Most Discussed Posts

How DevOps savvy is your organization?

How DevOps savvy is your organization?

The term DevOps has been bandied about for several years now, and while its meaning is open to debate, it’s basically a set of principles that help establish roles for developers and IT to build software in a continuous delivery...

/ August 28, 2019 / 1 Comment
VMware Cloud on AWS momentum starts to swell

VMware Cloud on AWS momentum starts to swell

Following a few early VMware missteps, it would appear that cloud momentum surrounding VMware, on the eve of the annual VMworld conference next week, is finally starting to increase. A survey of 1,156 IT and business professionals published today by...

/ August 22, 2019 / 1 Comment
5 steps to adopting a cloud services model

5 steps to adopting a cloud services model

Cloud computing has transformed the way companies do business. It’s no longer a solution for just enterprises, as it’s expected to exceed $270 billion by 2020 and 44 percent of the growth will come from small businesses. And it’s anticipated...

/ August 20, 2019 / 1 Comment
How RPA can help drive automation in legacy businesses

How RPA can help drive automation in legacy businesses

Increasingly, companies are looking for ways to automate repetitive internal processes, but most can’t simply rip and replace the systems that they have in place and go for the latest and greatest AI technologies. It’s simply too risky, disruptive, and...

/ August 19, 2019 / 1 Comment
Supply chain attacks on the rise

Supply chain attacks on the rise

You’ve turned your client’s network into a virtual fortress. There are firewalls, double authentication protocols, an up-to-date patching regimen, and frequent pen-testing. You’ve pretty much eliminated the threat of hackers within your client’s critical network, right? Think again.

/ August 14, 2019 / 1 Comment
Your next hack could arrive by snail mail

Your next hack could arrive by snail mail

When you think about getting hacked, you probably imagine hackers using stolen credentials, undertaking a phishing attack, or exploiting a vulnerability in your network. What you probably don’t expect is for them to come through the front door, and access...

/ August 9, 2019 / 1 Comment
Tech Time Warp: Was the Welchia Worm well-intended?

Tech Time Warp: Was the Welchia Worm well-intended?

As the old saying goes, two wrongs don’t make a right — especially if the second “wrong” is a computer worm, albeit a benevolent one. In August 2003, hundreds of thousands of PCs were infected by the Blaster worm, which...

/ August 9, 2019 / 1 Comment
MSPs should start setting expectations for 5G wireless networking services now

MSPs should start setting expectations for 5G wireless networking services now

The time when managed service providers (MSPs) will need to sit down with customers to have a serious conversation concerning the rollout of 5G wireless networks has arrived. While there’s already a massive amount of hype surrounding 5G networks, cities...

/ July 18, 2019 / 1 Comment
Why your MSP should eat its own dog food

Why your MSP should eat its own dog food

Are you familiar with the phrase “Eat your own dog food?” I’ve sometimes heard it also referred to (more nicely!) as “Drink your own champagne”. It refers to the idea that you shouldn’t sell a product or solution to somebody...

/ June 27, 2019 / 1 Comment
Buy or die – long term prospecting

Buy or die – long term prospecting

Recently, Managed Sales Pros has closed two new clients. What’s special about these engagements?  Nothing, except that we’ve been pursuing both clients for around four years. The value of those clients totaled about 42,000 in MRR. A decent win, that...

/ May 24, 2019 / 1 Comment