to the OneNeck brand.

Continue Reading

December 23, 2019

Alas, the perimeter is gone. Is it time for an updated firewall?

Long ago, in a land far away, there used to be a network perimeter. Those were the good old days where the network perimeter was the all-encompassing traffic control point, and where traffic was all funneled through a single point, no matter where it came from. But the cloud changed everything by decentralizing the network, making the perimeter vaporize, and giving IT many a sleepless night.

Continue Reading

November 12, 2019

Azure Reserved Instances

If it’s been a while since you have looked at Azure Reserved instances, now is a great time to revisit them. Not sure what Reserved Instances are for? Read on, you may just save some money.

Continue Reading

November 6, 2019

How Much Risk is Too Much?

For a long time, security initiatives have been driven by compliance mandates and a healthy dose of fear. But as threats continue to become more sophisticated, so must our efforts in thwarting them. This is why aligning with best practices is a great place to start, specifically the Center for Internet Security (CIS) Top 20 Critical Security Controls which was developed by a global group of security experts who continue to finetune them every year.

Continue Reading

October 29, 2019

Choosing an IT Vendor Without Your Crystal Ball

Does selecting an IT vendor and deciding on the right direction for your company seem to get more complex with every conversation? Without a crystal ball to reveal precisely which vendor is a perfect fit, knowing you’re making the right decision is virtually impossible—but it doesn’t have to be.

Continue Reading

October 23, 2019

When it comes to avoiding risk, what is OneNeck doing?

Security is intrinsic to our services (for all customers) and organization (all the way to the president and CEO of our parent company TDS Inc.). It’s part of every service we develop—from start to finish. Additionally, we leverage the Critical Security Controls (CSC), outlined by the Center for Internet Security (CIS), to complete our annual security assessments and third party audits. The Critical Security Controls provide a series of cybersecurity actions prioritized by their criticality in ...

Continue Reading

October 16, 2019

Avoid Issues with Microsoft Windows Server 2008 and SQL Server 2008 Upgrade or Migration to the Cloud

Have you upgraded or migrated your server to the cloud yet? With SQL Server 2008 support having ended in July 2019 and Windows Server 2008/R2 support ending in January 2020, if you haven’t, now is the time to upgrade or migrate your workloads to the cloud.

Continue Reading

October 15, 2019

OneNeck Named an Environmental Leader in Colorado

In a recent statement, the Colorado Department of Public Health & Environment recognized OneNeck IT Solutions, and its data center in Denver, Colorado, as an environmental leader in the state. On October 1, the Colorado Department of Public Health and Environment’s Environmental Leadership Program recognized more than 170 businesses—including OneNeck—for their the voluntary and significant environmental achievements. “Having our data center named an environmental leader is an important first ...

Continue Reading

October 10, 2019

How to Determine the Best-fit Venue for Workloads

If there’s anything that can be said about today’s IT environment, it’s that choice abounds, which is why we find ourselves smack dab in the middle of this hybrid reality in which we now exist.

Continue Reading

October 8, 2019

Notes from Oracle Open World 2019

This year #OOW19 and #CodeOne had a different color and feel, with lots of exciting announcements from Larry.

Continue Reading

October 1, 2019

Containers 101 – Here’s What You Need to Know

Although containers aren’t new (been built into Linux for 10+ years and been available in FreeBSD, AIX and Solaris), containers seem to be all the rage, and for good reason. The agility containers can bring to an IT team alone make them appealing, but add in the security benefits that the self-contained nature of containers brings, they seem like a no brainer. But even with numerous benefits, there is also a lot of confusion about what they really are and what is the best-fit scenario. So, we ...

Continue Reading

September 24, 2019

The Modern IT Partner – Bringing Value through Optimization Services

Is your business racing to keep up and redefine yourself? It’s a situation most businesses face as they strive to remain relevant in today’s digital economy. And, they count on their IT provider to do the same. At OneNeck, we are steadfast in our commitment to evolving our delivery capabilities and solutions to align with customers’ growing demands.

