Contact Us

|

Careers

|

Change Locale
close

The Softchoice Blog: From the experts

Featured Article
From the experts | August 17, 2016 by Tania Stadnik
Security Information and Event Management (SIEM) solutions are a combination of SIM (security information management) and SEM (security event manager). Whatever the acronym used, these products provide real-time analysis of security alerts generated by network hardware and applications and log security data and generate reports for compliance purposes. SIEM plays a key role in helping secure […]
Featured Article
From the experts | August 11, 2016 by Brett Gillett
every organization faces challenges – whether unexpected costs, unplanned outages or security-related issues. In my experience, most are avoidable with a little extra planning. As you invest more time and treasure in the cloud, I recommend the following to build the foundation to keep your cloud strategy moving in the right direction. Click here to learn more.
Featured Article
From the experts | May 19, 2016 by Joel Hoidas
In the past, server admins looked at servers as a “box” that contained CPU, memory, storage, and network connectivity. Troubleshooting was tough and startup times were slow. These aging servers weren’t necessarily part of a cohesive data center system, nor were their electricity numbers consumption efficient. New self-sufficient servers are so much more than these older servers. […]
Featured Article
From the experts | April 13, 2016 by Joel Hoidas
In 2014, A Softchoice study revealed employees who use cloud apps are reckless and more likely to put corporate data at risk. Two years later, not much has else changed! From lax password security to rogue IT behavior, North American workers are (Still) Careless Users in the Cloud.
Featured Article
From the experts | August 25, 2015 by Debbie Stephenson
Knowing what you already have in your toolbox before heading out to buy new tools is common sense. However, sometimes you can lose track of what you own and find yourself buying the same screwdriver over and over again. This can happen in your IT environment too if you don’t have a good system of keeping track of what’s in […]
Featured Article
From the experts | August 12, 2015 by Debbie Stephenson
Networking is a word that for many causes trepidation and excitement at the same time, and I’m not necessarily talking only about networking equipment in IT, I’m also talking about human networking. We all know how nerve racking it can be to step into a room full of strangers with the goal of branching out […]
Featured Article
From the experts | July 13, 2015 by Melissa Nitoiu
IT leaders are probably in the best position to help prevent a “fire, ready, aim” approach to using social media. This may sound counter-intuitive at first. After all, IT blocks social media, right? Not so. I’d argue that any organization that’s getting serious about using social media has a lot to gain by leveraging IT […]
Featured Article
From the experts | October 7, 2014 by Joel Hoidas
You’ve decided to open up your organization to BYOD — so what’s next? Along with mobile devices comes the need for mobile apps. One question that constantly arises: Which of our business applications should be made available on a mobile platform? While common apps that employees use every day (like CRM) are solid contenders, not […]
Featured Article
From the experts | September 29, 2014 by Matthew Thiffault
As organizations adapt to an evolving desktop environment, Professional Services will play a key role in guiding this transformation. The arrival of next-generation technology is one thing, but navigating through hundreds of options and actually deploying them are the most crucial components of IT success. Our Softchoice Advisor recently team met with John Kauffman, our […]
Featured Article
From the experts | September 22, 2014 by Emily A. Davidson
Most hear “server virtualization” and think: efficiency, ease of management, high availability and flexibility. But these benefits – the aim of sound IT planning – really only extend to the server (and in some cases application) layer. Administration, it turns out, is a whole other kettle of fish. That’s because the complexities of introducing server […]
Featured Article
From the experts | August 7, 2014 by Matthew Thiffault
What’s Unified Fabric Networking technologies?  As the number of data, applications and servers in data centers have increased, so have corresponding storage and networks. Couple this with an increasing appetite for Virtualization and networking seems to have been a bit forgotten.  As organizations look to condense platforms and applications the demand on networking and storage […]
Featured Article
From the experts | May 28, 2014 by Joel Hoidas
Career and Technical Education (CTE) programs a boon to students, schools and school districts across America. Economic uncertainty. Rapid technological advances. Government pressure. Increased globalization. Teachers and schools and school districts face greater challenges in preparing students for the future than ever before. With 1.2 million students dropping out in the US every year, those challenges […]
Featured Article
