Bulletproof Office Helping You to Better Enable Your IT

By: Steve | June 27, 2016


Game of Thrones fans will certainly be talking about this season’s finale for days to come and will be desperate for more during the long wait for the new season.

According to HBO, the original series, with so many great characters and story lines, is now the network’s most popular offering of all time.  If you aren’t familiar, one of the most popular and interesting characters on the show is Daenerys Targaryen.

"I am Daenerys Stormborn, of House Targaryen, rightful heir to the Iron Throne, Queen of the Seven Kingdoms of Westeros, the Rhoynar and the First Men. I am the Mother of Dragons, the Khaleesi of the Great Grass Sea, the Unburnt, and Breaker of Chains. The Khaleesi, Daenerys Targaryen."

Interesting introduction or “procla...

Category: Leadership 

Tags: Leadership 

By: Steve | April 11, 2016


Every business, no matter how large or small and regardless of industry, must give some measure of consideration to Disaster Recovery Planning. Larger entities have "DR Project Mangers" or even entire Departments dedicated to developing and keeping DR plans up to date.  Their duties include testing backup and recovery scenarios and ensuring, regardless of the nature of an incident, that the business is recoverable according to their objectives.


However, there are also some that choose, often indirectly, by either having too much to do or by keeping DR needs as a low priority, to do little or nothing. You would be surprised by the lack of sophistication or lack of interest in Recovery Planning that I have seen in some fairly larg...

By: Steve | March 03, 2016


Businesses today are managing IT infrastructure as never before. Business leaders want to focus on their core business as much as possible, without the distractions of IT challenges and disruptions.   The IT “utility,” tools and enablers just need to work!


Implementations are more varied than ever and include variations of on premise, off premise and hybrid implementations with small to large doses of Cloud mixed in, often without direct oversight of the IT Department.  


Through the use of colocation, third-party managed hosting, Infrastructure-as-a-Service (IaaS) and Cloud, business leaders are voting with their dollars to say, “Make it work, keep it secure, don’t distract me and, by the way, if I can save some money, all the better...

Category: Uncategorized 


By: Steve | February 05, 2016

Jimmy Page

In the entirety of my career, which is now longer than I like to admit or care to remember, I have probably worked out of a conventional office about 1/3 of the time – and much of that was in the early days.  Even then, while “office-ing,” I worked hard to spend most of my time with clients and prospects.  


I guess as a long-term results-oriented technology services seller, it came natural and probably an obsession to be out focusing on sales results.  No interest in water cooler talk, what the next football pool might look like or, as a married man, office romance. Managing other sellers changed that slightly to include understanding and “enabling” them for success.  But, it was still natural to focus on “sell-through” results.  And, in...

By: Steve | December 31, 2015


I don't mean to ignore Siri, but we're not close. In spite of my lack of attention, I have had some occasional curiosities about how she might be able to help me.  You know… those thoughts that hit your mind so occasionally that you rarely take action because they are, for the most part, trivial and random. 

Unless you are good friends with Siri, the odds are good that you've had some similar thoughts.

Why the Siri mind flashes?

  1. I am in the “cloud business.” Having spent the majority of my career representing data center and managed IT services companies to the business and IT market (currently with RPE Cloud), it makes me wonder how Siri is constructed. Does she fully reside on my phone? How much of her resides in the Apple cloud? I know she...

By: Steve | November 20, 2015


It's ironic that formal business plans have fallen out of favor in recent years. Entrepreneurs are “following their instincts,” building their businesses and changing direction as they go.  Investors are willing to fund after vetting “great ideas” and an existing track record through conversation and financial statements.


And yet, anyone in even the most entrepreneurial and aggressive business effort, when slowed down for a moment, will have to admit that they are “working a plan.” It may be a one week plan, thirty-day plan or end-of-quarter plan, but it is tactical effort stemming from a predetermined directive or target.


The plans of the diligent lead to profit as surely as haste leads to poverty.   ~Proverbs 21:5


Since many...

By: Steve | October 23, 2015


The cloud computing model has proven to be a great price performer, given its utility-based, “pay by the drink” economic approach.   You reduce operational costs overall and also continue to see savings with smooth pricing increases, only as you need increased capacity, and decreases, should less compute and storage be suddenly required.


Another key benefit is your ability to now focus your IT team on your strategic needs, since your cloud provider is now handling system upgrades, maintenance and support.


This economic model enables businesses of all sizes to enjoy the benefits of more current technology more often.   The typical hardware refresh rate for cloud providers is 3-4 years. You may well have some gear you are using right no...

By: Steve | October 09, 2015


According to recent surveys, more than 70 percent of businesses are using “cloud computing” platforms in some fashion. Common uses are convenient and value-priced cloud storage like Dropbox and Box, cloud email solutions such as Gmail for Business or Office 365 and automated desktop backup solutions like Mozy and Carbonite. General business applications have also come into common use. Most notable are CRM systems (Salesforce and many others) and HR/Payroll/Accounting systems (QuickBooks, Workday, ADP).

Nervous about Security?

By: Steve | July 31, 2015


As you likely know by now, Ransomware is a type of malware that prevents or limits users from accessing their system. This type of malware forces its victims to pay the ransom through certain online payment methods in order to grant access to their systems, or to get their data back.  

Now there is a scam targeted at iPhone and iPad users that will appear via a pop up message as you are doing an internet search with Safari.

You will be interrupted by a message that tells you that your device has been locked because a third-party application has crashed your iOS operating system. 

When you call the toll free number provided, the scammer will ask you for your credit card information so they can charge you for removing the third party applicat...

By: Steve | June 25, 2015

JDL HealthTech  

NOTE:  This is a reprint from a recent Press Release.  At my current firm, JDL Technologies, we have exercised strong relationships with our technology partners and have also minimized our own financial margins in an effort to make HIPAA compliance easier and more manageable for the smaller Practices we serve.