Continue Reading

September 19, 2019

HCI - Driving Real Business Results in a Time of Rapid Change

All businesses have to transform and adapt to do business in an increasingly digital world. But to transform, they must first address the foundation that their business sits on, making converged infrastructure (CI) and hyperconverged infrastructure (HCI) a great fit that enables efficiency and scalability on validated infrastructure. 

Continue Reading

September 17, 2019

The Ins and Outs of Cloud Backup vs NAS

When it comes to selecting the best backup—NAS (network-attached storage) or cloud-based—there are a multitude of factors IT leaders must consider. To break it down, a recent TechTarget article written by John Edwards highlights the pros and cons of the two approaches, and includes insights on which backup technology might be the best choice.

Continue Reading

August 27, 2019

Components of a Successful Security Practice

In its simplest form, compliance is about setting rules and following them, every time. No wavering, no audible—everyone simply follows the rules—every time. Seems easy, but it’s not always.

Continue Reading

August 14, 2019

6 Ways to Relieve "Security Fatigue"

Do you ever feel that your non-IT co-workers are trying to thwart your security protocols – ignoring software update alerts, opening suspicious emails or not following password best practices? If it seems that way, it might be “security fatigue.”

Continue Reading

August 6, 2019

How Setting Up and Running a Cloud-Based IT Environment is Different for the Small to Mid-Size Business

When it comes to setting up and running a cloud-based IT environment, businesses of all sizes (including small and mid-sized companies) can benefit from leveraging a hyperscale cloud. 

Continue Reading

July 30, 2019

Office 365 Backup

I need backup for Office 365? Isn’t it already included?  In short, no. The misconception that Microsoft fully backs up your data on your behalf is all too common.  To the contrary, Microsoft is primarily focused on managing the infrastructure and ensuring uptime; you are responsible for your data.

Continue Reading

June 18, 2019

Wi-Fi 6 is here. Now what?

There’s no denying it – the wireless network is the primary way we connect to the digital world. In fact, it’s so big, that traffic from wireless and mobile devices will account for 71% of total IP traffic by 2022, according to Cisco's Forecast and Trends for 2017-2022. But behind that wireless network is a mesh of complex technology, which to the general layman can be quite confusing.

Continue Reading

June 18, 2019

Understanding Software-Defined WAN

Bandwidth needs are skyrocketing. To meet the growing demand, there is a transition underfoot to move away from traditional the wide area network (WAN) to the software-defined wide area network (SD-WAN). According to IDC, SD-WAN technology is projected to exceed $6 billion in revenue by 2020. SD-WAN promises great change, and adoption is gaining traction, but understanding how you can deploy it to benefit your organization is still evolving for many organizations.

Continue Reading

June 6, 2019

Enhance Security with an Analytics-Driven SIEM

 Finding a mechanism to collect, store and analyze security only data is relatively simple. There is no shortage of options for storing data. Collecting all security relevant data and turning all that data into actionable intelligence, however, is a whole other matter.

Continue Reading

June 4, 2019

Creating a strong external security posture is critical

Creating a strong external security posture is critical. But what can businesses do to protect their data and environments?

Continue Reading

May 29, 2019

How Much Does the Public Cloud Cost? Answer These Four Questions to Find Out.

When it comes to moving to the cloud, businesses of all sizes are feeling the pressure. On one hand, the capabilities offered by the cloud are too good to ignore. If you don’t take advantage of the cloud’s flexibility and scalability—and its ability to support artificial intelligence, automation, real-time business analytics and more—you can bet that your competitors will. A Cloud Vision 2020 survey estimates that by the year 2020, 83% of the enterprise workload will be in the cloud—with almost ...

Continue Reading

May 23, 2019

Is it Time to Move Your ERP to the Cloud?

There are many considerations when moving to the cloud, and with large, complex ERP applications, there is even more to consider. We recently sat down with Scott Morley, one of OneNeck's ERP and cloud experts, to get his thoughts on the matter...