From the experts | May 27, 2014 by Richard Carson
How load balancing is helping deliver on the promise of application virtualization. From systems and storage to networks, virtually every nook and cranny of the IT environment these days is being virtualized. Applications, of course, are no exception, and for good reason. By isolating applications from the underlying operating system and from other applications, then […]
Featured Article
From the experts | May 23, 2014 by Joel Hoidas
Just Google BYOD (as of July 16, that 6,340,000 results and counting) and BAM! it’s clear the bring-your-own-device revolution is far more than just a trend. If you’re CIO hasn’t started quivering yet – whether it be from excitement or fear – take a look at some more staggering numbers: 95% of organizations allow employee-owned […]
Featured Article
From the experts | May 16, 2014 by Joel Hoidas
This article originally appeared on Stephen’s personal blog. You can visit it here. The future of client computing has a very different look and feel.  There are a couple of driving forces and they are driving hard and fast. Always on connectivity is actually finally pervading.  Smartphones with 8MB/s data connections have been here for approximately […]
Featured Article
From the experts | May 5, 2014 by Joel Hoidas
As 2011 comes to a close, Softchoice customers are evaluating the success and challenges from the present year, and planning for the year to come. The Softchoice Advisor sat down with our Manager of Category Marketing, Bryan Rusche, to understand the opportunity organizations should expect to encounter while continuing to mitigate risk and maximize efficiencies […]
Featured Article
From the experts | March 10, 2014 by Erika Van Noort
There was a time, back in the horse and buggy days or even the early days of automobiles, where dirt roads were just fine. They could be a little dusty or muddy at times but they fit the technology requirements well enough. They did the job. But once technology improved, once heavier cars and particularly […]
Featured Article
From the experts | February 25, 2014 by Erika Van Noort
As a leading North American provider of technology solutions and services, Softchoice combines the efficiency and reliability of a national IT supplier with the personal touch and technical expertise of a local solutions provider. Softchoice’s holistic approach to technology includes solution design, implementation, asset management and cloud services, as well as access to one of […]
Featured Article
From the experts | November 25, 2013 by Lesley Morris
Dear Frank, Recently, my company has added some branches across the country – which is great because we’re growing. But I’ve never been a fan of long-distance relationships. We try and keep in touch with co-workers, but the phone can be expensive and email just isn’t providing the intimacy we need to feel connected. How […]
Featured Article
From the experts | November 22, 2013 by Angela Cope
The Impact of Thailand Flooding on Enterprise Storage Most IT professionals are aware that recent flooding in Thailand has had an impact on the Hard Disk Drive manufacturing industry.  The impact has been most immediate on disk drives used in PC’s and Industry Standard Servers (ISS) because the drive types used by these products are […]
Featured Article
From the experts | November 5, 2013 by Angela Cope
This article originally appeared on Stephen’s personal blog. You can visit it here. Don’t let the introduction scare you.This post is actually more appropriate for less technical readers who have had a computer failure and lost data. While on a recent business trip, the hard drive light on my laptop remained solid at all times. As […]
Featured Article
From the experts | September 25, 2013 by Ian Zagrodney
Urban planners have long since realized that building wider and wider highways doesn’t actually solve traffic congestion problems in the long run. Why? Because while they increase capacity in the short term, they also encourage sprawl, which in turn generates more traffic and still wider highways – and the vicious cycle continues without ever solving […]
Featured Article
From the experts | September 17, 2013 by Angela Cope
While you might know that Softchoice recently was recognized as one of the top tech firms in North America, you probably didn’t know that we also fall into the top 2% of Cisco partners with masters certification levels in UC and Security! To show our committment to all-things Cisco, we put together a short video that does […]
Featured Article
From the experts | September 12, 2013 by Lesley Morris
Collaboration. There’s a million ways to do it, and a million ways to fail. Here are seven simple strategies to jumpstart your collaboration strategy and ensure your labors are fruitful. Related Posts Behind the Scenes: Don’t Build A Policy From Scratch!         This is the fourth in a our series about how Softchoice […]
Featured Article
From the experts | September 5, 2013 by Angela Cope
We’ve learned a lot in the last 18 months. As cautious optimism surrounds economic recovery, what has changed in how organizations are harnessing technology? We assembled a group of Softchoice’s top technology thought leaders and asked them all one question: “What’s on your radar as organizations get back to business?” “In the storage arena it’s […]
