Connection Community https://community.connection.com/ Official Technology Community of Connection Thu, 21 Nov 2024 11:01:21 +0000 hourly 1 https://wordpress.org/?v=6.7.1 Cyber Threats in Education and What to Do... https://community.connection.com/cyber-threats-in-education-and-what-to-do-about-them/ Nov 21, 2024 Pam Aulakh https://community.connection.com/author/pam-aulakh/ https://community.connection.com/wp-content/uploads/2024/11/2856377-Cyberthreats-Education-BLOG.jpg

The top target for ransomware attacks isn’t the healthcare industry or the critical infrastructure as many may assume. It is education, particularly K–12 institutions. Different studies found a dramatic increase in the number of attacks against schools, jumping from 129 in 2022 to 265 in 2023.1,2

The education sector is a data treasure trove of personal information belonging to students, educators, parents, and alumni—ranging from Social Security numbers to credit cards numbers. The PII of children is especially attractive to threat actors because no one is running credit checks or using that information until they want a driver’s license or try to rent an apartment after graduating. By then, unfortunately, their identity could be compromised an untold number of times.

The Reasons Behind the Rise in Cyberattacks against Schools

The vast amount of valuable data is why schools have shot up to number one on threat actors’ target lists, but it isn’t the only reason why education is seeing an increase in cyberattacks.

There is a greater reliance on technology even for the youngest children. Students are given computers and tablets to use both in school and at home—adding thousands of devices to the network and thousands of users who are untrained in basic cybersecurity hygiene.

School districts also traditionally have understaffed IT and cybersecurity teams, often spread out across different schools. Many have an aging infrastructure, poorly equipped to handle the more sophisticated and faster technology used by students and faculty.

Today’s school children live online, and threat actors know it. Social engineering tactics lure kids to watch videos on YouTube or TikTok and phishing emails lure them into making mistakes that launch malware into the school network.

Should Schools Pay Ransomware Payments?

Nearly half of schools hit by ransomware have paid to recover their data.3 But should they?

No, say the FBI and CISA. Payment doesn’t guarantee data will be released, and threat actors are increasingly holding data for multiple ransoms even after they are paid. There is also concern of subsequent ransomware attacks if the threat actors know they’ll get paid.

However, because of the nature of the data that is stolen, there are many district administrators who think the chance of recovery is worth the payment.

Educational Institutions Respond

Thanks to a number of government resources available, schools have access to the information needed to respond to cyber threats.4 This includes:

  • User cybersecurity education for all levels. There should be regular security awareness training for teachers and staff. In the classrooms, children should have grade-appropriate education about what they should and should not do on their devices.
  • End point protection. All devices and applications should require MFA or biometric authentication. Cybersecurity software that offers secure gateways, firewalls, and cloud security should be available.
  • Third-party services. Using MSSPs to manage the infrastructure and security issues like updates and patches covers the gaps of a small IT staff.

Addressing Security in the Age of AI

AI is creating new security risks for education, and school leaders are unsure how to address the increased use of generative AI by students and faculty. They aren’t alone; all industries are grappling with how to use AI in secure ways, but education is the only industry where the majority of users are under 18. How to handle privacy concerns or misinformation in generative AI is something that will need to become a top issue as schools continue to discuss their overall cybersecurity plans.

Cyberattacks are on the rise in the education sector, targeting the most vulnerable members of society. Schools must take greater steps to address the threats, as well as the immediate and future impacts of a data breach on students. 

How Connection Can Help

Connection is your partner for cybersecurity solutions and services. From hardware and software to consulting and customized solutions, we’re leading the way in education cybersecurity and solutions. 

Explore our Solutions and Services

Cybersecurity

K-12 Education Technology

Modern Infrastructure

Reach out to one of our Connection experts today:

Contact Us
1.800.998.0067

___

  1. Sophos, The State of Ransomware in Education 2023
  2. ThreatDown, 2024 State of Ransomware in Education: 92% Spike in K-12 Attacks
  3. K12 Dive, Nearly Half of K-12 Providers Hit by Ransomware Paid to Have Data Restored
  4. REMS, Cybersecurity Preparedness for K-12 Schools and Institutions of Higher Education

]]>
TechSperience Episode 130: AI in... https://community.connection.com/techsperience-episode-130-ai-in-manufacturing-productivity-at-the-point-of-use/ Nov 20, 2024 Connection https://community.connection.com/author/connection/ https://community.connection.com/wp-content/uploads/2024/11/2846925-TechSperience-AIManufacturingProductivity-BLOG.jpg

Manufacturing is undergoing a quiet transformation as AI becomes embedded across the industry, often without companies fully realizing it. Despite abundant data, many manufacturers are missing chances to boost productivity and quality control. With mature tools like Vision AI gaining traction, the future of manufacturing will rely on intelligent automation, edge computing, and AI as a workforce enhancer rather than a replacement.

In this episode, we delve into the current and future role of AI in manufacturing, highlighting practical applications and the impact on efficiency. We’ll cover how manufacturers can better leverage data, embrace embedded AI, and foster collaboration to successfully implement AI solutions, emphasizing the importance of continuous learning in this evolving space.

Host:

James Hilliard

Guests:

Ryan Spurr, Senior Manufacturing Strategy and Business Development Director at Connection

Jeff Minushkin, VP Helix Core Engineering

Show Notes:

00:00 Introduction to AI in Manufacturing
02:52 Current State of AI Adoption in Manufacturing
06:05 The Future of AI: Trends and Innovations
09:03 Identifying Wins: Productivity and Quality Control
11:51 Technological Changes on the Horizon
14:47 Impact on Workforce: Operators, Engineers, and Managers
20:50 Engagement Process: From Strategy to Execution
26:57 The Path Forward with AI in Manufacturing

]]>
Understanding the Impact of SQL Server 2022... https://community.connection.com/understanding-the-impact-of-sql-server-2022-licensing-changes-and-how-connection-sam-services-can-help/ Nov 19, 2024 Seth Mitchell https://community.connection.com/author/seth-mitchell/ https://community.connection.com/wp-content/uploads/2024/11/2852223-Microsoft-SQL-Server-BLOG.jpg

In November 2022, Microsoft quietly implemented significant changes to their SQL Server licensing rules, particularly affecting virtual SQL servers. These updates, including a notable price increase and new requirements for Software Assurance (SA) for virtual environments, could have a profound impact on your organization’s IT budget and strategy. As IT executives, it’s crucial to stay informed about these changes and understand how they affect your licensing and compliance landscape. This blog aims to provide an overview of the licensing changes introduced with SQL Server 2022 and how Connection SAM services can support you in navigating these updates.

Key Licensing Attributes for SQL Server 2022

1. Price Increase: Effective January 2023, Microsoft implemented a 10% price increase for SQL Server licensing. The price hike is reflective of the added value and enhanced capabilities of SQL Server 2022, but it also means that organizations need to budget for higher licensing costs. This change underscores the importance of evaluating the total cost of ownership and the benefits provided by the new features and improvements in SQL Server 2022.

2. New Requirements for Virtual SQL Servers: One of the most impactful changes with SQL Server 2022 is the new requirement for Software Assurance (SA) for virtual SQL server environments. Previously, organizations could deploy SQL Server on virtual machines without necessarily needing SA. However, with the new rules, virtual deployments now require SA to be compliant.

3. Per Core Licensing Model: SQL Server 2022 continues to use the Per Core licensing model as an option. The per-core licensing model ensures that customers pay for the actual computing power they use, providing a fair and scalable approach to licensing. This consistency across different deployment environments simplifies the licensing process and helps organizations manage their licensing costs more effectively.

Enhanced Benefits with Software Assurance

With Software Assurance (SA) or subscription licenses, SQL Server customers unlock a range of valuable benefits. These benefits include the Azure Hybrid Benefit, which allows customers to use their existing SQL Server licenses for Azure deployments at a reduced cost. Additionally, SA provides rights for failover servers, disaster recovery, high availability, and more—including now, of course, the option to license by virtual machine. These benefits enhance the overall value of SQL Server licensing and provide organizations with greater flexibility and cost-saving opportunities.

The updated SQL licensing terms reflect Microsoft’s commitment to providing flexible, cloud-centric, and sometimes cost-effective licensing options. The changes in virtual machine licensing and the price increase are designed to encourage the adoption of Software Assurance and/or subscription licenses. The continued use of the Per Core licensing model and the enhanced benefits of Software Assurance further support organizations in managing their licensing costs and maximizing the value of their SQL Server investments. As organizations transition to SQL Server 2022, it is essential to understand these changes and evaluate their impact on licensing strategies, budgets, and compliance efforts.

Navigating these significant changes can be daunting. Connection is here to help. Our team of highly seasoned experts specialize in helping organizations understand and comply with volume licensing metrics, ensuring that you are fully informed on the latest licensing rules. Our offerings include:

  • Assessment and Analysis: We provide a detailed assessment of your current SQL Server licensing and usage, identifying any gaps or areas where you may be at risk of non-compliance.
  • Strategy Development: Based on our analysis, we help you develop a licensing strategy that aligns with your organizational goals and budget, ensuring you can leverage the full benefits of SQL Server 2022.
  • Cost Optimization: We identify opportunities to optimize your licensing costs, such as utilizing the Azure Hybrid Benefit or adjusting your deployment models to maximize efficiency and reduce expenses.
  • Compliance Guidance: We assess your licensing strategy and consult on how to comply with Microsoft’s latest rules and regulations, providing peace of mind and avoiding potential legal and financial penalties.
  • Ongoing Support: Our extended Microsoft team offers ongoing support and guidance, keeping you updated on any future changes to SQL Server licensing and helping you adapt your strategy as needed.

Reach Out Today!

Our Connection SAM services are designed to provide you with the expertise and support you need to navigate these updates successfully. Contact us to learn more about how we can help you understand and comply with these new licensing requirements.

Let us help you turn these changes into opportunities for growth and efficiency. Together, we can ensure that your organization is well-prepared and fully compliant with the latest SQL Server licensing rules.

]]>
TechSperience Episode 129: Boosting... https://community.connection.com/techsperience-episode-129-boosting-workplace-productivity-with-embedded-ai/ Nov 14, 2024 Connection https://community.connection.com/author/connection/ https://community.connection.com/wp-content/uploads/2024/11/2857091-TechSperience-Workplace-Productivity-AI-BLOG.jpg

Embedded AI is revolutionizing industries by making advanced technology accessible to all organizations, driving innovation through applications like contract automation and proposal generation.

In this episode, we explore how our clients are leveraging embedded AI solutions and address key challenges, including ROI concerns and ethical considerations. Learn why it’s vital to start your AI journey today—and how Connection can help you stay ahead.

If you want to learn more about how Connection is helping its customers to improve productivity through AI Embedded AI, visit our online resources:
www.connection.com/solutions-services/artificial-intelligence
www.connection.com/solutions-services/digital-workspace

Speakers:

Brian Gatke – Vice President, GTM Solutions Strategy and Portfolio at Connection
Travis Cook – Director, Industry Solutions at Connection

Show Notes:

00:00 Introduction to AI Adoption Challenges
02:50 Understanding Embedded AI and Its Applications
06:06 The Democratization of AI
08:58 Navigating Hesitancy in AI Implementation
11:47 Exploring Use Cases for AI in Various Industries
15:09 The Importance of Clear Business Challenges
18:02 Ethical Considerations in AI Deployment
20:52 The Urgency of Getting Started with AI

]]>
The Importance of Embedded AI PCs in... https://community.connection.com/the-importance-of-embedded-ai-pcs-in-manufacturing/ Nov 05, 2024 James Rust https://community.connection.com/author/james-rust/ https://community.connection.com/wp-content/uploads/2024/10/2834040-ISG-Manufacturing-Embedded-AI-PCs-BLOG.jpg

When I worked at a smaller manufacturing operation, we migrated our ERP system from a program that resembled DOS to a cloud-based, modern-looking ERP that promised to have all kinds of new capabilities we would enjoy. Upon launching and utilizing it on the factory floor computers, the shipping department found that processing a single shipment in the new system took 20 extra minutes of computer work. The reason was simple—our infrastructure was not where it needed to be to handle this new software.

Hardware Requirements Can’t Be Neglected

The unfortunate truth is that this is not a rare occurrence. Software is only as good as the hardware it runs on. There’s no question that AI is the hottest topic in business these days, but like any software, it needs to be run on the proper hardware. Since the most familiar form of generative AI are public LLMs that can be run on practically any computer, it comes as a surprise to many that business AI use cases require powerful devices designed specifically for use with AI-powered software. That’s where embedded AI PCs come in.

Despite the name, embedded AI PCs do not usually come with AI applications installed. They are simply PCs (usually in a micro form factor) that are tailor-made to run AI-powered software and can quickly respond to input, making them crucial to certain operations. They can also be built to withstand the rugged conditions of any manufacturing environment.

AI has proven itself able to truly excel when given tasks involving pattern recognition, so most applications that yield good results are created with this in mind. Thus, it makes perfect sense that AI-powered camera vision can effectively perform quality control—it’s been trained that products must be a certain way, and anything that doesn’t conform to that pattern needs to be flagged. Even better, it can see these issues in real time during the production process, so manufacturers can easily determine when and where the defect was caused. If the same issues are popping up repeatedly, AI can also analyze the data and make process improvement recommendations.

 However, running this software with a traditional PC could mean it will take several minutes before a result is returned, and in a high throughput facility, this can be especially troublesome. For example, a quality control inspection performed by a human on a circuit board can take several minutes or even hours depending on the complexity of the product. AI programs running on hardware with the right processing power can utilize high-resolution cameras to check a board in under a minute, allowing for much faster processing and often more accurate test results. Such rapid testing means that it can also be done multiple times throughout the facility instead of one formal inspection at the end. The days of wasting precious time and resources on defective products that should have been pulled out five operations prior to final inspection can finally be over.

The Use Cases Are Limitless

Once you have hardware and software that can react quickly, the possibilities are endless—which can make it tough to know where to start. My advice is to tackle the persistent challenges in your business that are shared by most operations:  keeping your machines up and running and keeping automation reliable.

Factories have been aiming for true predictive maintenance for decades, but it’s been a very difficult challenge for most operations. However, once you’re equipped with devices that can quickly respond to machine conditions, the goal of zero breakdowns is within sight. Embedded AI PCs have the processing power needed to look at all your real-time factory data and immediately adjust machine operations to prevent errors and breakdowns. They can also automatically notify maintenance personnel of changing machine conditions so that repairs can be scheduled when the machine is not in use.

Considering that 76% of manufacturers are using automation in their factories, the value it can bring is undeniable. However, even simple automated operations can have errors and crashes because the machine is blindly following a program and will carry out those instructions regardless of the circumstances even when a human would know to stop. However, embedded AI PCs running your machines can adjust the program based on circumstances just the way a person would.

I once worked in a facility that involved a lot of liquid handling. Ultimately, all you needed to do was draw liquid from a source and dispense it in another location from a syringe-like container. This is extremely easy for anyone to do, but automated machines had issues due to variation in container size, container location, and several other factors. I spent days upon days fine tuning programs to handle all of the exceptions, but an embedded AI PC running the right software could have simply ran the basic program and seen “this is a different container, stop short of the container bottom and dispense liquid” or “the container is off center, adjust robot arm half an inch right,” and we could have run our operation with practically any variation. This same type of functionality can be applied to almost any operation that involves automation. All of this is only possible due to the near instantaneous reaction time offered by embedded AI PCs.

Don’t Go It Alone

If you’ve ever built your own computer, you know it can be frustrating and time-consuming making sure you have the right parts to run the software you need at a reasonable price, which is partially why prebuilt PCs have become so popular.

There’s no reason to add to the difficulty of implementing AI in your factory—that’s what Connection is here for. If you’re considering harnessing the power of AI on the manufacturing floor, engage our Manufacturing Practice today. We will make sure you have the right PCs for your specific use case so that everything will run as intended, and you can start reaping the benefits of this exciting new technology.

]]>
Boosting Cybersecurity for Schools and... https://community.connection.com/boosting-cybersecurity-for-schools-and-libraries-a-new-fcc-program/ Oct 22, 2024 Makayla Mota https://community.connection.com/author/makayla-mota/ https://community.connection.com/wp-content/uploads/2024/10/2823899-Boosting-Cybersecurity-for-Schools-Libraries-BLOG.jpg

In today’s digital world, cybersecurity is more important than ever—especially in schools and libraries. To help these institutions stay protected, the Federal Communications Commission (FCC) has launched an exciting new initiative. On June 6, 2024, the FCC approved a three-year Cybersecurity Pilot Program, which will provide up to $200 million in support to schools and libraries across the U.S. This funding will help cover the costs of cybersecurity services and equipment, ensuring that these vital community hubs are better protected from evolving online threats.

What Is the Cybersecurity Pilot Program?

This program strives to ensure that schools and libraries have the tools they need to safeguard their networks and data. Over the next three years, the FCC will assess how effective it is to use federal funding to boost cybersecurity in these settings, with the potential to make this support permanent in the future. The ultimate goal is to create safer digital spaces for students, educators, and library users.

Who Can Apply?

If you’re part of a K–12 school or a public library, you’re eligible to apply! The FCC is looking for institutions that are ready to invest in cybersecurity and work together to strengthen their defenses. Whether you're in a large school district or a small community library, there’s a place for you in this program.

Program Funding and Budget Caps

Here’s how the budget breaks down:

  • Schools and School Districts (S&SDs):
    • Up to $45,000 for those with fewer than 1,100 students.
    • $40.80 per student for districts with between 1,101 and 110,294 students.
    • A maximum of $4.5 million for districts with more than 110,294 students.
  • Libraries and Library Systems:
    • Up to $45,000 for individual libraries not part of a larger system.
    • $45,000 per library for systems with fewer than 12 locations.
    • A maximum of $525,000 for larger systems with 12 or more branches.

Participants can apply for reimbursements as they spend their allocated funds, giving them flexibility to meet immediate and future cybersecurity needs.

What Can You Spend It On?

The program covers a range of services and equipment, including:

  • Advanced firewalls
  • Endpoint protection (like antivirus and anti-ransomware software)
  • Identity protection and authentication
  • Monitoring and response systems

Microsoft Solutions for the Program

Many Microsoft solutions align closely with the eligible services and equipment defined by the program:

  • Advanced/Next-generation Firewalls
  • Azure Firewall: A cloud-native, scalable firewall service that provides features like threat intelligence-based filtering, network segmentation, and DDoS protection.
  • Microsoft Defender for Cloud: A comprehensive security management tool offering threat detection and prevention, integrated with cloud-delivered intelligence.
  • Endpoint Protection
  • Microsoft Defender for Endpoint: Provides enterprise-grade security for end-user devices, including advanced threat detection, anti-malware, anti-ransomware, and extended detection and response (XDR).
  • Microsoft Intune: Provides mobile device management (MDM) and application management (MAM) for protecting devices in K–12 and library environments.
  • Microsoft Purview Data Loss Prevention (DLP): Safeguards data on devices against potential leaks or misuse.
  • Identity Protection and Authentication
  • Azure Active Directory (Azure AD): Enables identity protection and access management with features like MFA, Single Sign-On (SSO), and identity governance.
  • Microsoft Entra: Offers identity and access management tools including Privileged Identity Management (PIM) and Zero Trust architectures.
  • Microsoft Defender for Identity: Monitors and protects against identity-related threats in on-premises environments.
  • Monitoring, Detection, and Response
  • Microsoft Sentinel: A cloud-native SIEM and SOAR solution offering real-time threat monitoring, detection, and automated response.
  • Microsoft Defender for Cloud: Provides continuous security posture management, vulnerability scanning, and compliance assessment.
  • Azure Security Center: Offers advanced monitoring, threat intelligence, and incident response across hybrid environments.

How to Apply

The application process happens in two parts. In Part 1, you’ll submit an overview of your cybersecurity project. If selected, Part 2 will ask for more detailed information about your plans and previous cybersecurity efforts. The FCC expects applications to open this fall, so now is the time to start preparing!

Selection Process

The FCC will work with the Universal Service Administrative Company (USAC) to choose a variety of projects, ensuring that both large and small, urban and rural schools and libraries are included, with a particular focus on low-income and Tribal communities.

Getting Ready

To make sure you’re prepared:

  • Stay updated by reviewing the program’s details and FCC announcements.
  • Double-check your institution’s registrations.
  • Assess your cybersecurity needs and start planning.

This pilot program represents a vital investment in the security of schools and libraries, helping to create a safe and secure digital environment for everyone who relies on these important community institutions. For more information and updates, visit the FCC’s Cybersecurity Pilot Program website.

How Can Connection Help?

Connection's cybersecurity services provide comprehensive assessment and testing solutions, including penetration testing, security audits, and vulnerability scans, to identify and address risks within IT environments. Our team is dedicated to ensuring organizations remain compliant and secure against potential cyber threats, with support from key partners like Microsoft. By leveraging Microsoft's advanced services, we enhance the security and resilience of your organization's infrastructure. For more information, visit us online.

]]>
TechSperience Episode 128: AI-Powered... https://community.connection.com/techsperience-episode-128-ai-powered-retail-balancing-innovation-and-security/ Oct 21, 2024 Connection https://community.connection.com/author/connection/ https://community.connection.com/wp-content/uploads/2024/10/2827021-TechSperience-AIPoweredRetail-BLOG.jpg

AI is transforming the retail landscape, offering unprecedented opportunities to enhance efficiency, personalize the customer experience, and optimize operations. But with these opportunities come new challenges.

In this episode, we explore how AI can empower employees, drive hyper-personalization, and revolutionize supply chain management. We also delve into the critical security risks associated with AI adoption and discuss how retailers can balance innovation with robust security measures.

Speakers:

Brian Gallagher, Connection Retail Strategy Director
Rai Basharat, Connection Senior Director Data Orchestration, Helix Center for Applied AI and Robotics

Show Notes:

00:00 Introduction to AI in Retail
03:08 Top Benefits of AI for Retail
05:59 Enhancing Customer Experience with AI
08:52 AI's Role in Employee Productivity
11:59 AI in Supply Chain Optimization
14:48 Security Implications of AI in Retail
18:00 Balancing Innovation and Security
21:06 The Future of AI in Retail
23:52 The Human-AI Relationship in Retail
26:48 Conclusion and Next Steps

]]>
Boosting Productivity with AI https://community.connection.com/boosting-productivity-with-ai/ Oct 17, 2024 Brian Gatke https://community.connection.com/author/brian-gatke/ https://community.connection.com/wp-content/uploads/2024/10/2821151-Blog-Boosting-Productivity-AI-BLOG.jpg

Artificial intelligence (AI) is transforming workplaces across industries—boosting employee productivity with embedded tools. While AI offers countless use cases, the key to success lies in identifying the right applications and overcoming challenges like data security and integration complexity.

AI is still making waves at work, and with good reason. Across all industries, AI tools are expected to ratchet up employee productivity by an estimated 40%. Embedded tools like Microsoft Copilot or Adobe Firefly are making the biggest and earliest digital splash, injecting new efficiencies without feeling like a heavy lift.

In fact, 77% of us already use AI at work, but because embedded tools can feel so non-invasive, only a third of us realize it. At the same time, the use cases are so widespread that implementing AI with ROI in mind can feel a bit like running through a generative maze.

To help us plot a course, I spoke with two experts in the field: Dan Ortiz, Director of the Digital Workspace Center of Excellence at Connection, and Chi Chung, Connection’s Director of Solution Architects.

A Flood of Use Cases

Creating new policies and directives for something as far-reaching as AI can be resource intensive. AI has literally hundreds, if not thousands, of use cases in business, including:

  • AI-powered customer service chatbots and virtual assistants that resolve issues 24/7
  • Data analysis algorithms that quickly uncover trends, patterns, and insights
  • Automation of routine tasks like data entry scheduling and email management that free up valuable employee time

To double-click just one of those, early adopters are already using AI chatbots to give level-zero responses that solve customer problems at the first touch. These chatbots can be incredibly robust thanks to the wealth of information many orgs have developed over time.

“The takeaway here,” says Ortiz, “is that there are so many use cases, it’s incredibly important to be intentional about how we move forward.”

1. Lay the Groundwork

Chung explains that any organization that wants to increase productivity with AI should start by asking one important question: What use cases will benefit us most?

“That’s really the key,” says Chung.

To get there, Ortiz recommends that organizations workshop their AI goals and benefits, creating an AI task force or committee that represents all the different functions of the company. “That task force should then identify potential benefits and outline the success criteria.”

From there, the task force should define a clear action plan and determine the criteria they’ll need to meet before they implement.

2. Identify the Challenges

The next big step in the shortest path to AI productivity gains is to spotlight the challenges that are in our way. Among the biggest are data security, data silos, and integration complexity.

  • Data security: It’s mission-critical to keep your organization’s data security in compliance with privacy regulations and guidelines, even as AI steps in to help.
  • Data silos: Data is stored in different systems in every organization. This can make it very hard for AI to see the bigger picture, hampering its insights and analysis.
  • Integration complexity: Integrating data from multiple sources is complex and often requires custom connectors or additional software, increasing complexity and the cost of integration.
  • Data quality and consistency: If you don't have good data hygiene, you can’t keep your data quality consistent across all your different platforms. This creates a garbage-in, garbage-out scenario, as Chung points out.

“Start by identifying the data sets that will help you reach your target level of success,” Ortiz says. “Then, thoughtfully align your AI efforts with the benefits you'd like to get.”

3. Choose Between Embedded vs Custom AI Solutions

The next important choice is deciding on the right AI solution. Embedded AI tools like Copilot and Firefly are ready-made to tackle a wide variety of real-world business situations. Other custom-made solutions can cost more and take time to develop, but offer tailored features.

Chung and Ortiz encourage stakeholders to complete a technical readiness assessment before they settle on a tool. Fully evaluate your team’s data hygiene, identity, governance, access posture, technology gaps, and how you’ll prepare your user community to use AI tools. Chung adds, “It’s often best to start with embedded AI, then baby-step your way into a custom solution, using APIs and adding tailored features.”

4. Where to Start

Any new venture as complex as boosting productivity with AI can be daunting. That’s why it’s best to start by talking to an AI expert. Professionals like Ortiz or Chung can help you pinpoint where you are in your AI journey, what you can achieve, and the fastest way to get there.

“Connection has the best SMEs in the industry,” says Ortiz, “and we’d love to talk to you. Let us know what’s on your mind and let us work for you.” With the right team on your side, realizing real productivity gains with AI isn’t as challenging as you might think.

To hear more from Ortiz and Chung about implementing AI solutions, you can watch the full webinar.

Explore our AI solutions and Digital Workspace services today by contacting an expert at 1.800.998.0067

]]>
Healthcare’s Data Governance Mandate and... https://community.connection.com/healthcares-data-governance-mandate-and-solutions/ Oct 16, 2024 Jennifer Johnson https://community.connection.com/author/jennifer-johnson/ https://community.connection.com/wp-content/uploads/2024/10/2816277-CSAM-Healthcares-Data-Governance-Mandate-and-Solutions-BLOG.jpg

Because of the vast amount of sensitive PII and financial data it holds, the healthcare industry is a frequent victim of hackers and other threat actors, driving the average cost of a healthcare breach to $10.93 million.1 Yet, it is also one of the biggest adopters of Internet of Things (IoT) devices, many which directly impact patient health and well-being.

For these reasons and others, the healthcare sector is subject to special compliance and data security requirements. The World Economic Forum reported that the healthcare industry produces approximately 30% of all data worldwide and that number is not only increasing but rising faster than any other industry.2,3 Much of that data is unstructured, making it more difficult to categorize and standardize, and, in turn, making governance practices more difficult to deploy.4 Without good governance practices and policies, it doesn’t just open up risks for the network and data, it also negatively impacts business operations and patient care.

Data Governance Requirements of Healthcare

In the healthcare sector, data governance centers around safeguarding patient information. Requirements for this data protection include implementing policies, risk assessments, and access controls for the following:

  • Health Insurance Portability and Accountability Act (HIPAA)—This is the best-known data compliance and governance mandate. Signed into law in 1996, its role is to protect sensitive health data and prevent disclosure to third parties without patient permission.
  • Personally Identifiable Information (PII)—PII is not necessarily covered under HIPAA compliance unless it is directly linked to healthcare information. Therefore, setting up security around PII falls under the Privacy Act and other federal, state, and local data privacy dictates.5
  • Patient safety—Data governance ensures that patient records are accurate and secure, which helps to reduce the risk of mistakes in patient care.
  • Beyond the hospital—There are many facets to healthcare, and data is shared across many networks, both in and out of a single healthcare system. Urgent care clinics, primary care practices, long-term care, specialists, and hospitals all need to work together to create a governance structure that allows patient data to be shared securely.

The Rise of IoT and Edge Applications in Healthcare

The healthcare industry uses IoT and edge applications to improve overall patient care. Medical professionals can use these devices and applications to monitor patient vital statistics remotely or to manage medications and treatments.

However, the hyperconnectivity of IoT devices comes with greater risk. Because of the value of the data in the healthcare sector, threat actors see IoT devices as an easy way to gain access to a network. And threat actors are getting in: the weekly average attacks against the healthcare sector is more than 2,000, an increase of 32% over a year ago. Ransomware, DDoS attacks, and data breaches are the most common threats to healthcare via IoT devices.6

IoT devices are vulnerable for a variety of reasons that include:

  • Outdated software, firmware, and operating systems
  • Weak passwords or not changing the default password
  • Lack of encryption across the device
  • Shared devices
  • Vulnerabilities built into the device or software

Best Practices for Data Governance and Data Security

To ensure healthcare data is safe and secure and that patients are able to get the best care, there are some best data governance practices to follow:

  • Hold regular user awareness training around data security and IoT device security.
  • Implement and enforce policies for a data governance framework.
  • Stay up to date with device and software updates and patches.
  • Deploy MFA and biometric authentication methods.
  • Modernize networks and infrastructure.

Data governance in healthcare has to be practiced at every level, from the CEO to the medical staff to the front desk receptionist. Without proper governance, patient data and security of the organization will be at risk.

How Connection Can Help

Connection is your partner for data security solutions and services. From hardware and software to consulting and customized solutions, we’re leading the way in data governance and solutions. 

Explore our Solutions and Services

Cybersecurity

Healthcare

Modern Infrastructure

Reach out to one of our security experts today: 1.800.998.0067

  1. IBM, Cost of a Data Breach Report 2024
  2. World Economic Forum, Data and trust: the two pillars of value-based healthcare
  3. IDC, The Digitization of the World from Edge to Core
  4. HealthTech, What Is the Role of Data Governance in Healthcare?
  5. U.S. General Services Administration, Rules and Policies – Protecting PII – Privacy Act

Industrial Cyber, CPR data reports 32% rise this year, as global healthcare sector faces surge in cyberattacks

]]>
Harnessing AI with NVIDIA: A... https://community.connection.com/harnessing-ai-with-nvidia-a-professionals-perspective/ Oct 15, 2024 Jennifer Johnson https://community.connection.com/author/jennifer-johnson/ https://community.connection.com/wp-content/uploads/2024/10/2811671-ISG-Healthcare-NVIDIA-AI-BLOG.jpg

I sat at a communal table with two colleagues on the lush grounds of the NVIDIA corporate campus, each of us enjoying lunch from one of their chef-curated culinary stations. Warm sun on our shoulders, we were mid agenda on the first day of our two-day AI training.

“We are sitting among the smartest minds in the world,” I said between bites. My colleagues quickly thanked me for celebrating their respective brain power before each of us laughed uproariously—our end of the table probably dropped the average NVIDIA corporate IQ by 20 points.

Much has been written about the storied career of founder and CEO Jensen Huang and NVIDIA’s evolution from gaming innovator to a driving force of all things AI. A darling of Wall Street, both a harbinger of what is and what is possible in this field of study, so much has been written about NVIDIA that anything I might say about the two days on their corporate campus seems reductive.

CRN Channel Chief, Craig Weinstein, NIVDIA’s Vice President America’s Partners Organization, opened our session by acknowledging the tenure in our group, reminding us of our shared experiences as IT professionals. He suggested that this training would be unlike anything we’ve experienced prior, and he was right. Led by their incredible team Stacey Lynar, Sr. Global Sales Enablement Manager; Rupali Deshpandi, AI Learning Specialist; and Dr. Sepi Seifzadeh, the training made me feel as though parts of my brain were building new neural pathways, replacing the parts that I reserve strictly for coffee. I returned to my hotel room each night, unable to do more than work on a sleep score of 99.

A score of 99 is NOT what I scored on the final NVIDIA exam, though the act of passing felt extraordinary. I proudly hold my AI Advisor sales certification from NVIDIA. Our channel team, John Fahmy, Sr. Partner Business Manager, and Michael Stys, Sr. Manager, Channels, had equipped us well with course requirements and pre-work that ensured our team of 26 was prepared.

It was once believed that humans only used 10% of our brains, an idea rooted in bogus science, now thoroughly de-bunked by better research and a deeper understanding of human neural networks. We use the totality of our brains, each part responsible for our thoughts and decisions, memories and emotions, movement, balance and coordination, perception of sensations, breathing, heartrate and sleep, organ function and language. Artificial neural networks built on data center-scale AI solutions use incredible compute power to harness information and data in ways that weren’t possible before, ways that the human brain can’t access on its own.

Cynics will say that the machines are coming to get us and point toward a dystopian future, but I’m taking a more optimistic point of view: responsible use of AI deployed by responsible humans. I’m encouraging my friends who have rising juniors and seniors in high school to pursue STEM careers with dual majors in liberal arts fields, pairing data scientist, artificial intelligence, machine learning, and engineering majors with linguistics, anthropology, psychology, sociology, English, and history degrees. We’re all going to need this pairing between oft-called “touchy-feely” majors alongside those that have STEM rigor.

As Connection’s Director of Healthcare, I’m often asked whether we’ll cure cancer in my lifetime. I’m not a doctor, and I defer to those who have selflessly dedicated their careers to the research and treatment of a disease that globally claims 10 million lives every year. I don’t know if we’ll cure cancer in my lifetime, but the computational power available to us, leveraged against decades of research, will bring us closer to better treatments that could include new drugs with fewer side effects. Whether we cure cancer or find ways to live quality lives with cancer because of new discoveries, I’m confident that artificial intelligence will play a role. We’ll need doctors and researchers, together with data scientists, to steward clinical and ethical efficacy.

In a field considered shiny and new by many, at the CNXN Helix Center for Applied AI and Robotics, we harness the unparalleled potential of advanced AI to craft tailored, efficient, and cost-effective solutions that drive our clients’ success. By converging the brightest minds in AI, we demystify the intricate landscape of artificial intelligence, guiding healthcare organizations through our vertical expertise and ensuring a seamless transition into the AI era. Our offerings include AI advisory services, AI skills development, data orchestration, infrastructure design and optimization, modeling, training and inference, kinetic bridging, machine learning operations (MLOps), and support management.

Connection’s healthcare practice brings maturity to the space as well: industry-leading partnerships, membership in the best healthcare IT consortia, and a deep understanding of the critical challenges facing payers, providers, and pharmaceutical and life-science organizations. With more than 20 years of healthcare industry experience and a team of healthcare-focused sales professionals, we’re an extension of partners like NVIDIA, helping our clients design, implement, and manage these highly technical solutions.