Continue Reading

May 20, 2019

Evolving Expectations for NMS

The landscape for Network Managed Services (NMS) providers continues to become more challenging, especially as application, management and compliance requirements keep evolving. Proactive support is a core component. At the same time, IT budgets for small- and medium-sized businesses keep shrinking while there is heightened focus on finding ways to squeeze more productivity out of limited resources.

Continue Reading

May 16, 2019

Older Windows Systems Beware of New Vulnerability

Are you running an older version of Windows and not current with your patch management? If so, you need to be aware of a recent exploitable vulnerability that just hit the news this week. Here's what you need to know...

Continue Reading

May 16, 2019

Security vs Compliance ... is there truly a difference?

It’s no secret... security attacks are the rise:

Continue Reading

May 14, 2019

The Re-emergence of SDN

Software Defined Networking (SDN) has been around for almost two decades. The concept was extraordinary and innovative then, but could be considered less-so in 2018. While the excitement surrounding this concept has aged a bit, real-world benefits and outcomes are emerging and bringing renewed interest.

Continue Reading

May 9, 2019

Multi-Factor Authentication Explained

TeleSign research indicates that the majority of users use five or fewer passwords for all of their accounts. While it may seem efficient for password memory on your end, you could actually create a “domino effect” that allows hackers to take down multiple accounts by cracking one password.

Continue Reading

April 30, 2019

The Ingredients of a Well-Architected Cloud

There are a lot of opinions to be had about what goes into a solidly-architected cloud. But with so many considerations around reliability, performance and security, too many options can get overwhelming. So, I thought I’d ask one of our resident cloud experts, Derek DeHaan, and get his thoughts on the matter…

Continue Reading

April 24, 2019

APM vs. NPM - What's the Difference?

Two terms that get thrown around a lot in our industry are APM and NPM, and it seems they are often interchanged (or confused). So, what is the difference between APM (Application Performance Monitoring) and NPM (Network Performance Monitoring)?

Continue Reading

April 18, 2019

Disaster Recovery, A Primer for CIO's

How can a CIO be confident that IT will perform 24/7/365?  According to Zerto, in today’s always-on, information-driven organizations, IT resilience depends completely on IT infrastructures that are up and running 24/7. The costs of downtime are huge and data loss can put a company out of business. Data loss is not only caused by natural disasters, power outages, hardware failure and user errors, but more and more by software problems and cybersecurity related disasters.

Continue Reading

April 18, 2019

Managing Shadow IT

No doubt about it — if your company has employees, you have shadow IT. According to a survey conducted by Stratecast and Frost & Sullivan, 80% of employees say they use applications on the job that aren’t approved by IT.

Continue Reading

April 16, 2019

First came Hybrid, and now MultiCloud. What's the difference?

In today’s digital world, terms like Hybrid Cloud and Multi-Cloud are thrown around interchangeably.  But there is a difference, and understanding it is key to getting the most out of your cloud strategy.

Continue Reading

March 26, 2019

Credential Stuffing - What it is and How to Protect the Enterprise

Credential stuffing is a type of cyber-attack where hackers take combinations of usernames and passwords leaked from other sites and use them to gain access to accounts on another site.  F5 states that there’s typically a 1 to 2 percent success rate, which means that if a cybercriminal purchases 1 million stolen credential records (for sale on the dark web for fractions of a cent each), they can generally gain access to 10,000 to 20,000 accounts.

Continue Reading

March 19, 2019

Thrive vs. Survive the Data Onslaught

The importance of data in not only business but our day-to-day lives continues to grow – no one is arguing that. But the pace at which it’s growing is mind-blowing. In a recent study sponsored by Seagate Technology, IDC forecasted that the global data sphere will grow to 163ZB by 2025. Considering that today it’s 16.3ZB, that’s almost tenfold what it is today, making this prediction significant.

