<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=352585001801011&amp;ev=PageView&amp;noscript=1">

Kelser Blog, Media, and News

All the latest Kelser news, media appearances, event recaps, press releases, and articles covering topics such as cybersecurity, business continuity, disaster recovery, networking and managed services, in one convenient place.

Blog Feature

Cybersecurity | Executive Consulting

By: Kelser
January 08, 2016

Independent security audits, such as a penetration test or vulnerability assessment, serve a critical purpose in an information systems security program. I’ll offer you two distinct perspectives to consider, depending on your role in your organization.

Blog Feature

Cybersecurity | Executive Consulting

By: Kelser
January 06, 2016

All kidding aside, you may or may not be aware of a pending change in how secure sites (think SSL/TLS) are secured. This is the SHA-1 to SHA-2 transition. It’s actually been in the works for a while, and primarily involves upgrading the certificate(s) on your public-facing websites, with more secure certificates. So what is SHA-1 or SHA-2 and why do we need to change?

Cybersecurity-Cover-01

Improving Your Cybersecurity Posture Isn't as Hard as it Sounds

Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.

Blog Feature

Modern Data Center

By: Kelser
December 30, 2015

Network automation is right up there with automated server provisioning, to accelerate the development and advancement of applications and services. A common example, might be: “There’s a problem in production and I need to clone my production environment to a bubble test environment for rapid testing and resolution.”

Blog Feature

Cybersecurity | IT Lifecycle Management | Executive Consulting | Workforce Enablement

By: Kelser
December 23, 2015

iPads, tablets, and other ‘smart’ devices are well known as popular entertainment mechanisms. But considering how distracting these devices can be, should your company allow and encourage their use?

Blog Feature

Modern Data Center | Executive Consulting | Workforce Enablement

By: Kelser
December 16, 2015

It happens all the time – for all the right reasons, one of our customers is interested in VDI until they see the price. Sticker-shock doesn’t begin to describe the experience one goes through, when looking into traditional VDI for the first time. Many organizations, large and small, understand the operational overhead (i.e. cost) of managing desktops, seeing VDI as a way to both streamline operations and deliver a consistent end-user experience.

Blog Feature

News | Foundation | Press Release

By: Kelser Press
December 09, 2015

EAST HARTFORD, CT - Kelser Corporation and the Kelser Foundation proudly close another successful year of giving by raising more than $43,000 in 2015.

Blog Feature

Modern Data Center

By: Kelser
December 09, 2015

There’s a new old buzzword surfacing in the storage space: “Erasure Coding”. Sounds pretty fancy! Believe it or not, most of you are using some form of erasure coding (EC) in your data centers today. The concept generally describes the math behind data availability and redundancy (think: RAID). What we are seeing now, is traditional RAID exposing significant limitations with both large, slow drives and super-fast SSDs. RAID also doesn’t generally describe data locality for availability purposes. Before we get into advanced erasure coding, let’s talk about what RAID-5 and RAID-6 really are.

Blog Feature

Cybersecurity | Modern Data Center | IT Lifecycle Management

By: Kelser
December 07, 2015

There is a fairly serious bug, in vSphere 6.0, which can make backup data corrupt and prevent you from restoring data. This issue is specifically targeted at those (most) who use CBT (change block tracking) to take efficient image-based backups of their environment. If you need any assistance with applying or testing these patches and/or the integrity of your backups, please give your account representative a call. You can also contact us here. The VMware KB for this article is here: http://kb.vmware.com/kb/2136854

Back to Top