<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=352585001801011&amp;ev=PageView&amp;noscript=1">

Kelser Blog, Media, and News

All the latest Kelser news, media appearances, event recaps, press releases, and articles covering topics such as cybersecurity, business continuity, disaster recovery, networking and managed services, in one convenient place.

Blog Feature

Cybersecurity | Managed Services

By: Kelser
January 20, 2016

Here at Kelser we've seen the same security errors being committed time and time again. In order to help keep companies from making the same mistakes, we put together a list of not only the worst security sins -but also some of the most surprising (and least thought of).

Blog Feature

IT Lifecycle Management | Executive Consulting | Managed Services

By: Adam Stahl
November 25, 2015

Developing supply chain management that improves efficiency and profitability is a common difficulty for hundreds of thousands of companies. Many of the inherent problems come in the form of difficult communication, prediction failures, and lack of demand management, although these easily visible problems barely scratch the surface.

Cybersecurity-Cover-01

Improving Your Cybersecurity Posture Isn't as Hard as it Sounds

Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.

Blog Feature

IT Lifecycle Management | Managed Services

By: Kelser
November 11, 2015

Are you planning to change the software your company uses for its day-to-day business? For example, anyone still using Windows Server 2003/R2 should migrate, as Microsoft ended support for it on July 14, 2015 . But perhaps you’re making a voluntary decision for migration based on any number of factors.

Blog Feature

Cybersecurity | Managed Services

By: Kelser
October 28, 2015

If you’re reading this, then you likely already know the dangers of data breaches for companies of all sizes. In 2014, the average cost of an organizational data breach was $5.4M, with each individual compromised record costing between $191 and $201, on average. And that’s not including the immeasurable costs to company integrity, public relations, and future sales. So kudos for researching the topic.

Blog Feature

Modern Data Center | Managed Services

By: Jonathan Stone
October 14, 2015

At the heart of many of today’s high-value business applications are large repositories of business data stored on rotating magnetic disk. Although CPU performance is critical to the performance of many of these applications, I/O performance, or the ability to read and write data to and from the disk, is frequently even more critical. The more time an application spends waiting for data to be read from or written to disk, the more its performance will improve if I/O can happen with less delay.

Blog Feature

Modern Data Center | Executive Consulting | Managed Services

By: Jonathan Stone
October 08, 2015

There’s so much written and talked about, targeting “big IT”. It probably misses the mark, when it comes to the small and medium business (SMB) space. It’s likely that your server room doesn’t look like a massive datacenter as pictured on many IT brochures and magazine covers. You might only have a closet, with just a server or two and some communication equipment. Your IT budget might not be in the millions and you probably have to be smarter with investing the right amount, in the right technology, at the right time. In reality, it’s more challenging for you to make the right decisions to develop your business, foster creativity in your employees, and efficiently manage an IT infrastructure. That doesn’t mean IT is any less important or critical to your success.

Blog Feature

Networking | Managed Services

By: Kelser
September 16, 2015

Open-standards based networking and network security means making a conscious choice to move away from a single-vendor to multi-vendor network. These multi-vendor networks rely on open standards for their interoperability.

Blog Feature

Cybersecurity | Executive Consulting | Workforce Enablement | Disaster Recovery | Managed Services

By: Lisa Carroll
September 02, 2015

Networks and network security have gone from simple multi-cell organisms into a supernova of colliding devices. As any network admin can tell you, more users and more devices means more complexity. And as networks quickly inflate they quickly become hard to administer.

Back to Top
Cybersecurity-Cover-01

Improving Your Cybersecurity Posture Isn’t as Hard as it Sounds

Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.