Continue Reading

March 7, 2019

Understanding Data Center Sustainability

The explosion of data and digital consumption in the last decade has dramatically increased the number of data centers, which have been described as the factories of the digital age. And just like traditional factories in their early days, data centers take their toll on the environment.

Continue Reading

March 5, 2019

Anticipate 2019's Cybersecurity Threats Without a Crystal Ball

In Cisco’s February 2019 Threat Report, their cybersecurity experts analyzed prominent threats of the past year for clues to new attack strategies and targets. As they put it, “It's as close as we can get to anticipating future trends without a crystal ball.”

Continue Reading

February 26, 2019

Blockchain: A Revolution in the Cloud for IT Security

Antiquated is not a word commonly associated with the advanced worldwide network of client-server configurations that make up modern data transmission. However, advances in data storage, file sharing and security protocols have struggled to keep pace with demands on infrastructure, cybersecurity threats and the ever-evolving competition that drives the industry.   

Continue Reading

February 14, 2019

Is it Time to Show Your Applications Some Love?

As a consumer, we utilize applications on a daily basis. How many times have you found yourself asking, “There’s got to be an app for that?” It’s quite simply the expectation in today’s app-centric world. And when an app doesn’t function the way it’s supposed to? Well, no one has time for that, and we simply move on…

Continue Reading

February 7, 2019

Do You Have a Digital Mindset?

 It's no secret… when you increase collaboration, you improve productivity and employee engagement. But how you do enable a digital workplace?

Continue Reading

January 29, 2019

Advances in Cybercrime Demand Greater Protection

A look at retrospective security versus point-in-time solutions With cybercrime predicted to reach $6 trillion annually by 2021 and to be more profitable—and therefore, more attractive to criminal organizations—than the global combined trade of all major illegal drugs, businesses can no longer rely on traditional network security tools and expect to achieve protection.

Continue Reading

January 22, 2019

Prepare for Windows Server 2008 and 2008 R2 End of Support

Extended support for Windows Server 2008 and 2008 R2 is coming to an end respectively on January 14, 2020 What does end of support mean for Windows Server 2008 & 2008 R2?

Continue Reading

January 15, 2019

What can a vCISO do for your organization?

Organizations, big or small, are all grappling with combating the onslaught of security attacks, making security a top priority for today’s IT teams in every vertical. As Forbes so broadly states, “Cybersecurity is applicable to every business operation, whether it’s in the military, corporations or entrepreneurs.” And while cybersecurity decisions used to be contained to the boardroom or high-level government agencies, now the average employee is hyper aware of the potential risks a breach can ...

Continue Reading

January 10, 2019

What’s Driving IT Budgets in 2019?

Many IT leaders expect to see their budgets to increase or remain unchanged.  This is driven largely by the need to upgrade aging infrastructure, accelerate digital transformation via a shift to the cloud and enhance their overall IT security posture.

Continue Reading

December 18, 2018

Is SD-WAN Hype or Reality?

Traditional wide area networks (WANs) bring numerous challenges to the enterprise, ranging from increasing cost, performance issues and flexibility challenges. And with the onset of the cloud, today’s IT teams are searching for solutions that meet the data accessibility demands from inside the organization to the edges of the earth.

Continue Reading

December 11, 2018

Who Owns Cloud Security?

 Organizations are rapidly embracing cloud services to gain agility and thrive in today’s digital economy. This has created a strategic imperative to better manage cybersecurity risk while keeping pace at scale as firms move critical apps to the cloud.

Continue Reading

December 4, 2018

It’s the Happiest/Scariest Season of All!

It’s that time of year, where twinkling lights and Santa’s sleigh full of toys are everywhere. But with all of the holiday bustle comes additional risk, the risk of mounting security threats as shoppers are eagerly swiping their credit cards while checking gifts off their lists. What does this mean for today’s organization, where the line between corporate and personal devices is blurrier than ever before?