The time at NVIDIA, though brief, ignited my imagination in ways that few things have from a technology standpoint in years. I glimpsed a future where our healthcare providers have the data and insights that will allow them to serve their patients’ healthcare needs in new and curative ways.

To learn more about the work we are doing in the AI space, explore our AI Solutions and Services Healthcare Solutions and Services and check out the additional resources below:

]]>
Inspiring Future Innovators with Microsoft:... https://community.connection.com/inspiring-future-innovators-with-microsoft-technology-takes-flight-at-the-aviation-museum/ Oct 08, 2024 Raeann Bilow https://community.connection.com/author/reann-bilow/ https://community.connection.com/wp-content/uploads/2024/10/2806583-Aviation-Museum-BLOG.jpg

The combination of technology and hands-on learning in education can ignite creativity and inspire future innovators. This idea recently came to life through a collaboration between the Aviation Museum of New Hampshire, Connection, and Microsoft. The partnership led to an exciting summer camp program that blended fun with meaningful learning.

At the heart of the program was a challenge for students to recreate the Manchester-Boston Regional Airport in Minecraft. Using Microsoft Surface laptops donated by Connection, these young learners embarked on a journey of discovery, teamwork, and technology-driven exploration.

A Hands-On Aviation Adventure: Students Recreate Manchester-Boston Regional Airport in Minecraft

Flights of Discovery, a two-week educational summer aviation camp held at the Aviation Museum of New Hampshire, gives students aged 10 to 17 an exciting, hands-on learning experience. The program focuses on teaching aviation while developing crucial digital skills through teamwork.

Last summer, the campers participated in a unique project: building a digital replica of the Manchester-Boston Regional Airport in Minecraft. The camp’s focus was on both aviation knowledge and fostering critical skills like leadership, communication, and problem-solving.

Here's how the project unfolded:

Step 1: Airport Visit

A visit to the actual airport kicked off the project, where students explored behind-the-scenes operations, from the fire department to the air traffic control tower. They were also provided with maps, satellite images, and photographs to guide their designs. These real-world insights helped inform the virtual airport design.

Step 2: Team Formation

In each camp of 20 students, teams of five were created, with team leaders selected based on their experience with Minecraft. These leaders were responsible for teaching their teammates the basics of using the program, fostering a sense of responsibility and peer-to-peer learning.

Step 3: Project Assignment

Each group was assigned a specific area of the airport to replicate, including the main terminal, runway and signage, control tower and parking garage, Signature Flight building, Fixed Base Operator building, and the museum with private hangars.

Step 4: Technology-enhanced Collaboration

Using the 20 Microsoft Surface laptops donated by Connection, the students worked in separate rooms, managing their projects remotely and collaborating through a chain of command, similar to a professional work environment. This teamwork experience was invaluable, as it strengthened their technical skills while also enhancing their leadership, communication, and problem-solving abilities.

“The Microsoft Surface was fun to use to build the airport in Minecraft. I liked how updated and fast it was.”

–Camden Beard, student camper

Step 5: Building and Final Touches

Each group worked meticulously to build their section of the airport, block by block. Once the basic structures were complete, they focused on decorating the interiors, adding aircraft, and even assisting other teams with their tasks.

Step 6: Winner Chosen

The airport staff reviewed the completed renderings and selected the winning design. Here are the winning airport renderings:

Through the process, students demonstrated problem-solving skills, group management, and even some light programming and scripting to enhance their Minecraft creations. The project not only honed their technical abilities, but also emphasized the importance of teamwork and communication in achieving complex tasks.

“I really enjoyed the camp. Before this camp, I had very little knowledge and interest about aviation and space. After this camp, I’ve gained a lot of knowledge and interest about both subjects.”

–Kadyn Minnigh, student camper

Microsoft Surface 5 Laptops: Powering Hands-on Learning

Access to cutting-edge technology is essential for enhancing the modern learning experience. Microsoft Surface laptops not only aid in project completion, but also foster creativity, collaboration, and problem-solving skills—key components for success in today's world.

The 20 Microsoft Surface 5 laptops donated by Connection were instrumental in supporting hands-on learning at the camp. Their advanced features helped students reach their full potential, facilitating both education and encouraging creative teamwork among young learners.

Some of the key features that enhanced the learning experience include:

  • Touchscreen Display: Allows for intuitive interaction with Minecraft, making it easier for students to navigate, build, and manipulate their virtual airport designs.
  • Long Battery Life: Ensures students can work on their projects for extended periods without needing to recharge, enhancing productivity and minimizing disruptions.
  • Portability and Durability: The laptops’ lightweight and sturdy design enables easy movement between different work areas and withstands the rigors of daily use by energetic campers.
  • Processing Power and Memory: Adequate processing power and memory ensure smooth performance when running Minecraft and other collaboration tools, preventing lag or crashes that could hinder progress.
  • High-resolution Display: Provides clear visuals, allowing students to appreciate the details of their creations and collaborate effectively with their teammates. 
  • Collaboration Tools: Microsoft Surface laptops typically come with built-in software and features that facilitate collaboration, such as screen sharing, video conferencing, and document co-authoring. These tools can streamline communication and coordination among team members working on different aspects of the airport project.

“The Surface’s performance was a jack of all trades. It had a nice tactile keyboard and a great overall performance.”

–Brayden Beard, student camper

Taking Flight: Technology Empowering Future Aviation Leaders

The Aviation Museum’s summer camp provided students with invaluable skills in aviation, digital technology, and leadership, making it more than just an enjoyable experience. By the end of the program, students left with a sense of pride, having created something tangible that impressed industry professionals. The museum is already preparing for the 2025 Flights of Discovery program.

This success shows how thoughtfully integrated technology can transform education. The partnership between the Aviation Museum, Connection, and Microsoft created a learning environment that extended beyond the classroom, equipping students with the tools and confidence to excel in the future.

With technology as a driving force, the Aviation Museum is poised to inspire the next generation of aviation enthusiasts and digital innovators. From future camps to limitless educational initiatives, the possibilities for inspiring young minds are truly sky-high.

]]>
Key Considerations When Designing the Next... https://community.connection.com/key-considerations-when-designing-the-next-generation-of-patient-rooms/ Sep 26, 2024 Roxanna Guilford-Blake https://community.connection.com/author/roxanna-guildfordblake/ https://community.connection.com/wp-content/uploads/2024/09/2799538-Samsung-Health-Care_Blog-2.jpg

The digital transformation of healthcare has radically changed hospital design. At the heart of this transformation lies the patient room, the anchor of the hospital. Like the modern medical complex, the modern patient room is streamlined with integrated and automated digital display solutions that enhance clinical workflows while supporting patient engagement, satisfaction and safety. Here’s how.

Account for Integration

Dry-erase boards have, for decades, been a standard feature of most patient rooms. But these boards need to be updated manually every shift to include the names of everyone on the patient’s care team, as well as other pertinent information, such as dietary restrictions, medications, and discharge date. Over time, it’s easy for this handwritten information to go out of date and become illegible. Plus, having to constantly make these updates by hand takes staff away from important clinical tasks.

Today’s patient room now includes a digital whiteboard that updates automatically, drawing on information from the electronic health record (EHR) and shift assignment software. That means the care team, patients, and families will automatically get the most current information at the point of care.

Similarly, a real-time location system (RTLS) ensures that patients and their loved ones know which staff member has entered the patient room at any given time. Each clinician and employee will wear a badge that communicates with the healthcare TV, automatically displaying their name and role as they enter the room. An integrated RTLS also ensures that the right information goes to the right care team member at the right time.

Screens located above the bed behind the patient can simultaneously display information relevant to whichever team member is checking on them. Their nurse, for example, would see different information than the attending physician, respiratory tech, and dietitian.

Plan for Telepresence

Telehealth technology allows for better monitoring and easier access to care. Interactive displays in patient rooms, such as Samsung Interactive Pro, often support web cameras to facilitate virtual appointments, allowing caregivers to monitor patients remotely and still speak with them face-to-face. With connected diagnostics, clinicians can make accurate assessments over a video call. For patients who are fall risks, cameras can function as virtual bed rails, alerting the care team if they attempt to get out of bed alone. But in-room cameras and telehealth solutions aren’t only for dire situations: They allow for virtual family visits and real-time, interactive education sessions with patients and their caregivers before discharge, with support from language translation services if needed.

Support Patient Engagement

A digitally streamlined patient room doesn’t just support clinical workflows; it also enhances the patient experience. In addition to the welcome distraction the entertainment provides, the in-room TV can provide diagnostics, data, and other key information. Empowered with this knowledge, patients can experience less of the discomfort and anxiety many struggle with during a hospital stay. Entertained and engaged patients are less likely to call the nurses’ station. The reduction in stress may also foster more positive outcomes.

Patient rooms might also have bedside tablets, which they can use to view their records and prescriptions, see who’s on their care team, and communicate with nurses, doctors and other hospital staff. Rather than pushing the call button to ask for something simple like another blanket, patients can request these services directly from their tablets, so the nurses’ station no longer needs to work like a switchboard. This reduces the nurses’ administrative burden, eases alarm fatigue and allows them to work at the top of their license.

On the same tablet, an automated message can ask patients if their room is quiet enough for them to sleep and make the appropriate changes. Patients can also adjust the room’s temperature, lighting, and window shades with the touch of a button—all to create a better, more comfortable experience.

Think Beyond the Room

The patient room is just the beginning. Digital displays can improve clinical efficiency across the entire facility, such as in these use cases:

  • Nurses stations: Equipping nursing stations with large, centralized USB-C monitors provides efficient, all-in-one information dashboards. Because they require fewer cables, these monitors easily fit on nursing carts.
  • Outside the door: Smaller displays outside each patient room ensure that clinicians, staff, and visitors are informed of the patient’s dietary restrictions, relevant allergies, and preferred language, as well as all safety protocols required to enter the room.
  • Waiting rooms: Visitors can track their loved one’s status on an updated waiting room monitor. Uncertainty leads to questions: Are they still in the operating room? For how much longer? When these questions are answered promptly, the waiting room becomes a much less stressful place.
  • Wayfinding: Touchscreen maps show patients and visitors exactly where they need to go, avoiding frustration and freeing up busy hospital staff from the need to constantly repeat directions.
  • Marketing and development: Hospitals can install a microLED video wall to recognize donors and share brand stories.

Keep Design Front of Mind

Implementing these digital solutions will require not only adequate space but smart design. Hospital architects and engineers will need to make sure that every element works together seamlessly and is scalable because technology is constantly evolving. When digital displays are properly deployed and fully integrated, patients and their loved ones are more engaged and at ease, future-proofing high-quality service to patients for years to come.

Learn more about how digital displays are easing pain points and transforming clinician and patient experiences in our free guide. Also, discover the many ways healthcare TVs improve the patient experience.

]]>
Snapdragon-Powered Copilot+ PCs: Ushering in... https://community.connection.com/snapdragon-powered-copilot-pcs-ushering-in-a-new-era-of-ai-at-work/ Sep 19, 2024 Ashley Lofaro https://community.connection.com/author/ashley-lofaro/ https://community.connection.com/wp-content/uploads/2024/09/2740911-CopilotPC-Snapdragon-Blog.jpg

AI is rapidly changing the way we work, making processes more efficient and streamlined. Companies leverage AI to fuel innovation, enhance problem-solving, and stay ahead of the competition. Meanwhile, employees use AI to simplify tasks, increase their productivity, and make a bigger impact.

Forward-thinking leaders understand that a motivated, innovative workforce is crucial for success. To empower these individuals, it’s essential to provide them with the right tools—AI-powered PCs that unlock their full potential and enhance their productivity.

To thrive in this new era of AI-powered work, we need PCs that are up to the task. Copilot+ PCs, equipped with Snapdragon X Plus processors, are a new class of Windows 11 Pro Devices designed to meet this challenge. They offer advanced AI capabilities that accelerate innovation, solve problems faster, and drive significant business impact.

Beyond Burnout: Reinvigorating Work with AI-Powered Copilot+ PCs

The introduction of AI-powered PCs comes at a crucial time, as many employees are feeling overwhelmed by the demands of their jobs. In 2023, about 64% of workers reported experiencing burnout. Balancing productivity with personal and professional responsibilities has become increasingly challenging, leading to what many describe as ‘brain drain,’ which stifles innovation and strategic thinking.

AI-powered PCs are positioned as a solution to these challenges. By automating routine tasks, these devices allow users to focus on higher-value activities, enhancing both productivity and job satisfaction. With organizations increasingly adopting AI—71% have already done so—the impact is clear: for every $1 invested in AI, companies are seeing an average return of $3.50.

The key to succeeding in this new AI-powered work environment is having PCs that are equipped to rise to the occasion. Copilot+ PCs, equipped with Snapdragon X Plus processors, are built to meet this challenge head on.

The Snapdragon Difference: Key Advantages for Copilot+ Users

The Snapdragon X series is at the core of Copilot+ PCs, setting a new standard in AI computing with its innovative architecture and powerful performance capabilities. These devices offer advanced AI capabilities that deliver:

Superior Power and Efficiency

At the core of the Snapdragon X series lies its unparalleled processing power, particularly in its Neural Processing Units (NPUs). These NPUs are specifically designed for AI tasks, capable of executing 45 trillion operations per second (TOPS). This immense processing capability unlocks new AI-enhanced experiences in Windows 11 Pro and popular applications.

TOPS, a newly established metric, measures the total maximum achievable throughput for an NPU, highlighting the incredible power and speed of AI processing. To meet the demands of AI-driven applications, Copilot+ PCs must deliver at least 40 TOPS in NPU performance.

The Snapdragon X Elite platform sets a new benchmark with up to 4.5 times faster AI performance and NPU processing power compared to competitors, ensuring near-zero latency for AI-enhanced applications, including Microsoft Teams, Excel, PowerPoint, and unique Copilot+ features.

Beyond its AI capabilities, Snapdragon X Series processors also deliver unmatched central processing unit (CPU) performance and battery efficiency, making it the most powerful, intelligent, and efficient platform ever created for Windows 11 Pro in its class.

Multi-Day Battery Life

One of the standout features of Snapdragon-powered Copilot+ PCs is their multi-day battery life. By optimizing power consumption while maintaining high performance, these devices significantly reduce the need for frequent charging, with some devices lasting up to five days on a single charge.

This extended battery life offers greater flexibility and mobility, allowing users to work uninterrupted for days on end. This is particularly beneficial for professionals who are always on the move and require a reliable device that can keep up with their demanding schedules.

Personalized, Private Gen AI Experiences

The Snapdragon X Series advanced AI capabilities enable Copilot+ PCs to deliver personalized and private generative AI experiences. These features are designed to enhance productivity and creativity by allowing users to customize their work environment according to their specific needs.

Whether it’s automating routine tasks or assisting in complex creative endeavors, the Snapdragon X series ensures that these AI-driven experiences are powerful, efficient, and secure, safeguarding sensitive data without compromising on performance.

Lightning-fast 5G Connectivity

In a world where staying connected is crucial, the Snapdragon X Series offers lightning-fast 5G connectivity. This feature allows users to collaborate seamlessly and access cloud resources with ease, regardless of their location.

The high-speed connectivity ensures that productivity is maintained whether users are working remotely or on the go, making the Snapdragon X Series an ideal choice for today’s mobile and remote work environments.

Easy Deployment and Management

Snapdragon X Elite PCs are designed for effortless deployment and management, combining high-performance technology with streamlined IT visibility. Using tools like Windows Autopilot and Microsoft System Center Configuration Manager (SCCM), devices can be easily configured and managed from any location through cloud-based zero-touch provisioning.

The persistent 5G connection ensures that policy updates and software patches can be applied even when devices are out of Wi-Fi range or closed, simplifying compliance and maintaining security. Additionally, real-time telemetry provides deeper visibility and faster decision-making, giving IT teams enhanced control over their devices remotely.

Seamless Sharing

Collaboration is a cornerstone of modern workplaces, and the Snapdragon X series enhances this by making content sharing effortless. Whether it’s working on a presentation, sharing large files, or collaborating on complex projects, these processors support quick and seamless data transfer. This capability streamlines workflows, improves team efficiency, and makes collaboration across different platforms and locations more fluid and effective.

Enterprise-grade Security

Security is a critical concern in today’s digital landscape, and the Snapdragon X Series addresses this with robust chip-to-cloud protection. Copilot+ PCs, powered by Snapdragon processors, are equipped with advanced security features, including the Microsoft Pluton security processor embedded directly into the chip.

This comprehensive security framework detects potential threats, safeguards sensitive data, and ensures a swift recovery in the event of an attack. By integrating these advanced security measures directly into the hardware, the Snapdragon X Series provides peace of mind while maintaining cutting-edge performance.

Turbo-charged Apps

The Snapdragon X Series doesn’t just support AI tasks—it supercharges them. With access to hundreds of optimized Windows apps, users can fully leverage the capabilities of the Snapdragon X Series to maximize productivity and enhance the overall user experience. These apps are designed to run faster and more efficiently on Snapdragon-powered devices, providing an unparalleled computing experience that meets the demands of both work and play.

Embracing the Future of AI-Powered Computing

Copilot+ PCs, powered by the Snapdragon X Plus processor, bring the power of intelligent edge computing to your desktop, offering unique AI features on high-performance devices. Whether you lead a large enterprise or a small business, these PCs provide the most productive and rewarding Windows 11 Pro experience available today.

With support for Windows 10 ending in October 2025, now is the ideal time to upgrade to Copilot+ PCs. As technology continues to evolve, these AI-powered devices are poised to meet the challenges of the modern workplace, where we’re constantly asked to do more with less. The future of computing is here, and it’s powered by AI.

]]>
Securing IoT Devices, Tools, and... https://community.connection.com/securing-iot-devices-tools-and-manufacturing-data/ Sep 19, 2024 Ryan Spurr https://community.connection.com/author/ryan-spurr/ https://community.connection.com/wp-content/uploads/2024/09/2775136-Blog-Securing-Devices-Tools-Manufacturing-Data-BLOG.jpg

Manufacturing has made the digital transformation. The good news is that digital factories are more efficient and have better production levels because problems with machines can be identified and addressed in real time.

The downside of digital factories is they are susceptible to the same security concerns as other connected organizations. In fact, 25% of all global cybersecurity incidents occurred within the manufacturing industry, according to IBM’s X-Force Threat Intelligence Index 2024. Four in ten attacks in U.S. manufacturing were caused through the use of compromised credentials where cybercriminals used legitimate account access to get into factory systems.

Why are attacks against manufacturing on the rise? Where machines were once stand-alone devices, they now access information from the cloud and utilize AI. The number sensors, IoT and IIoT devices, and connected machines spread across a large manufacturing plant present an expanding threat landscape. Manufacturing is an industry that can afford little downtime, as it impacts the supply chain, and many factories are among the sectors that make up the critical infrastructure. Cybercriminals know they can demand—and receive—handsome financial payouts if they take machines offline.

Biggest Security Challenges

Even in a manufacturing environment, many of the security challenges faced are the same ones found in any other work environment. There are social engineering attacks, Web-based denial of service attacks, software supply chain attacks, and malware.

Shadow IT and a lack of skilled workers to handle IT and security in manufacturing is more acute than it is in other IT environments. A lack of security professionals trained to handle manufacturing means it is more difficult to detect and mitigate problems. Workers try to take matters into their own hands by using shadow IT to handle equipment failures, which can lead to undetected access into the system.

Securing data in manufacturing is another unique challenge. Threat actors and nation states see data compromise in two ways—disruption of the supply chain and theft of intellectual property. Increasingly, ransomware is responsible for the compromise and theft of manufacturing-based data. Already in 2024, approximately two-thirds of factories reported a ransomware attack, and most of these companies report that these attacks are targeting both primary and backup data sources.

Securing IoT, Tools, and Data in the Manufacturing Environment

Securing IoT devices, tools, and manufacturing data requires a comprehensive and layered approach. Here are some best practices for securing the smart factory:

  • Endpoint Protection: All IoT and IIoT devices need the latest firmware updates and least privilege authentication to prevent unauthorized access.
  • Network Security: Basic network security tools like firewalls, intrusion detection systems (IDSs), and virtual private networks (VPNs) protect data as it is transmitted between devices and systems. Additionally, Citizens Broadband Radio Service (CBRS) can be used to deploy private 5G, offering greater range of signal and more security than standard Wi-Fi by protecting IoT devices from unauthorized access.
  • Anomaly Detection: Machine learning and AI tools can help identify unusual behavior or patterns that could indicate a cyber incident.
  • Access Control Policies: Policies like least privilege permissions and tools that cover identity and access management limit who has access to IoT devices and data.
  • Real-time Monitoring and Alerts: Real-time monitoring and alert systems will quickly detect and respond to potential security threats.
  • Automated Threat Remediation: Automated threat remediation will address vulnerabilities and attacks efficiently.

However, one of the biggest problems with IoT and IIoT devices is that most can’t be upgraded or patched, so security teams need to find other methods to protect their assets. These can include:

  • Industrial asset discovery that focuses on vulnerabilities unique to this environment
  • Identification and ongoing monitoring of cybersecurity and compliance using our Managed Cybersecurity and Compliance Services
  • Putting a Zero Trust network assets architecture in place to give at-risk devices additional defenses
  • Use third-party remote access security solutions

With these security measures, manufacturing organizations offer high levels of layered security for IoT devices and data against cyberthreats. By minimizing risk, you can avoid costly downtime and production disruptions.

For more information on how to secure IoT in a manufacturing environment, visit our Modern Infrastructure and Cybersecurity webpages.

]]>
8 Steps for Securely Readying Your Data and... https://community.connection.com/8-steps-for-securely-readying-your-data-and-infrastructure-for-ai/ Sep 18, 2024 Connection https://community.connection.com/author/connection/ https://community.connection.com/wp-content/uploads/2024/09/2778140-8-Steps-for-AI-Prep-BLOG.jpg

AI has almost reached the point of becoming as ubiquitous to an organization’s IT system as cloud computing. In fact, a Microsoft study has found that three-quarters of knowledge workers (75%) use generative AI. If your employees aren’t already using a generative AI application now, they will be soon enough.

Because AI is only as good as the data used to train it, IT and security teams are faced with the challenge of ensuring the data is not only high quality, but secure and meets compliance regulations. And it isn’t just data that needs to be prepared for AI—the infrastructure needs to have the necessary components to manage and deploy AI systems efficiently and securely.  

To securely ready your data and infrastructure for AI, consider the following 8 steps:

  1. Conduct a Data Audit: Knowing what data you have and where it is located is the first step. Organize a full evaluation of your organization’s digital landscape, including every device and system where data is generated, transmitted and stored. This will include cloud infrastructures, IoT devices, and any social media or Web applications.
  2. Conduct an Infrastructure Audit: The second step is to know your infrastructure just as intimately. An audit or penetration test will help you find weak spots and vulnerabilities that could be exploited through AI systems. This will also help you set up zero-trust architecture.
  3. Data Quality Assessment and Classification: Once you have a complete view of your organization’s data, the next step is to assess its quality and classify the information. This involves establishing a data catalog through a robust, agile data intelligence/data management and integration solution. Key considerations in choosing the right solution include processes for data classification, normalization, and movement. Data quality assessments should focus on consistency, accuracy, completeness, uniqueness, and timeliness, allowing you to classify data into categories such as restricted, confidential, private, and public. Proper classification helps protect sensitive and proprietary information from being exposed or used in AI models.
  4. Data Cleansing: Because the data going into AI models needs to be as accurate and truthful as possible, it should be rid of any inaccuracies and inconsistencies. According to an Experian report, 85% of organizations said poor data quality has a negative impact on operational processes and efficiencies. With data cleansing, AI models are better informed to make unbiased decisions and streamline business operations for overall better performance.
  5. Data Governance and Compliance: Guidelines are needed to ensure data is used ethically and securely while remaining compliant with federal and industry regulations. This includes clear definitions of data ownership. Governance also includes data security measures such as encryption, access privileges, privacy policies, and endpoint protections. Because data governance over time has likely not been adhered to, the company should consider adding tools to proactively analyze data to identify sensitive information and taking actions including removal and data classification. These tools will ensure copies of data are tightly managed for access and removal once the purpose for the information is completed; this is especially important for those organizations that have development environments where data sets are often copied as part of the development process.
  6. Threat Modeling: Use threat modeling to identify potential risks and vulnerabilities in AI, and use that information to develop best security practices to assess threats and incident response plans across the infrastructure using AI. If exposed to poor quality and untrustworthy data, NIST warns that AI can fail, and there is an uptick in threat actors exploiting this problem. Threat modeling offers a layer of protection to vulnerabilities in AI models.
  7. Data Usage Security: Some of generative AI’s biggest security flaws are due to humans entering sensitive and proprietary information, not realizing that once in the AI model, it can be accessed by anyone. Organizations need to place tight controls over the data used in AI. AI security awareness training is also necessary.
  8. Continuous Monitoring: Preventive measures don’t stop once the AI model is running. Continuous monitoring will continue to look for potential threats before they become problems and identify areas where security measures can be made stronger.

How Connection Can Help

Connection is your partner for modern infrastructure, cybersecurity, and AI enablement solutions and services. From hardware and software to consulting and customized solutions, we’re leading the way in areas critical to success infrastructure modernization. 

Explore our Solutions and Services:
Artificial Intelligence
Cybersecurity
Modern Infrastructure

]]>
Connection and Fusion Connect: A Perfect... https://community.connection.com/connection-and-fusion-connect-a-perfect-union-for-microsoft-teams-calling-services/ Sep 17, 2024 Makayla Mota https://community.connection.com/author/makayla-mota/ https://community.connection.com/wp-content/uploads/2024/09/2771398-Connection-FusionConnect-MSTeams-BLOG-1.jpg

In today’s fast-paced business environment, seamless communication is the backbone of success. That’s why Connection has teamed up with Fusion Connect, a Morgan Stanley Company and industry-leading cloud communications provider, to bring you a powerful solution: Operator Connect for Microsoft Teams.

Transform Microsoft Teams into a Complete Business Phone System

With Connection and Fusion Connect, you can now make Microsoft Teams your primary phone system. This partnership empowers you to make and receive traditional phone calls on any device—whether it’s your PC, smartphone, tablet, or a Teams-enabled desk phone. Imagine having all your communication needs under one platform, turning Microsoft Teams into a fully integrated business phone system that goes beyond just messaging and video calls.

Why Choose Microsoft Teams with Operator Connect?

  • Reduce Costs: Forget about the expenses of managing and maintaining an onsite PBX system and desk phones. By consolidating everything into Microsoft Teams, you eliminate unnecessary costs.
  • Platform Consolidation: Eliminate redundant collaboration tools. With Operator Connect, you streamline communication channels, gain greater control, and reduce overall costs through one unified solution.
  • Improved Productivity: Leverage the full potential of the Microsoft 365 platform. Boost employee productivity and simplify communication across your organization with a system you’re already invested in.

Optimize Your Microsoft 365 Services with Operator Connect

Operator Connect, powered by Fusion Connect, goes beyond just basic calling. It’s designed to enhance your Microsoft 365 services by offering:

  • 100% Business Continuity: Fusion Connect ensures uninterrupted voice service, even if Teams service is temporarily unavailable, so your business remains operational no matter what.
  • Global Coverage: Enjoy access to phone numbers across the U.S., Canada, Mexico, and over a dozen European countries, with further expansion into Europe, Latin America, and Asia Pacific on the horizon.
  • Professional Implementation Support: Rest easy with professional support managing system configurations, technical training, and service activation, ensuring a smooth transition to your new phone system.
  • Simplified Administration: The user-friendly management portal simplifies the native Microsoft administration console, enabling admins to obtain new phone numbers and deploy new Teams seats in real-time.
  • Attendant Console: Empower selected employees to manage and route incoming calls, view colleague availability, set up call queues, and manage ongoing call statuses efficiently.
  • Call Recording: With policy-led, unlimited call recording and retention, your organization can maintain records of audio and video calls for compliance, training, or other purposes.
  • SMS/MMS for Teams: Native mobile messaging allows SMS/MMS text messaging to individuals and groups across various platforms, all directly integrated with Microsoft Teams. Communication has never been this versatile.

Why Connection and Fusion Connect Are Better Together

As a leader in providing smart, cutting-edge technology solutions for organizations of all sizes, Connection serves as an extension of our customers’ IT teams. This partnership combines Connection’s commitment to delivering innovative solutions with Fusion Connect’s expertise in cloud communications.

“By partnering with Fusion Connect, we have introduced a solution that transforms Microsoft Teams for our shared customers into a robust business communication platform. It’s great to see our clients take advantage of this collaboration to streamline their communication systems, cut expenses, and experience exceptional uptime. We’re honored to have Fusion Connect as a ‘powered by’ partner at Connection,” says Brian Gatke, VP GTM Solutions Strategy and Portfolio Development for Connection.

“We are excited about our partnership with Connection. Fusion Connect contributes deep Operator Connect expertise enabling customers to get the most value from their Microsoft investment,” adds Diane Frazzetta, VP Strategic Alliances at Fusion Connect. “Aligned with Connection, Fusion Connect makes the complex simple, allowing our customers to focus on what really matters, which is growing their business.”

Together, they provide an unmatched service that transforms Microsoft Teams into a robust business phone system, making your communication seamless, efficient, and cost-effective. Make the smart choice for your business communication needs. With Connection and Fusion Connect, Microsoft Teams becomes more than just a collaboration tool—it becomes your complete business phone system.

]]>
AI for Personalization, Support, and Loss... https://community.connection.com/ai-for-personalization-support-and-loss-prevention-in-retail/ Sep 12, 2024 Brian Gallagher https://community.connection.com/author/brian-gallagher/ https://community.connection.com/wp-content/uploads/2024/09/2782221-GTM-DW-RetailAI-BLOG.jpg

Retailers are among the early AI adopters, with giants like Walmart, Amazon, and Lowes seeing significant returns—and smaller organizations like Uniqlo and West Elm pioneering AI shopping. While many retailers remain hesitant to release AI applications directly to individual customers, the impact of AI on business can no longer be denied. This article examines AI’s benefits in the retail industry, along with the unique security risks and best practices retailers should consider when using AI tools.

The Benefits of AI for Retailers

AI promises to provide significant productivity improvements by cutting down on repetitive work, allowing employees to refocus their efforts on higher-value tasks. AI can forecast product demand, analyze consumer behavior, and detect fraud. The customer experience benefits from both AI personalization and improved business operations.

  • Personalized customer experience: AI solutions can recommend best-fit products to consumers based on their browsing history and preferences. Today, 78% of consumers are more loyal to brands that offer personalized shopping content like this, and 87% of organizations are using AI to improve their email marketing campaigns.
  • Customer support: Retailers today use AI to identify customer issues, route customers to the right support agent, and—in some cases—provide end-to-end support. For instance, passenger rights firm AirHelp improved their response times by 65% by using AI to route customer requests to the right support agent.
  • Loss prevention: AI tools can monitor real-time security camera feeds and flag suspicious activity for in-store personnel. They can also search transaction logs for potentially criminal transactions, such as frequent or identical high-value purchases. One leading retail chain realized a 30% reduction in shrinkage by using AI-enabled video surveillance.
  • Inventory management: Retailers are using AI to reduce out-of-stocks, analyze sales data, and draw insights about inventory. Walmart applies AI to substitute missing items for curbside pickup and delivery orders. Meanwhile, Amazon’s AI tools detect damaged items, pick and pack, and manage inventory more efficiently.
  • Supply chain management: AI can forecast demand, plan the most cost-effective routes and suppliers, and optimize communication between all links in the chain. Walmart uses AI to negotiate supplier contracts, extending payment terms and cutting costs.

Data Security Risks Specific to the Retail Industry

Retailers face significant security hazards from the large volumes of customer data managed in the industry. Intensifying these risks are bad actors that can manipulate and confuse AI systems, tricking them into sharing sensitive information.

  • Payment card data theft: Retailers are prime targets for hackers aiming to steal payment card data through point of sale (POS) systems or online transactions. Retailers who share payment details with AI tools risk having those tools tricked or compromised, exposing customer data.
  • Phishing: Offenders can target employees through phishing emails or social engineering tactics. Cybercriminals are using AI tools to improve their phishing efforts, and AI can be tricked with phishing-like scams.
  • Data breaches: Retailers can inadvertently expose customer information—such as names, addresses, and payment details. AI systems present another entry point for data breaches.
  • Supply chain vulnerabilities: Third-party vendors and suppliers with weaker security can provide easier access to customer data. Sharing AI systems or outputs with third parties can open organizations to added risk.
  • Compliance Issues: Failure to comply with data protection regulations (including GDPR or CCPA) can result in legal action and damage a company’s brand. AI can open organizations up to increased liability.

Retailers currently use encryption, secure payment gateways, regular security audits, and cybersecurity training to mitigate these risks. However, AI systems create new pathways for cybercriminals to access sensitive data. For example, criminals can ask an AI tool multiple legitimate questions, then use its replies to reverse-engineer an off-limits answer.

With the onrush of AI, 77% of businesses have already suffered AI-related breaches. In response, firms are developing new AI security strategies and policies to reduce their risks from AI.

AI in Retail FAQ

Here are answers to frequently asked questions about AI in retail for personalization, support, and loss prevention.

How can retailers create an AI customer journey?

Use common, visible customer data to create basic customer profiles. Augment these profiles with input from social media posts and online reviews. Then, ask AI to recommend process changes to improve the customer experience. AI can help retailers:

  • Decide which products to carry
  • Determine inventory levels
  • Simulate promotions and pricing
  • Create personalized messaging in emails, offers, and product descriptions
  • Chat with customers about your products and offer support
  • Monitor surveillance footage to notify employees of suspicious behavior

Where should a retail company start when implementing AI?

It’s best to start with a small project that can show early success. Document the results and publish them internally to gain buy-in for future projects.

How can a retail business identify AI opportunities?

Retailers can find use cases for AI in their organization by analyzing their customers’ pain points and their own internal challenges. Assess which ones are tied to existing, easily accessed and organized data troves—such as online reviews or net-promoter score (NPS) survey results. Then determine the issues that are currently handled by repetitive, automatable, non-value-added human labor—or aren’t addressed at all because the cost of labor would be prohibitive.

How can retailers protect customer data when using AI?

The best way to protect customer data is to share only common, currently visible data. If you do use AI to process private information, only share it with closed-loop AI tools that don’t store or share it with online libraries or other users. Be transparent with customers about the data you use and how you use it. And subject the outputs to human review, with the same level of control you apply to all customer information.

Get Started

Want to learn more about our suite of embedded AI products, services, and solutions to help your teams deploy AI at scale and improve their operational efficiency? Visit our Solutions and Services page today.

]]>
Connection Azure and Microsoft 365 Managed... https://community.connection.com/connection-azure-and-microsoft-365-managed-services-experts-supported-by-experts/ Sep 05, 2024 Patrick Renzi https://community.connection.com/author/patrick-renzi/ https://community.connection.com/wp-content/uploads/2024/08/2756771-Azure-M365-Managed-Services-BLOG.jpg

When you pick your Managed Services Provider (MSP) for business-critical systems, you want to make sure that the team supporting your business is the one best equipped to do so. An organization responsible for so much should be equipped with the best tools, the best systems, and, most of all, the best resources. After all, your MSP is responsible for ensuring that these deployments remain operationally available and stable for your end users and critical operations.