Featured Article
From the experts | August 29, 2013 by Stephen Perciballi
SAN’s and Storage Tiering: Difficult Situations Inspire Ingenious Solutions.   “We hold these truths to be self-evident, that all men are created equal…” – Thomas Jefferson, US Declaration of Independence  While it is self-evident people are created equal, it is also self-evident to IT professionals managing application infrastructure that not all data is created equal. In the […]
Featured Article
From the experts | August 19, 2013 by Florent Tastet
What is it that you want to protect most? This can be a very difficult question.  A question that has created many products and solutions (inside and outside of I.T…think insurance).  Other than the people, the most critical asset we have in most organizations is the information.  If it were not for that information we […]
Featured Article
From the experts | August 15, 2013 by Mustafa Ebadi
Much has been written on the long-term survival of the desktop PC. The proliferation of smartphones, tablets, and cloud computing within the enterprise is changing the way we work, but does that mean the PC is destined for extinction? There’s no denying, the PC market is suffering right now. According to a recent Gartner report, […]
Featured Article
From the experts | July 30, 2013 by Candice Garner
IT professionals may be reluctant to introduce a Bring Your Own Device (BYOD) program – and for good reason. Concerns about security, governance and the fact that many employees are hesitant to take on the job of supporting their own devices derail even the best intentioned BYOD program. However, there is more balanced option emerging, and […]
Featured Article
From the experts | July 22, 2013 by Eric Gardiner
How to implement a Bring Your Own Technology strategy is still one of the most rampant conversations we have everyday with businesses. There is no single technology that is going to make the implementation successful. The goal of this guide is to outline the variables that need to be addressed so that you can find […]
Featured Article
From the experts | July 2, 2013 by Francis Li
We’ve learned a lot in the last 18 months. As cautious optimism surrounds economic recovery, what has changed in how organizations are harnessing technology? We assembled a group of Softchoice’s top technology thought leaders and asked them all one question: “What’s on your radar as organizations get back to business?” “In the storage arena it’s […]
Featured Article
Over the years, we’ve worked closely with a variety of market segments,to help them adapt, grow and thrive in spite of economic change and technology evolutions.With all that experience and knowledge behind us, we thought it would be interesting to hear from our Softchoice experts directly, so they could share their insights and perspectives on how technology […]
Featured Article
From the experts | June 21, 2013 by Mustafa Ebadi
Technology continues to become more complex as siloed projects create new layers and inter-dependencies within infrastructures. That’s not to say companies don’t want to simplify their landscape. It just comes down to how much time is allocated to addressing project sprawl. The fact is that the skills gap is becoming the new “silent killer” and […]
Featured Article
From the experts | June 20, 2013 by Joel Marans
One of the promises of BYOD is that it reduces help desk tickets, which allows IT to spend less time fixing problems and more time driving business value. However, as more employees bring their own devices to work, IT departments are seeing an increase in tickets. These tickets – which cover everything from device compatibility […]
Featured Article
From the experts | June 19, 2013 by Erika Van Noort
Employees today have more ways to communicate and collaborate than ever before, from desk phones and email to productivity apps in the cloud, instant messaging, video conferencing and smartphones. Many IT managers, however, are hesitant to invest in new collaboration technology, most claiming the tools they’ve already implemented to help employees work faster, smarter and […]
Featured Article
From the experts | June 6, 2013 by Aaron Brooks
According to the US Cyber Security Task Force, from October 2011 to February 2012 there were over 50,000 attempted or successful computer network intrusions in the United States alone. This makes security the fastest evolving area of IT today. As virtualization, cloud and BYOD continue to grow, expect a new set of threats to emerge […]
Featured Article
From the experts | May 29, 2013 by Candice Garner
Over the years, data centers became fragmented, with numerous types of proprietary software living in silos inside specialized hardware components – making them complex and frustrating to manage. Today, virtualization helps absorb and minimize this challenge, but creates another: Server and application sprawl from explosive data growth. Server and application sprawl will cost you A […]
Featured Article
From the experts | May 23, 2013 by Aaron Brooks