Continue Reading

November 30, 2018

Food Manufacturers Embrace Digital Transformation

At this point, nearly every modern manufacturer has some reliance on the cloud. But in this new age of digital transformation in manufacturing, the cloud might not be the answer for everything. In a recent Food Manufacturing article, Jeff Budge, OneNeck's VP of Advisory Services, offers insights for food manufacturers and the best way to utilize the cloud.

Continue Reading

November 27, 2018

Continuous Innovation on Oracle E-Business Suite 12.2

Oracle made a very welcome announcement on October 18, 2018, that made Oracle E-Business Suite (EBS) users and administrators quite happy. In their announcement, they introduced Continuous Innovation and assure premier support for EBS 12.2 until at least 2030. Read Oracle’s statement here and the EBS roadmap they provided.

Continue Reading

November 20, 2018

Ask the Expert Blog Series – Multi-Cloud Considerations: Interoperability

What we’re seeing in the industry today is that most of our customers aren’t adopting a single platform for all of their workloads. Depending on a plethora of factors (RTO/RPO, application requirements, latency requirements, etc.), it truly is becoming a multi-cloud world.

Continue Reading

November 15, 2018

Future of Database Administrators in the Cloud Era

A database management transformation is underway. Some say it threatens the long-term future of database administrators (DBAs). As more enterprises shift to multi-cloud and hybrid cloud solutions, automating their products with self-driving, self-patching and self-healing features, it has some in management thinking they don't need managed DBA services anymore.

Continue Reading

November 13, 2018

Transforming Business Intelligence with AI

It’s an exciting time we are living in, where what seemed like science fiction just a few years ago is becoming reality. From chess-playing computers to driverless cars, artificial intelligence (AI) is changing the way we live and work.

Continue Reading

November 7, 2018

Everyone Has a Role in Cloud Security

Outsourcing is becoming an increasingly popular business strategy. By carving off business processes and giving them to outside vendors companies save money and resources. Outsourcing enterprise computing processes using cloud services, for example, allows you to hand off the cost and responsibility of maintaining on-premise hardware and software. However, just because you outsource your enterprise infrastructure does that mean your cloud service provider assumes total responsibility for your ...

Continue Reading

October 25, 2018

Making the Most of Oracle Cloud Certifications

When it comes to Oracle cloud certifications, there are three broad categories says Oracle ACE Director Biju Thomas, who is also a Principal Solutions Architect at OneNeck. He recently discussed the categories and his insights on Oracle cloud certifications with Alan Earls of TechTarget noting that, “Within each category, you’ll find a variety of choices requiring an array of skill sets.”

Continue Reading

October 16, 2018

Application Criticality in a Multi-Cloud World -Matching Applications to the Cloud

As the cloud has come into its own and been widely adopted at enterprises around the globe, many organizations have started seeking services from a multitude of cloud providers to meet diverse application requirements and data needs across different business units. Multi-cloud approaches have become incredibly popular in recent years and many point to it as the future of cloud computing.

Continue Reading

October 11, 2018

Keep AX 2012 and Still Benefit from the Cloud

Like many terms in IT, the word ‘cloud’ carries with it a number of meanings. This can lead to a lot of confusion and can mean that each cloud implementation is as unique as the company driving the deployment. The message, however, is clear: Cloud is the future.

Continue Reading

October 9, 2018

The Big Chinese Hack – What do we know, and what should we do?

There has been a lot of chatter the past several days around a POTENTIAL hack via a China-based manufacture chip.  Yet, despite all the clamor, there are mixed reports about how real this is.

Continue Reading

October 9, 2018

App Hosting on Catalyst 9000 Switches

Wait a second! When did my switch become a Linux server?! Over the past several years, the networking industry has seen several well-known networking vendors migrate away from their traditional proprietary and monolithic network operating systems for their switches and routers into open Linux-based platforms.  But why would network vendors invest so much time and money in changing something as mundane as what OS kernel they use?

