Sales: 678.967.3854
Support: 866.252.6363

by Chas Arnold, VP Sales and Marketing

Chas Arnold
Where is the personal computer headed? With the advances in cloud computing and software as a service (see previous blogs), the need for a traditional personal computer is decreasing. Personal computers with local software files and high capacity are being traded down for smaller computers with less power that retrieve data from a centralized server or datacenter- often called thin clients or “smart terminals”. Scaled down computers or thin clients are not as costly and can still provide the same user experience of a personal computer, just delivered a little differently. So what exactly are these smart terminals and should you jump on the downsizing bandwagon? What benefits are there and why trade up your flashy PC for a simpler version?

First things first…What is a thin client or smart terminal? It is a computer that relies on some other computer (like a server) to fulfill traditional computing roles. A thin client can be a stripped down PC with little to no software that talks to a server to get its files, email and applications. A thin client can also be a small box attached to the back of your monitor or a device you plug into a USB port on your computer. They need only have the bare bones to get you online, while the true computer is in a datacenter down the hall or in the next state.

So the important question, why use a thin client?

• Decreased cost
A traditional personal computer can cost upwards of $1000 before you even get to security, upgrades, and maintenance costs, while a thin client can be purchased for less than $200. Applications, security, upgrades and more can be purchased monthly using a cloud service or SaaS provider.

• Decreased maintenance
Instead of working on each personal computer separately, thin clients give IT personal the ability to globally maintain workstations, meaning they only have to perform upgrades and system maintenance once for all computers on the network.

• Reduced Consumption
Thin clients are a smaller footprint where the environment is concerned. They use less energy and take up less space on a desktop than a personal computer.

• Seamless User Experience
Thin clients are capable of delivering the same user experience as traditional PC’s. Depending on what your business is, there are varying levels of thin clients that can offer the same functionality including video, 3D graphics, and audio.

So if you just purchased a fleet of new desktops, thin client computing may not be your best bet. But for those who are looking to upgrade in the near future, tossing out the personal computer model may make a lot of sense.

by David Moorman, President


You already know allowing employees to telecommute can help the environment, reduce traffic congestion, increase your talent pool, and even increase employee satisfaction. So with all these benefits, why isn’t it more widely adopted? Common concerns include loss of control over employees, decreased productivity, or security risks. The good news is advances in technology are calming these fears in addition to making working remotely as seamless as working at the office.

Employers Fear Loss of Control
The word telecommuting can strike fear in the hearts of many managers. How will I keep tabs on my people? How will we stay connected? While telecommuting does require a certain amount of trust and a results oriented management approach rather than an observation based management approach, there are ways to monitor employees that work remotely. Many companies use live chat applications that denote idle versus active status allowing them to peek in on employee activity as well as chat in real time. Other companies may use a web portal to access applications needed for work and monitor employee login and log off records. And for the ultra conscious manager, company computers can be equipped with spyware-like agents for monitoring employee activity. Spyware isn’t just a hacker tool you know. And don’t forget about phone records; many voice over IP phone systems provide detailed call reporting so you know if your team is reaching out to prospects or just hitting the snooze alarm. While you may not be able to pop your head over the cube wall anymore, you can still check up on employees with simple monitoring tools.

Decrease in Productivity
Won’t my employees productivity suffer with extra distractions or inability to access work files as easily? You could make the argument that employees that work at home can easily find other things to do besides work, but isn’t it the same scenario at the office? Employees at the office can waste time just as easily between trading gossip at the water cooler, yacking at the photocopier or changing up their fantasy football players for Sunday night’s game.
On the point of access, advanced software as a service (SaaS) delivery methods deliver the same experience no matter where you are or which device you use. Easy access can even mean employees log on after-hours to finish emails after the kids go to bed, actually increasing productivity. Plus employees that telecommute can work during hours that would otherwise be spent in 400 traffic.

Telecommuting Introduces Security Risks

Some make a valid point when it comes to telecommuting introducing security threats. Wireless Internet cafes can breed wild virus and spyware issues, which is why employee education and security policy is a must. Teaching employees about such threats can mitigate risks while providing secure Internet access through personal air cards or Clear technology can close the gap. Creating web based portals and using cloud technology alleviates the risk of data falling into the wrong hands if a laptop is stolen. These technologies allow data to be saved centrally to the datacenter instead of having copies of sensitive data on local machines, making a stolen laptop a few hundred dollar loss instead of a few hundred thousand dollar loss.

Technologies like cloud computing, SaaS, VoIP, and more are giving employees freedom and management peace of mind. Work no longer has to be somewhere you go but something you do no matter where you happen to be. So what are you waiting for? Your fuzzy slippers are calling your name.

by David Moorman, President

Change can be a source of apprehension for a lot of businesses, especially when it comes to critical data you use to run your operations. New technology definitely meets resistance because it is unknown and not yet understood widely. Cloud computing is one of those technologies that business professionals fear, so I thought I’d dispel some of the myths associated with it.

