<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1856953457853813&amp;ev=PageView&amp;noscript=1">

VLCM IT Industry News

How to Know if Your Network Has Been Breached

Posted by VLCM on May 9, 2017 8:49:19 AM

Even with advances in cybersecurity technology, organizations still struggle to detect and resolve breaches. This article provides tips on detecting data breaches and mitigating their impact on your network.

Read More


Is the Internet of Things taking over the universe?

Posted by Jared Quan on Jun 4, 2015 1:50:25 PM

Kevin Ashton said in an interview on NPR, “I had no idea that the phrase 'Internet of Things' would take off, had I known I would have thought of something better to call it.” The phrase IoT (Internet of Things) started as a presentation title Kevin had made up for Procter & Gamble, and though he was the first to say it, the concept has been around for a while.

Read More


Why the Cloud is Important

Posted by Brien M. Posey on Jan 7, 2015 5:00:00 PM

I have to confess that a few years ago I was one of the most outspoken opponents of the cloud. At that time, cloud was really nothing more than a fancy word for outsourcing and there seemed to be a very real danger that huge numbers of IT professionals would lose their jobs to rampant cloud outsourcing. As is the case with everything in IT however, the cloud has evolved. Cloud services are no longer about completely outsourcing corporate IT. There are very real, and legitimate use cases for the cloud.

The biggest selling point today is that cloud services reduce costs on things like server hardware and server maintenance. Rather than an organization having to purchase physical devices, they are able to lease space on a cloud provider’s hardware. This sharing of hardware resources saves money because no one single organization is forced to incur the costs of a full server.

Read More


Make the Cloud Work for You

Posted by Brien M. Posey on Dec 30, 2014 1:24:00 PM

As someone who speaks to audiences all over the world about disaster recovery, I get the opportunity to hear firsthand how a number of organizations handle disaster preparedness. Most IT professionals seem to accept the idea that disaster is not a matter of if, but when, and that disaster preparedness is essential. Even so, there is one big mistake that gets made over and over again.

The single biggest mistake that I see on a regular basis is organizations creating their backup and recovery efforts as a first line of defense against data loss, rather than as a last line of defense. While I do not want to downplay the importance of backups in any way, I believe that data restoration should only occur as a last resort.

There are two main reasons why I recommend avoiding data restorations unless you have no choice. First, the restoration process almost always results in at least a little bit of data loss. By its very nature, a restoration results in the loss of any data that has been created since the time of the most recent backup.

Read More


Five Things That You Should Know About Backup and Disaster Recovery

Posted by Brien M. Posey on Dec 23, 2014 12:05:00 PM

Over the years, I have done a lot of work related to backups and various other forms of disaster recovery. In doing so, I have found that there are a number of fundamental concepts that seem to hold true across organizations of nearly every size. This article discusses five such concepts.

  1. You Need At Least Three Copies of Your Data

The first bit of advice that I give anyone who asks about backups is that in order to be completely protected, you need at least three copies of your data. The first copy is your live data. Live data is the data that is actively in play on your network, and is used on a day-to-day basis.

The second copy of your data should be a local backup. It is extremely important to have a backup that is easily accessible, and that resides within your own data center.

The third copy should be a remote backup. Ideally, this should be a backup either to a public cloud or to a remote data center. In a pinch the requirement for a third copy of the data can be fulfilled by creating a tape based backup and shipping those tapes to a safe location. Regardless of the method however, a remote backup is the only way to protect your data against a data center level disaster.

Read More


Technical timing: How to Know When to Upgrade Your Technology

Posted by Josh Linton on Nov 13, 2014 6:00:00 PM

With the rapidly changing technology landscape, it’s difficult to know when it’s the right time to upgrade equipment and take advantage of the newer technology.

In my experience, the normal lifespan of a business class laptop or other equipment is about three years. This is consistent with what I’ve read in industry and trade publications. After three years, the cost of maintaining a laptop or a desktop becomes more expensive than buying a new one.

Read More


Why Small Businesses Should Spend More on IT Services

Posted by Brien M. Posey on Nov 12, 2014 7:00:00 PM

As someone who writes hundreds of articles and blog posts and a number of books and white papers each year, I tend to get a lot of mail from readers. I try to answer as many of these letters I possibly can, but there are only so many hours in a day. Most of the time when I answer a question, my answer is a very short response and a link to a webpage that I hope will help the person with their problem.


A few months ago, I had something of a rude awakening. I received an email from a guy who was asking for help with a technical problem that he was having. I sent him a link to an article that I had written. This article contains step-by-step instructions for solving the issue at hand. Rather than a thank you however, I received a scathing reply.

Read More


Security for the Business Mind

Posted by Priscilla Silva on Oct 13, 2014 6:30:00 PM

Secure your business by identifying and understanding your unique set of risks, evaluating the solutions that address your top company priorities, and creating the budget to finance the right solution. Recognize the myths of securing your business before coming to an informed decision.
Read More


HP Storage Serves as Big Data Tool

Posted by Priscilla Silva on Oct 3, 2014 11:00:00 AM

The Game Show Network Games and Big Data

By Calvin Zito, @HPStorageGuy  

Nth Symposium was at the end of August 2014 and one of the keynotes was delivered by Portman Wills.  Portman is the Chief Data Scientist at the Game Show Networks Games.  Portman discussed how they log every action taken by gamers and with HP Vertica, they use that information to improve their users' experience and drive higher revenue. 

For me, the keynote did a great job of making big data real and specifically how HP Vertica is used to get the insights that Portman discussed.  So Portman graciously said yes to my request to talk to him (he had a flight shortly after his keynote ended) and I think you'll find this as interesting as I did. 



Also at Nth Symposium, I had Jeromie Jackson, Director of Security and Analytics give me an overview of both HP Vertica and HP Autonomy for for analyzing social media.  It's another real world example of how big data can be leveraged with analytics.  Jeromie helped me understand what kind of social media monitoring capabilities Vertica and Autonomy have.  Here's that video.



Hope you enjoy your weekend. View a deep dive into big data and how it can benefit companies of all sizes. VLCM is a platium HP partner, certified to provide service and thought-leadership to other IT professionals. Subscribe to our blog to learn more.

Subscribe to our blog

Read More


ShoreTel 14.2 Feature Updates Deliver Benefits of Customizable Virtualization

Posted by Priscilla Silva on Oct 2, 2014 4:28:08 PM

Customers can mix-and-match hardware-based and virtual appliances for highest reliability and scalability at the lowest cost

Sunnyvale, Calif. – Jan. 30, 2014 – ShoreTel® (NASDAQ: SHOR), the leading provider of brilliantly simple phone systems and unified communications (UC) solutions for the cloud and premises, today launched ShoreTel 14.2 which allows companies of all sizes to deploy a ShoreTel communications system in a virtual environment. ShoreTel 14.2 delivers greater flexibility for customers, with the ability to mix and match hardware-based and virtual appliances in a single network, all managed using a single web-based management interface. With ShoreTel 14.2, customers may now select the UC deployment model that best suits their business and infrastructure needs – virtual, physical or any combination of both. The benefits are immediate – reduced hardware and operational complexity, higher application availability, increased scalability and reliability.

Read More