<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=352585001801011&amp;ev=PageView&amp;noscript=1">

Kelser Blog, Media, and News

All the latest Kelser news, media appearances, event recaps, press releases, and articles covering topics such as cybersecurity, business continuity, disaster recovery, networking and managed services, in one convenient place.

Blog Feature

News | Foundation | Press Release

By: Kelser Press
December 09, 2015

EAST HARTFORD, CT - Kelser Corporation and the Kelser Foundation proudly close another successful year of giving by raising more than $43,000 in 2015.

Blog Feature

Modern Data Center

By: Kelser
December 09, 2015

There’s a new old buzzword surfacing in the storage space: “Erasure Coding”. Sounds pretty fancy! Believe it or not, most of you are using some form of erasure coding (EC) in your data centers today. The concept generally describes the math behind data availability and redundancy (think: RAID). What we are seeing now, is traditional RAID exposing significant limitations with both large, slow drives and super-fast SSDs. RAID also doesn’t generally describe data locality for availability purposes. Before we get into advanced erasure coding, let’s talk about what RAID-5 and RAID-6 really are.

Cybersecurity-Cover-01

Improving Your Cybersecurity Posture Isn't as Hard as it Sounds

Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.

Blog Feature

Cybersecurity | Modern Data Center | IT Lifecycle Management

By: Kelser
December 07, 2015

There is a fairly serious bug, in vSphere 6.0, which can make backup data corrupt and prevent you from restoring data. This issue is specifically targeted at those (most) who use CBT (change block tracking) to take efficient image-based backups of their environment. If you need any assistance with applying or testing these patches and/or the integrity of your backups, please give your account representative a call. You can also contact us here. The VMware KB for this article is here: http://kb.vmware.com/kb/2136854

Blog Feature

Cybersecurity

By: Kelser
December 02, 2015

A company’s security network is like a chain in that it’s only as strong as its weakest link. For this reason, a thorough and regular

Blog Feature

IT Lifecycle Management | Executive Consulting | Managed Services

By: Adam Stahl
November 25, 2015

Developing supply chain management that improves efficiency and profitability is a common difficulty for hundreds of thousands of companies. Many of the inherent problems come in the form of difficult communication, prediction failures, and lack of demand management, although these easily visible problems barely scratch the surface.

Blog Feature

IT Lifecycle Management | Managed Services

By: Kelser
November 11, 2015

Are you planning to change the software your company uses for its day-to-day business? For example, anyone still using Windows Server 2003/R2 should migrate, as Microsoft ended support for it on July 14, 2015 . But perhaps you’re making a voluntary decision for migration based on any number of factors.

Blog Feature

Cybersecurity | Managed Services

By: Kelser
October 28, 2015

If you’re reading this, then you likely already know the dangers of data breaches for companies of all sizes. In 2014, the average cost of an organizational data breach was $5.4M, with each individual compromised record costing between $191 and $201, on average. And that’s not including the immeasurable costs to company integrity, public relations, and future sales. So kudos for researching the topic.

Blog Feature

Office 365 | Executive Consulting

By: Lisa Carroll
October 21, 2015

Virtualization has changed the way we think of the office. What was once a physical space has now become a network of workers plugged in from various locations. With laptops and mobile phones, even the infrastructure has become less and less rooted in the physical space of the traditional office.

Back to Top