My data won’t be as accessible in the cloud.
Some business professionals are uncomfortable with their servers and data being stored in the cloud. Without equipment physically at their office, they fear they won’t be able to get to their data when they need it. In reality, cloud computing is meant to maximize access to your data. Since your data is delivered over the Internet, you are no longer tied to any one physical machine. Any device that connects to the Internet is now your information highway. So whether you are at the office, home, or on the road you can still get to necessary files and applications.

My provider will be able to hold my data hostage.
Cloud computing is not a way that respectable providers are going to some how lock you into using their services. A reputable managed IT company is not going to deny you access to your information and should in fact have processes in place to transfer your data should you ever want to switch. Reputation is more important in the business of IT than wielding power over clients. Additionally, since the premise of cloud computing is to make your data more accessible, you can get to it whenever you want. Your data is literally at your fingertips, available from anywhere.

My data won’t be as secure in the cloud.

Having direct physical access to your equipment and data is what most companies are used to, but just because you can reach out and touch it doesn’t mean its safe. Having your data stored at your office can create a false sense of security. What if someone breaks in and steals your equipment or an employee tampers with it after hours? The cloud offers both physical and virtual security measures that may not be available to the typical SMB. Temperature control, fire suppression systems, around the clock monitoring, controlled access, enterprise firewall security, and virus protections are just a few of the features that come included with hosting your data in the cloud. Still unsure? Ask your provider for a tour of their data center facility to see exactly how they will treat your information.

Sharing physical resources in the cloud creates security issues.
The cloud often uses virtualization to accomplish high rates of uptime and to minimize the amount of physical equipment needed. Virtualizing means that many computers can be located on one physical machine. For example, instead of running one copy of Windows on your PC, with virtualization you could run two or three copies that all act as different PC’s on one physical machine. In the cloud, many companies share the same physical server but each company’s data is run on separate virtual servers. So what if that one server gets infected, won’t it spread to all virtual servers? Each virtual server has its own licensing, its own firewall, its own anti-virus software and so on. Just like two ships passing in the night, virtual servers run parallel but never touch.

Sharing physical resources in the cloud increases my risk of downtime.
With many companies running on one machine, you may be tempted to think the cloud is unstable. In a virtualized environment, if any one physical server crashes, all the virtual instances are easily moved to another resource so no downtime is experienced. Providers offering cloud computing should be able to give you the percentage of guaranteed uptime they offer. Additionally, if your business experiences a spike in credit card transactions, or an increase in the number of users accessing the network during certain times of the day or week, any available resources within the server farm are temporarily given to you and when you no longer need it, that bandwidth is reallocated somewhere else.

While converting your traditional network to one that utilizes the cloud can be daunting, it’s like any other new technology. You must evaluate the risks and benefits separating truth from irrational fears that may be based on the way you’ve always done things. The cloud is your friend--exploring its possibilities can offer huge time and cost savings.

by David Moorman, President


Many IT providers in the market today claim to offer “managed services,” and for rock bottom prices. But just what qualifies a provider’s service as a “managed IT service” and what distinguishes one managed IT provider from the next? According to Wikipedia, “Managed services is the practice of transferring day-to-day related management responsibility as a strategic method for improved effective and efficient operations. “ A good definition, but a lot of room for grey area.

In my time in the IT industry (over 20 years, wow I can’t believe its been that long) I have come across what we affectionately call in the business “trunk slammers”. A trunk slammer is often a small shop that offers IT services for low low prices and can sometimes go under the name of a managed service provider, hosting it all from the back of his, that’s right, trunk. Ok, in all seriousness they may not actually be working from their trunk, but they may not have the greatest equipment or practices in place when you consider the importance of your business data. It’s not hard to identify these knock-off managed service providers if you know the right questions to ask:

This first one might be easy, but how long have they been in business? Also, how long have they been offering this particular service? Did this company or service plan pop up over night or do they have a background to match their extensive offering? Often when new technologies hit the market, some providers are quick to add it to their menu without first testing and ensuring quality.

What equipment are they using? Along the same lines as above, make sure the company is using the latest hardware and software to provide these services, rather than scrambling to create a service built on a mishmash of what is in their server room.

What reporting do they provide? A true managed service company will offer you detailed reporting on the monitoring and management they provide. Reporting offers you insight into how much actual management they are doing.

Are they in it for the long term? A managed service provider should act as a trusted advisor and offer advice for both the short term and the long term, identifying your business goals and creating a plan so that IT helps you reach those goals.