As a Microsoft designated Expert MSP, Connection’s Managed Services Practice is staffed to assist with the wide array of tasks that IT departments are responsible for within an organization. Our MSP resources are skilled in assisting with these operational day-to-day responsibilities, freeing up your team for more strategic goals. When the need arises, however, your environment is supported not only by your primary MSP resources but also Connection’s full staff of Senior and Principal level engineering resources, each equipped with specialized areas of expertise gained from years of experience working hands-on with these technologies.

As an example, a Connection client concerned that their backup and business continuity capabilities in Azure might not meet their updated RTO/RPO requirements engaged their MSP support team. This team had been maintaining the existing DR setup but recognized that a strategic review and design of a more robust solution might be necessary for the client’s evolving technological needs. The MSP team then engaged Connection’s Professional Services to assist in designing an enhanced disaster recovery strategy. This included the implementation of Azure Site Recovery (ASR) and a comprehensive testing plan to ensure the optimal path for recovering from an outage. By working closely together, the MSP and Professional Services teams modernized and optimized the client’s BCDR plan for rapid recovery.

Collaboration between these different service teams ensures strategic and efficient execution of all stages of your IT support structure, day-to-day management tasks, strategic planning, critical issue resolution, and execution of new system architecture. Integration within a services provider ensures that each aspect of your organization’s needs is being properly addressed. With these teams working side by side, the overall coverage that Connection’s MSP services provide your organization will best equip you regardless of the situation. This collaboration between MSP and Professional Services engineers translates into better overall outcomes for you and your business.

As IT business systems and cloud architecture deployments become more complex, ensuring that your Managed Services Provider is best prepared to support the ever-evolving needs of your business is critical. By choosing Connection’s Expert Microsoft 365 and Azure MSP services, your organization will be best equipped to handle the increasing complexities of modern technologies and cloud systems.

]]>
Federal Health IT Strategic Plan and Modern... https://community.connection.com/federal-health-it-strategic-plan-and-modern-infrastructure/ Sep 05, 2024 Jennifer Johnson https://community.connection.com/author/jennifer-johnson/ https://community.connection.com/wp-content/uploads/2024/08/2748171-Public-Policy-BLOG.jpg

This image was generated by AI.

In my first three Connected Blog posts in this series, The Federal Health IT Strategic Plan and Third Party Risk, Managed Services, and Artificial Intelligence, I examined how the ONC’s 2024-2030 Federal IT Strategic Plan provides the framework for how public and private organizations will optimize Healthcare IT priorities across the continuum of care. Public Comments on the plan closed May 28, 2024, and at the time of this blog publication, the final version of the plan was not yet available. In its final iteration, The Federal IT Strategic Plan will have lasting impact to each of us as consumers of healthcare and for the more than 22 million healthcare workers in the United States.

The four goals of the 2024-2030 plan are to:

  • Promote Health and Wellness
  • Enhance the Delivery and Experience of Care
  • Accelerate Research and Innovation
  • Connect the Health System with Health Data

In this final post in a four-part series, I’ll review how the Federal Health IT Strategic Plan intersects with public policy, governance, security, access, and data sharing.

Goal 4: Connect the Health System with Health Data

There’s broad agreement that patient data, with rigid privacy and security framework, should be shared for better patient outcomes. It’s through those more favorable outcomes that we impact the greater population. At scale, this is how our healthcare system is reformed such that the U.S. no longer spend $4.5 trillion in healthcare, roughly 17% of the US GDP. Certainly, the success and failure of the U.S. healthcare system can’t be pinned solely on the nuances of data sharing, but that it figures so prominently in the plan implies that in a best future-state, costs are mitigated and more importantly, lives are saved.

The plan goes into considerable detail supporting nationwide interoperability, and ensuring access in underserved communities that are often without the financial advantages to build these platforms. TEFCA, The Trusted Exchange Framework and Common Agreement, is the standard for “universal governance, policy and technical floor” for the future of electronic health information sharing. You can expect language such as “TEFCA certified” or “meets TEFCA requirements” to infiltrate healthcare IT vernacular as public and private sector organizations begin adopting this framework.

These systems, both as they exist today, and the architecture of the future aren’t built using an online configuration tool with a nifty ROI calculator attached. Modern infrastructure allows any healthcare or healthcare adjacent organization the tools and knowledge to build highly flexible, scalable, agile, secure IT environments that meet the challenges that will advance secure data sharing for health systems. Connection has deep technical expertise and takes a highly consultative approach to these challenges, co-developing solutions with our partners and customers. Learn more about how our modern infrastructure and data center solutions and services are empowering organizations like yours.

]]>
AI for Providers, Life Sciences, and Payers... https://community.connection.com/ai-for-providers-life-sciences-and-payers-in-healthcare/ Aug 27, 2024 Jennifer Johnson https://community.connection.com/author/jennifer-johnson/ https://community.connection.com/wp-content/uploads/2024/08/2733973-GTM-DW-AIinHC-BLOG.jpg

Between 2019 and 2022 alone, healthcare organizations saw a 22% increase in per-patient costs. As the demands and costs of healthcare ramp up, leaders on the forefront of change are meeting the challenges through artificial intelligence. AI can be everywhere at once, increasing productivity, documenting visits, managing claims, training, imaging, and even designing medications.

Despite the promise, AI is not a panacea. With lives (and quality of life) at stake, healthcare demands uniquely rigorous controls for data privacy, ethics, and diversity. Medical organizations face singular requirements to ensure robust encryption and security, conformity with HIPAA guidelines, and data leak prevention.

How Healthcare Organizations Are Already Seeing Returns from AI

AI has already shown impressive proficiency and efficiency at multiple levels of the healthcare industry, from imaging and reimbursement to searching records and drug development. Here are a few ways that AI is already in place:

Imaging Enhancement
AI excels at identifying complex patterns, making it particularly useful at spotting deviations in medical images that may not be visible to the human eye. Vision Transformer (ViT) architecture has already proven effective at identifying diseases such as Alzheimer’s, and clinicians at Lahey Hospital and Medical Center in Massachusetts are using an innovative AI system to diagnose stroke and other conditions.

Electronic Health Record (EHR) Search
AI can sift through massive data sets in the blink of an eye, delivering more relevant results than a typical semantic search engine that only looks for keywords. The Mayo Clinic has partnered with Google to implement a HIPAA-ready AI search app that sifts through patient EHRs to help clinicians diagnose disease and recommend treatment more quickly and effectively.

Reimbursement-related Communications
Reimbursement is one of the more time-consuming workflows in the healthcare sector. Communications centering on reimbursement are packed with “toil”—non value-added work that clogs processes and hampers productivity. Since many communications between payers and providers are repetitive, AI can add significant efficiencies. For instance, Schneck Medical Center in Indiana uses AI to reduce claim denials, eliminating time-consuming, repetitive renegotiation and communication.

Drug Development
The pharmaceutical industry is a front-runner in AI development. This sector has been digitizing their data at a breakneck pace for several years, and using AI to solve complex clinical problems from bench to bedside. AI is already being used to predict molecular structures, determine drug activity, design new molecules, predict reaction yields, toxicity, and bioactivity—and perform dozens of other time-intensive tasks. Models such as MoIGPT and MOLBERT have been developed to synthesize specific compounds and predict drug-target interactions.

Data Analytics
The healthcare business is drowning in data, with approximately 2,300 exabytes created every year. Multiple healthcare providers are using AI tools to manage and analyze their data troves, helping clinicians classify medical findings, make patient health predictions, and recommend treatments. Letting AI analyze patient data can take the burden off human healthcare teams, so they can devote more time to patient care.

Training Support
As healthcare organizations continue to upskill, AI is stepping in to help. GE Healthcare partnered with Microsoft in 2022 to develop an AI-assisted mixed reality (MR) tool that can train technicians to operate and maintain their MRI machines. AI can also recommend certifications and trainings to ensure that healthcare workers follow a career development path that best serves their needs and their employer’s.

Real-time Monitoring
Remote patient monitoring technology has been in place for more than a decade in the form of implantable cardiac monitors, glucose monitors, and other patient health tracking devices. However, valuable patient information often hides in the data glut produced by these healthcare IoT devices. Providers are now using AI to monitor and analyze this data to diagnose and flag patient conditions.

Special Considerations for Healthcare Organizations Implementing AI

Despite AI’s power to drive new productivity, a growing body of advanced research is urging caution. The healthcare industry faces unique requirements for data privacy, security, and compliance, along with special considerations surrounding ethics and diversity.

Data Privacy and Security
The average cost of a healthcare data breach was $4.76 million in 2023, and there were 725 breaches that year, for a staggering total cost of $3.45 billion. Fines, penalties, and lawsuit settlements for HIPAA violations snowball, underscoring the importance of security and data privacy. The U.S. Government Accountability Office (GAO) released a 2022 report to guide organizations in the implementation of AI in healthcare.

Ethics and Diversity
While AI excels at identifying and using patterns, those same patterns can get its users into trouble when they touch on sensitive patient information. A comprehensive review of generative AI in healthcare published by Cornell University advocated caution to prevent discrimination against patient populations

Compliance
The healthcare sector requires rigorous clinical validation to assure safety and reliability. Healthcare organizations can build compliance guidelines into emerging AI tools and processes to ensure adherence to current regulatory standards.

How Users in Healthcare Can Safeguard Data and Compliance for AI Applications

Healthcare organizations can protect data privacy and ensure compliance by implementing AI systems with strong encryption and compliance built-in, and by training employees on how to use AI tools ethically.

  • More robust encryption and security: Healthcare organizations may need to devote substantial resources to reduce the risk of patient data breaches.
  • Built-in HIPAA integration and ethics: Dedicated AI tools can be developed for specific healthcare use cases, with HIPAA readiness, ethical guidelines, and security designed into the tools.
  • AI training for employees: Healthcare staff can be trained in how to ethically use AI tools and the information they generate.
  • Regular audits: Leadership can schedule periodic assessments of AI systems to verify compliance with changing regulatory standards.
  • Ensuring transparency: Organizations can design transparent AI decision-making processes to build trust among clinicians and patients.

What’s Next for AI in Healthcare

No matter where AI takes us, one thing is clear: the healthcare industry has only breached the seal on what AI can do. From documenting patient visits, to triage, diagnosis, and supply-chain monitoring, AI is poised to realize a sea change in the medical world.

Need help deploying AI at scale in today’s rapidly evolving healthcare ecosystem? Learn more about AI through Connection or our services and solutions today!

]]>
Top AI Use Cases and How to Leverage Them... https://community.connection.com/top-ai-use-cases-and-how-to-leverage-them-for-productivity/ Aug 22, 2024 Dan Ortiz https://community.connection.com/author/dan-ortiz/ https://community.connection.com/wp-content/uploads/2024/08/2741260-GTM-DW-Wave-1X-vertical-Blog-BLOG.jpg

Organizations are entering a time of unprecedented disruption. Amid a growing talent shortage, 75% of CEOs are struggling to fill open roles—and they’re increasingly turning to AI to fill the gaps. AI tools can analyze vast amounts of data in real-time, draw insights, and make intelligent decisions by acting within parameters laid down by human leadership. More than 85% of organizations expect to build AI into their operations in the next five years.

To use AI to increase your company’s efficiency, don’t think of it as a way to replace entire jobs. Instead, map your processes to unearth toil—or manual, repetitive, automatable work that customers won’t eventually pay for.

For instance, let’s say you have a bookkeeper on your payroll who spends an hour each day categorizing expenses and looking for discrepancies. AI can easily replicate that workflow, freeing up your human employee’s time to work on higher-level tasks. AI can take over job duties like:

• Data entry
• Answering customer questions
• Resolving support issues
• Screening resumes
• Reviewing and summarizing documents
• Conducting research
• Generating reports
• Data manipulation

Here's a look at the most common AI use cases and how to leverage them for business productivity.

IT Automation

A 2023 report by the World Economic Forum revealed that 75% of organizations are struggling to retain skilled IT workers. As the pace of innovation and remote work increase, IT teams are drowning in a sea of toil.

To combat the crunch, companies are using AI to automate dozens of labor-intensive IT tasks, including system monitoring, anomaly detection, predictive maintenance, cybersecurity threat detection and response, network optimization, and IT service management. AI is also widely automating routine helpdesk inquiries through chatbots.

In a real-world example, commercial real estate firm CBRE was drowning in billions of data points from their worldwide operations, and IT teams were struggling to keep pace. They developed a comprehensive AI-driven data platform that enables advanced analytics, delivering deep insights that help them make more informed decisions and have improved their client service scores.

Product and Service Innovation

The creative process is clogged with time-consuming, repetitive tasks. Product and service development teams can improve their efficiency as much as 40% by leveraging AI.

A big part of any product manager’s job is sorting through mountains of company data to guide design teams. For example, what are customers saying about previous product versions? What features would your sales team like to see in the next release? What insights are hiding in your safety or security data that your engineers should be aware of? AI can make short work of this trove of information, accelerating the discovery process keeping designers from re-inventing the wheel.

Mastercard is using AI to innovate its payment resiliency. “In today’s world where the payment ecosystem is highly distributed and increasingly complex, it’s vital banks get the support they need to ensure card payments run seamlessly,” says Ajay Bhalla, President of Cyber and Intelligence at Mastercard. AI tools now make intelligent decisions to keep their card networks up and running longer, with fewer outages.

Infographic: Top Use Cases for AI

Fraud Detection and Cybersecurity

Cybercrime sets new records every year, with a projected cost of $10.5 trillion in 2025—almost half the size of the entire U.S. GDP. This staggering growth comes as an increasing share of world business is conducted online. One of the biggest reasons for the problem is a lack of resources, combined with the sheer size of the Internet—at roughly a trillion gigabytes and five billion users.

While human cybersecurity teams can’t begin to police an arena of this size, AI can be everywhere at once. AI can monitor networks in real-time with zero downtime, detect anomalies, and generate reports for human cybersecurity professionals. Global tech leader Siemens now uses AI to process 60,000 cyberthreats per second, taming their 300% increase in annual attacks. A team of less than twelve human cybersecurity experts manages their AI cyberthreat detection system.

Microsoft Copilot for Security can summarize incidents, perform impact analysis, reverse-engineer scripts, and conduct several otherwise time-consuming security tasks.

Automating Business Processes and Workflows

About 38% of organizations are already using AI to transform their business processes. Most organizations face the wastes of overproduction, excess inventory, defects, wasted motion, overprocessing, waiting, and unnecessary transportation. These are the wastes Taiichi Ohno and Shigeo Shingo famously attacked in the Toyota Production System. Some companies are turning to AI to help identify and remove those wastes. Financial service firm Credigy Solutions used AI to automate the due diligence reviews of their loan documents. Manufacturing company Horizon Global implemented an AI data entry system that raised their data entry accuracy to 99%, delivering a 20% decrease in processing waste.

How to Implement AI Automation

Building AI into existing business processes and workflows may seem like a daunting task, but organizations can reap massive rewards by starting small. 

  • Find the right AI use cases: Identify processes in your operations, workflows, and teams that are human-intensive, data-intensive, highly repetitive, and/or need natural language interaction. Data-first problems often have useful AI solutions.
  • Set objectives: Estimate measurable improvements and decide on project KPIs.
  • Select tools: Organizations can realize immediate benefits from AI with out-of-the-box tools like Copilot for Microsoft 365 and ChatGPT. These tools can assist with dozens of job functions, including automated data analysis and report generation in Excel, analyzing customer feedback, and fast data visualization.
  • Create safeguards: Build guardrails to prevent AI from leaking organizational data, such as screening or validation to ensure a custom GPT doesn’t reveal sensitive company information.
  • Start small: Define success in phases with bite-sized wins to show initial ROI.
  • Test and expand: Institute a continuous improvement process to support change-management plans, including employees via feedback loops.
  • Win buy-in: Ensure organization-wide buy-in and train your employees to use new AI tools. Include adoption management, with champions to support employees and ensure the tools are being used effectively.

Equip Your Teams to Leverage AI

Connection can help you decide on the most productive embedded AI solutions to deploy, and then smoothly integrate new AI technology and solutions into your workflows. We can also help:

• Power your teams to collaborate seamlessly across on-site, remote, and hybrid environments
• Create out-of-the-box experiences for end users without compromising quality and speed
• Implement advanced capabilities, responsiveness, and support that are second to none

Explore our AI solutions and Digital Workspace services today by contacting an expert at 1.800.998.0067

]]>
Creating a Policy for AI in Education https://community.connection.com/creating-a-policy-for-ai-in-education/ Aug 22, 2024 Makayla Mota https://community.connection.com/author/makayla-mota/ https://community.connection.com/wp-content/uploads/2024/08/2738449-AI-in-Education-BLOG.jpg

I spent many years as a Microsoft Learning Consultant training teachers and administrators on Microsoft tools and programs. Even in my current position as the Microsoft Partner Marketing Specialist at Connection, I occasionally get to visit schools to talk education with impassioned and impactful teachers, and I love it. Can you guess what topic gets brought up the most overall? Take a wild guess—it’s AI. Of course it’s AI! Is there anyone currently that does not have an opinion about AI in any industry? But when we are talking about the education system, it is an entirely different set of circumstances that often brings up a mixed bag of emotions. As we head into back-to-school season, the discussion around AI in education and classrooms is paramount to ensuring a successful year for school administrations, teachers, and students alike.

At the core of ethical AI use within education is a well-structured policy, which serves as a safeguard against potential biases in AI algorithms. When a policy is introduced prior to AI use, it ensures that AI technologies are used in ways that promote inclusivity and fairness, especially in educational settings. This policy not only sets expectations for the development and deployment of AI systems but also provides a basis for ongoing assessment and improvement, ensuring that AI continues to support equitable opportunities and positive outcomes for all students.

Addressing Fears and Misconceptions

Where do you start when creating a policy? The first step is addressing common fears and apprehensions around AI in the classroom. The common thread in the many conversations I have had with educators is the fear surrounding AI—namely that it will replace teachers, and students will cheat and stop learning the necessary reading and writing skills. Having open conversations with teachers and students on using AI as a tool rather than an end-all is key here. Educating teachers on the benefits of AI to simplify their work, create learning materials, grade student work, analyze data and trends, and brainstorm new content are just a few examples of learning to view AI as an assistant rather than a replacement.

Another genuine concern is digital equity. If schools prohibit the use of generative AI in classrooms or on school devices, students with personal devices and home access will continue to explore AI capabilities. In contrast, those who depend on school-issued devices will lag behind their peers in developing AI skills, which experts predict will be essential for the workforce in the near future. Teaching kids how to use AI responsibly in the classroom will set them up for success in a changing world. Ignoring or banning the use will only create confusion in the long run. Using it to start conversations that engage students in the classroom is a great way to approach this.  

I have a 10-year-old son and the amount of fun I have had with him using tools like ChatGPT as a stepping off point for creative endeavors is ridiculous. I am talking rolling on the floor laughing at the rap song about bananas we made after many prompts, ideas, and edits. Not only are we having fun and connecting, but I am also teaching him the art of prompting and then editing, and being thoughtful in your approach, thereby reinforcing that AI is a tool to use as a starting off point and not a replacement for your own creativity. I try not to adopt that mentality of “back in my day, we didn’t have _______ and had to work harder” and embrace my children where they are in our ever-changing world. The same approach can be done in the classroom. Yes, it is different, but it can also be amazing (or progressive). Imagine the possibilities of using AI to get students engaged with subject matter while also fostering their own creativity and teaching them the limitations of AI and then guiding how they engage with it.

When it comes to the cheating conversation that a lot of educators and parents have in the back of their minds, the simple answer is that you’ll know. If you’re a parent or a teacher, you intimately know the work and capabilities of the child. If there is a sudden discrepancy in those capabilities, you will know and need to address it. Don’t underestimate your knowledge and be clear with your students about what the standards are. Again, the key here is transparency and teaching the use of AI as a tool, not to do the work for you.

Involve Everyone to Create Thoughtful Policies

Once fears and misconceptions are addressed, it is important to develop a policy that considers everyone involved. Begin by initiating an open conversation around the AI policy with key stakeholders, including teachers, administrators, school staff, the IT department, and students. It’s also essential to engage the broader community—parents, local education authorities, and even industry experts—to gather a wide range of perspectives.

AI use must be grounded in purpose. Determining how an educational institution wants to impact communication, productivity, and collaboration with AI, and then actively listening to all voices can significantly streamline the process of creating an effective AI policy. This inclusive approach helps identify specific concerns, needs, and expectations from different groups, ensuring the policy is thorough and balanced. It can also foster a sense of ownership and commitment among all parties, making it easier to implement the policy proactively and effectively.

Regular workshops, informational sessions, and feedback opportunities are an easy way to keep everyone informed and involved throughout the policy development process. This continuous engagement helps demystify AI technologies, building trust and confidence in their use. Ultimately, a collaborative effort not only simplifies the creation of an AI policy but also enhances its acceptance and practical application in the educational environment.

Provide Training and Resources

Once the policy is decided upon, providing training and resources for educators is critical in the success of adoption. Connection is a proud member of the Microsoft Global Trainer Partner Program, with Professional Development Specialists who are Microsoft Innovative Educator Experts (MIEE) to deliver training for educators on behalf of Microsoft. Our highly skilled and inquisitive specialists bring years of experience both in and out of the classroom, providing them with a deep understanding of the educational landscape. They speak the language of educators and approach training from an insider’s standpoint, which helps them build the trust necessary to effectively engage with schools. By integrating AI training into their sessions, Connection can help educators harness the power of AI to further enrich the learning experience.

There are already several AI-powered features built into Microsoft programs—such as Designer in PowerPoint, or the prediction feature in Forms—that educators might not realize they are already using. These features enhance efficiency and effectiveness of both teaching and administrative tasks. For instance, Designer in PowerPoint helps create visually appealing slides with minimal effort, allowing educators to focus more on content rather than design. The prediction feature in Forms can streamline the process of creating quizzes and surveys, offering smart suggestions based on the context of the questions being formulated.

These built-in AI tools provide an excellent starting point for educators to explore the broader potential of AI in education. By recognizing and leveraging these existing tools, educators can begin to appreciate how AI can simplify routine tasks, personalize learning experiences, and improve student engagement.

Starting with familiar tools that already incorporate AI can help demystify the technology for educators who might feel overwhelmed by the concept. It serves as a practical introduction, showing how AI can be, or already is, integrated into their daily workflows. This familiarity can then open the door to broader discussions about the potential of AI in education, such as adaptive learning systems that tailor content to individual student needs, AI-driven analytics for identifying at-risk students, and virtual teaching assistants that can provide support outside of regular classroom hours.

Engaging with existing AI-powered features can spark curiosity and inspire educators to explore additional AI tools. Having these conversations helps educators collaborate on thoughtful and ethical AI integration to enhance the educational experience. Recognizing and utilizing built-in AI features serves as a steppingstone, building confidence in technology, encouraging innovation, and fostering continuous improvement in the evolving educational landscape.

I leave you with the epic banana rap my ten-year-old crafted with the help of ChatGPT. Now, imagine doing this activity with a class of ten-year-olds to introduce the structures and rhythm patterns of poetry. Maybe task them with rewriting it as a sonnet or sestina. If you want to get really crazy, challenge them to reworking it into iambic pentameter. What started as a silly activity that guarantees a lot of giggling in the classroom suddenly becomes a series of memorable writing exercises and lessons that hold engagement and feels like less of a slog. And that? Well, that’s just poetry.

(Verse 1) Yo, listen up, I got a story to tell
‘Bout a fruit that’s yellow and you know it so well
It’s the king of the jungle, let me introduce
The one and only banana, it’s time to break loose

(Chorus) Banana, banana, so sweet and so fine
Peel it back, take a bite, let the flavor unwind
Banana, banana, it’s a tropical treat
From the Caribbean islands to the city streets

(Verse 2) You can find it in the morning, have it with your flakes
Banana pancakes, goodness, that’s all it takes
Potassium-packed, it’s a natural boost
Gives you energy, no excuse for the snooze

(Chorus) Banana, banana, so sweet and so fine
Peel it back, take a bite, let the flavor unwind
Banana, banana, it’s a tropical treat
From the Caribbean islands to the city streets

(Verse 3) Yellow and curved, it’s got that unique shape
Easy to hold, no mess, no need to scrape
You can freeze it, blend it, make a creamy delight
Banana smoothie, take a sip, feel the delight

(Chorus) Banana, banana, so sweet and so fine
Peel it back, take a bite, let the flavor unwind
Banana, banana, it’s a tropical treat
From the Caribbean islands to the city streets

(Bridge) Now let me tell you ‘bout the banana’s appeal
It’s not just the taste, it’s how it makes you feel
A smile on your face, a little burst of joy
From the youngest to the oldest, every girl and boy

(Chorus) Banana, banana, so sweet and so fine
Peel it back, take a bite, let the flavor unwind
Banana, banana, it's a tropical treat
From the Caribbean islands to the city streets

(Outro) So next time you see a banana in your sight
Remember its power, its natural delight
A versatile fruit, it’s a superstar
Banana, oh banana, you’re the best by far!

To ensure transparency, please note that artificial intelligence and large language models may be utilized to enhance the content of this article. This approach helps refine and enrich the information presented, ensuring accuracy and depth.

]]>
AI in Manufacturing: Productivity at the... https://community.connection.com/ai-in-manufacturing-productivity-at-the-point-of-use/ Aug 20, 2024 Ryan Spurr https://community.connection.com/author/ryan-spurr/ https://community.connection.com/wp-content/uploads/2024/08/2733103-GTM-DW-AIinManufacturing-BLOG.jpg

Despite the recent upsurge in manufacturing AI, organizations have barely scratched the surface of what’s possible. Manufacturers that prepare for the imminent embedded AI transformation will be uniquely placed to realize deep improvements to their productivity and profitability.

You’re probably already using embedded AI. For example, when you’re in a Teams meeting and the kids are having a spirited lightsaber battle behind you, AI-powered backgrounds and noise reduction can edit out their leaps and whooshes in favor of a professional-looking office setting and clean meeting audio.

Soon, employees at all levels will benefit from more effective AI-enabled hardware and software, harnessing new efficiencies in smartphones, laptops, operating systems, robots, wearables, and other tools.

The Current Condition

Over 90% of manufacturing companies have already launched pilot projects in AI, and 66% rely on AI in their day-to-day operations. In fact, for every dollar spent on AI, manufacturers see $3.31 in returns. The benefits extend to all business areas, enhancing inventory management, product development, and a shopping list of other functions. AI helps reduce costs, improve product quality, and shorten lead times.

For example, BMW created an AI-supported digital twin of a key facility, simulating production and improving planning. A plastics manufacturer used AI vision to identify and eliminate defects and waste, optimizing production. Through use cases like this (and hundreds more), AI is expected to contribute over $15 trillion to manufacturing by 2025, with hundreds of companies already reporting a 50% reduction in lead times, plus significant cost reductions and productivity improvements.

The Future Condition

AI-integrated OS platforms and next-gen chipsets from makers like AMD and Qualcomm are setting up to deliver powerful AI toolsets onboard laptops, tablets, and phones—instead of via resource-intensive cloud applications. By bringing sophisticated AI and compute technology to the point of use, front-line workers, engineers, and managers will leverage faster insights and more powerful, efficient devices.

Organizations as a whole will enjoy better bandwidth, lower network traffic, and improved compliance with security and privacy requirements. Ultimately, embedded AI will empower teams to design and build higher quality products, with shorter design lifecycles and production lead times, bringing better products to market, faster and more cost effectively.

Engineers

New embedded AI solutions in GPU-enabled engineering laptops will automate routine CAD tasks, analyze design requirements, suggest improvements, and simulate new products before they’re built. One engineering team used AI-driven edge devices to create a real-time object-tracking application. This (normally) processor-heavy task was rendered energy efficient thanks to an embedded AI chipset.

Operators

The National Association of Manufacturers’ Gardner Carrick says AI helps shop floor employees do their jobs better, provides them with more powerful tools, and ultimately increases the value-add of their jobs. In one example, Siemens implemented an AI system running on Microsoft Azure to project a laser grid that helps employees place fiberglass layers on wind-turbine blades with a minimal degree of error.

Managers

Managers will use embedded AI to drive process improvements across inventory management, hiring, scheduling, and dozens of other job functions. For instance, managers at sprinkler system manufacturer Hunter Industries used point-of-use AI to move training and guidance directly into job tasks, significantly reducing their onboarding time and improving employee performance.

How to Get There

It’s mission critical for today’s manufacturing organizations to invest in next-gen embedded AI devices and platforms. Only through ensuring AI readiness will businesses attract and retain top talent and continue to innovate and drive productivity. Explore Connection’s AI services and digital workspace solutions to start leveraging AI.

]]>
How Is Your MSP Managing Your Azure Workload? https://community.connection.com/how-is-your-msp-managing-your-azure-workload/ Aug 20, 2024 Jim Parker https://community.connection.com/author/jim-parker/ https://community.connection.com/wp-content/uploads/2024/08/2729821-WAF-Blog.png

Clients rely on their managed service provider (MSP) to oversee critical workloads in Azure—yet few know how the providers work behind the scenes. When choosing an MSP, it is important to ask specific questions aimed at understanding adherence to best practices and frameworks followed in support of the underlying services.

As an Azure MSP Expert, Connection leverages the depth and expertise of Microsoft by aligning to the pillars of the Azure Well-Architected Framework (WAF). By following the framework, we demonstrate to clients how reliability, cost, security, performance, and overall operational excellence is fundamental to our program.

Get with the Program

With over 30 featured components in our program, Connection builds in support, operations, health monitoring and patching, security, compliance, performance, backup and resiliency, cloud management and reporting, and customer engagement. Each of the technical components align to Azure best practices. For example, ensuring cost management—such as right sizing both compute and storage—is reviewed on a periodic basis with clients, in addition to its daily visibility. For security, on-going proactive monitoring is paramount.

We also offer scheduled reviews to demonstrate the client’s security posture while additionally making recommendations for improvement or remediation with particular focus to key business requirements (such as compliance). By aligning our program offerings to Azure best practices and architecture frameworks, clients understand the methodology implemented. Because Microsoft designed the framework, both the client and Connection have established and tested MSP-quality checks and balances.

Talk Is Cheap. Ask for A Review.

We practice WAF in our build and support model—and offer clients a WAF review. In a WAF review, Connection will guide you through the model and how it is applied to your managed Azure infrastructure. One of the best times to engage in a review is during your initial onboarding. From a service provider perspective, aligning best practices with the business goals of the client is paramount. When transitioning to a managed environment, a WAF review may reveal the architectural changes necessary to ensure optimal management, operational stability, and adherence to compliance requirements. Getting ahead of this early ensures success in support of your business while providing a solid architectural foundation to grow upon.

To assist your organization, Microsoft offers reference architectures on their Microsoft Learn training site—spanning from basic-but-well-architected landing zones to detailed designs for specific application and data use cases. Whether or not your MSP provides services at the application layer, or it is client managed, take a moment to peer into Microsoft’s 10 design principles for Azure applications, offered as a way to make your application more scalable, resilient, and manageable. When you speak with your MSP, refer to the Microsoft Well-Architected Framework to ensure your company is covered by industry best practices. Ask questions and understand how your business is operating in an optimal cloud environment that is positioned to foster growth and support you. As always, remember operating your business in the cloud is a shared responsibility and understanding the delineation of your responsibilities and those of the MSP is critical.

]]>
How to Simplify Data Management in Hybrid... https://community.connection.com/how-to-simplify-data-management-in-hybrid-environments-with-a-unified-backup-solution/ Aug 15, 2024 Becky Lawlor https://community.connection.com/author/becky-lawlor/ https://community.connection.com/wp-content/uploads/2024/08/2726771-Blog-Post-Unified-Backup-Solution.jpg

The adoption of complex IT infrastructures that combine on-premises systems with hybrid cloud environments is becoming increasingly common. According to Modor Intelligence, the hybrid cloud market is expected to reach $352.28 billion by 2029, growing at a CAGR of 22.12% during the forecast period (2024-2029).

This complexity in IT infrastructure is making data protection and backup and recovery more challenging than ever. A unified backup solution offers a comprehensive approach to managing data across diverse environments, providing centralized management, scalability, automation, and robust security features. Unlike traditional, fragmented backup methods, a unified solution consolidates various processes into a single, cohesive system, reducing complexity and potential vulnerabilities. This makes it easier for enterprises to secure their data effectively, even as they navigate the complexities of modern IT environments.

What Are the Benefits of a Unified Backup Solution?

A unified backup solution can streamline and enhance the process of data backup by consolidating various backup functions into a single, cohesive system. Some of the key benefits of using a unified backup solution include:

  • Centralized management: Unified backup solutions provide a single interface for managing all backup processes across an organization’s entire IT infrastructure. This centralization simplifies administration and improves efficiency, allowing IT teams to monitor and control backups from one location.
  • Scalability: As data volumes increase and IT environments become more complex, unified backup solutions can expand to accommodate new requirements without the need for extensive reconfiguration.
  • Automation: Automation in a unified backup solution reduces the manual effort required for data protection tasks. Automated scheduling, monitoring, and reporting ensure that backups are performed consistently and reliably, minimizing the risk of human error. This feature is crucial for maintaining regular backups and ensuring quick recovery in the event of data loss.
  • Security and compliance: Unified backup solutions incorporate advanced security measures to protect data from unauthorized access and cyber threats. They also help organizations comply with industry regulations by ensuring that data protection practices meet legal and regulatory requirements.

Why Traditional Backup Solutions Increase Complexity and Costs

Traditional backup solutions often involve managing multiple point solutions, each handling a specific aspect of data protection. For example, organizations might use one solution for database backups, another for file system backups, a separate one for virtual machine backups, and yet another for cloud storage protection. This fragmented approach can lead to increased complexity, as IT staff must be proficient in various interfaces and management consoles.

Using multiple point solutions can also result in higher costs due to the need for multiple licenses, maintenance contracts, and the potential for redundant hardware. Moreover, this siloed strategy can create potential gaps in coverage, such as missed backups or inconsistent policies across different platforms.

In contrast, unified backup solutions provide a more streamlined and efficient approach, integrating all these capabilities into a single platform. This consolidation reduces the administrative burden by offering a centralized management interface and consistent backup policies across all data types and locations. By simplifying the backup process and reducing the need for disparate point solutions, unified backup solutions improve overall data protection and operational efficiency.

How a Unified Backup Solution Better Protects Diverse IT Environments

Hybrid cloud environments combine on-premises infrastructure with cloud services, optimizing IT operations by offering flexibility, scalability, and cost efficiency. Unified backup solutions are essential for managing and protecting data across these environments by facilitating seamless data transfer, ensuring consistent data availability, and simplifying management across environments.

A unified solution enables the smooth transfer of data between on-premises and cloud environments, guaranteeing that backups are consistent and always available. This consistent availability supports robust business continuity strategies and effective disaster recovery plans, minimizing downtime and operational disruptions.

Moreover, unified backup solutions simplify the management of backups across diverse environments by providing a single interface for monitoring and control. This centralized management reduces administrative complexity and the risk of errors, making it easier for IT teams to maintain effective data protection policies across both on-premises and cloud infrastructures.

Security Considerations in Hybrid Cloud Integration

Security is paramount in hybrid cloud environments, where the complexity of managing diverse infrastructures heightens the need for robust data protection measures.