Continue Reading

October 2, 2018

Using SIEM to Combat Alert Fatigue

Early detection, rapid response, collaboration to mitigate advanced threats imposes significant demands on today’s enterprise security teams.

Continue Reading

September 25, 2018

Migrating to the Cloud Starts with a Clear Understanding of Your Data

Most CIOs today are either considering moving to or are already in the process of migrating to the cloud, whether it’s public, private or a hybrid combination. But in order to strategically migrate to any cloud solution, applications and supporting data environments and services must be clearly defined.

Continue Reading

September 21, 2018

5 Key Reasons to Outsource Your Application & Database Management

To be competitive, enterprises need to deliver new products, update processes and improve services that will drive new business, increase profits, and cut costs – all while asking IT to do more with less. As the pace of innovation increases, many IT organizations find themselves stretched impossibly thin and struggling to keep pace.

Continue Reading

September 20, 2018

The Hierarchy of Digital Transformation Needs in Your Organization

You can’t focus on self-actualization before meeting basic needs such as hunger and shelter. And, you shouldn’t pursue transformative IT modernization until your current workload environments are stable and secure. Just as renowned psychologist Abraham Maslow noticed an order humans follow in terms of motivation and development, so too do organizations have a hierarchy connected to IT needs. OneNeck Vice President of Advisory Consulting Jeff Budge explained the different phases and outcomes of ...

Continue Reading

September 13, 2018

Choosing a Security Framework

 Running a security program can be an overwhelming task. There are so many factors to consider including: encryption, application security, disaster recovery and let’s not forget adherence to compliance mandates such  HIPAA and PCI DSS .  How then do security professionals prioritize and maintain their efforts to build the most effective security program for their business?

Continue Reading

September 11, 2018

Ask the Expert – Multi-Cloud Considerations: Keep Security Front and Center

What we’re seeing in the industry today is that most of our customers aren’t adopting a single platform for all of their workloads. Depending on a plethora of factors (RTO/RPO, application requirements, latency requirements, etc.), it truly is becoming a multi-cloud world.

Continue Reading

September 6, 2018

Uptime Institute Case Study Features OneNeck Data Centers

When it comes to our OneNeck data centers, they are extremely secure, symmetrical, automated, responsive and awesome, but practical for all use cases. They are purpose-built and designed for mission-critical IT operations and hosting. Optimized for performance and dependability, our data centers also deliver uninterrupted uptime along with security, physical asset protection and workflow separation — backed by clear and thorough 100% SLAs.

Continue Reading

September 4, 2018

Forward to the Future – Four Digital Transformation Success Stories

Whether you’re in the C-Suite or the IT department, digital transformation is a topic no company can ignore. However, finding the best way to implement change within your organization can be daunting, and garnering support at all levels is no small task.

Continue Reading

August 28, 2018

The Future of Wireless on the Factory Floor

The challenges faced by today’s manufacturer are in many ways the same as they’ve been in the past: maintain the right amount of inventory, optimize production efficiency and never lose sight of quality. Yet addressing these challenges has become more tied to the underlying technology than ever before.

Continue Reading

August 14, 2018

Slow and Steady Wins the Race to the Cloud

If there’s one thing that large enterprises all the way down to mom-and-pop shops have in common, it’s the lure of the quick win. Every business is hyper focused on the bottom line, and what they can do to drive quick growth, which has been one of the primary drivers in the race to the cloud. It just makes sense. The cloud enables faster delivery of services, in turn, faster profit.

Continue Reading

August 7, 2018

6 Steps to Smarter Unified Communications

The way we work has evolved. It’s no longer 9 to 5. And it’s not all in one office. Work today requires collaboration and involves teams spread across time zones. And buyers today expect their business devices and applications to be as well designed, easy to use, and powerful as their personal devices

Continue Reading

August 2, 2018

Cloud Saves Money ... Myth or Reality?