What’s in the fine print? When comparing managed IT providers, compare apples to apples. Some providers leave off necessary services that come included in other plans. Similarly, things you may not need now like extra helpdesk support, or increased storage maybe charged at a premium outside of the contract, while other providers offer a service that is easily scalable.

So, the bottom line here? Not all managed services or providers are created equal, nor can they be compared on price alone. Asking the right questions up front can save you time, money, and hassle down the road.

by David Moorman, President

So you’re managing the company’s IT and trying to keep up with your own duties? One of the great things about working for a small or medium sized business is that you get to wear many hats, but it’s a double edged sword. Your knowledge of IT or the ability to lend a hand has helped you become an invaluable resource for the company, but as the company grows your main priorities suffer. Sound familiar?

The need to hire outside consultants is a fact of life in the small business. The good news is, outside consultants can offer huge value to your company, improve processes, allow you to focus on your primary responsibilities, plus save the company money over the long term.

Here are a few things to think about when considering making the switch to an outside provider:

Consultants Increase Productivity
Large companies have IT staff with specialists in each area – desktop support, server administration, infrastructure maintenance, application programming, web development and a host of other specialties. In an SMB environment, your focus should be on what you do best, allowing the experts to handle IT issues and strategy. This approach can help you get more accomplished without wasting time learning how to manage a secondary role, saving the company time and money.

Explore New IT Resources
When you have your primary job functions plus co-worker PC issues, you can hardly manage your day, let alone think about IT strategy. New technologies like virtualization, ERPs, or data mining can improve company processes and save money in the long term. Using a consultant frees you to focus on your job while experts handle the day-to-day and make recommendations on the latest technology.

So you’re sold, but what about your boss? Presenting the need for an IT partner is best explained in dollars and cents. DynaSis can help identify the true costs involved with managing your own IT and the value of an outside vendor.

by David Moorman, President


Many IT providers in the market today claim to offer “managed services,” and for rock bottom prices. But just what qualifies a provider’s service as a “managed IT service” and what distinguishes one managed IT provider from the next? According to Wikipedia, “Managed services is the practice of transferring day-to-day related management responsibility as a strategic method for improved effective and efficient operations. “ A good definition, but a lot of room for grey area.

In my time in the IT industry (over 20 years, wow I can’t believe its been that long) I have come across what we affectionately call in the business “trunk slammers”. A trunk slammer is often a small shop that offers IT services for low low prices and can sometimes go under the name of a managed service provider, hosting it all from the back of his, that’s right, trunk. Ok, in all seriousness they may not actually be working from their trunk, but they may not have the greatest equipment or practices in place when you consider the importance of your business data. It’s not hard to identify these knock-off managed service providers if you know the right questions to ask:

This first one might be easy, but how long have they been in business? Also, how long have they been offering this particular service? Did this company or service plan pop up over night or do they have a background to match their extensive offering? Often when new technologies hit the market, some providers are quick to add it to their menu without first testing and ensuring quality.

What equipment are they using? Along the same lines as above, make sure the company is using the latest hardware and software to provide these services, rather than scrambling to create a service built on a mishmash of what is in their server room.

What reporting do they provide? A true managed service company will offer you detailed reporting on the monitoring and management they provide. Reporting offers you insight into how much actual management they are doing.

Are they in it for the long term? A managed service provider should act as a trusted advisor and offer advice for both the short term and the long term, identifying your business goals and creating a plan so that IT helps you reach those goals.

What’s in the fine print? When comparing managed IT providers, compare apples to apples. Some providers leave off necessary services that come included in other plans. Similarly, things you may not need now like extra helpdesk support, or increased storage maybe charged at a premium outside of the contract, while other providers offer a service that is easily scalable.

So, the bottom line here? Not all managed services or providers are created equal, nor can they be compared on price alone. Asking the right questions up front can save you time, money, and hassle down the road.

by David Moorman, President

When implementing an IT solution, do you figure just hardware, software and manhour costs, or do you take it a step further and calculate the soft costs involved in a purchase, too?

You'd be wise to take the latter approach, because soft costs can add up quickly.

A managed IT solution (such as the one my company happens to market) can save small- and mid-sized businesses nearly 60% versus an internal IT department and 20% when compared to an outsourced solution. In fact, those savings may be on the conservative side because we tended to overstate actual costs.

In addition to those hard costs, there are other items that should be factored into the cost equation:

-- Downtime: Internal and outsourced IT systems will need to be brought down for periodic maintenance or may experience a catastrophic failure. A managed system can offer guaranteed up time, giving you peace of mind.

-- Spam:
Fighting spam can take up a considerable amount of time when the inevitable outbreak occurs. With an IT services contract, internal staff does not need to worry about it.