Simplicity is among the principal advantages of implementing a virtual infrastructure, but few talk about the complexity that can come with it. Often, companies are far down the virtualization road before realizing the challenges they’ll face … and have done nothing to prepare for them. Virtual machine sprawl can be as vexing as that of […]
Featured Article
From the experts | May 8, 2013 by Dan Sylvester
It seems that as we find newer, faster and more efficient ways to store, access and manipulate data, we can’t seem to keep up with the growth of the data itself. Even worse, we seem to be at odds with finding ways to successfully protect that data from being lost in the abyss. Backups exist […]
Featured Article
From the experts | April 5, 2013 by Richard Carson
Innovation: it’s a word ranked in the top 10 of the most overused marketing terms in the past few years. You see it everywhere you go. It’s used to describe everything from new cars and smartphones to sports equipment and food. While there are countless books written on this topic, it should be noted that a lot […]
Featured Article
From the experts | March 25, 2013 by Lesley Morris
Softchoice Solutions Architect Matthew Bynum reveals his top ten considerations for any organization considering a unified communications (UC) deployment.  #10. Understand why All too often, the driver behind IT change is as simple as “our existing gear is old,” or “we can’t get support on it anymore.” Make sure you can articulate the actual reasons […]
Featured Article
From the experts | March 21, 2013 by Mark Sebastian
Previously employed with Xerox, KPMG, Telus and Konica Minolta, David Morrow is currently a creative and goal-oriented Chief Commerical Officer at PrintFleet Inc. During his career he has been recognized as an expert in sales, performance management and a motivator of teams. We were able to steal 45 minutes out of his busy day to […]
Featured Article
From the experts | March 12, 2013 by Florent Tastet
Another big buzz in the media again. Looks like there has been another dangerous vulnerability identified and rated a 10 for impact, and a 10 for exploitability. This is the threat we now know as the Shellshock Vulnerability. The major concern is that, if an attacker has the skill to craft a packet to take advantage of the vulnerability, they can inject code […]
Featured Article
From the experts | March 8, 2013 by Jonathan White
It’s impossible to ignore. Technology is evolving at an astonishing pace, and major business trends like BYOD, Cloud and UCC are introducing new complexities and challenges for leaders in every business unit – not just within IT. In fact, the very role of IT is changing the world over, as end-users now make their own choices when […]
Featured Article
From the experts | March 8, 2013 by Doug Sekus
In what’s shaped up as something of a cliffhanger episode of The Housewives of Silicon Valley, Oracle’s decision in March to end software development for Intel’s Itanium platform still has everyone in the industry hot and bothered – and not in a good way. No one – except maybe Oracle – is exactly sure why […]
Featured Article
From the experts | February 3, 2013 by Matthew Bynum
Back in the golden age of IT ( about 8 years ago),  the only thing you had to worry about running on your network was data. It was easier then to troubleshoot problems and find solutions. Then came voice, added to the network to leverage the infrastructure and save costs, and more recently video and […]
Featured Article
From the experts | January 18, 2013 by Matthew Thiffault
Open Systems Availability: Virtualization’s First Frontier What has been will be again, what has been done will be done again; there is nothing new under the sun… – Ancient proverb  Server virtualization has brought great advances in flexibility, efficiency and responsiveness to today’s always-on, web-enabled data centers.  Although that is what most people think today when […]
Featured Article
From the experts | December 17, 2012 by Deepesh Misra
Do our users want BYOC? So all of us on the team were excited about the possibilities of BYOC, but what we hadn’t checked yet was what percentage of Softchoice laptop users would actually be interested in a program like this? At the end of the day, no matter what great technologies and policies we put in […]
Featured Article
From the experts | December 7, 2012 by Jason McNeill
Like it or not, Bring Your Own Device (BYOD) isn’t going away. While everyone agrees it’s a good idea to plan for the inevitable, few know what to expect. To give you an idea, we put together a list, compiled in part from first-hand experience of doing it ourselves, of the impacts you can expect […]
Featured Article
From the experts | November 30, 2012 by Matthew Bynum
 Once upon a time, you delivered an operating system to your employees on their desktop devices – or maybe you still are. You had applications and user profiles on your desktops too. And of course, your service level agreements (SLAs) were tied to the hardware as well because the hardware counted most. If it broke, […]
Featured Article
From the experts | November 12, 2012 by Jason McNeill