Unified backup solutions address these security challenges through several key features:

  • Data encryption: Encrypting data in transit and at rest protects against unauthorized access.
  • Access controls: Implementing strict access controls ensures that only authorized personnel can access sensitive data.
  • Threat detection and response: Continuous monitoring for potential threats and rapid response capabilities mitigate risks effectively.

A unified backup solution not only enhances these security features, but also facilitates the implementation of global protection policies. By centralizing data management, organizations can easily apply consistent security protocols across all environments, whether on-premises or in the cloud. This centralized approach simplifies compliance with regulatory requirements and reduces the operational complexity associated with managing multiple, disparate backup systems.

Adopt a Unified Backup Solution for Better Data Protection

As businesses increasingly adopt hybrid cloud environments, while at the same time facing an ever-growing risk of ransomware or other data security threats, a unified backup solution offers a comprehensive and streamlined approach to data protection. By providing centralized management, scalability, automation, and robust security features, a unified backup solution reduces complexity and vulnerabilities compared to traditional fragmented methods.

To ensure transparency, please note that artificial intelligence and large language models may be utilized to enhance the content of this article. This approach helps refine and enrich the information presented, ensuring accuracy and depth.
]]>
AI: The Invisible Consultant Who Might Steal... https://community.connection.com/ai-the-invisible-consultant-who-might-steal-your-corporate-secrets/ Aug 13, 2024 Jamal Khan https://community.connection.com/author/jamal-khan/ https://community.connection.com/wp-content/uploads/2024/08/2735913-AI-The-Invisible-Consultant.jpg

This image was generated by AI.

Today, as we navigate the ever-expanding universe of artificial intelligence, I am compelled to reflect on the profound implications this technology holds for our data management strategies. In this era, marked by rapid technological evolution reminiscent of the early days of the Internet, AI emerges not just as a tool of convenience but as a pivotal force reshaping our operational landscapes.

Consider AI as a consultant who enters your organization to revolutionize processes and unlock hidden potentials. This consultant learns intimately from your data, discerning patterns and suggesting optimizations. However, when their tenure ends, the nuanced insights acquired don't simply vanish; instead, they’re ingrained in the fabric of the AI system, potentially ready to be transferred elsewhere. This transferability underscores a critical vulnerability in AI deployment—data mishandling could not only diminish your data’s intrinsic value but also expose you to severe privacy and security breaches.

This concern becomes even more pronounced when we discuss systems like pilots, copilots, and crew setups that facilitate conversational access to sensitive company information. While these systems aim to streamline data accessibility, a flawed framework could inadvertently lead to substantial data compromises. The real danger here is the subtle erosion of vast data value, often overlooked in enthusiastic AI adoptions.

For enterprises venturing into the realms of cloud and hyperscale AI tools, the assurance of data security must be paramount. It is insufficient for providers to offer generic reassurances. They must demonstrate, through auditable and rigorous methods, that our data—whether anonymized or not—remains untouched for purposes beyond our consent, including upstream training or seemingly innocuous analytical undertakings.

Historically, on-premises solutions sought to integrate applications congruent with their infrastructural ethos. Ironically, the advent of AI, championed largely by cloud-based platforms, may catalyze the creation of systems that could ultimately challenge their own efficacy and integrity.

As we continue to explore the vast potentialities of AI, it is imperative that we maintain a vigilant perspective. The power of AI to transform our enterprises is immense, yet so are the risks it poses. As we integrate these advanced systems, let us proceed with a balanced view, appreciating the capabilities of AI while critically assessing the potential repercussions on the very backbone of our operations.

In our journey with AI, let us embrace both its promise and its challenges, ensuring that as we advance, we do not compromise the foundational elements that sustain our businesses. Stay tuned as we delve deeper into how AI’s influence on data valuation unfolds, shaping our decisions and strategies in the years ahead.


To learn about Connection’s efforts in the AI space, please visit our Helix Center for Applied AI and Robotics.

About the Author

To ensure transparency, please note that artificial intelligence and large language models may be utilized to enhance the content of this article. This approach helps refine and enrich the information presented, ensuring accuracy and depth.

]]>
Is Software Asset Management Still Relevant?... https://community.connection.com/is-software-asset-management-still-relevant-our-answer-may-surprise-you/ Aug 06, 2024 Casey Lindsay https://community.connection.com/author/casey-lindsay/ https://community.connection.com/wp-content/uploads/2024/07/2717624-Is-SAM-Dead-Not-so-Fast-BLOG.png

My career has had me closely intertwined with Software Asset Management (SAM) and IT Asset Management (ITAM) since 2006. Over this stretch of 18 years, I have helped to pioneer and implement a SAM practice at two different resellers, including Connection starting in 2012. So while I might find myself squarely in my current role of Principal Consultant of our Licensing Optimization Practice, and not with a primary focus on SAM, I have always found a way to keep my finger on the pulse of SAM.

The fact is a lot has changed since those early SAM days. We’ve evolved from on-premises infrastructure to the cloud. Licensing has changed from per server to counting processors and cores. From a financial perspective, we’ve moved from CapEx to OpEx with this advent of subscription and cloud licensing—not to mention the ability to take your entire on-premises server infrastructure (or a portion of it) and lift it to any of the available hyperscalers like Azure, AWS, and GCP. 

SAM technologies have been forced to adapt to this rapid rate of change. We’ve departed from the days of deploying tools with agents to scan for Office, Project, and Visio installs—the usual suspects, I might add—and then comparing this install base to legacy licenses and/or Software Assurance to establish a compliance position. While there is still an element of this within a SAM engagement, the focus is more heavily on cloud infrastructure. And while you might have invested in the best, most sophisticated SAM tool on the market—and there are a lot of great technologies in this space—it’s increasingly complex and requires a trusted advisor to help optimize and govern your software estate. 

I’ll state this in a different way, so it sinks in: It is the PEOPLE behind the tools, turning the dials, that are the most important part of an effective SAM strategy, and this has not changed since the dawn of SAM.

Now that we have covered how important the people are in conjunction with the technology, let’s discuss how an effective SAM strategy must start with establishing a current IT estate or compliance position—to use industry terminology. Once this has been established, the focus can progress and branch off into many key areas, such as technology alignment, lifecycle management, and vendor management, to name a few. These are some of the vital pillars to achieve cost optimization, while also establishing an ironclad technology roadmap that drives productivity and enables organizations to achieve their technology goals. Just as an example, with vendor management, data-driven decisions can be made to maintain relationships and negotiate better terms to support organizational cost optimization efforts. Essentially, you’ll find yourself with a much better story to tell software publishers and much better tactical negotiation power. 

I went to our in-house SAM expert, Seth Mitchell, who is a Senior Consultant within our SAM practice at Connection to get his take on the SAM evolution.

Here is what Seth had to say: “Under Satya Nadella’s leadership, Microsoft’s mission has been to empower every person on the planet to work more efficiently by opening the possibility to work at anytime from anywhere via any device. This ‘Cloud-First, Mobile-First’ initiative drove a critical mindset change in the SAM world that continues to adapt today. Governance and control of an IT estate with a hybrid and remote workforce has come with its challenges, and SAM technologies have had to adapt and progress. We’re not only seeing our clients leverage these tools to assess on-premises assets, like the days of old, but also to understand and measure cloud transition and ensuring quicker time-to-value to close gaps in deployment opportunity. Today, we supplement the classical SAM engagement with our trusted expertise to ensure compliance, optimize investments, and achieve efficiency. To see these tools adapt along with our clients’ progression has been interesting to watch over the last 10 years.”

So is SAM dead? Absolutely NOT. SAM is alive and well. SAM has evolved to not only include the compliance arithmetic it was born from, but also cloud preparedness, utilization, measurable ROI, and cost-optimization. SAM encompasses today’s prominent remote/hybrid work environments while also enhancing cybersecurity posture. AI even has an impact on SAM. By analyzing historical usage data and patterns, AI-driven SAM tools can proactively recommend adjustments to license agreements, allowing organizations to optimize their software spending with minimal touch. The future of SAM is marked by continuous change and increasing complexity. As technology evolves, so does the need for efficient, cost-effective, and compliant SAM practices. I am excited to have a front row seat to witness this technological evolution and to watch SAM play a key role in providing organizations with the proper visibility and controls.

To ensure transparency, please note that artificial intelligence and large language models may be utilized to enhance the content of this article. This approach helps refine and enrich the information presented, ensuring accuracy and depth.
]]>
Navigating the AI Copilot Frontier in... https://community.connection.com/navigating-the-ai-copilot-frontier-in-enterprise-environments/ Aug 06, 2024 Jamal Khan https://community.connection.com/author/jamal-khan/ https://community.connection.com/wp-content/uploads/2024/07/2709871-Navigating-the-AI-Copilot-Frontier-BLOG.jpg

This image was generated by AI based on a 20-word prompt.

Welcome to the evolving landscape of AI implementations in enterprise settings—where terms like copilots, crews, and pilots are not just novel, but have become the central focus of discussions around technology adoption. At Connection’s Helix Center for Applied AI and Robotics, we’re deeply engaged in the ongoing debates about the safety and efficacy of AI copilots for enterprise-wide deployment.

Uncertainty Remains a Constant

Much to the dismay of many of our stakeholders, the current answer to whether AI copilots are ready for widespread enterprise use is a cautious “we don’t know for certain.” This might seem unsettling, but it’s a stance grounded in transparency and an honest evaluation of the information available to us. Just half a year ago, our answer would have been a resolute “no.” However, the landscape has shifted as major AI service providers—often referred to as hyperscalers—have started to open up about their processes, infrastructures, and controls.

Despite these advancements, we believe there’s a significant need for greater transparency. This is essential before we can fully endorse the implementation of AI copilots across enterprises.

Data Integrity and Value at Risk

Two main concerns inform our cautious approach:

1. Data Usage and Privacy: The primary issue is understanding precisely how enterprise data is utilized by AI copilot services. There’s an urgent need to establish auditable trails detailing how this data is processed and parameterized by the underlying systems. Practices such as ensuring unique tenancy and avoiding the training of models with customer data are fundamental. At Helix, we aim to comprehensively understand the data lineage within these systems—including how data is consumed, embedded, analyzed, and managed within these AI frameworks.

2. Potential Devaluation of Data: In the haste to adopt AI systems, there’s a risk of diluting the unique value of corporate data. As data passes through third-party systems, its intrinsic value may be diminished if key insights are extracted and utilized elsewhere. We anticipate that once auditing firms begin to assign tangible monetary value to corporate data, they will likely value data that remains within the control of the enterprise more highly.

Before You Leap into AI

Before integrating AI copilots into corporate systems, enterprises must engage in rigorous due diligence with their service providers. It’s crucial to ask the right questions and resist the pressure to adopt features that might compromise the intrinsic value of core data assets. Every organization must assess its own risk and data value propositions carefully.

In conclusion, while the allure of AI in enterprise environments is undeniable, a measured, reflective approach is vital. Consider your organization’s unique circumstances and ensure alignment with your strategic goals before diving into the transformative yet challenging waters of AI implementation. This is not just about keeping up with technological trends—it’s about making informed, prudent decisions that will define the future of your enterprise.

To learn about Connection’s efforts in the AI space, please visit our Helix Center for Applied AI and Robotics.

About the Author

To ensure transparency, please note that artificial intelligence and large language models may be utilized to enhance the content of this article. This approach helps refine and enrich the information presented, ensuring accuracy and depth.
]]>
Navigating the AI Revolution: A Blueprint... https://community.connection.com/navigating-the-ai-revolution-a-blueprint-for-digital-transformation-in-the-cognitive-era/ Aug 01, 2024 Rai Basharat https://community.connection.com/author/raibasharat/ https://community.connection.com/wp-content/uploads/2024/07/2709789-Navigating-the-AI-Revolution-BLOG.jpg

This image was generated by AI based on a 20-word prompt.

In the rapidly evolving landscape of modern technology, AI stands out as a transformative force, reshaping industries and redefining the boundaries of innovation. As a member of the Helix Center for Applied AI and Robotics, I've had the privilege of observing this revolution firsthand, witnessing how AI is not merely a buzzword, but a powerful tool that’s changing the game for businesses of all sizes.

Consider the small startup, operating on a shoestring budget but armed with ambition. In the past, such companies might have struggled to compete with their larger, more resource-rich counterparts. But today, thanks to the democratization of AI through open-source frameworks and cloud-based services, these underdogs are punching well above their weight. They're automating tasks, enhancing customer experiences, and making data-driven decisions that were once the exclusive domain of corporate giants.

Meanwhile, large enterprises are harnessing AI to tackle complex challenges at scale. Picture a global corporation using predictive analytics to optimize its supply chain, or leveraging AI-driven customer relationship management to analyze vast troves of data. These organizations are not just maintaining their competitive edge; they're redefining what’s possible in their industries.

But here’s where things get interesting: despite the clear advantages, enterprise adoption of AI is moving at a pace that would make a glacier look speedy. We’re currently in what I like to call the “experimental phase” of the adoption curve. It’s reminiscent of the early days of cloud computing, where companies dipped their toes in the water before taking the plunge. This cautious approach is understandable, given the potential risks and the need for careful implementation.

As organizations navigate this digital transformation, three key principles emerge as crucial for harnessing the full potential of AI:

  1. Centralize and Leverage Your Data Assets: The foundation of any successful AI implementation lies in the ability to centralize both structured and unstructured data. In the modern enterprise, it's not uncommon to find over 100 SaaS applications in use, each housing valuable data. The first step is to create a comprehensive data inventory, classify your data based on type and value, and develop an integration strategy. This centralized data can then be transformed for use in AI applications through methods like retrieval-augmented generation (RAG) via embeddings or fine-tuning existing models.
  2. Strategize Your AI Infrastructure: Organizations must carefully consider where their AI infrastructure will run. Options range from building in-house AI infrastructure to relying on hypercloud providers, using open-source solutions, or leveraging LLMs as a service via APIs. Each choice comes with its own set of considerations, including cost, security, and privacy concerns.
  3. Optimize Inference Endpoints: Deciding where and how AI inferences will be made is crucial. Options include local inference for sensitive data or real-time applications, open-source models for customization and control, or prioritized LLM services via APIs for scalability. Balancing factors such as cost, security, and privacy is essential when making these decisions.

Looking ahead, the future of AI holds even more promise. Imagine a world where AI doesn't just assist with physical tasks, but takes on cognitive work. We’re talking about AI systems that can comprehend complex goals, perform intricate tasks, and make nuanced decisions. In the realm of software development, for instance, AI copilots could soon be suggesting code snippets, identifying bugs, and automating testing processes with uncanny accuracy.

It's crucial to note that this AI-driven automation is a far cry from traditional robotic process automation (RPA). While RPA excels at handling repetitive, rule-based tasks, AI shines in scenarios that require adaptability and decision-making. Think of it as the difference between a well-trained dog following commands and a wise mentor offering guidance based on years of experience.

For the tech-savvy among us, the integration of AI with existing enterprise systems presents both challenges and opportunities. Many organizations rely on systems like Salesforce, Workday, and various enterprise resource planning (ERP) tools—each operating within its own walled garden. The key lies in leveraging application programming interfaces (APIs) and command line interface (CLI) tools to seamlessly integrate AI capabilities into these existing frameworks.

This is where AI engineers, particularly those with a software development background, come into play. Their role is pivotal in bridging the gap between traditional software systems and cutting-edge AI technologies. For software developers looking to transition into this field, the path forward involves honing skills in machine learning, data science, and big data technologies. It’s akin to a chef learning to work with exotic new ingredients—the fundamental skills are there, but mastering these new elements opens up a world of possibilities.

As we look to the horizon, the AI landscape is poised for further evolution. We’re likely to see a convergence of large language model (LLM) companies and chip manufacturers, leading to more integrated and efficient AI solutions. Organizations will face crucial decisions about whether to rely on hypercloud providers or build their own AI infrastructure. The computing model itself is shifting, with workloads transitioning from traditional virtual machines to hosted LLM endpoints.

The implications of these changes extend beyond the realm of technology. The way we interact with computers is set to become more intuitive and powerful. Applications will seamlessly integrate AI capabilities, allowing users to interact with intelligent systems as naturally as they would with a human colleague.

Recent data from McKinsey’s Global Survey on AI underscores the growing importance of generative AI in particular. If 2023 was the year of discovery, 2024 is shaping up to be the year of implementation and value creation. Organizations are reporting tangible benefits, from cost reductions to revenue increases. However, this adoption isn’t without its challenges, with issues like data privacy and output accuracy at the forefront of concerns.

As we navigate this new terrain, organizations are adopting different approaches to AI implementation. Some are opting for off-the-shelf solutions, while others are customizing tools with proprietary data or even developing their own foundation models. The high performers in this space are those who are not only leveraging AI across multiple business functions, but are also proactively addressing the associated risks.

The journey to AI adoption is not a sprint, but a marathon. It requires careful planning, continuous learning, and a willingness to adapt. At the Helix Center for Applied AI and Robotics, we’re committed to guiding businesses through each stage of this journey. Our goal is to help organizations harness the power of AI to drive efficiency and innovation, positioning themselves at the forefront of their industries. The AI revolution is not just coming; it’s here. And while the path forward may be complex, the potential rewards for those who successfully navigate this new landscape are immense. As we continue to push the boundaries of what’s possible with AI, one thing is clear: the businesses that embrace this technology thoughtfully and strategically will be the ones that thrive in the digital age.

To ensure transparency, please note that artificial intelligence and large language models may be utilized to enhance the content of this article. This approach helps refine and enrich the information presented, ensuring accuracy and depth.
]]>
Manufacturers on High Alert: Cybersecurity... https://community.connection.com/manufacturers-on-high-alert-cybersecurity-incidents-driving-managed-services-adoption/ Aug 01, 2024 Ryan Spurr https://community.connection.com/author/ryan-spurr/ https://community.connection.com/wp-content/uploads/2024/07/2691640-ISG-Manufacturing-BLOG.jpg

Over the years, the acceleration towards automation, artificial intelligence, and interconnected systems has transformed manufacturing into a powerhouse of efficiency. This digital revolution comes with a cost: an amplified threat landscape. But let’s not blame it all on new technology, as operational environments have long been fraught with a lack of good cybersecurity hygiene and best practices, unpatched or at-risk equipment, long device life cycles, and a disparate approach to infrastructure and integration with the corporation’s balance. Unfortunately, our days of manufacturers ignoring this problem are over, as manufacturing has become the #1 most attacked industry globally for three years, and 61% of successful cybersecurity incidents occur in operational technology environments.

Let’s explore the top cybersecurity risks that can cripple your manufacturing operations:

  • Phishing Attacks: These deceptive emails or messages exploit human error to trick employees into revealing sensitive information or clicking malicious links. Manufacturing facilities, with potentially less tech-savvy workforces, can be prime targets.
  • Ransomware: Ransomware makes up 17% of all manufacturing cybersecurity incidents. This malware encrypts critical data, holding it hostage until a ransom is paid. Manufacturing relies heavily on real-time data for production. Downtime caused by ransomware attacks can be devastatingly expensive.
  • Supply Chain Attacks: Hackers can infiltrate a less secure vendor within your supply chain to gain access to your own systems. This highlights the importance of robust security standards across the entire network. An example that has been on the rise in third-party remote access, which has seen 57% of manufacturers suffer a third-party related breach, where trusted partners in your supply chain access your business systems or directly into operational technology environments to maintain or upgrade equipment remotely.
  • Insider Threats: Disgruntled employees or those with compromised credentials can inflict serious damage, from stealing intellectual property to sabotaging critical equipment.
  • IoT Security Risks: The increasing use of Internet-connected devices (IoT) on the factory floor opens new avenues for attacks. Legacy systems may not have adequate security measures to protect against these vulnerabilities, leaving OT networks wide open to horizontal sprawl of cyberattacks regardless of initial entry vector.

Consequences Are Rising in Significance

A successful cyberattack on a manufacturer can have a devastating domino effect. Production lines can grind to a halt due to ransomware attacks, causing significant financial losses and delays. Stolen intellectual property, like product designs or proprietary processes, can be sold to competitors, eroding a company’s competitive edge. Additionally, data breaches can expose sensitive customer information, leading to reputational damage and regulatory fines.

The consequences of these breaches are far-reaching:

  • Production Disruptions: Downtime due to ransomware attacks or compromised systems can cripple production lines and lead to significant financial losses.
  • Financial Damages: Ransom demands, data recovery costs, and lost sales can create a significant financial burden.
  • Reputational Harm: A data breach can erode customer trust and damage your brand reputation. In the past, this was often hidden from clients or shareholders because the decision to report was left to the business. With changes to US regulatory requirements, public manufacturers are mandated to report material cybersecurity events. These include those that have experienced drops in operational delivery, reduced sales, brand impact, and significant share price reductions.
  • Cybersecurity Insurance Challenges: In a Connection Manufacturing Survey, 57% reported experiencing higher cybersecurity insurance premiums, limited availability, and/or denial of insurance due to their current security posture. A staggering 18% were dropped entirely and bear the full financial burden of future cybersecurity incidents.

Navigating these risks presents a unique challenge for IT and OT (Operational Technology) teams in manufacturing. Here’s why:

  • Cybersecurity Workforce Shortage: The demand for skilled cybersecurity professionals outpaces the supply, making it difficult for manufacturers to build strong in-house teams, keep up with the latest threats, and maximize the benefits of invested tools to achieve the best possible security posture.
  • Heterogeneous OT Environments: Manufacturing facilities often have a mix of old and new systems, making it difficult to implement a comprehensive security strategy. Legacy systems may not be easily patched or upgraded.
  • Limited Cybersecurity Budgets: Balancing security needs with tight budgets can force manufacturers to make difficult choices, leaving them vulnerable.

Partnering for Protection: Why Managed Security Services Are Essential

Given these challenges, it’s no wonder that many manufacturers are turning to managed security services (MSS) providers. Partnering with a managed security services provider (MSSP) in this complex cybersecurity ecosystem can offer a range of services, including visibility and risk planning, threat detection and monitoring, incident response, staff augmentation, and security awareness training.

This allows manufacturers to:

Bridge the Talent Gap: MSSPs offer access to a pool of cybersecurity experts who can augment internal teams and provide specialized skills.

Compliance Services: Managed Cybersecurity and Compliance services are helping manufacturers improve cybersecurity maturity, identify gaps, prove controls, and maintain industry or regulatory compliance.

  • Simplify Security Management: MSSPs can provide a unified security platform to manage diverse OT environments, streamline security operations, and integrate OT and IT cybersecurity in a single “pane of glass”.
  • Optimize Security Spend: By leveraging the expertise and resources of an MSSP, manufacturers can achieve better security outcomes without exceeding their budgets.

Don’t let cybersecurity cripple your operations. Explore how partnering with a managed security services provider can help your manufacturing business stay secure and competitive. Learn more about how managed services from Connection can help to identify IT and OT asset and infrastructure risks, improve cybersecurity posture, reduce operational costs, and maintain industry compliance.

]]>
Federal Health IT Strategic Plan and... https://community.connection.com/federal-health-it-strategic-plan-and-artificial-intelligence/ Jul 30, 2024 Jennifer Johnson https://community.connection.com/author/jennifer-johnson/ https://community.connection.com/wp-content/uploads/2024/07/2705019-Public-Policy-BLOG.jpg

In my first two blog posts in this series, Federal Health IT Strategic Plan and Third Party Risk and Federal Health IT Strategic Plan and Managed Services, I examined how the ONC’s 2024–2030 Federal IT Strategic Plan will impact healthcare public policy and create the foundation for how we live our healthiest lives.

The four goals of the 2024–2030 plan are:

  • Promote Health and Wellness
  • Enhance the Delivery and Experience of Care
  • Accelerate Research and Innovation
  • Connect the Health System with Health Data

In the third blog of this four-part series, I’ll review how the federal government plans on advancing opportunities for individuals, researchers, technologists, and other digital health users to accelerate scientific discovery and innovation.

Goal Three: Accelerate Research and Innovation

Objectives:

  • Ensure that researchers and other health IT users have appropriate access to health data to drive individual and population health improvement
  • Individual and population-level research and analysis are enhanced by IT
  • Researchers advance health equity by using health data that includes underrepresented groups

Amy Webb, author, futurist, and darling of SXSW (attendees queue up in lines overnight to hear her speak) likens the fear around artificial intelligence to the fear you have when you learn how to drive on the ice. When your car begins to slide, your instinct is to slam on the brakes, but the safest thing to do is steer into the skid.

The ONC’s strategy reflects both the opportunity to broaden the use of new technologies while increasing transparency when and where AI is used. There’s a strong predilection for the power of pattern recognition within disparate and unstructured data and equally strong wording that addresses algorithmic discrimination and bias in health IT. Curative properties that propel diagnosis will be found in data that doesn’t yet exist. Each of these objectives have separate strategies that empower patients to consent to how and when their data is used, and that de-identified health information is protected from re-identification. Innovation can’t come at the expense of individual privacy.

Connection is your trusted source for the compassionate and ethical use of embedded and generative AI.  Connection’s Helix Center for Applied AI and Robotics offers technical expertise, end-to-end solutions, and deep partnerships that address six critical success factors in healthcare AI projects: Ethical Foundations of AI in Healthcare, Data Privacy and Security Measures, Building and Maintaining Trust through Transparency, Stakeholder Engagement and Collaborative Practices, Regulatory and Compliance Standards, and Implementation Challenges and Strategies.

If you want to learn more about how Connection can help transform your healthcare organization to unlock the capabilities needed to drive growth and productivity, you can find more information at www.connection.com/helix or watch our latest webinar: Responsible AI in Digital Health and Life Science.

]]>
Why Standardization Across Hybrid IT... https://community.connection.com/why-standardization-across-hybrid-it-environments-improves-data-protection/ Jul 24, 2024 Becky Lawlor https://community.connection.com/author/becky-lawlor/ https://community.connection.com/wp-content/uploads/2024/07/2704318-HPE-Greenlake_Hybrid-Environments_Blog.jpg

As businesses increasingly adopt multicloud hybrid environments, data protection becomes more challenging. By nature, multicloud and hybrid environments expand the potential attack surface, opening new vectors through which threats can infiltrate. This increased exposure requires heightened vigilance and more robust security measures.

Standardized data protection policies help to ensure that all data, regardless of location, is protected under robust security measures. In multicloud and hybrid environments, where complexity is heightened, standardization becomes even more necessary.

Yet, in a recent survey of IT decision-makers we conducted in partnership with Foundry, we found that standardized data protection policies improve an organization’s security posture. Organizations with a global protection policy reported experiencing fewer incidents, and a higher percentage reported no incidents compared to those without a standardized data protection policy.

Yet, despite the clear advantages standardization can offer, over one-third (36%) of organizations surveyed indicated they still lacked a global protection policy.

So why haven’t more businesses adopted a global protection policy?

Challenges of Standardizing across Multicloud and Hybrid Setups

Standardizing security measures across multicloud and hybrid environments presents a complex set of challenges. The intricate process of implementing uniform encryption and access controls across diverse platforms often leads to errors and misconfigurations. Additionally, the varying compliance standards of different cloud providers add significant difficulty in maintaining consistent regulatory adherence. This issue is particularly acute in highly regulated sectors such as healthcare and finance, where stringent data protection laws mean that non-compliance can result in hefty penalties.

Further complicating the landscape is the lack of standardization in APIs, data formats, and management tools among cloud services, which hampers seamless integration and consistent security practices. The specialized skills required to manage security in multicloud environments are also in high demand, leading to a shortage of qualified professionals.

These challenges are a major factor in why many organizations have not yet implemented a comprehensive global protection policy. However, despite these hurdles, the benefits of standardizing data protection measures across an organization make the investment of time, effort, and resources worthwhile.

Benefits of a Unified Global Protection Policy

A unified global protection policy standardizes data protection across all regions and departments, simplifying security and compliance management in multicloud and hybrid environments. In addition, enterprises with a global protection policy feel they are better aligned between provisioning vs. demand, according to our survey. 

Other benefits include:

  • A consistent security posture: A global policy establishes uniform security measures across all cloud providers and on-premises infrastructure, minimizing vulnerabilities and ensuring a consistent defense against threats.
  • Streamlined compliance management: A unified policy aligning with global regulations allows organizations to efficiently demonstrate compliance with various data protection laws and industry standards, reducing administrative burden and complexity.
  • Enhanced operational efficiency: Implementing a single, global policy simplifies the management of security protocols, thereby reducing the likelihood of breaches

Improved visibility and control over data handling practices, easier policy updates and enforcement, and better incident response are additional advantages of a global protection policy. Moreover, maintaining a single set of global policies is more cost-effective than managing multiple, region-specific policies, reducing administrative overhead and resources required for training and compliance monitoring.

Finally, a consistent global policy simplifies training and communication, ensuring employees understand and adhere to data protection guidelines, reducing human error risk, and enhancing security culture. Standardized policies facilitate smoother transitions and integrations between different environments, ensuring consistent security measures during migrations.

How a Centralized Backup Solution Makes Standardization of Data Protection Easier

A single, centralized backup solution can make it much easier to standardize security across hybrid and multicloud environments. According to our research, organizations with a global protection policy are more than five times as likely to utilize a single consolidated backup solution compared to those without such a policy.

This centralized approach offers numerous advantages:

  • Unified management interface: A single Software-as-a-Service (SaaS) console for managing backup and recovery operations simplifies administration and ensures consistency across all environments.
  • Consistent security measures: A centralized platform can support uniform security protocols, such as encrypted backups and configurable backup data immutability.
  • Simplified compliance management: A single solution can unify reporting and audit trails, making it easier to maintain compliance with various regulations and industry standards.
  • Improved visibility: Comprehensive insights into backup status, data protection coverage, and potential vulnerabilities are all in one location.
  • Scalability: As organizations adopt new cloud services or expand infrastructure, a single solution can seamlessly extend protection.
  • Integrated local and cloud protection: By managing Cloud Protection Store (CPS) and Integrated Local Protection Stores (ILPS), in a single solution, data protection architecture is simplified.
  • Protection for diverse workloads: It becomes easier toprotect a wide range of workloads from a single solution and enables comprehensive data protection across all environments.
  • Automated policy enforcement: A single solution with automation features can help to automate global protection policy applications, reducing human error risk and ensuring consistent compliance and security measures.
  • Streamlined disaster recovery: A single consolidated backup solution can speed the disaster recovery processes by enabling faster and more consistent recovery across all environments.

Standardizing data protection policies across hybrid environments is essential for maintaining a consistent security posture, simplifying compliance, and enhancing operational efficiency. Using a centralized backup solution like HPE GreenLake can facilitate this standardization, providing numerous benefits and ensuring robust data protection across a multicloud and hybrid environment.

]]>
AI and Camera Vision Are Transforming Facilities https://community.connection.com/ai-and-camera-vision-are-transforming-facilities/ Jul 18, 2024 James Rust https://community.connection.com/author/james-rust/ https://community.connection.com/wp-content/uploads/2024/07/2695248-AI-Camera-Vision-BLOG.jpg

For decades, businesses of all types have been increasing the number of machines in their facilities to automate tasks and streamline processes. The issue is that no matter how many machines a location has, they are reliant on people or sensors to give them feedback on what is happening and how they should perform their tasks—instead of interacting with the world the way we can.

However, camera vision and AI are merging to create a new era of intelligent observation. This powerful combination is revolutionizing how machines interface with the world, leading to significant advancements in facilities of every type. Although there are use cases specific to each industry, several common applications provide benefits that virtually every facility can find useful. Given that the camera vision market is expected to have a 10% compound annual growth rate until 2027, it’s safe to say that this is a proven AI use case that will only get bigger and better.

Top Use Cases

Robots have traditionally been confined to repetitive tasks and were unable to adapt to any variance in the process. Now, cameras can provide real-time visual data that they can use for complex tasks like assembly, sorting, and welding. AI algorithms guide robots to perform tasks with greater precision and efficiency, freeing up human workers for more complex activities.

Smart cameras can track inventory levels in real-time, providing businesses with a clear picture of stock availability. This data is then used to optimize stock levels, preventing stockouts and ensuring that the right materials are readily available for production. This not only reduces costs associated with excess inventory or lost sales but also improves overall supply chain efficiency.

Vision AI can eliminate the need for constant human monitoring. By analyzing video feeds in real-time cameras can send alerts based on restricted areas, weapon detection, or flagged individuals and send immediate alerts to ensure security personnel can intervene quickly. As AI technology continues to evolve, we can expect even more innovative applications of vision AI to emerge, shaping the future of intelligent facilities management.

Security and Privacy: Top Priorities

While vision AI offers incredible benefits, people have very understandable and justified concerns about security and privacy. Businesses must consider anonymizing data whenever possible and adhere to relevant data privacy regulations. Data should be securely stored, and event-based vision can only store camera data if necessary. Cybersecurity should be made a priority by any organization when choosing where to invest.

Options like edge computing can minimize data transfer and storage, and privacy-preserving algorithms can anonymize video data. In many applications, people in videos can be reduced to stick figures or pixelated to make identification difficult while still extracting valuable insights. This can allow for the analysis of group behavior like customer flow tracking without recording their individual identities.

Manufacturing: Optimize Quality Control and Plant Efficiency

Studies have shown that in many manufacturing operations quality-related costs are as high as 15-20% of sales revenue, but this can be mitigated with camera vision and AI.  High-resolution cameras capture intricate details of products at various stages of production. AI algorithms then analyze these images, meticulously inspecting for defects that might escape the human eye. This not only reduces human error, but also ensures consistent quality, minimizing the number of defective products reaching customers and ultimately resulting in a significant increase in profit.

Beyond quality control, camera vision and AI can also enhance production efficiency. Instead of process engineers gathering data manually, strategically placed cameras track can objects and materials as they move throughout the production process. AI analyzes this visual data, identifying bottlenecks and inefficiencies in the production flow. Instead of spending countless hours observing the factory floor, manufacturing engineers can use their time understanding these bottlenecks, maximizing factory potential and allocating resources where they are needed.

Retail: Provide a Better Experience for Your Customers

The retail landscape is evolving from a one-size-fits-all approach to a customer-centric experience. Camera vision and AI are playing a key role in this shift by analyzing consumer behavior. They are able to anonymously track customer movement patterns, discern where customers spend most of their time, and even take note of body language and expressions to see how pleased they are with your store. Heat mapping customer movement provides valuable insights into store layout, product placement, and customer flow. Retailers can then optimize their locations for better traffic flow, strategically place products to encourage sales, and improve customer experience.

Furthermore, camera vision and AI can contribute to loss prevention and inventory management. Cameras can detect suspicious customer behavior that might indicate potential shoplifting. AI is capable of analyzing this data and triggering alerts for security personnel. Additionally, camera systems can track inventory levels on shelves, ensuring shelves are always well-stocked and products are readily available for customers.

Healthcare: Improve Patient Care with Vision AI

One of the best camera vision use cases is autonomous inventory monitoring. Many hospitals still manually track inventory, and a whopping 40% of hospitals surveyed have admitted to cancelling surgical procedures due to a lack of supplies. Camera vision is able to track inventory levels and send automatic alerts when low stock has been identified, but when paired with AI, it can forecast demand and notice when items are near expiration.

Cameras can also monitor patients in real-time, especially those at risk of falls or wandering. AI algorithms can detect falls or patients leaving designated areas, allowing staff to intervene quickly and ensure patient safety. This is particularly beneficial for elderly or at-risk patients who may require constant monitoring.

