Research in Motion Research in Motion (RIM), the maker of Blackberry devices, once dominated the corporate smartphone market. They were able to offer convenience to users in the form of…
PEI Achieves VMware’s Rigorous new Competency: Virtualization of Business Critical Applications (VBCA) PEI, an IT consulting company out of Boulder, Colorado was recently awarded VMware’s new Virtualizing of Business Critical…
PEI & SoftwareONE Present: What’s New with Licensing for Microsoft Windows Server 2012 Webinar Date: August 28th Time: 10:00 am- 10:45 am MST RSVP: Jennifer.smith@pei.com The last few weeks have…
Top Five Benefits of Managed IT Services Computer systems form an integral part of most businesses these days which is why managed IT services are becoming an increasingly popular solution…
How I use Microsoft Lync I have been using Microsoft Lync and its predecessors OCS and OCS R2 for several years now. Initially a collegue of mine stepped into my…
Selling Office 365 Working for an IT consulting firm who specializes in the Microsoft space, we tend to sell many of the MSFT apps and technologies….primarily in the SMB market….
Just Because it’s Not Broken Doesn’t Mean it Can’t be ‘Fixed’ I love it when a client uses the old adage ‘it’s not broken …” to which I finish the…
Outlook Anywhere & Continuous Login Prompts So, you’ve deployed Exchange 2010, secured it with Microsoft Forefront Threat Management Gateway (TMG) and want to take advantage of Outlook Anywhere. After enabling…
Protecting Layer 2 Using Cisco Best Practices The Data Link layer (Layer 2 of the OSI model) is used to transfer data between network entities with interoperability and interconnectivity to…