There’s a perfect storm out there and it’s causing a radical change to the desktop environment. The proof is everywhere. Start with the prominent use of Windows XP, a 10-year- old operating system causing a mass migration to Windows 7. Next is a sea of aging client hardware, remnants of down-economy budget crises. Combine these […]
Featured Article
From the experts | November 5, 2012 by Lesley Morris
Like it or not, Bring Your Own Device (BYOD) isn’t going away. While everyone agrees it’s a good idea to plan for the inevitable, few know what to expect. To give you an idea, we put together a list, compiled in part from first-hand experience of doing it ourselves, of the impacts you can expect […]
Featured Article
From the experts | October 15, 2012 by Lesley Morris
The Impact of Thailand Flooding on Enterprise Storage Most IT professionals are aware that recent flooding in Thailand has had an impact on the Hard Disk Drive manufacturing industry.  The impact has been most immediate on disk drives used in PC’s and Industry Standard Servers (ISS) because the drive types used by these products are […]
Featured Article
From the experts | October 9, 2012 by Lesley Morris
Over 83% of endpoint infections come from hijacked websites. Have you ever seen those crazy popups that look like a real anti-virus program AntiVirus Plus, System Tools 2011 that look just like Windows Security Center?  This is some pretty nasty malware.  Why is this so successful?  These are the threats we discussed in previous posts.  […]
Featured Article
From the experts | September 26, 2012 by Elliott McWhirter
Want to save time and money on your Windows 7 deployment? Virtualize!  If you’re a stalwart IT decision maker who stuck by Windows XP for the last decade, you’re finally coming face to face with the reality of a Windows 7 world. And you’re probably asking yourself: so how do I make the move? For […]
Featured Article
From the experts | September 14, 2012 by Lesley Morris
As a cloud consultant, I’ve had the opportunity to see dozens of different public cloud implementations – the good, the bad and the ugly. Regardless of where you are on your journey, every organization faces challenges – whether unexpected costs, unplanned outages or security-related issues. In my experience, most are avoidable with a little extra […]
Featured Article
From the experts | September 6, 2012 by Stephen Perciballi
 Virtualize first: The #1 rule for new IT applications.  There are a ton of things you can’t completely predict when it comes to the growth, responsiveness and success of your IT infrastructure. But one that you can bet on, if you’re going to keep pace with change and become or remain a highly efficient and […]
Featured Article
From the experts | August 24, 2012 by Madeleine Lee
You want to get started on your Cloud roadmap, but with all of the options and opinions available it’s hard to determine exactly which approach is best for your organization. You have read white papers, blogs, newsletters, tweets and articles all explaining different approaches to: IaaS, SaaS, PaaS, hybrid cloud, private cloud, migrating to the […]
Featured Article
From the experts | August 17, 2012 by Emily A. Davidson
Presenting Softchoice’s Top 6 backup challenges brought on by the virtualization revolution. Few who’ve seen virtualization implemented in their organizations would debate its benefits. Reduced costs, fewer physical servers, less IT admin time – what’s not to love? But as users rely more on virtual machines, protecting the virtual environment is becoming more critical and […]
Featured Article
From the experts | August 16, 2012 by Madeleine Lee
This is the third entry in a series about how Softchoice implemented BYOC. We hope you find the series interesting and look forward to your comments and thoughts on your experiences. As Madeleine’s blog series on Softchoice’s journey from Blackberry to BYOD is starting to wrap up, I’ve now started on a new journey considering whether Softchoice should expand BYOD […]
Featured Article
From the experts | August 14, 2012 by Melissa Alvares
Collaboration. There’s a million ways to do it, and a million ways to fail. Here are seven simple strategies to jumpstart your collaboration strategy and ensure your labors are fruitful. Related Posts Addressing Bring Your Own Technology How to implement a Bring Your Own Technology strategy is still one of the most rampant conversations we have […]
Featured Article
From the experts | July 27, 2012 by Melissa Alvares
Want to save time and money on your Windows 7 deployment? Virtualize!  If you’re a stalwart IT decision maker who stuck by Windows XP for the last decade, you’re finally coming face to face with the reality of a Windows 7 world. And you’re probably asking yourself: so how do I make the move? For […]
Featured Article
From the experts | July 27, 2012 by Madeleine Lee
Presenting Softchoice’s Top 6 backup challenges brought on by the virtualization revolution. Few who’ve seen virtualization implemented in their organizations would debate its benefits. Reduced costs, fewer physical servers, less IT admin time – what’s not to love? But as users rely more on virtual machines, protecting the virtual environment is becoming more critical and […]
