Most Discussed Posts
How DevOps savvy is your organization?
The term DevOps has been bandied about for several years now, and while its meaning is open to debate, it’s basically a set of principles that help establish roles for developers and IT to build software in a continuous delivery...
VMware Cloud on AWS momentum starts to swell
Following a few early VMware missteps, it would appear that cloud momentum surrounding VMware, on the eve of the annual VMworld conference next week, is finally starting to increase. A survey of 1,156 IT and business professionals published today by...
5 steps to adopting a cloud services model
Cloud computing has transformed the way companies do business. It’s no longer a solution for just enterprises, as it’s expected to exceed $270 billion by 2020 and 44 percent of the growth will come from small businesses. And it’s anticipated...
How RPA can help drive automation in legacy businesses
Increasingly, companies are looking for ways to automate repetitive internal processes, but most can’t simply rip and replace the systems that they have in place and go for the latest and greatest AI technologies. It’s simply too risky, disruptive, and...
Supply chain attacks on the rise
You’ve turned your client’s network into a virtual fortress. There are firewalls, double authentication protocols, an up-to-date patching regimen, and frequent pen-testing. You’ve pretty much eliminated the threat of hackers within your client’s critical network, right? Think again.
Your next hack could arrive by snail mail
When you think about getting hacked, you probably imagine hackers using stolen credentials, undertaking a phishing attack, or exploiting a vulnerability in your network. What you probably don’t expect is for them to come through the front door, and access...
Tech Time Warp: Was the Welchia Worm well-intended?
As the old saying goes, two wrongs don’t make a right — especially if the second “wrong” is a computer worm, albeit a benevolent one. In August 2003, hundreds of thousands of PCs were infected by the Blaster worm, which...
MSPs should start setting expectations for 5G wireless networking services now
The time when managed service providers (MSPs) will need to sit down with customers to have a serious conversation concerning the rollout of 5G wireless networks has arrived. While there’s already a massive amount of hype surrounding 5G networks, cities...
Why your MSP should eat its own dog food
Are you familiar with the phrase “Eat your own dog food?” I’ve sometimes heard it also referred to (more nicely!) as “Drink your own champagne”. It refers to the idea that you shouldn’t sell a product or solution to somebody...
Buy or die – long term prospecting
Recently, Managed Sales Pros has closed two new clients. What’s special about these engagements? Nothing, except that we’ve been pursuing both clients for around four years. The value of those clients totaled about 42,000 in MRR. A decent win, that...