Small business owners who are not already on board the “cloud” may be missing out on a great opportunity to improve their business operations as well as profitability. Cloud computing has changed the landscape of business dramatically in the past few years. In order to reap the most rewards from technological advances, it is important first for business owners to understand what they are dealing with and how new technologies can improve the functionality of their business.

Read more

As more and more people bring and use their own laptops, smartphone and tablet in office, the notion that company data is only on company computers and you can’t work without accessing them is slowly being eliminated. This of course vastly improve the productivity of the employees, however if the technology used by the company is outdated, whatever productivity gained is instead lost. At the same time, the increased mobility gained also open a can of worms – how do you ensure your data is safe and secured, and not accessible by unauthorized people?

We will be having a series that deal with productivity, mobility and security in the area of BYOD (Bring Your Own Device), how you can make the full use of BYOD in your company without being bogged down by them.

This week will be a continuation from one of our previous blogon the topic of IMAP vs POP3 email, and we will be looking at which one is best suited for BYOD environment.

Read more

As more and more people bring and use their own laptops, smartphone and tablet in office, the notion that company data is only on company computers and you can’t work without accessing them is slowly being eliminated. This of course vastly improve the productivity of the employees, however if the technology used by the company is outdated, whatever productivity gained is instead lost. At the same time, the increased mobility gained also open a can of worms – how do you ensure your data is safe and secured, and not accessible by unauthorized people?

We will be having a series that deal with productivity, mobility and security in the area of BYOD (Bring Your Own Device), how you can make the full use of BYOD in your company without being bogged down by them.

This week we will examine the 2 common email protocol which is the IMAP, POP3 and how they work to bring you email.

Read more

Backing up data to the cloud involves benefits unavailable with other options. Until the cloud existed, individuals and companies had limited choices for this vital responsibility. Available options often made this necessity a tedious and/or delayed process. This led to some people and organizations to overlook this important function.

Using a cloud backup system delivers multiple benefits and no major downsides. Among the benefits, the following typically are the most important to users.

Read more

When you open your email client (eg Outlook, Thunderbird etc) in the morning, is the first thought that goes through your mind “Let’s see what I need to take care for today?” which is then followed immediately by “Arg, so many junk email” when the streams of junk mail start flooding your mail?

Read more

Whenever we get into a discussion around recovery SLAs, it always starts with the customer saying the same thing. Terms like “immediately”, “ASAP”, and “yesterday” come up, to which we start the discussion of what’s truly attainable.

What’s attainable really revolves around what you want to invest in keeping a system running in the first place; if you truly can’t afford a system to go down, perhaps looking into redundant systems or virtualization should be on the table first. But, assuming you are more interested in just having as fast a recovery as possible instead, there are two factors to consider:

Read more

You already trust the planning, installation, configuration and support of your company’s servers, data and workstations to a trusted provider (hopefully us) and now you’re thinking about what to do with recovery.

You probably have a pretty good handle on it – you’ve invested in a tape system, have a tape rotation schedule, even use off-site tape storage. But you keep hearing about outsourcing and wonder what all the noise is about. Providers like us are pushing cloudbased backup & recovery – some (like us) even use terms like “hybrid cloud” and this is all very new and uncertain.

Read more

Confucius once said… “In the world there are many different roads but the destination is the same.” While we’re quite certain he wasn’t talking about backup and recovery of your workstations, servers and data, there is an application in there somewhere. There are many ways to provide backup of your most precious data and devices – and they all lead to the same destination – an ability to recover. But are they all the same?

Read more

Many businesses and companies rely on data, network and computing for their very survival. While this has become normal occurrence in today’s information age, the risk of losing important data could mean losing tens of thousands of dollars in an instant. Having an operational critical server breakdown could mean losing everything in the ever-changing game of business.

Read more

Nowadays, almost everyone relies on technology and the Internet. From online games to office work, almost anything and everything can be done using a computer. Many business establishments also rely on the computer by storing some of their most valuable records and information in their computers. Unfortunately, many companies and enterprises fail to recognize the importance of backing-up important files and records.

Read more