Featured Article
From the experts | July 25, 2012 by Melissa Alvares
One approach to support multiple devices in a manageable and secure fashion is to leverage client virtualization. Our Softchoice Advisor Team asked Jon White, Solutions Architect for Client Virtualization here at Softchoice for his insights on helping customers understand the considerations involved. Softchoice Advisor:  What are the steps for building out a client virtualization strategy to […]
Featured Article
From the experts | July 25, 2012 by Lesley Morris
Security Information and Event Management (SIEM) solutions are a combination of SIM (security information management) and SEM (security event manager). Whatever the acronym used, these products provide real-time analysis of security alerts generated by network hardware and applications and log security data and generate reports for compliance purposes. SIEM plays a key role in helping secure […]
Featured Article
From the experts | July 25, 2012 by Lesley Morris
What are you going to get out of this blog? As technology advances, it is paramount that organizations capitalize on the potential efficiencies to be gained and both adapt and embrace change.  Over the past 20 years we have helped our clients optimize their existing infrastructures while integrating new technologies to help the business mitigate […]
Featured Article
From the experts | July 25, 2012 by Melissa Alvares
The right VDI security achieves the costs and efficiencies your enterprise is looking for. As server virtualization continues to go mainstream, achieving significant savings by optimizing resource utilization, many organizations are taking the lessons learned and benefits achieved and setting their sights on an even bigger challenge and opportunity: the desktop. Desktop virtualization – or VDI […]
Featured Article
From the experts | July 24, 2012 by Emily A. Davidson
You’ve decided to open up your organization to BYOD — so what’s next? Along with mobile devices comes the need for mobile apps. One question that constantly arises: Which of our business applications should be made available on a mobile platform? While common apps that employees use every day (like CRM) are solid contenders, not […]
Featured Article
From the experts | July 23, 2012 by Lesley Morris
Much like the human brain, the typical data center uses only a fraction of its potential, with servers running at about 10% of their actual capacity. Imagine if we could turn that number around! In this issue of the Advisor we highlight how virtualization is creating new opportunities to optimize the data center. Whether it’s […]
Featured Article
From the experts | July 16, 2012 by Emily A. Davidson
SAN’s and Storage Tiering: Difficult Situations Inspire Ingenious Solutions.   “We hold these truths to be self-evident, that all men are created equal…” – Thomas Jefferson, US Declaration of Independence  While it is self-evident people are created equal, it is also self-evident to IT professionals managing application infrastructure that not all data is created equal. In the […]
Featured Article
From the experts | July 16, 2012 by Emily A. Davidson
Most hear “server virtualization” and think: efficiency, ease of management, high availability and flexibility. But these benefits – the aim of sound IT planning – really only extend to the server (and in some cases application) layer. Administration, it turns out, is a whole other kettle of fish. That’s because the complexities of introducing server […]
Featured Article
From the experts | July 5, 2012 by David Davis
 So you’re sold on virtualization being the answer to controlling hardware costs in your organization’s long-awaited great Windows 7 implementation. But, you may be wondering, what about all my apps? In other words, you’ve found a resource-friendly way to implement Windows 7 but you worry that won’t amount to a hill of beans for users […]
Featured Article
 Virtualize first: The #1 rule for new IT applications.  There are a ton of things you can’t completely predict when it comes to the growth, responsiveness and success of your IT infrastructure. But one that you can bet on, if you’re going to keep pace with change and become or remain a highly efficient and […]
Featured Article
From the experts | June 22, 2012 by Madeleine Lee
BYOD embodies many requirements that stretch outside the traditional realm of IT including change management, policy development and program delivery. We recognize there’s a disconnect between business and IT as it relates to BYOD – and this is what we’re doing to help our clients navigate with the launch of the Softchoice Innovation Office. Related […]
Featured Article
From the experts | June 13, 2012 by Madeleine Lee
Open Systems Availability: Virtualization’s First Frontier What has been will be again, what has been done will be done again; there is nothing new under the sun… – Ancient proverb  Server virtualization has brought great advances in flexibility, efficiency and responsiveness to today’s always-on, web-enabled data centers.  Although that is what most people think today when […]
Featured Article