-- Systems training: While there may be some need for training in the managed services scenario, staff will not need nearly as much hardware- and software-specific training.

-- IT management: These costs are calculated as a percentage of infrastructure costs. Since overall infrastructure costs are lower, management costs will be lower, too.

-- Non-business Internet usage:
A managed solution allows you to control how employees surf the Web, decreasing productivity loss due to unnecessary Internet use.

While the hard costs savings seen when comparing a managed solution to internal or outsourced models are impressive, soft cost savings add up quickly also.

by David Moorman, President


Although you may not realize it, Software as a Service (SaaS) has become an important part of your business.
Salesforce.com pioneered the online software platform for customer relationship management, and all of Google’s offerings, from search and e-mail functionality to document storage and calendar functions, operate in a SaaS environment. If you check your e-mail through a Web site, that’s also a SaaS application.

But what about SaaS for centralized computing for your business? While that might sound scary at first, many small- and medium-sized businesses are moving to centralized computing with anywhere/anytime access as a way to help workers become more productive and to leverage critical business assets more effectively.

In smaller businesses, the owner or a trusted employee keeps the computers running along with attending to dozens of other duties. Larger companies may well have an IT director or even a small staff, but day-to-day maintenance and putting out inevitable fires arising from the help desk often take precedence over protecting a company’s critical business data.

As more companies become comfortable with the SaaS model, centralizing data center operations makes business sense and financial sense, too.

Here are three reasons why centralized data storage may be the answer for your business:

1. Your IT staff can spend more of their time performing value-added functions to expand business opportunities like data mining and analytics instead of manual computer updates.
2. Employees can work from anywhere there’s an Internet connection.
3. Centralized computing means less hardware and utility costs associated with a data storage room.

What’s more, virtually all software can operate in a SaaS environment, saving a company up to 50% of IT operating costs—not to mention cost savings on office rent through the need for fewer workstations (see previous column on hot desking).

Who could have imagined 15 years ago that any company hoping to stay in business needed a Web site? Likewise, centralized computing represents the next wave of IT functionality that could well separate the vibrant, profitable companies from the average.

by David Moorman, President


Its been said that you are only as strong as your weakest link, and so it goes with your network security. You may have the latest and greatest equipment and software guarding the gateway to your network, but all that means nothing if you don’t have an IT security policy in place that is being enforced.

A security policy includes details such as which websites are approved, and which should be blocked, as well as what kind of content or programs employees are allowed to download. Do they really need to download and install the latest version of Texas hold’em? Other points include the frequency of changing passwords and ensuring passwords are not written down or stored in obvious locations.

One quid pro quo to an IT security policy: it needs to be enforced. There is growing recognition among employers that, however much time and money they spend on ramping up their IT security, it counts for very little if they fail to change the practices and mindset of their workforce. Have employees sign an agreement so they are held accountable for their actions. In extreme cases, larger companies have even charged for damages done to business PC’s due to employee misuse or have adopted the policy of employees supplying their own personal computers. Employees may think twice if they’ve got skin in the game.

The moral of that story is clear: No matter how secure your network may be, it's only as secure as its weakest link. And people--meaning you and your employees--are often the weakest link. So get on the phone with your trusted IT advisor and start creating your detailed security plan today. You'll sleep better tonight.

by David Moorman, President


It’s 10:30 a.m. on a weekday. Do you know where your employees are?
According to workplace consulting firm DEGW, chances are that only 50% are in the office and that 30% are at their desks. The rest are teleworking, on sales calls, attending a conference, traveling, out on vacation, or otherwise occupied.

If you have a workstation for each employee, you may be missing out on an opportunity to save money on office space and computer hardware by “hot desking.” The name is adapted from a naval term called either “hot bunking” or “hot racking,” where sailors share limited bunk space because ships and submarines operate on a 24/7 schedule. Since one sailor gets up just before another lies down, the bed is still hot.

An increasingly mobile workforce and technological advances have made hot desking, also called location independent working, a viable option for many companies. Do your outside salespeople really need a workspace at the home office? Those employees likely can access company data remotely, making a physical connection at the office unnecessary.

Although the concept of hot desking dates to the late 1980s, the prevalence of Software-as-a-Service offerings, centralized data servers, and smart telephony solutions that don’t require a physical phone have combined to give the concept new life. If your company works on multiple shifts or has staff members who spend most of their time out of the office anyway, hot desking could save up to 30% on office rent.

In a managed services environment, employees can access any information they need from anywhere, eliminating the need for a dedicated workstation at the office. Of course, that begs the question of where an employee puts the photos of the spouse, the kids, the dog, or that prized boat.
But that’s what screensavers are for.

linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram