Selling Office 365 Working for an IT consulting firm who specializes in the Microsoft space, we tend to sell many of the MSFT apps and technologies….primarily in the SMB market….
Just Because it’s Not Broken Doesn’t Mean it Can’t be ‘Fixed’ I love it when a client uses the old adage ‘it’s not broken …” to which I finish the…
Outlook Anywhere & Continuous Login Prompts So, you’ve deployed Exchange 2010, secured it with Microsoft Forefront Threat Management Gateway (TMG) and want to take advantage of Outlook Anywhere. After enabling…
Protecting Layer 2 Using Cisco Best Practices The Data Link layer (Layer 2 of the OSI model) is used to transfer data between network entities with interoperability and interconnectivity to…
I CAN HAZ HARDWARE?! I think an oft overlooked part of an IT budget is the money allotted and committed to refreshing and replacing aging hardware. Users and clients usually…
Overlapping Sales Being in the sales game both as an individual contributor as well as a sales manager for the better part of 30 years, I’ve often found that you…
Building Business Trust – The Cores of Credibility This is my second blog on my series on Trust. Last month, I discussed the concept of extending trust and the trust…
The Tyranny of Low Price It is not typical for me to ‘resend’ a blog but this particular topic has been one that’s reared its head many, many times over…
2012 Top IT Initiatives Released in the May issue of InformationWeek, the Top IT Initiatives for 2012, see which of your organizations projects show up. 1. Improve security 2. Increase…