Similar to manufacturing cases, camera vision can track staff movement within a hospital to identify inefficiencies in workflows. AI analysis of this data can help optimize staffing schedules and resource allocation, allowing for better patient care and improved utilization of staff time.

The Time Is Now

This technology has been implemented successfully across the globe, and common use cases have demonstrated a strong ROI for those bold enough to be first in line. As use cases increase, camera vision and AI will only become more valuable, and those who already have it in place will be able to quickly adapt and implement uses as they come.

Learn more about the solutions and services Connection has to offer to help your organization harness the power of AI.

]]>
AI Appreciation Day: Looking Back on the... https://community.connection.com/ai-appreciation-day-looking-back-on-the-past-and-toward-the-future/ Jul 16, 2024 Jamal Khan https://community.connection.com/author/jamal-khan/ https://community.connection.com/wp-content/uploads/2024/07/2696549-AI-Apprecation-Blog-BLOG-1.jpg

Today, as we commemorate AI Appreciation Day, I find myself reflecting on the transformative journey of the past two decades since I first ventured into the realm we now recognize as Artificial Intelligence. In those early days, our work on contextual language systems for threat intelligence aggregation was hardly seen as pioneering AI. We were merely engineers in pursuit of modest breakthroughs, crafting solutions with a mission in mind. Yet, over time, our steady progress enabled the creation of systems capable of learning and adapting algorithmically to changing variables.

Jamal Khan giving a lecture and spending time with his children

Among the most rewarding experiences has been the opportunity to engage with the bright, curious minds during academic lectures across various institutions. Their eagerness to explore the future, juxtaposed with the skepticism of some, only fueled our collective passion for what might lie ahead. In recent years, as advancements in this field have surged, I’ve had the privilege of meeting influential figures and visiting the corridors where tech giants have shaped the future.

Yet, our celebration today owes much to Alan Turing, who, in 1950, first posed the question, “Can machines exhibit intelligence?” His inquiry laid the groundwork for our current achievements and challenges in AI.

As we celebrate, we must also embrace a moment of somber reflection on the dual-edged nature of this technology. Celebrating AI may seem premature as we, the practitioners, must remain vigilant about its potential misuse.

In a world often seen in black and white, we stand at a crossroads. AI could lead us either to a promising future marked by health and security or toward a dystopian society riddled with perpetual surveillance. Yet, a third path might blend these realities, ushering in an era of deep digital integration and automation—with all its attendant benefits and drawbacks.

Looking forward, the legacy of AI will depend significantly on how we choose to implement it. As we celebrate today, let us temper our enthusiasm with a cautious appraisal of the potential risks. Our choices now will determine whether we continue to celebrate AI’s possibilities or brace against its threats in the years to come.

To learn about Connection’s efforts in the AI space, please visit our Helix Center for Applied AI and Robotics.

About the Author

To ensure transparency, please note that artificial intelligence and large language models may be utilized to enhance the content of this article. This approach helps refine and enrich the information presented, ensuring accuracy and depth.
]]>
AI in Healthcare: A Revolution in Progress https://community.connection.com/ai-in-healthcare-a-revolution-in-progress/ Jul 02, 2024 Jamal Khan https://community.connection.com/author/jamal-khan/ https://community.connection.com/wp-content/uploads/2024/06/2669109-Helix-AI-Healthcare-BLOG.jpg

AI is rapidly transforming the healthcare landscape. Its remarkable ability to analyze vast datasets and uncover hidden patterns has opened new frontiers in disease diagnosis, treatment optimization, and patient management.

While implementing AI in healthcare presents special considerations and challenges, its successful adoption has the potential to revolutionize the field. From early disease detection to personalized treatment plans, AI is on track to become an essential tool for healthcare professionals.

Unleashing AI’s Potential in Healthcare: Benefits and Use Cases

AI offers a wide range of applications that enhance patient care, streamline processes, and drive innovation. Here are some of AI's top benefits and use cases in the healthcare industry.

Enhancing Patient Care with AI

AI's potential to improve patient care is immense. By analyzing patient data, AI can identify trends, predict health outcomes, and personalize treatment plans, particularly for chronic diseases. For example, AI algorithms can analyze medical images, such as X-rays and MRIs, to detect early signs of cancer, often with greater accuracy than human radiologists. This early detection allows for timely intervention, leading to improved treatment outcomes and increased survival rates.

It's important to emphasize that AI is a tool designed to complement, not replace, human judgment. The most effective approach involves integrating AI-generated insights with the expertise of healthcare professionals to create a comprehensive and informed decision-making process. This collaboration ensures that clinical experience remains at the heart of patient care, mitigating the risk of over-reliance on technology.

AI in Drug Discovery and Development

Beyond patient care, AI is revolutionizing the way new drugs are discovered and developed. By analyzing vast datasets, AI algorithms can rapidly identify potential drug candidates and predict their efficacy. This significantly accelerates the research and development timeline, potentially bringing new treatments to market faster and at a lower cost. Additionally, AI can optimize clinical trials by analyzing patient data to identify suitable candidates, improving the efficiency and success rates of these trials.

The application of AI in drug discovery showcases its potential to transform healthcare on a global scale. By providing more accurate and efficient methods for identifying new therapies, AI can address unmet medical needs and improve health outcomes for patients worldwide.

AI in Population Health Management

AI offers powerful tools for managing the health of entire populations. By analyzing data from various sources, including electronic health records, social determinants of health, and environmental factors, AI can identify patterns and predict disease outbreaks. This enables healthcare providers and public health officials to take proactive measures, such as targeted interventions and resource allocation, to prevent and manage health crises.

For instance, AI can analyze environmental data, socioeconomic factors, and healthcare access to pinpoint communities at higher risk for specific diseases. This information can guide public health initiatives, ensuring that resources are directed where they are needed most and that vulnerable populations receive adequate care.

AI and Wearable Technology

Wearable technology, such as fitness trackers and smartwatches, is generating an abundance of health data. AI can leverage this data to provide personalized health insights and recommendations. Wearables can continuously monitor vital signs, activity levels, and sleep patterns, alerting users to potential health issues before they escalate. This continuous monitoring is particularly beneficial for managing chronic conditions, offering real-time feedback and early warnings to both patients and healthcare providers.

AI-powered apps can analyze data from wearables to identify trends and offer personalized suggestions for improving health. For example, an AI-driven app could analyze sleep patterns and provide recommendations for improving sleep quality, ultimately enhancing overall health and well-being. The combination of wearables and AI empowers individuals to take a more active role in managing their health and making informed decisions about their lifestyle choices.

Key Considerations of Implementing AI in Healthcare

While the potential benefits of AI in healthcare are vast, its implementation requires careful consideration of various challenges and ethical concerns. Balancing innovation with responsible use is crucial to ensure that AI serves the best interests of patients and the healthcare system as a whole.

Ethical Considerations in AI Implementation

The ethical implications of AI in healthcare are significant. Ensuring data integrity is paramount. The potential misuse of data, such as data poisoning (where corrupted data leads to inaccurate diagnoses and treatments), poses a serious risk. Even minor inaccuracies can have severe consequences for patient outcomes, making it imperative to maintain the accuracy and reliability of data used in AI systems.

Algorithmic bias, which can result in unequal treatment of patients based on race, gender, or other factors, is another critical concern. Rigorous testing and validation of AI algorithms are essential to mitigate these biases and guarantee fair and equitable treatment for all individuals.

Security Concerns and the Role of CAIOs

Patient data privacy and security are paramount in healthcare. Any breach can erode trust in AI technologies and have far-reaching consequences. To safeguard sensitive patient information, robust data governance frameworks are essential. This includes implementing stringent security measures, adhering to data protection regulations (such as HIPAA in the U.S.), and ensuring that AI applications are used equitably across all demographic groups.

Integrating AI into existing healthcare workflows can be complex. While cloud-based solutions offer flexibility and scalability, many organizations prefer on-premises infrastructure due to concerns about data security and regulatory compliance. Striking a balance between innovation and security is crucial for the successful adoption of AI.

Chief AI Officers (CAIOs) play a pivotal role in mitigating AI security concerns. CAIOs manage data strategies, ensure data privacy, and develop synthetic data capabilities for training AI models. They bridge the gap between the technical and clinical aspects of AI, ensuring that technologies are practical, compliant, and ultimately beneficial for patient care. CAIOs also focus on building robust data infrastructures, including data lakes for storing and organizing vast amounts of patient data, which form the foundation for developing meaningful AI applications.

The Importance of Interdisciplinary Collaboration

Successful AI implementation in healthcare requires collaboration among diverse disciplines, including medicine, data science, ethics, and law. Interdisciplinary teams can proactively address potential issues and ensure that AI systems are not only technologically advanced but also ethically sound, transparent, and aligned with patient needs. Involving ethicists and legal experts early in the development process helps identify and mitigate ethical and legal risks, fostering responsible AI development.

The Importance of Explainability in AI

Explainability is a fundamental aspect of AI in healthcare. Complex AI models often operate as "black boxes," making it difficult to understand their decision-making processes. This lack of transparency can hinder trust and acceptance among healthcare providers and patients. Developing AI systems that provide clear and understandable explanations for their decisions is crucial for building confidence and ensuring that AI is used responsibly. Explainability also helps identify and address potential biases in AI systems, ensuring recommendations are based on sound reasoning and accurate data.

The AI-Powered Future of Medicine

AI holds the promise of revolutionizing healthcare, offering improved diagnostics, personalized treatments, and enhanced patient care. However, realizing this potential requires addressing significant challenges, including data privacy, ethical considerations, and integration into existing workflows. Robust data orchestration and governance frameworks are essential to ensure that AI is developed and implemented responsibly.

As we continue to explore and innovate, the collaboration between technology and healthcare professionals will be key to unlocking AI’s full potential. By working together, we can harness the power of AI to transform healthcare and improve patient outcomes. For more insights and updates on AI in healthcare, visit our dedicated website at www.connection.com/helix.

]]>
TechSperience Episode 127: AI in... https://community.connection.com/techsperience-episode-127-ai-in-healthcare-a-revolution-in-progress/ Jul 02, 2024 Jamal Khan https://community.connection.com/author/jamal-khan/ https://community.connection.com/wp-content/uploads/2024/06/2669109-Helix-AI-in-Healthcare-Podcast-IMG1.jpg

AI is revolutionizing healthcare by analyzing massive datasets to uncover hidden patterns, leading to breakthroughs in disease diagnosis, treatment, and patient care. Join Jennifer Johnson and Jamal Khan as they explore AI’s impact on healthcare. They delve into critical ethical considerations, governance structures, data security measures, and AI’s role in clinical decision support.

Speakers:

Jamal Khan, Chief Growth and Innovation Officer at Connection

Jennifer Johnson, Director of Healthcare Strategy and Business Development at Connection

Show Notes

00:00 Introduction and AI Ecosystem Shifts

02:07 Ethical Considerations and Governance in AI Healthcare

05:49 Challenges of Data Poisoning and Model Drift in AI Healthcare

08:02 Role of CAIOs in Healthcare Governance and Data Strategy

10:48 Importance of Patient Consent and Cross-Jurisdictional Challenges

13:01 AI’s Impact on Healthcare Provider Work Environment

17:45 Vetting AI Partners and Virtual Assistants in Healthcare

19:39 Patient Accessibility and Engagement in Healthcare

22:50 Clinical Trials and Technology in Healthcare

24:13 Challenges of Merging Patient Data in Healthcare

27:01 AI Adoption in Healthcare: Impact on Insurance Providers

32:08 Challenges of Transparency and Explainability in AI

35:58 AI in Clinical Settings: Promising Use Cases

37:18 Choosing Hyperscalers for Healthcare AI Implementation

48:01 Data Orchestration for Patient Care with AI

50:17 Following Patients Through Care Settings with AI

52:08 Excitement and Challenges of AI Integration in Healthcare

]]>
Microsoft New Commerce Experience for Public... https://community.connection.com/microsoft-new-commerce-experience-for-public-sector-in-2024/ Jul 02, 2024 Makayla Mota https://community.connection.com/author/makayla-mota/ https://community.connection.com/wp-content/uploads/2024/06/2679522-Microsoft-New-Commerce-for-Public-Sector-Blog-BLOG.png

As Microsoft transitions public sector subscriptions to the New Commerce Experience (NCE), Connection is here to support you. Here is what you need to know to ensure a smooth transition:

What Is NCE and How Does It Impact Public Sector Customers?

New Commerce Experience, or NCE, and is the latest iteration of the Cloud Solutions Provider (CSP) program, applicable to seat-based offers in Microsoft’s modern work (Microsoft 365 and Office 365) and business applications (Dynamics 365 and Power Platform). Key changes to be aware of in NCE compared to legacy CSP include:

  • Commitment Periods: NCE enforces annual and monthly commitment periods, with monthly subscriptions carrying a 20% price premium.
  • Modification Window: While customers can add seats at any time, they have seven calendar days post-activation to change the subscription term, decrease quantity, or cancel. After this period, the subscription is locked in for the agreed term. 
  • License Qualification: A single customer tenant can qualify for both education and nonprofit licenses under NCE.

When Did These Changes Start?

In July 2023, Microsoft launched NCE for public sector customers, including nonprofits, government, and education. These sectors require Microsoft’s approval to access specific licenses. NCE, initially introduced to commercial customers in 2020, will soon be available to public sector customers, simplifying subscription management for partners.

The original availability of NCE for the public sector was set for November 2023. However, based on feedback, Microsoft extended the transition period. The eventual phase-out of legacy CSP subscriptions means action is required before the renewal date to avoid automatic migration to NCE with annual commitments for both public and commercial customers.

Timeline

  • August 1, 2024: New subscription purchases must be on NCE.
  • No earlier than September 1, 2024: Microsoft-led migration for the public sector begins.
  • March 31, 2025: End of legacy incentives.

Key Considerations for Public Sector Clients Transitioning to NCE

As public sector organizations prepare for the transition to NCE, several major factors must be considered. These considerations are pivotal in ensuring that the move to NCE aligns seamlessly with the unique operational dynamics of the public sector.

Understanding the Transition: The shift to NCE is a major change, particularly for education, nonprofit, and government community cloud (GCC) customers. It’s crucial to grasp the full implications of this transition.

Timeline of Key Events: The transition began with high-volume offers on March 1, 2024, followed by monthly transition stages. This phased approach allows entities to adapt gradually.

Preparing for Migration: Work with your Connection Account Team to ensure eligibility for migration and thoroughly understand the migration process. Your Connection team can help access current legacy offers and their mapping of new NCE product SKUs.

Budget Cycles: As public sector organizations often operate on pre-allocated annual funding, work with your Connection Account Team to be aware of the changes to the licensing structure and payment schedules to ensure the management of costs effectively.

Security and Compliance: Cybersecurity remains paramount, with protecting sensitive data being a top priority. Adhering to security protocols is a critical aspect of the transition.

Microsoft and Partner Support: Successful navigation of the transition requires guidance from both Microsoft and its partners. Utilizing the support of your Connection Account Team can help overcome any challenges during the shift.

By addressing these key considerations, public sector clients can effectively prepare for the transition to NCE, ensuring alignment with budgetary requirements, user needs, security protocols, and compliance standards. Please reach out to your Connection Account Team with any questions in the coming months as your organization transitions.

]]>
From English Major to Ultimate IT Superhero:... https://community.connection.com/from-english-major-to-ultimate-it-superhero-a-leadership-journey/ Jun 26, 2024 Connection https://community.connection.com/author/connection/ https://community.connection.com/wp-content/uploads/2024/06/2661171-EnglishMajor-IT-Superhero-BLOG.jpg

The Connection annual IT Superhero Awards celebrate the unsung heroes of the tech world, recognizing outstanding individuals across categories like leadership, problem solving, innovation, and resilience. The pinnacle of these awards is the title of Ultimate IT Superhero, awarded to the individual who exemplifies the highest standards of technical excellence and leadership. In 2023, that honor went to Johan Dowdy, Global Head of IT and IT Security at Asana. Johan also received the Best Team Leader Award, a testament to his exceptional ability to inspire and guide his team to success. We had the privilege of speaking with this true IT superhero about his journey, leadership philosophy, and insights into fostering a thriving team. Here’s what he shared.

The Unexpected Path to Tech

Johan’s path into the tech world was anything but ordinary. “I studied English and German literature in school,” he laughs, “but computers always fascinated me.” A student job unexpectedly blossomed into a fulfilling career, proving that passion and flexibility can lead to unforeseen opportunities. His first role at a then-unknown startup called Workday ultimately propelled him to a management position. This company later became a major player in cloud computing, changing the way people use and experience technology.

Through managing others, Johan discovered that his love for teaching and mentoring—which he once thought was limited to academia—could flourish in the corporate world. By helping others grow in their careers, he found a way to fulfill his passion for mentorship, albeit in an unexpected setting.

The Evolution of an IT Leader: Learning to Delegate and Mentor

Johan’s leadership philosophy centers on two key principles: delegation and mentorship. Early in his career, he struggled with the idea that great managers don’t do all the work themselves. This realization was a turning point in his leadership style. “The leader’s role is not to do everything, but to orchestrate how it’s done,” he explains. He compares it to being a symphony conductor—setting the tempo, choosing the music, and guiding the players—even if he isn’t playing every instrument himself.

This philosophy extends to his approach to mentorship. Johan believes in actively engaging in his team’s development, fostering an environment where learning and growth are shared values. For him, it’s not just about telling people how to do their jobs, but about empowering them to learn and excel. He has created a culture of mutual growth, where both mentor and mentee learn from each other. This approach has led to the implementation of structured training programs to help his team navigate the challenges of remote work and the evolving IT landscape. These programs bridge the gap created by physical distance, ensuring that staff continue to learn and grow even when working remotely.

“The way you retain your staff is by training your staff,” Johan states. “If people are learning and growing, they’re less likely to change roles.” This belief in continuous development underscores Johan’s commitment to both his team’s success and his own growth as a leader.

The Qualities of an IT Superhero

This year, Johan’s award comes full circle as he takes on a new role: judge for the 2024 IT Superhero Awards. He’s looking forward to giving back and acknowledging the outstanding contributions of his IT peers. So, what qualities does he seek in the next generation of IT leaders?

Johan emphasizes the importance of collaboration and a customer-service mindset. He looks for individuals who foster strong partnerships with both colleagues and stakeholders, recognizing that IT is ultimately a service-oriented field dedicated to supporting the company’s success. Empathy and mindfulness, while sometimes overlooked, are also crucial leadership traits for Johan. He believes empathy is an essential skill that often gets overshadowed by the drive for results. “The best leaders lift others up with them,” he explains, and he actively seeks this quality in both potential hires and IT Superhero candidates.

IT Leadership that Inspires Change

Johan Dowdy’s story is an inspiration for anyone navigating a career in tech. It’s a testament to the power of embracing the unexpected, leading with empathy, and fostering a culture of continuous learning.

Key Lessons from Johan’s Journey

  • Don’t Fear the Unexpected: Career paths rarely follow a straight line. Embrace change as an opportunity for growth.
  • Empower Your Team: Great leaders create a collaborative environment where everyone feels valued and empowered to contribute.
  • Never Stop Learning: The tech landscape is constantly evolving. Foster a culture of continuous learning to stay ahead of the curve.
  • Lead with Compassion: Empathy is a powerful leadership tool. Understand and connect with your team on a personal level.
  • Recognize Unsung Heroes: Celebrate the individuals who go above and beyond to make your organization successful.

Learn more about the 2024 IT Superhero Awards and how we recognize IT professionals who go above and beyond every day. Winners of the 2024 IT Superhero Awards and the non-profit organization they choose to donate to will be announced at our Technology Summit in Boston, MA on September 12, 2024.

]]>
Federal Health IT Strategic Plan and Managed... https://community.connection.com/federal-health-it-strategic-plan-and-managed-services/ Jun 25, 2024 Jennifer Johnson https://community.connection.com/author/jennifer-johnson/ https://community.connection.com/wp-content/uploads/2024/06/2658522-Healthcare-Public-Policy-2-BLOG.jpg

In my prior Connected Blog post, Federal Health IT Strategic Plan and Third-Party Risk Management, I explored several strategic initiatives outlined in the ONC’s 2024-2030 Federal IT Strategic Plan which is in draft for public comment.

The four goals of the 2024-2030 plan are to:

  • Promote Health and Wellness
  • Enhance the Delivery and Experience of Care
  • Accelerate Research and Innovation
  • Connect the Health System with Health Data

In this second of a 4-part series, I’ll discuss managed service solutions that support the goal to enhance the delivery and experience of care.

Goal 2: Enhance the Delivery and Experience of Care

Objectives:

  • Providers deliver safe, equitable, high quality, and improved care
  • Patients experience expanded access to quality care and reduced or eliminated health disparities
  • Healthcare is improved through greater competition and transparency
  • Providers experience reduced regulatory and administrative burden
  • The healthcare workforce uses Health IT with confidence

Implied in the objectives of care delivery are the ways in which providers are burdened rather than helped by technology. The United States is facing a shortage of up to 124,000 physicians by 2034. That includes 48,000 primary care physicians. Those who remain in patient-facing roles, 49% report symptoms of burnout. Whether death by 1000 clicks, note bloat, or pajama time, clinical care teams have been vocal about how administrative burden robs them of the joy of practicing medicine.

While not patient-facing, the role of a healthcare IT or digital health leader is similarly impacted by the workforce shortage with pronounced gaps in skillset and reach. As is true with their clinical counterparts, IT leaders also have considerable administrative burdens that make it difficult to execute the basics, let alone reach strategic IT initiatives that deliver value and help support core clinical and financial objectives.

Connection has built an impressive array of managed services that enables health IT leaders to prioritize projects and maximize the skills of their team.

End User, Data Center, Network, and Security managed support programs fully integrate into an organization help desk and workflow. Organizations facing shortages in either human capital or talent, leverage Connection’s bench strength for project staffing, contract-to-hire, direct hire, and payroll services, help desk, and service desk support. By partnering with Connection, clients become more efficient to help reach their objectives.

Healthcare organizations succeed when they can fulfill the promise of value-based care that aligns with the strategic imperatives. Partnering with Connection can help IT leaders reach these goals.

If you’d like to learn more about how Connection can help your organization become more efficient through managed services, engage our Healthcare Practice today to get started.

]]>
Beyond the Core: How Apple is Integrating AI... https://community.connection.com/beyond-the-core-how-apple-is-integrating-ai-to-redefine-personal-computing/ Jun 21, 2024 Chris Roux https://community.connection.com/author/chris-roux/ https://community.connection.com/wp-content/uploads/2024/06/2641310-Connected-Post-Webinar-BLOG-Image.jpg

AI has rapidly transformed from a technological novelty to a fundamental tool driving business productivity and innovation. Apple empowers businesses with a unique blend of AI-powered software and state-of-the-art hardware. This combination streamlines operations, enhances decision-making, and fuels innovation.

Connection, as an Authorized Apple partner, plays a crucial role in this AI revolution. We leverage Apple’s cutting-edge technology to craft bespoke solutions that address your specific business needs. By harnessing the full potential of Apple’s AI ecosystem, Connection ensures your business remains competitive and achieves its strategic objectives.

The Mac Difference: How Unified Memory and Core ML Empower Your AI Initiatives

For businesses looking to leverage AI, Apple provides unparalleled tools and capabilities to enhance productivity and streamline operations.

Apple’s Evolution in AI Hardware

Apple’s AI hardware journey began in 2017 with the A11 Bionic chip, which introduced the neural engine—a specialized component for handling AI and machine learning tasks. This innovation enabled features like Face ID and Animoji.

With the transition to Apple Silicon in 2020, Apple seamlessly integrated the neural engine into its M series chips for Macs, continuously improving performance and expanding AI capabilities.

What Makes an AI PC?

Before we dive into Apple’s advantages, let’s clarify what we mean by an “AI PC.” According to Canalys, an AI PC is a computer that can process AI workflows locally using a dedicated neural processing unit (NPU). This local processing is key, offering several advantages over cloud-based AI solutions:

  • Enhanced Security: Keeping data on-device minimizes the risk of data breaches during transmission.
  • Lower Latency: Local processing leads to faster response times and smoother workflows.
  • Reduced Costs: Businesses can save on cloud service expenses by processing data on-device.

Every Mac powered by Apple Silicon is designed to excel at AI and ML tasks. The combination of a powerful CPU, GPU, and dedicated neural engine accelerates AI workflows while maintaining energy efficiency and impressive battery life. Apple is now on its third generation of M series chips insert on the Mac with built-in neural engines, outpacing competitors who are only just starting to introduce PCs with NPUs.

Hardware and Software Synergy

The true power of the Mac lies in the seamless integration of its hardware and software. Apple’s Core ML framework, along with a comprehensive suite of developer tools, drives both macOS features and third-party app utilization of AI and ML. This integrated approach ensures optimal AI performance by coordinating the efforts of CPUs with machine learning accelerators, powerful GPUs, and other components.

Unified Memory: A Game Changer

One of the standout features of Apple Silicon is its unified memory architecture, which allows all compute elements (CPU, GPU, neural engine) to share a large pool of high-speed memory. This eliminates the bottlenecks of traditional GPUs with separate memory pools, enabling Macs to handle large models and data sets with remarkable efficiency.

Core ML and Developer Tools

Core ML, available since 2017, serves as the central framework for machine learning on Mac. It’s optimized for secure, on-device performance, dynamically leveraging the CPU, GPU, and neural engine based on the task at hand. Developers can seamlessly integrate machine learning models using Core ML’s pre-built APIs or craft custom models with Create ML, Apple’s app for streamlined ML model creation and optimization.

Real-World Applications and a Thriving Ecosystem

The Mac ecosystem boasts a vast array of third-party applications that harness Core ML for AI and ML tasks. These applications demonstrate the practical benefits of Apple’s AI infrastructure, from intelligent features in Adobe Illustrator to enhanced capabilities in Zoom. Tools like Photo AI and Mac Whisper exemplify how AI can amplify productivity by automating complex tasks like image upscaling and audio transcription.

The Apple Advantage for Businesses

Why should businesses choose Apple for their AI endeavors? The answer lies in a combination of factors:

  • Boosted Productivity: Macs are designed to supercharge productivity, with macOS features like voice isolation for crystal-clear calls, secure offline dictation, and the ability to extract text from images without relying on the cloud. These tools make business operations smoother, more secure and focused on privacy.
  • Security and Privacy: Apple devices are built with advanced security measures at their core, safeguarding both personal and corporate data.
  • Seamless Integration: Apple’s ecosystem ensures a smooth flow of work across iPhones, iPads, and Macs, enhancing collaboration and efficiency.
  • Effortless Deployment: With zero-touch deployment and automatic enrollment in mobile device management (MDM) solutions, setting up Apple devices for your team is a breeze.
  • Cost Efficiency: While Macs may have a higher upfront cost, they often lead to lower total cost of ownership (TCO) over time. Studies have shown that Macs can save businesses significant amounts in hardware, software, support, and operational costs over a three-year period.

How Connection Elevates Your Apple Experience

Connection leverages its extensive expertise and strong partnership with Apple to deliver unparalleled support and solutions tailored to your business needs. By offering a range of services from deployment to lifecycle management, Connection ensures that your Apple devices are seamlessly integrated and optimized for peak performance.

Comprehensive Support, Tailored for You

Connection is structured to support diverse sectors, with dedicated divisions for Business Solutions, Enterprise Solutions, and Public Sector engagements. This enables them to cater to specific industries like healthcare, manufacturing, retail, and financial services, offering tailored IT solutions and services that align with unique needs.

Your Authorized Apple Partner

With a 40-year relationship with Apple, Connection is an authorized Apple service provider, offering Apple-certified support. This long-standing partnership ensures access to top-tier services like Apple Business Manager, Apple School Manager enrollments, and volume purchase programs. Connection also facilitates AppleCare for Enterprise, AppleCare Plus enrollments, and Apple Financial Services, providing flexible financial solutions tailored to your business.

Professional Services That Fit Your Needs

Connection’s professional services are designed to meet a wide range of business needs. These services include readiness reviews, mobile device automation, Mac proof of concepts, authentication and identity integration, and comprehensive IT lifecycle services. By proactively managing device refresh cycles and ensuring proper recycling of end-of-life resources, Connection keeps your business at the forefront of technology.

Holistic IT Lifecycle Management

Effective device management is crucial for any organization. Connection assists businesses in planning and executing refresh cycles for iOS and Mac devices, ensuring that outdated hardware doesn’t impede productivity. They offer trade-in options and proper recycling services, making it easy for businesses to retire and replace devices while maintaining a seamless workflow.

Enhanced Support with AppleCare

Connection’s partnership with AppleCare provides an extra layer of support from experts who know Apple products inside and out. AppleCare for OS agreements focus on IT department-level support, while AppleCare for Enterprise caters to employee support, providing priority on-site service and 24/7 help desk support, including next-day business device repair or replacement.

Advanced Services Through TIDC

Connection’s Technology Integration and Distribution Center (TIDC) is a unique value-add that sets them apart. As a Jamf Pro and Jamf Gold partner, Connection offers MDM-agnostic solutions, custom packages, automated device automation, and Mac evaluation units. These services provide a comprehensive health check of your environment, ensuring optimal performance and seamless integration of new technologies like the M3 MacBook Air and M3 MacBook Pro.

Business Outcomes That Matter

Connection’s offerings are focused on delivering tangible business outcomes, including digital transformation, managed services, professional services, and supply chain optimization. With a strong emphasis on data and AI, Connection empowers businesses to harness the power of AI within their operations, creating custom workflows that drive efficiency.

Unifying Device Management with Microsoft Intune

Many organizations seek a unified platform to manage all devices, regardless of operating system. Microsoft Intune fulfills this need, offering a streamlined, cost-effective solution for managing Apple devices within a Microsoft environment.

Building Your AI-Powered Future with Apple and Connection

Apple’s AI-enabled Macs provide a powerful synergy of hardware and software optimized for AI and ML workflows. With top-tier security features, power efficiency, and a vibrant ecosystem of third-party apps, Macs are the ideal choice for AI-driven tasks and everyday business needs.

As AI continues to evolve, Macs are well-positioned to lead the way in business productivity and innovation. The seamless integration of hardware and software, coupled with the ability to run complex AI models locally, ensures that Macs will remain at the forefront of technology, delivering exceptional performance and value to businesses worldwide.

Connection’s deep expertise and long-standing partnership with Apple empower businesses to harness the full potential of Apple’s cutting-edge technology. From deployment and integration to ongoing management, Connection ensures your AI initiatives are not only successful but also drive real business results. Together, Apple and Connection provide a comprehensive solution for navigating the AI landscape and positioning your business for future success.

]]>
How AI Is Already Transforming the IT Job... https://community.connection.com/how-ai-is-already-transforming-the-it-job-landscape/ Jun 11, 2024 Patrick Dja Konan https://community.connection.com/author/patrick-dja-konan/ https://community.connection.com/wp-content/uploads/2024/05/2647399-The-IT-Landscape-In-AI-Era-BLOG.jpg

Artificial Intelligence (AI) is significantly transforming the IT job landscape, heralding a new era where the demand for IT professionals is on the rise. The integration of AI into various business operations is not only automating routine tasks, but also creating new roles that require a unique set of skills. As AI continues to evolve, it is becoming increasingly clear that its impact on the job market is both profound and multifaceted.

One of the key ways AI is changing the future of work is by driving job creation. A report by the World Economic Forum suggests that nearly half of the companies surveyed expect AI adoption to create jobs, with a particular increase in roles linked to AI such as data scientists, big data specialists, and business intelligence analysts. The U.S. Bureau of Labor and Statistics predicts that the employment of computer and information research scientists may grow by 21% between 2021 to 2031.

A Competitive Job Market Gets Tighter

The demand for IT professionals has significantly increased over the past few years, thus creating a very competitive job market. With a shortage of IT talent already existing, the adoption of AI is set to reshape the job market, with certain skillsets becoming highly sought after. According to Forbes, professionals with a broad knowledge base and the ability to quickly adapt to new topics may be more in demand than those with narrow specializations. This shift is due in part to the versatility of AI tools, which can enhance the performance of a wide range of tasks, from business analysis to software development.

In terms of specific skills, the ability to work with generative AI, large language models, and AI-powered Web applications is becoming increasingly valuable. A study by Dataquest indicates that job postings requiring generative AI skills have surged, with roles such as Prompt Engineer, AI Ethicist, and Synthetic Data Scientist emerging as new career paths. Similarly, Indeed listed Computer Engineer, Business Intelligent Developer, Software Engineer, Big Data Engineer, and Machine Engineer as some of the growing opportunities within AI. 

How to Attract the Talent You Need

As companies continue to adopt AI technologies, the IT job landscape will likely see a continuous increase in the demand for professionals equipped with these advanced skills. This trend will certainly create exciting job opportunities but also widen the IT skills gap, which will make it challenging for companies to find talent to hire. To attract IT talent in the era of AI, organizations should focus on several best practices, such as creating an inclusive and diverse workplace, competitive compensation packages, and opportunities for professional growth and development. Lastly, working with a staffing partner can help organizations have access to a larger pool of talent.

With AI now revolutionizing a wide variety of industries, the demand for skilled IT professionals in this field will increase significantly. As an IT company, Connection is at the forefront of emerging technologies and can assist organizations as they adopt artificial intelligence. Our knowledge and expertise in the IT industry have allowed us to build a proven network of IT talent across the United States and help companies fill IT hiring needs through our recruiting services. Contact us today for more information.

]]>
Empowering Educational Excellence: Keller... https://community.connection.com/empowering-educational-excellence-keller-isd-seamlessly-transitions-to-microsoft-solutions-with-guidance-from-a-strategic-partner/ Jun 06, 2024 Makayla Mota https://community.connection.com/author/makayla-mota/ https://community.connection.com/wp-content/uploads/2024/06/2639270-Empowering-Educational-Experience-BLOG.jpg

As a trusted partner of Microsoft Education and a Global Training Partner, Connection specializes in customized solutions and services for educational institutions, bringing a wealth of experience to the education sector. Connection also provides technology solutions infused with Microsoft tools and services to propel digital transformation within school systems across North America.

The Technology Integration and Distribution Center (TIDC) at Connection played a pivotal role in facilitating Microsoft Surface sales for Keller Independent School District when they transitioned from Google to Microsoft technologies under the leadership of new CTO, Matthew Vrlenich. Keller Independent School District (KISD) serves over 34,000 students across numerous cities and towns, spanning 51 square miles of land north of Fort Worth, Texas.

In the ever-evolving landscape of education technology, schools often find themselves reassessing the platforms they use to support teaching and learning. When Matt came on board at Keller ISD, it prompted a thorough evaluation of their technological infrastructure and budgetary considerations.

“Microsoft is just far superior to other companies in the market with their productivity tools,” Matt says. “In my opinion, as a long-time tech guy, Microsoft has just always been ahead of the game. And then the security side was the other big thing for me because when I walked in the door here, there wasn’t really a security plan. In the previous district I worked in, I had a lot of success integrating Microsoft Security into our environment to cut costs. Cybersecurity solutions are not cheap, and there are not EDU SKUs currently.”

Matt worked closely with Jennifer Price, Keller’s Superintendent of Curriculum and Instruction, throughout the transition, and the two relied heavily on Tiffani Collins, Business Development Manager at Connection, as they worked with Connection and the TIDC.

