The Real Cost of Software Non-Compliance (and what to do about it)

The Real Cost of Software Non-Compliance (and what to do about it)

Software compliance is one of those aspects of business that exists safely in the back of your mind until, suddenly, it rears its ugly head. Issues of software non-compliance rarely occur intentionally, and are often the result of a company expanding beyond the scale of their original licensing agreements.

In short, while it may be a good problem to have, it becomes a huge headache if left unchecked for too long. Our team digs into the real costs of software non-compliance – and how to address it.

[Read more…]

Mastering the BYOD Balancing Act: The Softchoice Journey

Balancing Act

It’s funny how things evolve so quickly. Just a few years ago, the thought of employees using their own phones or laptops for work at work was unthinkable.

But as the consumerization of IT trend grows from a trickle to a flood, many organizations have no choice but consider how to implement a Bring Your Own Device (BYOD) program. And the experience at Softchoice was no different.

[Read more…]

Feeling The Pressure Of Big Data?

Feeling the pressure?

Over the years, data centers became fragmented, with numerous types of proprietary software living in silos inside specialized hardware components – making them complex and frustrating to manage. Today, virtualization helps absorb and minimize this challenge, but creates another: Server and application sprawl from explosive data growth.

Server and application sprawl will cost you

A sprawl of uncontrolled and poorly managed application deployments leads to ‘application unavailability’ that endangers an organization’s profitability. Numerous examples of this continue to sprout up all around us. For example, do you remember the Amazon datacenter failure? I always like to remember an article I read that states:

“As business becomes increasingly dependent on technology and information, availability is a universal concern for every business, in every industry…And  globalization means there are no more periods of  ‘acceptable’ downtime. At any time of the day or night, somewhere in the world, customers and vendors need access to your corporate information. If they can’t get it, they’ll go elsewhere – creating an opportunity for your  competition.”

David M. Fishman, Sun MicroSystems, Application Availability: An Approach to Measurement

I was young, and I have to admit that it touched me and created a sense of urgency. Maybe this is why I am so passionate about what I do today. Considering the problem of server and application sprawl, automation and ease of management are no longer a ‘nice to have’ they are a MUST. With this in mind, where do you start?

[Read more…]

7 Technologies That Make BYOD a Reality

seven technologies to enable a BYOD strategy

Let’s start with the obvious.

There is no silver bullet, one-size-fits-all checklist for creating the perfect Bring Your Own Device strategy. Every organization is completely different.

But it’s not as bad as it sounds. Many of the technologies necessary to support a strategy are probably already in your ecosystem. It’s just a matter of knowing what’s missing, and how to leverage what you’ve already got.

To give you a hand, we’ve assembled seven tools and technologies that make planning and executing your BYOD strategy a reality.

[Read more…]

Cloud Cheat Sheet: 5 Building Blocks, 3 Service Models and 4 Deployment Models

You want to get started on your Cloud roadmap, but with all of the options and opinions available it’s hard to determine exactly which approach is best for your organization.

You have read white papers, blogs, newsletters, tweets and articles all explaining different approaches to: IaaS, SaaS, PaaS, hybrid cloud, private cloud, migrating to the cloud, securing the cloud, desktop virtualization, app virtualization, storage virtualization, roadblocks, strategies, hardware foundations, disaster recovery and budget, budget, budget!

Don’t you wish you could get all that information in one place?

Using the National Institute of Standards and Technology’s (NIST) definition of Cloud Computing as a reference, I have compiled a cheat sheet outlining the 5 building blocks, 3 service models and 4 deployment models of Cloud Computing.

The NIST is responsible for developing standards and guidelines, including minimum requirements for providing accurate information security for Federal Agency operations and assets.  Although it’s mostly for Federal Agency use, the intended audience is system planners, program managers, technologists and others adopting cloud computing as consumers or providers of cloud services.

So here they are in one place – the fundamentals of Cloud Computing:

[Read more…]

Securing Passwords in Business: What You Really Need To Know

Another week, another breach! It seems like every week we’re hearing about another major website’s secure passwords being compromised. Personal information is either being leaked for malicious purposes, or hackers are showing off their prowess for accessing “secure” information.

Last week 3 major websites reported their customer passwords were compromised:

If you have an account on any of these sites, it is highly recommended that you change your password immediately. Also no funny business: make sure that you use a different password on each of them.

Imagine someone contacting your business relationships. Or using your identity to manipulate business relationships you have spent time building. Or just as bad, manipulating personal relationships you are developing. When you use the same password for most of your services (including work systems) you make it very easy for someone to get into many – or all – of them.

Here are my recommendations for password management best practices to reduce your risk of exposure.

[Read more…]