 As you look at moving your IT infrastructure to the cloud, be aware of the myths especially around statements such as “With cloud, businesses can save money.” It’s reality, but can also lead to misunderstanding because true ROI is difficult to calculate. To better understand myth vs. reality, author Kevin Casey asked several cloud experts for their insights on common myths. He shares their responses in a recent The Enterprisers Project article.

Continue Reading

July 31, 2018

It’s Time to Get Back to the Security Basics

If there’s any constant in today’s technology landscape, it’s change. And when it comes to security, there’s no rest for the weary. Advancing technology, savvier-than-ever users and the onslaught of attacks are making today’s IT teams scramble to keep up. Now more than ever, it’s critical to make sure the basics are covered so that you have the ability to respond and keep your business safe.

Continue Reading

July 26, 2018

Avoid Cloud Sticker Shock

As a business, moving your IT to the cloud is a major decision involving hours and hours of time, review, scrutiny and conversation. The last thing you want is sticker shock following your move to the cloud. Surprise fees are certainly a close second. To help you evade both, author Kevin Casey recently highlighted five tips for avoiding sticker shock and surprise bills in a just published The Enterprisers Project article.

Continue Reading

July 24, 2018

Consistent disk sizes per +ASM diskgroup is best practice

A recent MI and RCA brought this to light, and I thought it important enough to share with all of you.  This blog should provide detail, not just as to the best practice of having consistent disk sizes per +ASM diskgroup, but why it’s a best practice and  the impact of not following such best practice.

Continue Reading

July 17, 2018

Making the Most of Your Multi-Cloud Environment

No one disputes the impact of the cloud on today’s business, and now with multiple clouds in the mix, the exponential impact continues to grow. But with multiple clouds comes multiple challenges, challenges that must be addressed up front to ensure your cloud(s) don’t work against you.

Continue Reading

July 13, 2018

Common Myths in the Cloud

Friday the 13th – a day many dread. But what is it about the number 13? We’re afraid to have a 13th floor in buildings, airports go without a 13th terminal and prospective home owners steer clear of addresses with the number 13.

Continue Reading

July 10, 2018

Microsoft Dynamics AX Upgrades

Anyone considering an upgrade from Microsoft Dynamics AX 2012 to Microsoft Dynamics 365 for Finance and Operations has probably thought about the technical challenges involved. How do I convert my custom data and import it into Dyn365FO? What code will I have to rewrite into extensions and what happens if there is not a trigger where I need one? How will I connect my add-ons to my data? With so many technical questions it is easy to overlook the business process impact such a change will have ...

Continue Reading

June 28, 2018

Digital Transformation is Here and Now

Digital transformation enables IT to meet business demands but immediate transformation is not always the reality. This video demonstrates the reality of networks, customer environments and the immense gaps between the two. What’s the reality of bridging those gaps? More importantly, why bridge those gaps? How do smart networks meet business demands? And, how is it accomplished in a “do more with less” business landscape. What’s the true REALITY of digital transformation?

Continue Reading

June 26, 2018

Fly High with a Career in Hybrid Cloud

There’s no doubt, more and more businesses are looking to move to the cloud while making the most of their current IT investments, which in turn has led to the myriad of hybrid solutions that exist today. As a result, the demand for hybrid-savvy IT talent is on the rise.

Continue Reading

June 19, 2018

Know Your Data in a Multi-Cloud World

Utilizing multiple clouds from multiple vendors with a mix of public and private clouds is now a way of life for most enterprises today. However, operating in a multi-cloud environment is not without its challenges.  Data egress charges, incurred when data is transferred out of a cloud to another, are a particularly thorny aspect.

Continue Reading

June 12, 2018

Cloud Transformation and the Best Execution Venue for Your Workloads

Our previous blog focused on the challenges and opportunities for businesses undergoing application modernization and cloud transformation (the latter required for the former), and the role IT services and infrastructure providers play in facilitating that journey. But that’s a high-level view, and the fact is that practical implementation is going to be unique for every organization and require a wide range of solutions to interesting problems. Every application has a different set of ...

Continue Reading