“Tiffani played an integral role in the success of this transition. She was so great. A lot of times your success on large implementations can live or die with your rep and she worked well with our Microsoft team facilitating both the connection and scheduling with the TIDC,” Matt says.

“The TIDC served as a pivotal piece of the Keller device refresh,” Tiffani says. “It served as a centralized hub ensuring efficient deployment of the 23,000 new devices in an efficient manner, ramping up or ramping down in conjunction with what the customer needed. One notable advantage that was highlighted by the CTO was the convenience of dealing with a single entity, rather than navigating multiple channels. The streamlined communication process fostered clarity and efficiency when the customer needed to address concerns, track progress, and obtain assistance—all through a single point of contact.”

Matt agrees, “I’ve done multiple large-scale deployments, and I have hit several road bumps along the way. What set Connection apart from other vendors on this project was that I could do everything in-house with one vendor. The operation that you guys do with the TIDC is so impressive. I’ve been doing this for a long time and that is one of the better operations I have seen from front to back.”

Another key factor in this successful transition was the inclusion of Microsoft Professional Development from Connection for both Keller’s instructional and administrative staff. Jennifer Price says, “I will say one of the smartest things that Matt did is he moved the tent from technology to curriculum and instruction, so that made a forced connection between the two departments. So, when ed tech came into our department, we started working with Connection, specifically Cindy Daniels, to create a strategic plan on groups that we were going to start training in the spring before the deployment.”

Keller took a strategic approach in training their administrative staff first, setting up a full day of training led by Cindy Daniels for the district’s administrative assistants, secretaries and librarians. Committed to empowering the district’s entire community, Connection collaborated closely with schools and leaders to design and implement customized solutions aligned with their goals—and that included beginning with the admin staff who are often overlooked in terms of training and are at the heart of the school community.

“If your office staff—your secretaries, your admin assistants, your librarians—buy in, that message spreads like wildfire,” Matt explains.

“We had two Connection Professional Development trainers because the group was so large,” Jennifer adds. “And what was awesome is they went back singing the praises of Microsoft. Saying, ‘Oh my gosh, we’re going to get this, and Microsoft does this, and we’re going to get this.’ I mean, they were doing the selling for us.”

The administrative training was quickly followed by full-day in-person training sessions for all curriculum and instruction departments including special education, fine arts, athletics, and facilities. They also hosted an “Administrator Retreat” with Principals, Assistant Principals, and District-level staff, which included a full rollout implementation training in July with all campus administrators.

“Transitioning from Google to Microsoft is a huge undertaking, and ensuring that all staff feel comfortable means equipping them with the skills to feel confident. That meant professional development needed to be involved,” Tiffani adds. “As a former teacher, I am very aware of the workload teachers have, and to make this transition smooth, teachers needed to be empowered and not overwhelmed. Teachers and staff were able to acquire new skills and adapt to different tools that will in turn make their day-to-day lives in front of students easier, leading to higher morale and retention. By emphasizing the importance of investing in employees’ growth through professional development, we were able to create a sense of ownership amongst the staff. Intentional PD is not just one or two days in a classroom, it is a lifelong experience that can ultimately lead to a stronger educational community.” 

In the end, Connection’s Sales team, Professional Development team, Product Management, Operations, Finance, and the TIDC all came together to facilitate what became the largest EDU and Microsoft Surface deal in Microsoft history—23,000 Surface devices provisioned with Windows Autopilot. Weekly Wednesday lunch meetings helped to keep the project on track by taking the time to check in with all parties involved and brainstorm what might be missing from the rollout plan. This collaborative working relationship was an integral part of the rollout’s success.

Connection distinguished itself by acting not only as a hardware and services provider, but also as a strategic partner committed to educational success. By showcasing the Professional Development expertise of Cindy Daniels and navigating challenges such as attaining Microsoft Cost Plus certification, Connection demonstrated its dedication to delivering a comprehensive solution within tight deadlines.

Through collaborative efforts, TIDC ensured a seamless transition, garnering support from board members and positioning the district for long-term success. The engagement highlighted Connection's ability to provide tailored solutions and impactful professional development, prompting Matt to choose Connection as the preferred partner for future initiatives. The transition's success can be attributed to the synergy between the district and Connection, as well as the meticulous planning and execution by all parties involved. Matt noted that without this cohesion, such a monumental task would have been impossible to accomplish within the allotted timeframe.

“Typically, you don’t do a Google to Microsoft conversion for a district this size and do a 23,000-device rollout in eight months—what we did together was unheard of—and without the support and collaboration with Connection it wouldn’t have been a success.”

Keller ISD proudly serves a vibrant community dedicated to nurturing student achievement and upholding our tradition of excellence in education. Spanning across portions of Colleyville, Fort Worth, Haltom City, Hurst, North Richland Hills, Southlake, Watauga, Westlake, and the entirety of Keller, our district caters to over 34,000 students. Encompassing 51 square miles, Keller ISD boasts the third-largest land area in Tarrant County. Keller ISD employs more than 4,000 staff members including just over 2,700 classroom instructional employees. Every member of the Keller ISD team is committed to delivering an outstanding educational journey for our students. Whether it's through classroom instruction, maintaining our school facilities, or providing unwavering support and guidance, we prioritize ensuring an exceptional learning environment for all.

]]>
Meet ChromeOS: Powered for Big Ventures.... https://community.connection.com/meet-chromeos-powered-for-big-ventures-perfect-for-your-business/ May 20, 2024 Connection https://community.connection.com/author/connection/ https://community.connection.com/wp-content/uploads/2024/05/2612599-Blog-Google-ChromeOS.jpg

Did you know 91% of small business owners work over 40 hours a week?1 As a business owner, you're constantly seeking ways to increase productivity and cut costs. Meanwhile, your IT team struggles to balance reactive and proactive work, security, and the simplification of operations.

To perform in today’s modern landscape, efficient and intuitive hardware and software are crucial. Gone are the days when advanced device management solutions were only accessible to large enterprises. ChromeOS device management with Chrome Enterprise Upgrade empowers your small business with the built-in business capabilities of ChromeOS. This translates to a secure, manageable, and empowered workforce—all backed by 24/7 IT admin support.

Looking to select the right device for your workers? Here are the top 5 benefits of switching your small business to secure, cloud-first computing with ChromeOS.

1. A Focus on Savings

Small businesses understand the pressure to cut costs. ChromeOS devices deliver up to 65% compared to previous devices, and an estimated $1,700 in savings per device over three years due to time efficiencies and productivity gains.2 You can learn more about simplifying and saving with ChromeOS in this on-demand webinar presented by Google’s Lawrence Lui, a ChromeOS product manager.

2. Effortless Device Management

ChromeOS devices deploy 63% faster than other operating systems2, getting your people up and running quickly. Chrome Enterprise Upgrade unlocks the full potential of ChromeOS devices for your business. Here's how:

  • Zero-touch Enrollment: No more manual setup! Pre-configure devices and ship them directly to employees. They'll be ready to work in just three easy steps upon connecting to Wi-Fi.
  • Seamless Network Access: Employees can instantly connect to your secure business network as soon as they connect to Wi-Fi.
  • Centralized Device Management: Take control with ease. Default Google-recommended policies—and the ability to create custom rules—keep all your ChromeOS devices secure and running smoothly, no matter their location.

ChromeOS is also 36% easier to manage than other operating systems.2 Plus, you get free 24/7 IT admin support with ChromeOS device management through Chrome Enterprise Upgrade.

3. Enterprise-grade Security

Managed ChromeOS devices have 24% fewer security attacks2 and have never had a reported ransomware attack. Ever.* And ChromeOS has 26% faster security updates than competitors.2

ChromeOS is the most secure OS out of the box.3 Built-in security features include automatic updates, sandboxing, and verified boot. ChromeOS device management strengthens these capabilities by allowing administrators to enforce policies like device encryption, application allowlisting, and remote device wiping. It also enables sign-in restrictions and force re-enrollment to ensure data stays secure.

Learn more about working confidently with built-in security here.

4. Work Without Limits

ChromeOS devices deliver 77% higher productivity and faster reboots compared to legacy or other devices.2

Slow and lagging technology is frustrating. ChromeOS devices are agile and flexible—so you can stay productive no matter where you’re working. ChromeOS takes the burden off your IT team and empowers your employees.

The centralized Google Admin console allows for easy management from anywhere, freeing your IT staff from tedious tasks. Automated updates, policy enforcement, and robust security features ensure your devices are always protected, allowing your IT team to focus on what truly matters—supporting your business needs in an efficient and stress-free way.

5. Scale Your Business with Confidence

As your business thrives and reaches new milestones, taking the next step can feel daunting. But what if your technology could seamlessly adapt and grow alongside you?

ChromeOS is built with scalability in mind. Its adaptable features empower your business to handle whatever comes next. Adding new employees or expanding to new locations? No problem. IT teams can effortlessly integrate new devices into the Google Admin console without significant time or resource investment. Get the full picture of Google’s business solutions here.

Learn more about ChromeOS or contact your Connection Account Team to discuss making the right move for your small business.

1. OneDeck, “Small Business Trends: 58% Of Small Business Owners “Very Concerned” About the Economy” April, 20231
2. IDC Business Value Paper, sponsored by Google, The Business Value of ChromeOS, doc #49920522, March 2023
3. Atredis - Google ChromeOS Competitive Analysis - v1.0

* As of 2024 there has been no evidence of any documented, successful virus attack or ransomware attack on ChromeOS. Data based on ChromeOS monitoring of various national and internal databases.

]]>
Celebrating Winners of the 2024 Women of the... https://community.connection.com/celebrating-winners-of-the-2024-women-of-the-channel-awards/ May 17, 2024 Connection https://community.connection.com/author/connection/ https://community.connection.com/wp-content/uploads/2024/05/2604981-CRN-2024-WOTC-BLOG.png

As one of the greatest drivers of innovation, the IT industry is responsible for bringing incredible benefits to the way we live, work, and play. From revolutionary new technologies and products to entirely new ways of collaborating and connecting with others, IT delivers change on a grand scale. That’s why it’s so important to celebrate fresh ideas and different perspectives in the industry—greater inclusion helps build on the momentum we’ve achieved and ensure everyone’s needs are heard and represented. CRN’s Women of the Channel Awards showcases those perspectives and experiences, honoring the women who demonstrate exceptional channel leadership, strategic vision, and advocacy. The entire team at Connection is proud to announce that several of our outstanding coworkers have been recognized on CRN's prestigious Women of the Channel Power 100 Solution Provider list and Women of the Channel list for 2024.

Women of the Channel Power 100 Solution Provider

  • Anna Philbrick
  • Lisa Trisciani

Women of the Channel

  • Roxanne Haayer
  • Meghan Haley
  • Jennifer Johnson
  • Kelly Kempf
  • Karen Moriarty
  • Dana Sherry
  • Katie Springs
  • Rebecca Zsolnay

This recognition is a testament to their hard work, dedication, and impact in our organization and the broader tech community. Connection is proud to support our employees with robust Diversity, Equity, and Inclusion efforts as part of our Connection Cares program. We are deeply committed to fostering an inclusive workplace where all employees have the opportunity to thrive. Congratulations to all winners of the 2024 Women of the Channel Awards for your well-deserved honor. From the entire team at Connection, we wish you the best as you continue to share your experiences and deliver exciting innovations that move our industry forward!

]]>
Federal Health IT Strategic Plan and... https://community.connection.com/federal-health-it-strategic-plan-and-third-party-risk-management/ May 14, 2024 Jennifer Johnson https://community.connection.com/author/jennifer-johnson/ https://community.connection.com/wp-content/uploads/2024/05/2608538-Health-Public-Policy-BLOG.png

On March 27, 2024, the Office of the National Coordinator for Health Information Technology (ONC) released the 2024-2030 Federal IT Strategic Plan which is in draft for public comment.

The four goals of the 2024-2030 plan are:

  • Promote Health and Wellness
  • Enhance the Delivery and Experience of Care
  • Accelerate Research and Innovation
  • Connect the Health System with Health Data

In this first of a four-part series, I’ll explore each of these goals, the objectives that will drive the attainment, and highlight some of the strategies for advancing these goals while connecting the strategies to ways that Connection helps our clients.

Why Is the Federal Health IT Strategic Plan Important to Health IT?

The plan is important because it guides federal government efforts, helps constituents understand how their tax dollars are being spent, and emphasizes health equity in all aspects of health IT and electronic health information (EHI). More than 25 federal government organizations will use the plan to prioritize resources, align and coordinate efforts, benchmark and assess progress, and most importantly, amplify health IT priorities to the industry.

This plan builds upon significant progress made in prior plans, including common standards such as UCDI and HL7 FHIR—which allows the electronic capture and exchange of clinical data with an increased emphasis in areas such as health equity, public health, and artificial intelligence.

Goal 1: Promote Health and Wellness

Objectives:

  • Individuals are empowered to manage their health.
  • Individuals and populations experience modern and equitable healthcare.
  • Communities are healthier and safer.

The strategies to help individuals manage their health include using EHI securely, privately, and without special effort so that they can engage with their own health information. Another strategy is to improve the security and portability of EHI through APIs and other interoperable health IT so that individuals can easily use their EHI across various technology platforms. It’s important to help protect an individual’s right to share EHI with third-party applications safely, privately, and securely by protecting EHI in circumstances where HIPAA rules are not applicable.

Though the specific language in the strategic plan around the use of EHI is aimed at individuals managing their own health information, often—through the use of smartphones and wearable technology—it underscores the importance of understanding the risk of putting personal health information into third-party applications.

Healthcare provider organizations rely heavily on third-party applications in all facets of care delivery. Within a healthcare provider organization, third-party risk monitoring ensures all business partners are compliant to that provider organization’s standards and risk tolerance. 62% of cybersecurity threats originate from within the third-party ecosystem. Traditional assessment methods, such as questionnaires, risk scoring services, and periodic audits are not only time-consuming, they also fall short in providing comprehensive, real-time insights into third-party risks.

To address the pressing issue of third-party cybersecurity risk, Connection offers a different approach that efficiently collects and analyzes critical risk assessment data and eliminates manual inefficiencies. We aggregate risk assessment results and present a comprehensive and current view of third-party risks.

An aggregated risk score for each third-party partner offers healthcare IT professionals the opportunity to prioritize actions based on risk levels, enabling them to take timely, well-informed measures to bolster their cybersecurity defenses. Connection’s proactive risk management approach equips you with the tools needed to protect sensitive data and maintain the trust of your patients and their families. If you’d like to learn more about how Connection can help your organization effectively control third-party risk, engage our Healthcare Practice today to get started.

]]>
Connection’s Copilot for Microsoft 365... https://community.connection.com/connections-copilot-for-microsoft-365-workshop/ May 07, 2024 Makayla Mota https://community.connection.com/author/makayla-mota/ https://community.connection.com/wp-content/uploads/2024/05/2598276-Copilot-Workshop-Blog.jpg

Connection is now offering a comprehensive Copilot for Microsoft 365 Workshop. This enables organizations to harness the potential of AI while also making sure they are prepared for the meticulous planning that comes along with such an endeavor. This workshop follows a three-phase structure, leading you through the essential stages of evaluating your needs, determining key Copilot applications, and developing a feasible plan of action. Additionally, it delivers valuable insights into your organization's preparedness and pinpoints areas for improvement through tailored services. These services concentrate on bolstering your data infrastructure, refining accessibility, and strengthening security protocols.

So, what exactly does the workshop entail and what—if you are interested—preparations can you take to ensure success? I sat down with David Carey, Field Solution Architect at Connection, to address these and many more questions regarding Connection’s Copilot for Microsoft 365 Workshop.

Q: What is the workshop? Can you provide some details on what is covered, the length of the workshop, and its logistics?

A: The workshop is about a 6-hour engagement and consists of three phases.

  • First we have the Assess phase, where we discuss the objectives, scope, and other details of the workshop. We also assess the customer’s readiness to adopt Copilot for Microsoft 365.
  • Next, we have the Art of the Possible phase. In this phase, we showcase the capabilities of Copilot for Microsoft 365 in the form of demonstrations.
  • Lastly, the Build the Plan phase entails interactive sessions where we work with the customer to identify use cases and develop a plan and timeline to prioritize and implement those use cases

Q: Does a customer need to meet any prerequisites to attend the workshop?

A: The customer does have to meet some qualifications to be eligible for the workshop. They must have a minimum of 250 Microsoft 365 users—these can be Microsoft 365 and / or Outlook 365 licensed users. They also need to be currently purchasing their Microsoft 365 licensing from Connection. And they must be using Entra ID—formerly known as Azure AD. Hybrid or Entra ID only is fine.

They also must be willing to invest six hours into the engagement with any necessary key business stakeholders—if needed. This last part is key because the workshop relies on interaction from users of the technology as well as their leadership.

Q: What can a customer expect?

A: The customer can expect the workshop to take a minimum of 3-4 days—depending on the customer’s stakeholder availability to attend the sessions. The sessions can be very interactive, so open, two-way conversation between the customer and the Connection team throughout the workshop is highly encouraged.

Q: What level of AI and / or Microsoft knowledge does a customer need to attend this workshop?

A: No specific AI knowledge is required for the workshop. However, regarding Microsoft, the customer should have stakeholders attend that are knowledgeable about their current Microsoft 365 applications as well as the technical / administrative side of Microsoft 365.

Q: How can the customer prepare for the workshop? Individually and within their organization.

A: One way that the customer can prepare for the workshop is by working with their internal business-facing teams to identify potential use cases for Copilot for Microsoft 365—as well as identifying stakeholders that align to those use cases. Another way to prepare would be to review their current data governance / security posture and be prepared to talk about their ongoing efforts and the tools being used in that space.

Q: What are the outcomes of the workshop?

A: The customer will walk away from the workshop with:

An understanding of what is possible with Copilot for Microsoft 365

  • Technical guidance on improving their infrastructure to support the use of Copilot for Microsoft 365
  • An actionable, high-level plan to implement Copilot for Microsoft 365 for their identified use cases
  • Support from the Connection team for any aspect of the plan—including, but not limited to, licensing and / or professional services

Q: If a customer is interested in attending the workshop, how can they sign up?

A: If the customer is interested in attending the workshop, they should start by contacting their Account Manager. The Account Manager can engage the correct resources for the workshop by submitting a “Microsoft Licensing” request in Xcelerate.

In addition, David hosted a webinar briefing on the workshop that you can find on-demand here
Copilot Microsoft 365 Workshop Please reach out to your Connection Account Team for more details or to schedule a Copilot for Microsoft 365 Workshop today



]]>
Microsoft’s Teams Unbundling: What’s the... https://community.connection.com/microsofts-teams-unbundling-whats-the-impact-on-your-organization/ May 02, 2024 Casey Lindsay https://community.connection.com/author/casey-lindsay/ https://community.connection.com/wp-content/uploads/2024/04/2603048-Microsoft-Teams-Unbundling-BLOG.jpg

It’s that time of the year again…spring has sprung, the flowers are in full bloom, the grass is growing fast, it’s such a rebirth of life—and with that comes another unprecedented Microsoft announcement: the “unbundling” of Teams from Office and Microsoft 365 suites. Change is constant in the Microsoft world, but this change is profound. Let’s dig in and start with the why.

There are three main reasons Microsoft has made this change:

  1. Antitrust Investigation: Microsoft is making these unbundling moves with an aim to head off European antitrust regulators that are in the process of investigating the impact of bundling Microsoft Teams with other Microsoft products. Microsoft unbundled Teams from Office 365 across Europe and Switzerland in 2023, and this move expands this unbundling globally.
  2. Anticompetitive Landscape: Competitors like Salesforce’s Slack have argued that Microsoft’s practices were a form of monopolistic self-dealing, i.e. customers were left with no choice but to go “all in” on the Microsoft stack, which included the obvious Teams deployment for unified communications (UC).
  3. Overarching “Pricing Change”: Using Connection’s CSP pricing that is published on our website, historically, Microsoft 365 E3 with Teams bundled came at a price point of $32.84 per user per month. Today, Microsoft 365 E3 (without Teams) is $30.84, and Microsoft Teams Enterprise is $4.84 for a grand total of $35.68 per user per month. That’s an 8% increase to end up with the same product mix as before!

Now let’s pivot from the “why” and help to distill these changes down to how they will affect you, the Microsoft customer. As with any Microsoft rules, there are always nuances, and I will keep my commentary high-level for ease of interpretation and to help reduce heartburn.

First and most important, if you are an existing subscriber of Microsoft 365 E3/E5 or Office 365 E1/E3/E5 with Teams included, rest assured; you can continue to purchase your existing suites that include Teams. You will be able to upgrade these existing subscriptions to a higher version with Teams. You will even be able to renew these suites with Teams into a new agreement with one caveat: you cannot renew from EA to CSP, as Microsoft considers this a “new” subscription. But you can do to the opposite and renew these suites with Teams from a CSP to an EA. There is one last unique customer circumstance to mention: for customers in the middle of a CSP partner change, Microsoft has offered a grace period until June 30, 2024, to get any new subscriptions for Office 365 and Microsoft 365 procured with Teams included.  

The bottom line is any “net new” Office 365 or Microsoft 365 purchase (meaning you don’t currently own an active subscription of the suite) on an EA or CSP must be purchased as two separate SKUs: Office 365/Microsoft 365 without Teams + the Teams Enterprise SKU if you desire to use Teams.

For those customers using another solution for UC like Webex, Zoom, or Slack, this does bring some sunshine in the way of savings. You’ll end up saving between $1.75–$2.25 per user, per month without Teams. But I would also argue a point where that savings could bring diminishing returns. For instance, let’s say a company is using a competitor to Teams but has Teams deployment on their roadmap, even if it’s remote. It would be vital to dig in and compare the financials to unbundle now and forecast long-term costs to stack the two SKUs down the road. Projecting that breakeven point is necessary to determine if your long-term costs could outweigh your immediate savings. This is probably a good time to let you know that this kind of forecasting fits squarely into my team’s wheelhouse: Connection’s Microsoft Landscape Optimization (MLO) service!

There are a few Microsoft suites that will remain unchanged, meaning Teams will remain available to be bundled (but will also include an option to unbundle). This includes all Frontline SKUs: Microsoft 365 F1 and F3 plus Office 365 F3 (existing customers only). Additionally, Microsoft 365 Business Suites will also remain with an option to include Teams bundled.

There are certainly a lot of rabbit holes you can venture down under each customer's circumstance when researching your best option. I would lean on Connection to be your guide through this big announcement. I do believe that Microsoft is making this move to provide customers with more flexible options for collaboration. I also think this is part of an overall strategy to position Teams as a standalone product to compete more effectively with other tools in this space. However, I’ll leave you with a final thought on this topic—and this is just my own opinion—I think this move is more about Microsoft staying ahead of (the potential for) legal scrutiny than it is about offering their customers an option to save money or more flexibility in choosing a collaboration tool.

Ready to figure out your next steps for your Microsoft licensing situation? Contact us today.

]]>
Journey to the Fourth Industrial Revolution:... https://community.connection.com/journey-to-the-fourth-industrial-revolution-harnessing-ais-potential/ Apr 25, 2024 Robert McIntosh https://community.connection.com/author/robert-mcintosh/ https://community.connection.com/wp-content/uploads/2024/04/2595099-FourthIndustrialRevolution-BLOG.jpg

In the last 250 years we have witnessed unparalleled acceleration in technological advancements, with each era marked by transformative industrial revolutions that were powered by groundbreaking innovations. Each marked revolution created a paradigm shift that redirected and forever changed the course of humanity. Each step built upon and transitioned to the next, causing significant shifts in economic structures, cultural norms, and global dynamics.

“Those who came before us made certain that this country rode the first waves of the industrial revolution, the first waves of modern invention and the first wave of nuclear power. And this generation does not intend to founder in the backwash of the coming age of space. We mean to be part of it—we mean to lead it.” –John F. Kennedy

As we begin speaking to the inflection point of AI and what experts are considering the Fourth Industrial Revolution, let us look back at how we got here.

Industrial revolutions as defined by their driving force:

  1. STEAM: The First Industrial Revolution, 1760–1840 (Industry 1.0)
  2. ELECTRICITY: The Second Industrial Revolution, 1870–1914 (Industry 2.0)
  3. ELECTRONICS AND DIGITAL TECHNOLOGY: The Third Industrial Revolution, 1969–2000 (Industry 3.0)
  4. ARTIFICIAL INTELLIGENCE: The Fourth Industrial Revolution, 2023 (Industry 4.0) 

Dates retrieved from: https://www.youtube.com/watch?v=NDTvCO5ifKo

Industry 1.0 – Powered by Steam

The First Industrial Revolution, with its start in Britain in the mid to late 18th century, following the “proto-industrialization” period and continuing to the early to mid-19th century, saw the harnessing of steam power, leading to mechanization and automation. Steam engines fueled productivity, revolutionizing textile manufacturing, agriculture, transportation, and urbanization—laying the foundation for industrial capitalism. This transition from an agrarian society to an industrialized one provided the first true transformation.

James Watt emerged as one of the greatest inventors of the time, as his steam engine left its mark on various industries from agriculture, mining, textiles, transportation, manufacturing, and more. We saw textile machinery, such as the spinning jenny and power loom, emerge, leading to increased speed, accuracy, and scale in production and allowing more accomplishments in less time.

The first revolution also saw the rise of the telegraph, mechanized agriculture, the factory system, and the mass migration from rural America to cities, as people searched for employment opportunities in factories and mills. This population shift defined the urban landscape.

Industry 2.0 – Humanity Goes Electric

The Second Industrial Revolution, fueled by electricity and mass production techniques in the mid to late 19th and early 20th century, electrified factories, facilitated mass production, and standardized products, catalyzing globalization and the rise of multinational corporations. The widespread adoption of electricity as a power source changed everything. Imagine which technologies would not exist without electrical power.

1879 saw the development of Edison’s incandescent light bulb and his systematic approach to power distribution systems that allowed for electricity in homes, on streets and in factories. What steam did in the 18th century, electricity amplified in the 19th century. Karl Benz gave us the internal combustion engine at this time, as well as creation of the first “practical” automobile in 1885—giving rise to the likes of Ford and Mercedes-Benz. Ford’s invention of the assembly line carved a pathway to the future, propelling manufacturing to unprecedented heights.

The steel industry concurrently went through a notable change, with one main invention by Henry Bessemer in 1856 called, oddly enough, the Bessemer converter. In a process known as again, oddly enough, the Bessemer process, it allowed the production of steel from molten pig iron by blowing air through the iron to remove impurities. This reduced costs and time required to produce steel, making it more affordable and allowing for rapid industrialization.

Andrew Carnegie built his empire on this process and brought us into the modern world of skyscrapers, bridges, railways, ships, automobiles, etc.

Keep in mind other notable mentions during this time included the telephone, sewing machine, radio, dynamite, refrigerated railroad car, motion picture camera, phonograph, and typewriter—just to mention a few.

Research contribution: 8 Groundbreaking Inventions from the Second Industrial Revolution | HISTORY

Industry 3.0 – It’s All Digital

The Third Industrial Revolution, the Digital Revolution of the latter half of the 20th century, was propelled by computing advancements and the adoption of the Internet. This era transformed commerce and exploded the digital economy through e-commerce and social media, as well as the creation of new industries like software and IT.

The Space Age kicked off the revolution, and nuclear energy played a part as another untapped energy source. The rise of telecommunications, computers, and programmable logic controllers (PLCs), along with robots, ushered in a new age of automation.

The Internet hit inflection, now connecting the world like never before, coupled with automation soaring to new heights. In 1975, Ed Roberts gave us the Altair 8800, considered the first PC and sold as a build your own with an Intel 8080 processor. Altair began the democratization of computing and blew open the doors to an industry that never looked back. Consider just six years earlier, large entities and governments dominated computing. The Apollo 11 mission landed on the moon with the “supercomputer” of the day that, in today’s standards, had the power of a Commodore 64.

Many Millennials and Gen Zers have never known a world prior to the personal computer, Internet, mobile phones, digital cameras, email, ecommerce, GPS systems, or Wi-Fi. Gen Z is considered the first truly “digital native” generation in a ubiquitous digital world.

Cloud computing, blockchain technology, 3D printing, advanced robotics, crowdsourcing, HTML, the IoT, and AI got their roots during this time—setting us up for what is ahead.

Research contribution: https://www.machinedesign.com/community/guest-commentary/article/21833596/6-major-technologies-bringing-the-third-industrial-revolution

Industry 4.0 – AI Comes to the Fore

Now, standing on the brink of the Fourth Industrial Revolution, we witness the convergence of digital and physical technologies with artificial intelligence (AI). AI, stemming from machine learning and cognitive computing, promises to revolutionize sectors like healthcare, transportation, finance, manufacturing, defense, and education—augmenting human intelligence with autonomous learning and decision-making abilities.

This flashpoint builds on all the industrial revolutions preceding, yet utilizes the same spirit and ingenuity that drove Watt, Edison, Bessemer, and Bell. New visionary Geoffrey Hinton, “the Godfather of Deep Learning,” has spearheaded the development of deep learning algorithms and neural networks, which in turn has advanced image recognition and natural language processing. Jeff Dean’s contributions to machine learning and work done on Google’s TensorFlow have propelled him to a top computer scientist and Google architect of their open-source machine learning platform.

Augmented reality, virtual reality, and immersive digital experiences have energized the creative juices of the gaming, entertainment, education, and simulation world. The possibilities are mind-blowing, as we see the rise of Oculus, Vive, Valve, and the latest disruptor of all in that space, the Apple Vision Pro.

Unleashing AI’s potential comes with a learning curve. It is our duty as stewards of this new technological breakthrough to address ethical concerns, privacy issues, and algorithmic bias as well as to help upskill workers and attenuate job displacement. The goal is ensuring AI is a positive factor that enhances society and helps foster human potential. We cannot let fear of the unknown halt advancements or bow to the prognosticators of doom that wish to stop the momentum; however, responsible AI must be at the forefront. The problem of the day is not necessarily the data but how the data is governed, integrated, and managed. Training data must be scrutinized at an elevated level, and AI models should be developed to prevent inadvertent discriminatory outcomes.

The industrial revolutions are a showcase of our innovations, resiliency, and adaptability to technological change. As we take this journey together, let us learn from the past and utilize AI's transformative power to create a better world of sustainability, responsible economic growth that benefits all, and a pathway to righting past wrongs and using natural resources and human ingenuity to provide equity for the masses. The framework and outcome from past revolutions have set the stage for our fourth—but certainly not last—industrial disruption. Interestingly, as the first industrial revolution caused urbanization, the rise of the fourth revolution is beginning to see a shift back to rural America, as those who love the countryside can once again work from where they enjoy living.

Reference research: Fourth Industrial Revolution - Wikipedia

Industry 5.0 – What’s Next?

To conclude, let’s envision the Fifth Industrial Revolution. Some foresee it as a collaborative endeavor, blending the remarkable programming capabilities of machines with the unparalleled problem-solving skills, creativity, social intelligence, and critical thinking of humans. Stay tuned! Our own Helix Center for Applied AI and Robotics is playing a key role in this 4th revolution—visit us online to learn more.

]]>
Microsoft Copilot for Security: A Beneficial... https://community.connection.com/microsoft-copilot-for-security-a-beneficial-tool-for-users-of-all-skill-levels/ Apr 18, 2024 John Ryan https://community.connection.com/author/john-ryan/ https://community.connection.com/wp-content/uploads/2024/04/2582451-Microsoft-Copilot-for-Security-BLOG.jpg

As a user and consumer of technology rather than a technology creator or a developer, I got curious about how I may personally benefit from the myriad of new Microsoft AI Copilots that are launching. I find myself most intrigued by the Copilot for Security service for its purported ease of use for IT security professionals at every level of their career journey and their related skillsets. Also, I endeavored to use Copilot in Bing to help create my first official AI-enhanced blog, as follows.

Microsoft Copilot for Security is a generative-AI powered security solution built to help security professionals build their skills and efficiencies at a much faster rate than learning on their own with more traditional methods.

Copilot for Security is designed with the same interface we are familiar with in the Edge browser’s Bing Chat, and the automation in the background is continuously monitoring and processing prompts that are received from the various Microsoft and or third-party security tool services that the end user has integrated. This AI-powered tool is not just a step forward in security—it’s a leap towards a future where cybersecurity is accessible, understandable, and manageable for everyone.

Embracing Security with Microsoft Copilot: A Tool for All

In the digital age, security is paramount. As cyber threats evolve, so must our defenses. Microsoft Copilot stands at the forefront of this evolution, offering robust security features that cater to users of all abilities. Let’s explore the benefits of Microsoft Copilot for security and its accessibility to users with diverse needs.

A Secure Digital Assistant

Microsoft Copilot is designed with security at its core. It employs advanced algorithms and machine learning to detect and prevent unauthorized access to your data. Here’s how it ensures your digital safety:

  • Data Encryption: Copilot encrypts your data both in transit and at rest, ensuring that sensitive information is protected from prying eyes. This encryption is akin to a vault, where your data is locked away securely, accessible only to those with the right key.
  • Continuous Monitoring: The system continuously monitors for suspicious activity. If an anomaly is detected, Copilot takes immediate action to mitigate potential threats, much like a vigilant sentinel guarding a fortress.
  • Regular Updates: Security is not a one-time setup but a continuous process. Copilot receives regular updates to stay ahead of the latest cyber threats, ensuring that your digital environment remains fortified against new vulnerabilities.

Accessibility: Empowering Every User

Microsoft Copilot is not just secure; it is also incredibly accessible. It breaks down barriers, allowing individuals of all abilities to benefit from its features, such as:

  • Intuitive Interface: The interface is intuitive, making it easy for users with varying levels of tech-savviness to navigate. Whether you’re a seasoned IT professional or a novice, Copilot guides you through its functionalities with ease.
  • Assistive Technologies: For users with disabilities, Copilot integrates with assistive technologies such as screen readers and voice recognition software. This integration ensures that everyone can use the tool effectively, regardless of physical limitations.
  • Multilingual Support: Language should not be a barrier to security. Copilot offers multilingual support, catering to a global audience. It understands and communicates in multiple languages, ensuring that users around the world can interact with it in their native tongue.

The Copilot Advantage

Here are real-world scenarios where Microsoft Copilot shines:

  • Small Business Owners: For small business owners, security is crucial but often overlooked due to resource constraints. Copilot acts as an affordable, virtual security team, protecting their digital assets without the need for significant investment.
  • Educators and Students: In educational settings, Copilot helps maintain the integrity of academic work by safeguarding research data and intellectual property. It also provides a safe platform for students to explore and learn.
  • Individuals with Disabilities: For individuals with disabilities, Copilot’s compatibility with assistive technologies means they can enjoy the same level of security and functionality as any other user, promoting inclusivity and equality.
  • Non-native English Speakers: Copilot’s multilingual capabilities ensure that non-native English speakers are not left behind in the digital security landscape. It empowers them to protect their online presence effectively.

Microsoft Copilot is more than just a digital security assistant; it’s a testament to Microsoft’s commitment to security and accessibility. It provides a safe, user-friendly platform that caters to the needs of a diverse user base. In a world where digital threats are ever-present, Copilot stands as a beacon of security, shining a light on the path to a safer digital future for all.

Microsoft began offering Copilot for Security on April 1, 2024 via Azure with pay-as-you-go pricing (based on consumption) billed monthly. Security Copilot will be widely accessible to organizations of all scopes, no matter what phase they are in, with regard to shoring up their security posture today and in the future.