Another big buzz in the media again. Looks like there has been another dangerous vulnerability identified and rated a 10 for impact, and a 10 for exploitability. This is the threat we now know as the Shellshock Vulnerability. The major concern is that, if an attacker has the skill to craft a packet to take advantage of the vulnerability, they can inject code […]
Featured Article
From the experts | May 31, 2012 by Melissa Alvares
In today’s dynamic and ever changing IT landscape there is a lot of emphasis on purchasing technologies that do more with less, increase performance, and make existing approaches more efficient. Clients are turning to their trusted advisors and asking them to sift through all the stories, FUD and hype in the hopes that their solution […]
Featured Article
From the experts | May 30, 2012 by Joel Marans
The computer under your desk is a big, clunky thing with a lot of moving parts. And moving parts mean that, sooner or later, some of those parts are going to break. That’s why, realistically, the traditional desktop has a three- to five-year lifespan.  But the increasingly widespread adoption of virtualization and data centers is […]
Featured Article
From the experts | May 29, 2012 by Ben Abbey
While it’s true almost everyone is gung-ho about the benefits of virtualization these days, many organizations end up missing the boat on maximizing its greatest benefits – increased server utilization and consolidated workloads, lower energy costs, increased flexibility and easier system management.  Why? Maybe because they view virtualization as a magic bullet to solving all […]
Featured Article
From the experts | May 25, 2012 by Lesley Morris
The term “grok” first appeared in the 1961 Novel “Stranger In a Strange Land” by Robert Heinlein. It was used to describe the sensation of becoming one with the observed. In the technology world, it’s a term that describes when someone fully and completely understands something in all its details and intricacies. We thought the […]
Featured Article
From the experts | May 25, 2012 by Lesley Morris
Just Google BYOD (as of July 16, that 6,340,000 results and counting) and BAM! it’s clear the bring-your-own-device revolution is far more than just a trend. If you’re CIO hasn’t started quivering yet – whether it be from excitement or fear – take a look at some more staggering numbers: 95% of organizations allow employee-owned […]
Featured Article
From the experts | May 14, 2012 by Melissa Alvares
From rumors of cost savings, to greater employee satisfaction, to more productivity – the reasons for initiating a bring-your-own-device (BYOD) policy span far and wide. In the second addition to Softchoice’s BYOD Behind the Scenes Blog Series (read the first here), I wanted to explore exactly what triggered our decision to adopt a bring-your-own-device policy. […]
Featured Article
From the experts | May 13, 2012 by Lesley Morris
While it’s true almost everyone is gung-ho about the benefits of virtualization these days, many organizations end up missing the boat on maximizing its greatest benefits – increased server utilization and consolidated workloads, lower energy costs, increased flexibility and easier system management.  Why? Maybe because they view virtualization as a magic bullet to solving all […]
Featured Article
From the experts | May 8, 2012 by Lesley Morris
Employees today have more ways to communicate and collaborate than ever before, from desk phones and email to productivity apps in the cloud, instant messaging, video conferencing and smartphones. Many IT managers, however, are hesitant to invest in new collaboration technology, most claiming the tools they’ve already implemented to help employees work faster, smarter and […]
Featured Article
Storage always makes me think of the late, great George Carlin’s classic comedy routine about stuff. “Sometimes you’ve got to move, you’ve got to get a bigger house. Why? Too much stuff! You’ve got to move all your stuff. And maybe put some of your stuff in storage. Imagine that – there’s a whole industry […]
Featured Article
You’re an IT decision maker, and business continuity (BC) is an important component of your IT infrastructure. You understand that accidental or malicious data loss, unplanned system outages, user error, hardware theft or failure, power failure, software failure, fire, flood, earthquakes, landslides, hurricanes, tidal waves and tornadoes can blow your company’s data into oblivion. Have […]
Featured Article
From the experts | April 27, 2012 by Lesley Morris
Seasoned IT professionals remember dreaming of the potential of a dynamic datacenter. Constrained by platforms that allowed little flexibility, IT managers were forced to forecast, provision and spend on a per-system basis, which inevitably meant that some systems would be taxed while others sat dark. Dynamic datacenter architectures were the stuff of reverie. Well, not […]
Featured Article
From the experts | April 13, 2012 by Lesley Morris
This is the first in a series about how Softchoice implemented BYOC. We hope you find the series interesting and look forward to your comments and thoughts on your experiences. Like many other organizations, Softchoice is in the process of working our way through all the complexities of the Bring Your Own Computer (BYOC) revolution. We’re […]
