Kelser Blog, Media, and News
All the latest Kelser news, media appearances, event recaps, press releases, and articles covering topics such as cybersecurity, business continuity, disaster recovery, networking and managed services, in one convenient place.
Cybersecurity | Managed Services
By:
Kelser
January 20, 2016
Here at Kelser we've seen the same security errors being committed time and time again. In order to help keep companies from making the same mistakes, we put together a list of not only the worst security sins -but also some of the most surprising (and least thought of).
IT Lifecycle Management | Executive Consulting | Managed Services
By:
Adam Stahl
November 25, 2015
Developing supply chain management that improves efficiency and profitability is a common difficulty for hundreds of thousands of companies. Many of the inherent problems come in the form of difficult communication, prediction failures, and lack of demand management, although these easily visible problems barely scratch the surface.
Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.
IT Lifecycle Management | Managed Services
By:
Kelser
November 11, 2015
Are you planning to change the software your company uses for its day-to-day business? For example, anyone still using Windows Server 2003/R2 should migrate, as Microsoft ended support for it on July 14, 2015 . But perhaps you’re making a voluntary decision for migration based on any number of factors.
Cybersecurity | Managed Services
By:
Kelser
October 28, 2015
If you’re reading this, then you likely already know the dangers of data breaches for companies of all sizes. In 2014, the average cost of an organizational data breach was $5.4M, with each individual compromised record costing between $191 and $201, on average. And that’s not including the immeasurable costs to company integrity, public relations, and future sales. So kudos for researching the topic.
Modern Data Center | Managed Services
By:
Jonathan Stone
October 14, 2015
At the heart of many of today’s high-value business applications are large repositories of business data stored on rotating magnetic disk. Although CPU performance is critical to the performance of many of these applications, I/O performance, or the ability to read and write data to and from the disk, is frequently even more critical. The more time an application spends waiting for data to be read from or written to disk, the more its performance will improve if I/O can happen with less delay.
Modern Data Center | Executive Consulting | Managed Services
By:
Jonathan Stone
October 08, 2015
There’s so much written and talked about, targeting “big IT”. It probably misses the mark, when it comes to the small and medium business (SMB) space. It’s likely that your server room doesn’t look like a massive datacenter as pictured on many IT brochures and magazine covers. You might only have a closet, with just a server or two and some communication equipment. Your IT budget might not be in the millions and you probably have to be smarter with investing the right amount, in the right technology, at the right time. In reality, it’s more challenging for you to make the right decisions to develop your business, foster creativity in your employees, and efficiently manage an IT infrastructure. That doesn’t mean IT is any less important or critical to your success.
By:
Kelser
September 16, 2015
Open-standards based networking and network security means making a conscious choice to move away from a single-vendor to multi-vendor network. These multi-vendor networks rely on open standards for their interoperability.
Cybersecurity | Executive Consulting | Workforce Enablement | Disaster Recovery | Managed Services
By:
Lisa Carroll
September 02, 2015
Networks and network security have gone from simple multi-cell organisms into a supernova of colliding devices. As any network admin can tell you, more users and more devices means more complexity. And as networks quickly inflate they quickly become hard to administer.
Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.