]]>
IT Superhero Awards Goes Above and Beyond https://community.connection.com/it-superhero-awards-goes-above-and-beyond/ Apr 16, 2024 Connection https://community.connection.com/author/connection/ https://community.connection.com/wp-content/uploads/2024/04/2546249-ITSA-2024-ConnectionCares-Blog.jpg

At Connection, we believe in celebrating the unsung heroes of IT who go above and beyond to keep their teams supported, productive, and secure. This year, we are taking our IT Superhero Awards to new heights by not only recognizing the unsung heroes of IT but also giving them the chance to give back to the community.

In its 4th year, the IT Superhero Awards continue to recognize excellence in IT professionals across five categories:

  • Best Team Leader—Leads to success, inspires others to greatness
  • Best Rookie—A fresh IT pro who performs like a seasoned pro
  • Best Catch—Made an amazing save, big or small, that averted disaster
  • Best Superpower—Capable of performing astonishing feats, no matter the deadline
  • Most Unshakeable—Always calm, patient, and focused in the face of IT chaos

These awards honor individuals who excel in guiding teams, making crucial saves, displaying exceptional skills, and maintaining composure under pressure. The grand prize winner, chosen from the five category winners, is crowned the Ultimate IT Superhero.

Our team understands the importance of giving back—which is why we are excited to announce the winners of the 2024 IT Superheroes Awards will have the opportunity to support an amazing group of non-profit organizations. On behalf of our winners, Connection will donate a total of $9,000 to organizations that closely align with our Connection Cares initiatives and company values.

We have carefully selected three non-profits to participate in this year’s IT Superhero Awards—Feeding America, NPower, and the National Center for Women & Information Technology (NCWIT)—because they share our commitment to making a positive impact in our communities. Feeding America’s mission to fight hunger and food insecurity resonates deeply with us. Connection Cares has collaborated with Feeding America and similar organizations in the past, organizing food drives and donations to support those in need. NPower holds a special significance for many at Connection, due to their contributions to the veteran community. As a Gold NH Veteran-Friendly Business, Connection is proud to work alongside NPower to support veterans and their transition into civilian life. NCWIT’s efforts to increase the representation of women in technology are incredibly important to our entire team—for the supportive work environment and culture we are proud to have built today to the skills and resources we are investing in for future generations. We believe in fostering diversity and inclusion in the tech industry to drive innovation, and supporting NCWIT’s mission aligns perfectly with our commitment to gender equality and empowerment in the workplace.

Nominations for the 2024 IT Superhero Awards are now open, and we encourage you to nominate the IT professionals in your organization who go above and beyond every day. Winners and the non-profit organization they choose to donate to will be announced at our Technology Summit in Boston, MA on September 12, 2024. Be sure to submit your nomination before June 28, 2024 to recognize deserving IT Superheroes and help support Feeding America, NPower, and NCWIT!

]]>
How to Create a Modern Engineering Workstation https://community.connection.com/how-to-create-a-modern-engineering-workstation/ Apr 16, 2024 James Rust https://community.connection.com/author/james-rust/ https://community.connection.com/wp-content/uploads/2024/04/2570659-Modern-Engineering-Worksation-BLOG.jpg

Imagine this: You’re an engineer leading a plant expansion project. You’re buzzing with ideas, eager to translate them into reality using AutoCAD. But with every click, your computer grinds to a halt for a frustrating three seconds. That creative spark starts to dim.

This isn’t a hypothetical scenario—it was my life for far too long. It may not sound like much, but those three seconds added up quickly. Working on the design was a slow and tedious task when it should have been something I enjoyed. What engineer doesn’t love figuring out how to make all the pieces fit and work for everyone? What engineer doesn’t love the job they spent years training for?

The answer: the engineer who doesn’t have the right tools to get their work done. Don't let outdated technology hold your engineers back. Give them the tools to unleash their creativity and bring groundbreaking designs to life.

Powerful Workstations Fuel Engineering Success

When selecting an engineering workstation, several considerations are involved, but ultimately, the goal is to have a device that helps rather than hinders the creative process. Engineers need something that can process the most demanding design and rendering jobs—but this doesn’t necessarily have to be a machine that’s at the absolute cutting edge of technology. If you’re in procurement or IT, ask yourself the following: does the workstation you’re providing to a highly paid, well trained, and in-demand engineer meet their needs, maximize their productivity, and get the best ROI for your organization?

The modern workstation needs a vast amount of parallel processing power to support computer aided design (CAD), computer aided engineering (CAE), and simulation programs. Design software evolves so rapidly these days that it’s often best to get more than the minimum requirements for processing power to ensure the workstation remains reliable for years to come. Design suites have even begun adding generative AI capabilities into their software, and these features will only grow over time.

Another consideration is networking speed. Often designs are being worked on or reviewed live in tandem with engineers who may not be onsite, and depending on the file size of the model, this may end up being a bottleneck. Files also need to be properly backed up to ensure no design time is lost. Without the proper network infrastructure in place, even the best workstation hardware will slow to a crawl.

GPUs Can Make the Difference

Many engineering tools now require additional processing performance and capabilities that only GPUs can provide. CPUs are still essential, but the GPU can do the heavy lifting that is just too much for CPUs. The right GPU futureproofs engineering workstations by letting them accommodate growing and ongoing engineering trends, especially considering their usage in AI and machine learning.

A high performance GPU can allow an engineer to get more done in a much smaller timeframe when compared to engineers with inadequate tools. By accelerating powerful technologies like rendering, interactive CAE, and generative design, GPUs are revolutionizing how engineers bring products to market faster. These GPU-powered tools empower engineers to experiment with novel manufacturing techniques, unlocking a new era of innovative designs packed with exciting features.

Invest in Technology and Empower Your Employees

A survey in 2022 found that a whopping nine out of ten employees are frustrated by their workplace technology. People will always do their best work when they have the proper tools, and engineers are no exception. Keep in mind that these days we are still dealing with an engineering skillset shortage, and making technology boosting rather than limiting can have a remarkable effect on productivity. The issue is that navigating the ever-changing tech landscape can be daunting.

Knowing what you need is difficult when technology is moving so fast and you’re busy doing your part to get product out the door. Instead of looking yourself, engage Connection’s Manufacturing Practice. We stay up to date with the latest hardware and software and can recommend the right products to fit your performance and budgetary needs.

]]>
Microsoft 365 E3 or E5: What Is the Right... https://community.connection.com/microsoft-365-e3-or-e5-what-is-the-right-plan-for-your-organization/ Apr 11, 2024 Makayla Mota https://community.connection.com/author/makayla-mota/ https://community.connection.com/wp-content/uploads/2024/04/2568772-Microsoft-365.-E3-or-E5-what-is-the-Right-Plan-BLOG.png

In the realm of productivity software, Microsoft 365 maintains its position as the leading business solution with over 1 million companies worldwide utilizing this cloud-based suite of applications.

However, Microsoft provides various types of 365 plans—each tailored to offer distinct benefits that adapt to evolving business requirements. Determining the correct Microsoft plan for your organization can be a daunting endeavor. The correct plan can affect the overall productivity, efficiency, and security—so making the correct choice is crucial to your business. Among the most popular subscription options are Microsoft 365 E3 and E5. While both offer productivity advantages, E5 boasts a more comprehensive feature set.

E3 and E5 Feature Breakdown

Both E3 and E5 provide access to an essential suite of productivity apps, including Word, Excel, PowerPoint, OneNote, Outlook, and Teams. These apps simplify collaboration amongst employees regardless of their location, creating seamless efficiency and productivity whether your users are in-office, hybrid, or remote. Both plans also offer SharePoint, OneDrive, and Exchange, ensuring smooth file sharing, storage, and email administration.

Security and Compliance

Security is a primary concern for any organization, and this is where E5 truly outshines E3 licensing. E3 includes fundamental security features—such as multifactor authentication (MFA) and data loss prevention—but E5 takes it up a notch by also providing advanced threat protection, intelligent security management, and supplementary compliance features like customer lockbox, privileged access management, and advanced eDiscovery. Microsoft's security and compliance solutions evolve continuously to combat emerging threats, rendering E5 an optimal selection for organizations with heightened security requirements.  

Advanced Analytics and AI

Another big factor in today’s business world is access to analytics and the latest in AI technology. Microsoft 365 E5 offers both analytical capabilities and AI tools that are absent from the E3 package. Power BI Pro, a dynamic data visualization tool, empowers your staff to derive insights for data-informed decision-making. E5 also delivers sophisticated AI functionalities, including MyAnalytics and Workplace Analytics, providing valuable insights into productivity and collaboration patterns throughout your organization. Leveraging these capabilities can optimize your team's efficiency and optimize performance.

Pricing Breakdown

A big factor in making your final decision is understanding the differences in pricing structure between Microsoft 365 E3 and E5. Microsoft 365 E3 costs $36 per user/month, while Microsoft 365 E5 comes in at $57 per user/month. While it does seem like a big jump, the inclusion of additional security, compliance, analytics, and AI features may justify the investment for your organization. 

It's also possible to customize Microsoft 365 licenses within your organization to suit your requirements. This flexibility enables you to allocate a suitable plan to users depending on their individual needs and responsibilities, ensuring that you only invest in the features necessary for each user. This strategy can prove cost-efficient since you have the option to provide advanced features available in the E5 plan to users who require them, while assigning the more economical E3 plan to others who may not need all the additional functionalities of the E5 plan. Connection’s Microsoft Landscape Optimization (MLO) assessment allows you to gain insight into your current IT environment through a series of workshops, helping you determine the correct and most cost-effective licensing for your organization.

Should You Change Plans?

For businesses contemplating streamlining their software infrastructure, experiencing substantial growth, or transitioning to a permanent remote or hybrid work setup, migrating to Microsoft 365 E5 is a logical choice.

With Microsoft 365 E3 and E5, features and functionalities are integrated within a unified ecosystem. This simplifies team communication and enhances workflow efficiency. Microsoft 365 E5 enhances the E3 experience by introducing user-friendly collaboration tools like Teams Phone and a comprehensive security framework. The outcome is productivity bolstered by proactive security measures. While making the correct decision for your organization may appear daunting, Connection is ready to assist with planning, designing, deploying, and managing these products and solutions, ensuring your Microsoft licensing is the optimal fit for your needs. Contact your Account Team anytime for help!

]]>
A Day in the Life of a Senior Executive... https://community.connection.com/a-day-in-the-life-of-a-senior-executive-account-manager/ Apr 02, 2024 Timothy Parsons https://community.connection.com/author/timothy-parsons/ https://community.connection.com/wp-content/uploads/2024/03/2525832-DayInTheLife-TimothyP-BLOG.jpg

Q1: As a Senior Executive Account Manager, what does a typical day look like for you and how does it differ from earlier stages in your career?

As a more seasoned rep here at Connection, a typical day involves studying to keep my finger on the pulse of what is happening across the industry and bringing that insight to my valued clients. This involves reading about important events in the IT world, studying industry trends, and collaborating with strategic partners and vendors to hear new ways that they are helping customers accomplish goals and solve problems in their business. IT moves at an extremely fast pace, so this is a vital part of making sure my team can provide the best services possible to our customers.

However, knowledge alone doesn’t bring a lot of value. The best leaders in my role know how to take gained insights and translate that into meeting real-world business objectives. This is where my team and I are laser focused. Every time we meet with clients, we want to make sure we are bringing valuable insight that makes a difference in their world, assists them in accomplishing their goals, and helps them to sleep better at night.

Early in my career at Connection there was a heavy focus on building my network and gaining depth of understanding of the business world. I had background in providing technology solutions in a consumer environment, but less about how it applied in the business world. Our training, management, and later, a key mentorship program did a phenomenal job in teaching me how to accomplish both. In terms of how the role has changed with time and growth, it has evolved from building the network towards a heavier focus on fostering relationships that already exist, and selecting the team members that are the best fit to meet my clients’ business objectives. It has also shifted from learning about business in general, towards zeroing in on industry-specific areas—each of which have their own unique needs and compliance requirements that impact their go-to-market strategies.

Q2: How do you prioritize your tasks and manage your time effectively, especially when dealing with multiple clients and projects simultaneously?

When it comes to time management, I think the most important thing is having a plan going into your day. I always take careful notes in all meetings that I lead and attend. This allows me to set priorities and carve out an agenda for each day. However, considering the pace of the industry, it’s always important to leave room for emergency situations that arise and be able to pivot when needed.

A philosophy that is important to me is striving towards frictionless business for our clients. Priority one going into every day is customer responsiveness. I hear from a lot of folks that I work with that some partners are not responsive. Because of that—and because I sincerely care about the people I work with—it’s extremely important to me that my customers know that I am always going to respond quickly and accurately. Even if I don’t know the answer immediately, they are going to know that I am working on it right away. Why? Because that’s just good partnership!

Q3: How do you collaborate with other team members or departments to achieve your account management goals?

One of the most critical things I’ve learned at Connection is that teams are what build success. Nobody is an expert in everything, so collaboration is vitally important. My team and I always want to bring the right resources, with the right knowledge, to every meeting. I find that that is usually more than one person. Success comes from bringing the right people together to accomplish a mission, whether that is a customer goal or business objective.

I mentioned earlier that over the years my role has shifted into more relationship building. This includes daily conversations and meetings with colleagues and partners to learn more—and particularly to gain an understanding of what people are learning and who has expertise in what areas. I have expertise in areas my teammates and partners don’t. They have expertise in areas I don’t. If we work together, we can accomplish more. I am all about helping people out as much as I possibly can—and with that comes a level of reciprocity. When I help people, they want to help me, and we all help our clients achieve more.

I think reading a variety of publications is an important component of learning about industry trends. However, I would add that reading critically is also important. I am not a headline sifter. If an article or paper catches my attention, I like to dig into its content, try to view it from different angles and perspectives, and even push back against it in my mind a bit. I feel like this allows me to develop a better and more informed opinion about a topic.

This is when collaboration comes into play. I enjoy discussing my industry-trend ideas with colleagues, partners, and clients. I think this sort of discussion strengthens good opinions and filters out bad ones.

Q5: With 20 years of experience, what advice would you give to someone starting in the field of account management today?

I think the two most important things to apply to your role as a new account manager are:

  1. Understand what your customers’ business objectives are. Tech talk is cool. Flashy features are fun to talk about, but specs mean nothing unless they drive business outcomes.
  2. Relationships are everything. Strong customer relationships are critical. That is the goal! Strong colleague and partner relationships are what fuel strong customer relationships. They are interconnected, sort of like all the new and innovative tech that we all love discussing!
]]>
Embracing the Future: A Deep Dive into... https://community.connection.com/embracing-the-future-a-deep-dive-into-windows-11-pro-devices-for-businesses/ Mar 27, 2024 Chris Roux https://community.connection.com/author/chris-roux/ https://community.connection.com/wp-content/uploads/2024/03/2514446-Windows11Pro-EmbracingTheFuture-BLOG.png

The world of technology is complex, but each new development brings with it a host of opportunities. One such development is the launch of Windows 11 Pro, Microsoft’s latest operating system. This blog post will explore the benefits of upgrading to Windows 11 Pro devices and provide strategies for a smooth migration process.

Introduction: The Windows 11 Pro Upgrade Experience

Feeling overwhelmed by the switch to Windows 11 Pro? You’re not alone. Many businesses are wondering if it’s worth the hassle or are worried about a complicated migration process. But rest assured, Windows 11 is not a complete overhaul but a familiar friend with new features.

Windows 11 Pro as a Feature Update

Windows 11 Pro is more than just a new version of Windows, it’s a feature update that enhances the user experience. It brings a host of new features and improvements over its predecessor, Windows 10.

Reasons to Upgrade to Windows 11 Pro Devices

There are several compelling reasons to upgrade to Windows 11 Pro Devices. It offers improved performance, a modern and streamlined interface, and new features designed to boost productivity. Why should you take the plunge?

  • Visual Refresh: Imagine sleek taskbar icons, rounded corners, and an overall modern vibe.
  • Performance Boost: New Windows 11 Pro devices are up to 42% faster at completing demanding workloads.
  • Enhanced Productivity: Snap Layouts, Snap Groups, and virtual desktops make multitasking a breeze.
  • Microsoft Store Revamp: It’s like the store got its own manager, better apps, and better curation.
  • Microsoft Teams Integration: Achieve seamless communication for work or virtual coffee breaks.
  • UEFI Firmware with Secure Boot: Security is the cool kid at the party.
  • DirectX 12 Compatible Graphics / WDDM 2.x: Fancy visuals await.

Integrating AI into Your Enterprise: A Strategic Road Map

In the digital transformation era, incorporating artificial intelligence (AI) into your organization is not merely an upgrade; it’s a critical step toward redefining business operations and unlocking new potential. This journey, though challenging, promises a future where efficiency, insight, and innovation drive success.

Challenges in Adopting AI

Resistance to Change: One of the most common challenges is the natural resistance to change. Employees may be comfortable with existing processes and systems, fearing that new technology could disrupt their routine or even threaten job security.

Lack of Understanding and Training: Ensuring that all employees have a clear understanding of the new technology and are adequately trained to use it is crucial. Without proper training, adoption is slow, and the technology’s full potential remains untapped.

Poor Communication: Effective communication about the benefits and the “why” behind the change is critical. If the reasons for adopting new technology are not communicated effectively, it can lead to skepticism and a lack of buy-in from staff.

Technological Compatibility and Integration Issues: Often, new technology needs to integrate with existing systems—which can be complex. Ensuring compatibility and smooth integration is important for the seamless functioning of the organization.

Cost Implications: The cost of adopting new technology isn’t just financial; it also includes the time and resources spent on training and the transition period—which can temporarily impact productivity.

Key Strategies for Successful AI Integration

To overcome AI integration challenges, consider the following strategies:

Change Management Strategy: Develop a well-planned change management strategy that includes strong leadership support, effective communication, comprehensive training programs, and a clear understanding of the benefits that the new technology brings to each role in the organization.

Cultural Shift: Foster a culture that embraces innovation and continuous learning. Encourage employees to see AI as an enabler rather than a threat.

Collaboration: Involve cross-functional teams in the AI integration process. Collaboration ensures that different perspectives are considered, and potential roadblocks are addressed.

Pilot Projects: Start with small-scale pilot projects to test AI solutions. Learn from these experiments and iterate before scaling up.

Data Readiness: Ensure that your data is clean, accessible, and well-organized. AI relies heavily on data, so data readiness is critical.

Remember, successful AI integration is not just about technology; it’s about people, processes, and a shared vision for the future. By strategically adopting AI, organizations can unlock new opportunities and stay ahead in today’s dynamic business landscape. Whether you’re upgrading existing hardware or acquiring new equipment, a well-thought-out approach ensures smooth operations and optimal resource utilization. As a business, your hardware procurement decisions impact not only your bottom line but also your overall operational efficiency and employee productivity.

10 Steps to Strategic Hardware Procurement

  1. Align with Business Goals
    Business-centric Approach: Consider how hardware supports your core business functions. Every hardware choice should align with your strategic objectives, whether it’s enabling remote work, enhancing customer service, or optimizing production,
  2. Total Cost of Ownership (TCO)
    Beyond the Price Tag: Look beyond the initial purchase cost. Consider maintenance, support, and potential downtime. A slightly higher upfront investment in quality hardware can yield significant savings over its lifecycle.
  3. Scalability and Future-proofing
    Think Ahead: Choose hardware that can scale with your business. Anticipate growth and technological advancements. Avoid investing in solutions that become obsolete too quickly.
  4. User Experience Matters
    Employee Productivity: Hardware impacts how efficiently your team works. Ergonomic devices, fast processors, and ample memory contribute to a positive user experience.
  5. Security and Compliance
    Protect Your Assets: Prioritize security features. Ensure compliance with industry regulations. Hardware vulnerabilities can lead to data breaches and legal repercussions.
  6. Vendor Relationships
    Strategic Partnerships: Engage with vendors who understand your business needs. Look for long-term relationships rather than transactional interactions.
  7. Sustainability and Environmental Impact
    Eco-friendly Choices: Consider the environmental impact. Select energy-efficient devices and explore recycling programs.
  8. Procurement Process Streamlining
    Efficient Workflow: Streamline procurement processes. Ensure efficiency and transparency from requisition to delivery.
  9. Employee Involvement
    User Feedback: Involve end-users in hardware decisions. Their insights matter. They’re the ones using the devices daily.
  10. Lifecycle Management
    Retirement Plans: Plan for hardware retirement. Perform regular assessments and replace outdated equipment.

Conclusion: Embracing the Future with Windows 11 Pro Devices

As we conclude this comprehensive exploration of Windows 11 Pro, it’s clear that this new operating system is more than just an upgrade—it’s a leap into the future of business computing. With its modern interface, enhanced performance, and innovative features, Windows 11 Pro devices are poised to revolutionize the way businesses operate.

The integration of AI into Windows 11 Pro devices is particularly exciting. By automating tasks and providing personalized experiences, AI is set to boost productivity and efficiency across all levels of a business. This, coupled with the improved performance of Windows 11 Pro devices, means businesses can look forward to a significant increase in productivity.

However, the transition to Windows 11 Pro requires careful planning and execution. From understanding the hardware requirements to creating a refresh plan, every step is crucial for a smooth migration. The possibility of running Windows 10 and 11 concurrently offers businesses the flexibility to migrate at their own pace, minimizing potential disruptions. Moreover, the procurement of new hardware, if necessary, should be a strategic decision. Factors such as budget, compatibility, and future-proofing need to be considered to ensure the best return on investment.

Finally, remember that a successful migration to Windows 11 Pro is not just about the technology, it’s also about the people who will be using it. Providing adequate user training and support is key to ensuring a smooth transition and unlocking the full potential of Windows 11 Pro.

In conclusion, Windows 11 Pro represent a significant step forward in business computing. By embracing this new technology, businesses can stay ahead of the curve and pave the way for a more productive and efficient future.

So, are you ready to embrace the future with Windows 11 Pro devices? The journey starts now. Contact your Connection Account Team to discuss AI integration best practices and more!

]]>
What Is Microsoft Copilot? A Guide to the... https://community.connection.com/what-is-microsoft-copilot-a-guide-to-the-latest-features/ Mar 26, 2024 Makayla Mota https://community.connection.com/author/makayla-mota/ https://community.connection.com/wp-content/uploads/2024/03/2544881-MS-Copilot-BLOG.jpg

I am sure you have heard many things about Microsoft Copilot at this point, and then many things about the many different Copilots as well. But what exactly is Copilot and what are the differences between the varieties and how they work within the Microsoft ecosystem?  

Let’s start with the basics. Microsoft Copilot is a groundbreaking AI-powered innovation that harnesses the capabilities of machine learning and natural language processing to enhance efficiency, foster innovation, and elevate teamwork within the Microsoft ecosystem. Serving as an advanced digital assistant, Copilot streamlines operations by providing intelligent recommendations and valuable insights, as well as automating repetitive tasks.

Copilot enables users to engage in coding, writing, image generation, and information retrieval. It transcends traditional tool functionality, offering a holistic solution tailored for Microsoft's suite of products, including Microsoft 365, Dynamics 365, Fabric, Sales, Service, and GitHub. With its AI-driven features, Copilot transforms conventional task approaches, stimulating creativity and productivity.

Top Benefits of Using Copilot

Utilizing Microsoft Copilot offers myriad advantages for businesses, ranging from heightened efficiency and productivity to decreased workload and stress.

  • Enhanced Efficiency and Productivity: Through task automation, intelligent suggestions, and workflow optimization, Copilot elevates workplace efficiency and productivity.
  • Reduced Workload and Stress: By handling repetitive tasks and offering meaningful insights, Copilot diminishes employee workload, leading to reduced stress and greater overall wellness.
  • Fostering Collaboration and Creativity: With its real-time collaboration capabilities and original suggestions, Copilot cultivates a collaborative environment, inspiring team members to combine forces to work together in coauthoring innovative work.
  • Optimized Cost Management: Copilot offers guidance and suggestions to optimize costs, allowing businesses to achieve long-term savings while maintaining exceptional quality standards.
  • Seamless Integration with the Microsoft Ecosystem: Because it is a Microsoft product, Copilot perfectly works alongside other Microsoft tools, ensuring a consistent user experience.
  • Security and Data Privacy: Copilot follows leading cybersecurity protocols, integrating state-of-the-art security measures such as data encryption and data residency options to consistently protect your organization's sensitive information.
  • Emphasizing Commercial Data Protection: Copilot prioritizes safeguarding commercial data, guaranteeing confidentiality and integrity.
  • Enforcing Logical Isolation: Copilot employs logical isolation to compartmentalize data, preventing unauthorized access and ensuring a secure work environment.
  • Detailed User Permissions: Copilot provides granular user permissions, enabling organizations to efficiently regulate access and promote a secure and compliant ecosystem.

What Are the Different Copilots and How Can You Use Them Effectively?

Microsoft Copilot (formerly Bing Chat, or Bing Chat Enterprise) is perfectly suited to assist you with everyday tasks such as searching online. Microsoft Copilot makes your browsing experience faster and easier across Bing, Edge, and Windows.

Copilot in Bing transcends traditional search engines. Serving as your personal AI assistant, Copilot streamlines your online search experience by delivering swift and concise responses to inquiries—conserving your time and energy. In addition, it extends support by furnishing recommendations and aid for writing assignments, making it an asset for both students and professionals.

Discover Copilot’s capabilities within Bing by following these simple steps. Just head to Bing's homepage, sign in with your Microsoft account (or register one for free), and seamlessly access Copilot via the search bar. Input your query, press enter, and appreciate the prompt and succinct responses to your inquiries.

Edge stands as Microsoft’s innovative and robust Web browser, elevated further with the inclusion of Copilot. Leveraging its AI capabilities, Edge accelerates information retrieval, enhances your browsing experience, and protects your online privacy. Additionally, it seamlessly integrates with Bing, delivering a comprehensive and streamlined search journey.

Unlock the potential of Copilot in Edge by following these steps:

  1. Launch your Microsoft Edge browser. If it’s not already installed, you can download it from the official Microsoft website.
  2. Confirm that you’re signed in to your Microsoft Account. If not, access Settings and Profiles from the three-dot menu at the browser’s top-right corner, and then click on Add Profile to either log in or create an account.
  3. Once signed in, access Edge Settings by clicking on the three-dot menu at the browser’s top-right corner.
  4. In the Settings menu, select Privacy, Search, and Services.
  5. Scroll down to the Services section and locate Microsoft Copilot.
  6. Activate Copilot by toggling the switch to ‘On’.

Copilot can now improve your Edge browsing experience by offering intelligent suggestions and expediting search outcomes. Remember, for Copilot to operate optimally, keep your Edge browser updated to the latest version! Regular updates not only introduce new features but also uphold the highest standards of security for your browsing activities.

Copilot for Windows 11 provides a state-of-the-art, AI-driven assistant crafted to elevate your digital interactions, helping you increase your productivity. Copilot stands as your smart assistant, seamlessly woven into your workflow, easily accessible on the taskbar, or a Win+C keyboard shortcut away.

Experience heightened efficiency as Copilot empowers you to uncover answers and inspiration from the Web while nurturing creativity and collaboration. Streamline cognitive load and expedite task fulfillment with its intuitive aid.

Whether you’re at work, school, or home, Copilot remains by your side delivering support alongside your apps. Its presence amplifies focus and helps you complete numerous tasks.

Copilot for Microsoft 365

Copilot for Microsoft 365 is now seamlessly integrated into the Microsoft 365 suite and will reform the way you work within Teams, Word, Excel, PowerPoint, Outlook, SharePoint, and more. Whether you are using it to answer queries, generate content, or analyze data, Copilot for Microsoft 365 augments productivity with its natural language capabilities.

On January 15, 2024, Microsoft announced Copilot’s availability regardless of seat size for individuals, enterprises, and anyone in between. This inclusive accessibility ensures that regardless of your team or organization size, you can leverage Copilot’s array of benefits and features. Whether you’re working independently or within a sizable company, Copilot stands ready to elevate your productivity and efficiency levels.

Microsoft Copilot serves as an AI-driven productivity solution, seamlessly merging your data across Microsoft Graph and Microsoft 365 applications and services.

Harnessing machine learning algorithms and natural language processing, Microsoft Copilot comprehends context and provides intelligent recommendations. This entails Copilot being trained on extensive datasets, encompassing code among other information.

Highlighted below are key attributes of Microsoft Copilot for Microsoft 365 applications:

Copilot in Outlook

Copilot within Outlook helps to manage your inbox effectively and craft communications in significantly less time. Use Copilot in Outlook to condense lengthy email exchanges into concise summaries by requesting Copilot to encapsulate an email thread—swiftly navigating to the essence of the summarized content, while also proposing action items, responses, and scheduling follow-up meetings. Also, when composing an email, you can select preferences for length and tone with Copilot’s help!

Copilot in Word

Copilot within Word revamps your writing process, fostering productivity and creativity as you craft, summarize, comprehend, refine, and enhance your documents. Now, leverage advanced functionalities that include text visualization and table conversion, adding to existing prompts, composing a document with reference to up to 3 documents, and exploring document-related information.

Create a first draft easily with Copilot, igniting inspiration and allowing it to expand on your existing idea. Seamlessly convert text into tables using Copilot’s rewriting capabilities. Begin a chat with Copilot to unearth supplementary details that work to enrich your document. When time is of the essence, allow Copilot to condense your document for you.

Copilot in Excel

Copilot in Excel collaborates with you to streamline data analysis and exploration. Ask Copilot questions regarding your data in natural language, not just formulas. It shows correlations, presents what-if scenarios, and proposes new formulas based on your inquiries—constructing models tailored to your questions, allowing for data exploration without altering the data itself. Discern trends, craft impactful visualizations, or solicit recommendations to drive varied outcomes.

Leverage Copilot’s assistance to delve into and comprehend your data with enhanced efficiency. Pinpoint significant insights and visualize your data easily. Streamline your focus on critical aspects by effortlessly highlighting, filtering, and sorting your data. Seamlessly devise formulas with Copilot’s recommendations for complex calculations.

Copilot in PowerPoint

Copilot within PowerPoint empowers you to translate your concepts into captivating presentations. Think of Copilot in PowerPoint as your narrative collaborator helping you to convert existing written documents into comprehensive decks, including speaker notes and references, or to initiate a new presentation from a basic prompt or outline.

Copilot is your PowerPoint partner whether you’re crafting a fresh presentation or needing a summary of a lengthier one. Entrust Copilot to arrange your slides, smoothly restructuring them to your specifications. Additionally, easily integrate your organization’s branding by allowing Copilot to generate slides or visuals.

Copilot in Teams

Copilot within Teams can summarize conversations, precisely organize pivotal discussion points, and create of meeting agendas derived from chat history. Stay updated by obtaining answers to specific inquiries and catching up on any overlooked details. Communication amongst teams becomes further enriched when relying on Copilot for identifying who needs follow-ups and scheduling subsequent check-ins, enhancing productivity all around.

Copilot in Viva

Copilot within Microsoft Viva stands as the forefront AI tool, delivering quick, precise, and personalizes responses and insights customed to your business context. Microsoft Viva Copilot employs advanced AI to accelerate workforce insights and elevate employee engagement. It equips managers with predictive tools, thereby fostering a more connected and effective workforce. Copilot prioritizes security, compliance, and privacy while championing responsible AI practices and heightened employee engagement.

Copilot in OneNote

Copilot within OneNote facilitates a transformative approach to planning and organization, enabling better preparedness and proactive action based on your notes. Now, delve deeper into your notes by posing comprehensive questions, generating summaries of your content, requesting Copilot to generate content, and aiding in enhancing the clarity of your writing.

Copilot in Loop

Copilot within Loop empowers you to harness the potential of collective ideation—co-create, synchronize with teammates, and maintain alignment effortlessly. Collaboratively with Copilot in Loop as a team, you can co-craft prompts, generate tables to streamline team projects, pick up where your teammates left off, summarize page content, and produce a recap for a colleague to whom you’re delegating work.

Copilot in Whiteboard

Copilot within Whiteboard serves as a catalyst, expediting your process from idea, to generation, to organization, to summarization. Engage in collaborative brainstorming sessions, receive insights from Copilot tailored to your creations, and refine your brainstorming outputs into refined presentations.

What Is Microsoft Security Copilot?

Presently available through invitation-only early access, Microsoft Security Copilot has emerged as a pivotal tool within the security domain. Leveraging data signals from diverse sources like Microsoft Defender Threat Intelligence, Microsoft Sentinel, and Microsoft Intune, it proactively identifies threats and automates responses for swift threat resolution. Enhanced by a specialized language model with dedicated capabilities, Microsoft Security Copilot’s effectiveness is heightened, enabling it to effectively monitor potential cyber risks.

Moreover, Security Copilot aids organizations in enhancing the productivity of their existing security teams by bridging skill gaps, delivering ongoing risk assessments, and furnishing customized recommendations. These measures fortify the overall cybersecurity posture, particularly in managing imminent threats or potential attacks.

Are You Ready for Microsoft Copilot?

While the array of different Copilots is vast, imagine the possibilities in productivity, creativity, and organization. Embracing AI requires careful planning, meticulous preparation, and a readiness mindset to ensure successful implementation and return on investment. Microsoft 365 Copilot is no exception.

Embark on the initial steps of integrating AI into your workplace with Connection's Copilot for Microsoft 365 Workshop. Crafted as a three-phase engagement, our workshop will assist you in assessing needs, prioritizing Copilot scenarios, and defining an actionable roadmap. It provides insights into your readiness and identifies optimization opportunities through tailored services aimed at enhancing your data infrastructure, analyzing and enhancing accessibility, and maximizing security.

Let Connection guide you in preparing for Copilot implementation and realizing its full range of benefits and return on investment. Reach out to your Account Team for more information on how to get started.

]]>
Vision AI Unlocks New Factory Insight https://community.connection.com/vision-ai-unlocks-new-factory-insight/ Mar 19, 2024 Ryan Spurr https://community.connection.com/author/ryan-spurr/ https://community.connection.com/wp-content/uploads/2024/03/2536525-Helix-Manufacturing-VisionAI-Blog.jpg

Vision AI, the technology that allows computers to “see” and understand the physical world, has been a mainstay in manufacturing for decades. From robotic arms picking up parts to automated optical inspection lines, cameras have played a crucial role in streamlining processes and ensuring quality. However, in recent years, the rise of artificial intelligence (AI) has injected a potent new wave into camera vision, transforming its capabilities and impact on the manufacturing landscape from niche automation use cases to a diverse solution that allows you to go deep and wide, and modernize across various disciplines.

Vision AI can also be an essential tool to improve revenue, manage costs, and, most critically, address workforce shortages in manufacturing. 72% of manufacturers view workplace acquisition as the number one challenge. In December of 2023, there were 601,000 unfilled manufacturing job openings, and 4 million more manufacturing jobs are expected to be required by 2030. Manufacturers struggle to attract and retain workers, and a lack of workforce will make it challenging to staff production lines, support expansion, and meet long-term strategic growth objectives. So how will your company mitigate these risks and tackle its future?

Whatever your company’s motivation, the key is to understand where to start, how to bring early time to value, and how best to scale and align to the many business challenges and opportunities associated with the application of vision AI.

What Has Changed?

While the technology, quality, and breadth of vision models have accelerated, the most notable change is eliminating the barrier to entry. Manufacturers of any size may benefit from these technologies due to lower infrastructure costs, accessible open-source models, and technological advances that make them realistic for any business.