Featured Article
From the experts | April 8, 2012 by Lesley Morris
Over 83% of endpoint infections come from hijacked websites. Have you ever seen those crazy popups that look like a real anti-virus program AntiVirus Plus, System Tools 2011 that look just like Windows Security Center?  This is some pretty nasty malware.  Why is this so successful?  These are the threats we discussed in previous posts.  […]
Featured Article
This article originally appeared on Stephen’s personal blog. You can visit it here. Don’t let the introduction scare you.This post is actually more appropriate for less technical readers who have had a computer failure and lost data. While on a recent business trip, the hard drive light on my laptop remained solid at all times. As […]
Featured Article
We offer Managed Print Services (MPS) solutions to our customers, but we’ve also experienced the benefits firsthand. Previously, our IT department was responsible for managing a large printer fleet spread across multiple offices. Managing, maintaining and supporting our print environment was a time-consuming task — one that took away from more strategic IT-related endeavors. We […]
Featured Article
From the experts | April 2, 2012 by Eric Gardiner
“Mission-critical” means that reliability can’t be compromised. The applications on which business users rely every day to generate revenue, service clients and keep the company operating need to be as close to bulletproof as possible. In pursuing this, many IT departments are forced to over-invest in infrastructure, constraining budgets and making other investments impossible (or […]
Featured Article
From the experts | March 30, 2012 by Ferrol Macon
Where would we be without computers, smartphones, music and video streaming? Likely, we’d still be using decade-old technologies like typewriters, landlines, CDs and DVDs. These newer products are prime examples of disruptive technology: exciting innovations that displace pre-established items, and drastically shake up the way we live, work, interact and communicate. Related Posts The Real […]
Featured Article
From the experts | March 30, 2012 by Ferrol Macon
There are a lot of differing opinions floating around these days about “Storage Tiering” and the different methods of achieving it. Before we get into some of the popular approaches you’ll read about, let’s talk about why tiering is important. The “need” for storage tiering stems from the fact that different types of drives have different performance […]
Featured Article
From the experts | March 29, 2012 by Lesley Morris
Open Systems Availability: Virtualization’s First Frontier What has been will be again, what has been done will be done again; there is nothing new under the sun… – Ancient proverb  Server virtualization has brought great advances in flexibility, efficiency and responsiveness to today’s always-on, web-enabled data centers.  Although that is what most people think today when […]
Featured Article
From the experts | March 16, 2012 by Emily A. Davidson
In 2014, cloud computing was still shifting into the enterprise mainstream. Back then, Softchoice commissioned a study that discovered North American workers were careless users. Specifically, employees who use cloud apps displayed markedly more reckless technology habits and were more likely to put their employers’ networks and corporate data at risk. Two years later, most organizations […]
Featured Article
From the experts | March 8, 2012 by Lesley Morris
“Mission-critical” means that reliability can’t be compromised. The applications on which business users rely every day to generate revenue, service clients and keep the company operating need to be as close to bulletproof as possible. In pursuing this, many IT departments are forced to over-invest in infrastructure, constraining budgets and making other investments impossible (or […]
Featured Article
From the experts | February 14, 2012 by Ferrol Macon
You’re storing more data than you need to. Cut the excess in your infrastructure, and you can benefit from efficiency gains, cost savings and budget that can be redeployed to high impact IT initiatives. All it takes is a little data deduplication. Lower the amount of data you store without sacrificing what you need, and […]
Featured Article
From the experts | February 10, 2012 by Emily A. Davidson
Not all tiers of storage are equal, especially when it comes to compliance. Optimize your storage architecture for regulatory obligations such as Sarbanes-Oxley, HIPAA and PCI, and you can recoup your compliance spend, make audits less painful and redeploy the savings to projects that have ROI potential. As with every aspect of your compliance efforts, […]
Featured Article
From the experts | January 10, 2012 by Emily A. Davidson
WAN optimization: the same network experience for all.  As virtualization and cloud computing drive more and more traffic over wide area networks (WANs), end users are expecting and demanding connectivity to access their applications from anywhere and any device, any time. This in spite of the fact that poor application response times at remote sites […]