  • Tagging and Camera Vision AI: The ability to automatically tag and categorize objects in images, coupled with AI algorithms that can learn and adapt to variations, has vastly expanded the scope of what cameras can do. This has led to systems that identify objects to understand their relationships, contextualization, and may even predict future behavior.
  • Lower Cost Cameras: The proliferation of high-resolution, affordable cameras has made deploying vision systems across diverse manufacturing environments more feasible. This democratizes the technology and allows smaller players to leverage its benefits. Some camera partners provide out-of-the-box vision AI functionality (aka, license plate detection or people detection), but these same cameras can be extended with advanced vision AI models. Whether your business requires low-cost IP cameras, high-end 8K cameras, or specialty cameras with high-speed industrial functionalities, the methodology for integrating any cameras with vision AI remains the same.
  • Advancements in GPUs and Edge Compute: Powerful graphics processing units (GPUs) and edge computing technologies bring real-time processing capabilities closer to the data source, enabling faster responses and minimizing latency. This allows immediate inferencing and decision-making based on unstructured data, further optimizing production lines.
  • Hyperscalers: Today’s hyperscalers are building vision AI into their platforms, removing barriers to this technology. These platforms integrate natively into their respective cloud stacks, integrate governance and security, and provide lifecycle support allowing organizations to label, tune, inference, and deploy. Depending on your business model and needs, many hyperscalers allow for inferencing in the cloud and deployment at the edge. Whichever you require, these solutions streamline MLOps and make it easier to manage over the life of the models, including deployment to edge compute.

What Are the Top Use Cases for Vision AI?

There aren’t many things you can’t accomplish given the right sample size, time, and money. With the advent of existing vision AI models detecting a wide range of objects, locations, text, and sentiments, it’s possible to detect and capture unstructured insight from images and videos to suit just about any use case. The good news is you don’t have to start with the most complicated use cases to get a business success. The following highlights some of the most feasible and widely adopted use cases in manufacturing that will get your organization up and running with meaningful business impact.

  • Real-time Quality Control: High-resolution cameras combined with AI can inspect products at every production stage and identify minute defects that might escape the human eye. This leads to higher quality output, reduced waste, and improved brand reputation. For example, organizations that deployed AI-enabled quality control could see a reduction in defect rates by as much as 50% and save up to 50% on inspection costs. Given its high feasibility and business outcome, quality control is also the most widely adopted use case in manufacturing. If you want to start somewhere—start with quality control use cases.
  • Predictive Maintenance: Cameras can now monitor equipment for subtle changes in vibration, temperature, movement, or wear patterns. AI algorithms analyze this data to predict potential failures before they occur, preventing costly downtime and ensuring smooth operation. Factory equipment often contributes to costly downtime, and implementing predictive maintenance can reduce unplanned maintenance events by as much as 30%.
  • Optimized Production Lines: AI can analyze the flow of materials and products on a production line in real time, identifying bottlenecks and suggesting adjustments. This dynamic optimization increases throughput, reduces waste, and improves efficiency. A study found that AI-powered production line optimization can increase output by up to 25% and decrease waste by 15%. This is an excellent example of the evolution of machine vision towards a more holistic capability. Instead of just monitoring a single cell, cameras installed in the ceiling or over production lines now can reference a wide range of situations, allowing organizations to use cameras to gather more systemic insight within the plant and thus transform how they optimize their value stream.
  • Optimized Robotics and Automation: AI vision enhances the capabilities of robots, equipping them with the ability to navigate complex environments, manipulate delicate objects, and adapt to changes in production workflows. This opens doors to increased automation, improved worker safety, and greater production flexibility. A study by the International Federation of Robotics found that collaborative robots assisted by vision systems can boost productivity by up to 40%.
  • Enhanced Worker Safety: Most manufacturers track worker safety incidents after they’ve occurred. Cameras not only help determine the root cause for a particular incident, but they can also be used to identify unreported safety incidents, unreported injuries, and utilized to support a more proactive workplace safety culture. AI vision can detect unsafe practices and hazardous conditions in real-time, triggering alerts and even shut down equipment to prevent accidents. This can significantly improve worker safety and reduce workplace injuries, and ultimately drive the organization to be more proactive about its actions to protect employees.

Start Seeing Differently

Vision AI is not just a trend but a transformative force reshaping the manufacturing landscape. There is massive potential to collect unstructured data and translate that into valuable insight. Just imagine, whatever a supervisor, technician, or operator can see can often be emulated with a vision AI solution. This enables organizations to augment workforce gaps, eliminate mundane, error-prone, or non-value-added activities, and allow the workers we do have to perform value-added and thoughtful activities.

The power of vision AI to improve efficiency, quality, and safety is undeniable, and the collective advancements in this technology are paving the way for a more intelligent, productive, and competitive future for the manufacturing sector. As the technology evolves and becomes more accessible, expect to see even more innovation and disruption with expanding use cases, off-the-shelf foundational models, and integration with other AI capabilities like generative AI.

The key is not to wait. Most manufacturers need more skillsets and a broad understanding of applying this powerful technology in their business processes and technology stack. Starting early provides the ability to bring many stakeholders together, solve meaningful business challenges with realistic returns on investment, and prepare the organization for what will quickly follow. At the end of the day, those who start and execute with vision AI will outcompete those who don’t.

Our Manufacturing Practice has a team of experts from trade, an evolving portfolio of manufacturing solutions, and assists IT and OT teams by augmenting their existing skills with complimentary advisory services to help your business accelerate technology adoption where it matters most.

If your business wants to learn more about how we support our clients with artificial intelligence, engage our Helix Center for Applied AI and Robotics to learn more about this technology, available services, and the many use cases that may benefit your organization.

]]>
Connection Announces the 2024 IT Superhero... https://community.connection.com/connection-announces-the-2024-it-superhero-awards/ Mar 14, 2024 Connection https://community.connection.com/author/connection/ https://community.connection.com/wp-content/uploads/2024/03/253664-ITSA-2024-Blog.jpg

The IT Superhero Awards are back for another amazing year! We are proud to share that Connection will host the fourth annual IT Superhero Awards, honoring hardworking IT heroes from across the country for their dedication and technical expertise. The awards program recognizes IT professionals, nominated by their colleagues, for going above and beyond the call of duty to save the day for their team. Submit your nomination today!

There are five award categories for the 2024 IT Superhero Awards:

  • Best Team Leader–The Best Team Leader Award goes to a true motivator who leads others to success and inspires greatness.
  • Best Rookie–The Best Rookie Award is for that fresh IT pro who performs like a seasoned pro.
  • Best Catch–The Best Catch Award honors a teammate who made an amazing save, big or small, that averted disaster.
  • Best Superpower–The Best Superpower Award recognizes a hardworking hero capable of performing astonishing feats, no matter the deadline.
  • Most Unshakeable–The Most Unshakeable Award belongs to a winner who is always calm, patient, and focused in the face of IT chaos.

A grand-prize winner, chosen from the 5 category winners, will be named the 2024 Ultimate IT Superhero!

Winners will have the opportunity to select one of three charities—Feeding America, NPower, and the National Center for Women & Information Technology (NCWIT)—to receive a $1,500 donation from Connection in their name, with a $3,000 donation in the name of the Ultimate IT Superhero. These extraordinary non-profits were selected by Connection employees as part of Connection Cares.

The IT Superhero Awards program is open to IT professionals from organizations of all sizes and industries, spanning startups to large enterprises across all vertical markets. Winners will be announced at the Connection Technology Summit in Boston, MA on September 12, 2024. Read the full press release for complete details.

Nominations for the 2024 IT Superhero Awards are due June 28, 2024—submit yours today!

]]>
Bringing Clinicians and Patients... https://community.connection.com/bringing-clinicians-and-patients-closer-together-at-himss24/ Mar 05, 2024 Jennifer Johnson https://community.connection.com/author/jennifer-johnson/ https://community.connection.com/wp-content/uploads/2024/02/2513171-HIMSS24-BLOG.jpg

As we stand on the brink of 2024, it’s fascinating to reflect on how far we’ve come since 2006—a year when the average cost of gas was $2.64, healthcare was still establishing uniform standards for EHRs, and most of us navigated the digital world through Windows XP. That same year, Connection made its inaugural appearance at the HIMSS conference in San Diego, California, marking the beginning of a transformative journey in healthcare IT.

The Healthcare Information Management Systems Society (HIMSS) has long been recognized as a global beacon, guiding the healthcare ecosystem through the power of information and technology. As a mission-driven nonprofit, HIMSS leverages its expertise in health innovation, public policy, workforce development, research, and digital transformation to empower leaders and influencers worldwide.

In this spirit of innovation and partnership, Connection is thrilled to announce our 18th year as a HIMSS Diamond Sponsor, a testament to our commitment to advancing healthcare through technology. We invite you to join us in Booth #1449 during the HIMSS24 conference to explore how our dedicated specialists tailor IT offerings to meet the unique needs of the healthcare sector, fostering infrastructure modernization and enhancing the connection between caregivers and patients.

Addressing Key Healthcare IT Challenges

With healthcare costs anticipated to climb by over 7% in 2024, and health system ransomware attacks more than doubling last year, the urgency for advanced, secure IT solutions has never been greater. Connection, along with our esteemed partners, is at the forefront of addressing these challenges.

Connection, a Fortune 1000 company, calms the confusion of IT by delivering customers industry-leading technology solutions to enhance growth, elevate productivity, and empower innovation. Dedicated specialists focused on exceptional service and customized offerings tailored to the unique needs of healthcare. Partnering with healthcare organizations of every size—from private practices to large health systems—Connection delivers end-to-end IT solutions and expert guidance to accelerate infrastructure modernization and bring caregivers and patients closer together.

At HIMSS24, Connection Booth #1449 will be a hub of innovation and collaboration, including:

  • Demonstrations on Operations Management, Patient Experience, and Provider Experience solutions
  • Insights into our Digital Workspace, Modern Infrastructure, Multicloud, Supply Chain and Lifestyle services portfolio
  • Opportunity for engaging discussions with our expert Solution Architects, Services, Sales, and executive leadership team

Additionally, our booth will offer a refreshment station, a space for assembling Connection Cares veteran’s care kits, a device charging station, and exclusive in-booth receptions.

HIMSS24 Conference Experiences

Attendees can also continue their journey to better global health during these unique conference experiences with members of the Connection team, including:

Lunch and Learn
Navigating the AI Revolution in Healthcare: From Prognosis to Ethics
Presented by Jamal Khan, Chief Growth and Innovation Officer and Head of Helix Center for Applied AI and Robotics
Tuesday, March 12
1:00–2:00 p.m.
Orange County Convention Center
Room 202B 

Focus Group (Invitation Only)
Third Party Risk—The growing cyber and compliance concern for Healthcare
Presented by Connection Security Experts
Wednesday, March 13
12:30–1:30 p.m.

Customer Happy Hour
Enjoy food, drinks, and networking with the Connection team
Wednesday, March 13
4:30–6:00 p.m.
Orange County Convention Center
Booth 1449 | Exhibit Hall
Register Here

Esteemed Partners at HIMSS24

Our partners—including Abacode, Barco Healthcare, Dell, Google, and more—bring their unique strengths and innovations to the table, offering a holistic view of the future of healthcare technology.

From cybersecurity and compliance to medical imaging, Generative AI, and modernizing healthcare solutions, our collaborative efforts aim to empower healthcare providers and patients alike. Alongside the Connection team, these esteemed partners will join us in Booth #1449:

Abacode is the leader in unified Cybersecurity and Compliance services™. With one managed program, Abacode secures your digital environment and helps you reach a state of continuous compliance. Founded in 2014, Abacode is headquartered in Tampa, FL, with Security Operations Centers in Tampa and Las Vegas. They deliver customized, managed programs aligned with industry best practices to help clients achieve positive business outcomes.

Abacode provides world-class professional services combined with leading-edge technology solutions to ensure that client needs are met to the highest standards. With a diverse international client base spanning multiple sectors, Abacode’s unique approach leverages a predictable, repeatable model that helps clients achieve results four times faster than the industry average.

Barco Healthcare’s extensive line-up of high-precision medical monitors brings accuracy and efficiency to a broad range of healthcare disciplines including Radiology, Mammography, Digital Pathology, Clinical Review, and Dentistry. Complimented by cloud based QAWeb Enterprise, stable image quality is supported throughout the display’s entire lifetime by keeping an eye on your displays, so you don’t need to with automated calibration tests, quality assurance, and reporting. By providing medical staff with the complete and most accurate picture, Barco enables more informed decisions, when and where it matters most.

With a patient first, data-anywhere focus, Dell reimagines patient care delivery—where secure, modern health IT solutions enable a more connected workforce providing personalized care to patients wherever they might be.

Generative AI (GenAI) is a game-changing technology that has tremendous potential for the healthcare industry. GenAI can transform how you interact with patients, provide tools and resources that empower employees and improve productivity, and support risk scenario planning and data security measures. Dell is working alongside NVIDIA to enable Generative AI workloads—delivering engineering-validated hardware and software to accelerate AI workloads across the healthcare landscape.

Google’s comprehensive suite of Google Cloud, Google WorkSpace, Google Chrome, and Google Pixel all working together enables healthcare professionals to collaborate effortlessly, ultimately improving the delivery of high-quality care and furthering advancements in the life sciences field.

“Google is a life company…not a health company. To have a high quality of life, health is very important. We want to help people, and we want to help enterprises meet consumers where they are and give them what they need. One of the primary goals of the company is to help billions of people around the world become healthier in an equitable manner… giving every single person an opportunity to have the highest quality of health.” –Dr. Karen DeSalvo, Google’s Chief Health Officer.

Embrace the Future of Healthcare IT with Connection

As we gather at HIMSS24, let’s embrace the opportunity to shape the future of healthcare together. Visit Connection in Booth #1449 to witness how technology can transform healthcare for the better. Join us in this journey towards a more connected, efficient, and secure healthcare ecosystem.

Schedule a meeting with the Connection team in Booth #1449 during HIMSS24.

]]>
Navigating the AI Revolution in Manufacturing https://community.connection.com/navigating-the-ai-revolution-in-manufacturing/ Feb 28, 2024 Jamal Khan https://community.connection.com/author/jamal-khan/ https://community.connection.com/wp-content/uploads/2024/02/2518458-Helix-AIManufacturing-BLOG.jpg

The integration of artificial intelligence (AI) into the manufacturing sector represents a pivotal shift, set to transform operational efficiency, drive innovation, and fundamentally alter manufacturing processes.

The manufacturing sector is an ideal setting for AI implementation. With its repetitive tasks and wide range of functions, it presents a perfect opportunity for AI to enhance various aspects of manufacturing, from research and development to production, and even extending to aftermarket services. AI's ability to improve productivity, bolster quality control, and optimize supply chains is poised to dramatically increase efficiency and foster innovation in the industry.

However, adopting AI in manufacturing is not without its challenges and complexities. To navigate this evolving landscape successfully, manufacturers must form strategic partnerships with AI experts. Connection’s Helix Center for Applied Artificial Intelligence is strategically positioned to guide manufacturers through the intricacies of AI integration, ensuring a seamless and efficient transition.

Why the Time for AI in Manufacturing Is Now

The manufacturing landscape is at a pivotal moment, with several compelling factors making it the perfect time for manufacturers to adopt AI:

Economic and Workforce Pressures

Today’s manufacturing sector is navigating through stormy economic pressures, further complicated by a significant shortage of skilled labor. The National Association of Manufacturers points to a staggering projected shortfall of 2.1 million jobs in the next decade. This gap emphasizes the critical need for AI technologies, which can not only augment but also revolutionize workforce capabilities, offering solutions to these pressing challenges.

The Data Explosion

Manufacturing operations generate a wealth of data, encompassing production metrics, logistics details, and a vast array of other valuable insights. However, a significant portion of this potential remains unutilized due to the inherent complexities of data capture and analysis. Fortunately, AI has the unique ability to navigate this data deluge and unlock previously inaccessible efficiencies and actionable insights.

Advances in AI Algorithms and Infrastructure

The AI landscape has undergone a transformation, with advances in algorithms and supporting infrastructure making AI more accessible than ever. Breakthroughs in neural networks and machine learning, along with more readily available computing power, have significantly reduced the barriers to AI adoption, making it a viable, cost-effective option for manufacturers of all sizes.

Enhanced Processing Capability

The modern manufacturing process demands high-speed, efficient processing capabilities, and AI is stepping up to meet this need. With the ability to process and analyze data at unprecedented speeds, AI technologies enable manufacturers to optimize operations, reduce waste, and make more informed decisions faster than ever before.

Democratization of AI Tools

Today, AI technologies are not confined to tech giants and large corporations. A wide array of platforms and tools are now available, making it easier for manufacturers, regardless of their size, to leverage AI. This accessibility ensures that even small and medium-sized enterprises can harness the power of AI to innovate and compete on a global scale.

The Boundless Potential of Use Cases for AI in Manufacturing

Now is the ideal time for manufacturers to adopt AI, with early adopters already experiencing substantial business benefits. AI technologies are being utilized to enhance workplace safety, transform supply chains, employ camera vision for optimizing production line processes, and more. These are some of the top use cases for AI in manufacturing:

Predictive Maintenance

Predictive failure and maintenance uses algorithms to predict the next machine or system failure, then alerts employees so that they’re able to prevent that failure from happening. It can analyze data from equipment sensors, forecasting potential failures and scheduling maintenance to prevent downtime, thereby saving millions in potential lost revenue. Defined as the “low hanging fruit” by one research institution, intelligent maintenance of machinery and equipment is the most common use of AI in manufacturing.1

Machine Vision and Quality Control

Specialized cameras can interact with AI-based software to improve operations, check for quality, and take action depending on the results. Through advanced image recognition and machine learning algorithms, AI systems can inspect products with a level of accuracy and speed unattainable by human operators. Analyzing images in real-time to complete product quality inspections is critical to augment the workforce and stay in compliance with regulatory requirements.

Transforming Supply Chains with AI

AI algorithms can process vast amounts of data from various sources—including market trends, weather forecasts, and geopolitical events—to make informed predictions about supply chain disruptions. This capability enables manufacturers to be proactive rather than reactive, ensuring the smooth operation of supply chains even in the face of unforeseen challenges. This ability also allows manufacturers to predict buying behavior allows manufacturers to optimize inventory control, staffing, energy consumption, raw materials, and more.

Digital Twins

A digital twin is a virtual model of an actual manufacturing process, created by using data from both the process itself and the products that pass through it. This technology can seamlessly synchronize sales and operations by analyzing sales data, taking into account seasonal, regional, and event-driven fluctuations. AI models can leverage this analysis to inform production planning across various facilities, ensuring product availability aligns efficiently with market demand.

Customization and Personalization

AI is revolutionizing how companies meet individual customer preferences without compromising on efficiency. By analyzing data, AI enables manufacturers to predict trends and innovate products ahead of consumer demands. Augmented reality (AR) and virtual reality (VR) allow customers to customize products virtually, ensuring satisfaction before purchase.

In production, AI enhances flexibility by adapting processes for custom orders, with robots performing complex tasks accurately and 3D printing enabling on-demand custom production. This automation maintains speed in manufacturing. Furthermore, AI personalizes the delivery process by predicting demand and optimizing delivery routes, ensuring quicker and more personalized service.

Workplace Safety

AI has unlocked the potential for a range of technologies aimed at enhancing workplace safety. This includes the implementation of systems for the detection of personal protective equipment (PPE), ensuring that workers are adequately protected at all times. Safety zoning is another area where AI contributes significantly, by monitoring and managing access to hazardous areas, thereby preventing unauthorized or unsafe entries.

AI-driven predictive maintenance for equipment can foresee potential failures before they occur, reducing the risk of accidents and ensuring that machinery operates safely and efficiently. AI can also analyze workplace data in real-time to identify patterns that may indicate safety risks, allowing for proactive measures to mitigate potential hazards.

Synthetic Data and Collaborative Innovation

For areas where data is scarce or sensitive, synthetic data can help manufacturers to simulate scenarios and train AI models without compromising real data. This approach, however, requires careful design to ensure that synthetic data accurately reflects real-world conditions without introducing biases.

Overcoming the Hurdles to AI Adoption in Manufacturing

The potential rewards of incorporating AI solutions into the manufacturing space are significant; however, manufacturers must also navigate a series of obstacles to successfully implement AI. These obstacles include:

Data and Integration Challenges

A key hurdle is the integration of AI into existing manufacturing systems, many of which are legacy platforms not originally designed for compatibility with AI technologies. The diversity and volume of data generated in manufacturing environments further complicate this issue. Manufacturers must take action to standardize and harmonize data across disparate systems to create a cohesive, AI-ready infrastructure.

The Workforce and Job Displacement Concerns

The introduction of AI in manufacturing raises concerns about job displacement and the need for workforce upskilling. As AI automates routine tasks, the nature of jobs will evolve, necessitating a shift in the skills that workers need to thrive. Manufacturers must prioritize retraining and education initiatives to prepare their workforce for this new landscape.

Ethical Considerations

Ethical considerations, particularly around bias in AI algorithms, present another challenge. AI systems are only as unbiased as the data they are trained on. Ensuring data diversity and implementing robust testing protocols are critical steps in mitigating the risk of unintentional biases, which can lead to skewed outcomes and decision-making.

Supply Chain Issues

Supply chain disruptions create incomplete and fragmented data, hindering AI training and effectiveness. Additionally, component shortages and rising costs delay and inflate implementation projects.

Your AI Journey Shouldn’t Be a Solo One

Implementing AI initiatives in a manufacturing facility comes with an inherent set of challenges. Manufacturers should not undertake this journey alone. Establishing strategic partnerships with leading technology companies can greatly enhance the success of integrating AI.

The path to successfully deploying AI extends across various domains, requiring collaboration in areas such as infrastructure setup, model training, quality assurance, and security measures. Even seemingly straightforward applications, like camera vision technology, require a detailed strategy that includes selecting appropriate hardware, integrating with existing network systems, deploying GPU-enabled edge devices for processing, and continuously maintaining and updating AI models. This multifaceted approach underlines the complexity of AI adoption and the necessity of both external partnerships and internal capability building.

While partnerships are essential, cultivating internal AI expertise within an organization is equally important. A well-developed internal skill set ensures the organization can engage in meaningful conversations with vendors, effectively evaluate the real benefits and applications of AI, and scrutinize the costs, risks, and data-handling aspects of proposed AI solutions. This balance between external collaboration and internal proficiency enables a comprehensive and nuanced approach to AI integration.

How Connection Can Help You Integrate AI Into your Manufacturing Processes

Manufacturers who partner with Connection can streamline their adoption of AI. Connection’s Helix Center for Applied AI and Robotics offers a detailed pathway for manufacturers to tackle the complexities of AI integration.

This encompasses a range of services including advisory, data orchestration, infrastructure setup, model development, and application re-platforming, each crucial for applying AI effectively in real-world settings.

  1. Advisory Functions: Connection deeply understands the specific challenges and goals within the manufacturing industry. By working closely with clients to grasp their business models, supply chains, and objectives, Connection evaluates the company’s readiness for AI and the maturity of its data ecosystem. This critical analysis ensures that AI initiatives are well-suited to each manufacturer's unique context, facilitating the implementation of AI solutions that genuinely align with business needs.
  2. Data Orchestration: At Connection, we emphasize the importance of a robust data strategy, helping manufacturers to organize, manage, and optimize their data assets. Our goal is to ensure that the data used for AI applications is accurate, relevant, and aligned with business goals.

    We also encourage flexibility with data. Since not all data is pristine, we help manufacturers to navigate the challenges of dealing with diverse datasets, including unstructured and dirty data, and provide solutions to derive meaningful insights.
  3. Infrastructure Design and Optimization: Connection proactively designs and optimizes the necessary infrastructure for AI applications, from cloud solutions to edge computing, ensuring it meets the specific needs of the manufacturing sector without unnecessary expenditure.
  4. Model Development: Connection supports the continuous improvement of AI through MLOps and DataOps, focusing on operational support for AI implementations.
  5. Application Re-platforming: Connection assists manufacturers in re-platforming applications, a process aimed at making applications smarter and more responsive. This approach involves transforming applications to support intelligent actions, enhancing efficiency and effectiveness across manufacturing processes.

Seizing the AI Opportunity in Manufacturing with Connection

The integration of AI into manufacturing is not just an opportunity—it is a necessity for those seeking to stay competitive in an increasingly digital world. The journey is complex and requires a strategic approach, but the rewards—in terms of efficiency, innovation, and resilience—are substantial. By embracing AI, manufacturers can unlock new levels of performance and open the door to a future of limitless possibilities.

As we stand on the cusp of this AI-driven transformation, the question for manufacturers is not if they will adopt AI, but how quickly and effectively they can do so. The future of manufacturing is smart, connected, and AI-powered, and the time to embark on this journey is now. For more information and to get started on your journey with AI in manufacturing, visit our Helix Center for Applied AI and Robotics online today.

]]>
TechSperience Episode 125: Navigating the AI... https://community.connection.com/techsperience-episode-125-navigating-the-ai-revolution-in-manufacturing/ Feb 22, 2024 Connection https://community.connection.com/author/connection/ https://community.connection.com/wp-content/uploads/2024/02/AI-Revolution-in-Manufacturing.jpg

Artificial intelligence (AI) has been nothing short of revolutionary for the manufacturing industry. From research and development to production, and even extending to aftermarket services, AI can drastically improve productivity, bolster quality control, and optimize supply chains in the industry.

However, adopting AI in manufacturing is not without its challenges and complexities. Join us as we navigate this evolving landscape, explore practical applications of AI for manufacturers, and uncover the business benefits it can bring.

Guests:

Ryan Spurr, Manufacturing Strategy Director at Connection

Jamal Khan, Chief Growth and Innovation Officer at Connection

Show Notes

00:00 Introduction
00:46 The Impact of AI in Manufacturing
03:01 Challenges in AI Adoption in Manufacturing
05:30 Unique Challenges in Manufacturing
08:22 Job Displacement in Manufacturing
09:40 Drivers for AI Adoption in Manufacturing
11:43 Factors Enabling AI Adoption
14:35 The Role of Data in AI Adoption
18:48 Applications of AI in Manufacturing
24:52 Use Cases and Workloads in AI
28:36 The Power of Camera Vision in Manufacturing
34:06 The Importance of Supply Chain Twins
38:41 The Role of Synthetic Data in AI
45:25 Connection's Approach to AI in Manufacturing
50:15 Six Areas of Focus
50:45 Partnerships and Technology Stacks
51:08 Opportunity and Feasible Use Cases
51:36 Limited Sampling of Use Cases
52:03 Learning More about AI in Manufacturing
52:17 Closing Remarks

]]>
Top 8 Benefits of Backup and Recovery as a... https://community.connection.com/top-8-benefits-of-backup-and-recovery-as-a-service/ Feb 22, 2024 Becky Lawlor https://community.connection.com/author/becky-lawlor/ https://community.connection.com/wp-content/uploads/2024/02/2510980-HPEGreenlake-Benefits-of-BRaaS-Blog.jpg

As businesses navigate an increasingly interconnected and data-driven landscape, the stakes for data loss or unauthorized access have never been higher. Cyber threats, accidental deletions, hardware failures, and unforeseen disasters pose significant risks to the integrity of digital assets. Recognizing this, organizations are turning to backup and recovery as a service (BRaaS) as a proactive and strategic measure to fortify their data against potential threats while ensuring a swift recovery.

Unlike traditional backup methods that often involve on-premises hardware and manual interventions, BRaaS leverages the scalability and flexibility of the cloud to offer a more streamlined and automated approach to data protection.

Here are the top advantages of pivoting to a BRaaS model for backup and recovery protection.

1. Cost-effectiveness

Traditional backup solutions often require substantial upfront investments in hardware infrastructure. In fact, 67% of enterprises using on-premises storage over-invest. BRaaS, being a cloud-based service, eliminates the need for organizations to invest in and maintain dedicated on-premises hardware and reduces capital expenditures, allowing businesses to allocate resources more efficiently and redirect funds toward strategic initiatives.

A pay-as-you-go BRaaS pricing model, such as HPE GreenLake offers, enables organizations to pay only for the resources they consume. This flexibility is particularly advantageous for businesses with fluctuating data storage needs. It not only gives these organizations the ability to scale BRaaS usage accordingly but also optimizes costs and avoids the inefficiencies associated with overprovisioning. In addition, this flexible, pay-as-you-go model can help prevent unnecessary resource allocation and promote energy efficiency.

2. Improved data security

BRaaS prioritizes data security through robust encryption mechanisms that safeguard data during both storage and transmission. Secure transmission protocols further enhance data protection, guaranteeing that data is transferred to and from the cloud infrastructure in a secure and encrypted manner. In addition, BRaaS providers, like HPE GreenLake, also adhere to rigorous security standards and certifications, assuring businesses that their data is handled in accordance with regulatory requirements.

3. Scalability

The scalable nature of BRaaS allows organizations to adapt to changing data storage requirements seamlessly. As data volumes grow or business needs evolve, organizations can easily scale their storage capacity without the need for extensive planning or infrastructure upgrades. This agile scalability ensures businesses can efficiently accommodate the dynamic nature of their data environment as well as their business environment—whether that’s expanding into new markets, introducing new applications, or undergoing organizational shifts.

4. Business continuity

Compared to traditional backup and recovery methods, BRaaS can minimize downtime in the face of data loss or disruptions. With rapid recovery options and efficient backup processes, organizations can swiftly restore critical data and applications, reducing the impact on business operations. This proactive approach to business continuity enhances resilience and safeguards against potential revenue loss associated with extended downtimes.

5. Accessibility and ease of use

In a business landscape where remote work is increasingly prevalent, the ability to access and manage backups from anywhere with an Internet connection is invaluable. BRaaS allows authorized personnel to retrieve critical data or initiate recovery processes without being physically present in the office. This remote accessibility not only enhances operational flexibility but also ensures that data management remains seamless regardless of the geographical location of key stakeholders.

Additionally, BRaaS platforms typically feature user-friendly interfaces designed for ease of use. Intuitive dashboards and tools simplify the management of backup and recovery processes, allowing even non-technical users to navigate and execute tasks efficiently. The emphasis on user experience contributes to a lower learning curve for personnel involved in data management, reducing the likelihood of errors and ensuring that organizations can leverage BRaaS to its full potential.

6. Automation and efficiency

Automation is a core feature of BRaaS, streamlining backup and recovery processes for enhanced efficiency. Automated scheduling, as mentioned earlier, ensures that backups occur at predetermined intervals without the need for manual intervention. This automation not only saves time but also reduces the risk of human error associated with manual processes. By automating routine tasks, BRaaS allows IT teams to focus on more strategic aspects of data management, fostering increased productivity and resource optimization.

BRaaS solutions that support hybrid cloud environments enable seamless integration and management of workloads across on-premises infrastructure and multiple public cloud platforms. For instance, HPE GreenLake’s hybrid approach to BRaaS delivers a unified and comprehensive solution that allows businesses to effectively assess their IT infrastructure needs and place workloads in the most efficient locations based on factors such as performance, cost, and compliance.

7. Simplified operations and management

BRaaS aims to simplify IT operations by handling the day-to-day management of infrastructure. This allows IT teams to focus on more strategic initiatives rather than routine tasks, enhancing overall operational efficiency. With end-to-end management services, such as HPE GreenLake offers, businesses can further improve operational efficiency by deploying on-premises, at the edge, or in the public cloud while maintaining control and visibility of their infrastructure and consumption experience across the entire infrastructure stack, including hardware, software, and services, both on-premises and in the cloud.

8. Sustainability

Environmental sustainability is gaining prominence across industries. Some BRaaS providers are adopting energy-efficient technologies and optimizing resource usage to reduce the environmental impact of data storage and management.

HPE, for example, has been working towards making its data centers more environmentally friendly. In addition, HPE GreenLake provides an on-premises cloud experience, allowing organizations to enjoy the benefits of cloud computing without relying solely on external cloud services. This approach can lead to reduced data transfer and processing in external data centers, contributing to lower energy consumption and a smaller carbon footprint.

A Better Way to Back Up and Recover Data

In a world where data is a cornerstone of business operations, the evolution of BRaaS aligns with the imperative of ensuring data security, adaptability, and environmental responsibility. It also offers a cost-effective, scalable, and efficient approach to data backup and recovery. As organizations continue to embrace digital transformation, the strategic adoption of BRaaS will play a crucial role in fortifying an organization’s resilience and contributing to a sustainable and secure digital future.

Connection’s cloud and data center services can help you find a BRaaS solution that will improve the resilience, scalability, and sustainability of your data environments. Reach out to your Account Team or contact us here for more information.

]]>
TechSperience Episode 124: Leveraging the... https://community.connection.com/techsperience-episode-124-leveraging-the-power-of-tidc-in-manufacturing/ Feb 14, 2024 Connection https://community.connection.com/author/connection/ https://community.connection.com/wp-content/uploads/2024/02/2486910-TIDC-Manufacturing-TechSperience-Solutions-FB-LI-SOCIAL-v01.jpg

Manufacturers demand better technology delivery.

In this podcast, we'll explore how Connection's Technology Integration and Distribution Center (TIDC) can help manufacturing IT organizations invest in automation, tech modernization, and leverage our deep technology experience to reduce costs, improve efficiency, and free up it staff to focus on more strategic initiatives.

Host: James Hilliard

Guests: Ryan Spurr, Manufacturing Strategy Director at Connection

Mark Wulfhorst, Senior Director for the Solution Engineering Group at TIDC, Connection

Show Notes:

00:03 Introduction to Connections Technology Integration and Distribution Center

00:49 Challenges Faced by Manufacturing Customers

01:23 Disruptive Initiatives in Manufacturing

02:12 The Changing Expectations of IT

03:04 The Struggle to Hire Competent People

03:57 The Reality of IT Staffing in Manufacturing

05:30 The Increasing Demand for Better Technology Delivery

06:39 The Evolution of Customer Needs and TIDC Services

07:43 The Benefits of TIDC Services

08:57 The Impact of COVID on IT Delivery

11:43 The Transition to Windows 11

20:12 The Role of TIDC in IT Asset Disposal

22:05 The Engagement Process with TIDC

23:55 Conclusion and Contact Information

]]>
Is Your Organization Getting the Most Use... https://community.connection.com/is-your-organization-getting-the-most-use-out-of-your-microsoft-contract/ Feb 14, 2024 Stephanie Bondhus https://community.connection.com/author/stephanie-bondhus/ https://community.connection.com/wp-content/uploads/2024/02/2493676-MLO-BLOG.jpg

A common story we hear as consultants is that our clients aren’t ready to bring modern technology to their Microsoft contracts because they hardly have the time to deploy what is included in their current licensing. But that doesn’t stop Microsoft account teams from pushing increased capabilities (and cost) onto renewing contracts.

With Connection’s Microsoft Landscape Optimization (MLO) assessments, we can help you understand holistically what you already own, and then help to create deployment plans for your organization that get the most value from your licensing entitlements. In addition, we will analyze your spending on Microsoft over the duration of your contract—including identifying any changes made by you and/or Microsoft since your contract was signed. We do not shy away from digging deep into the licensing changes to ensure you understand your rights forward and backwards.

If you have trouble understanding or explaining your Microsoft licensing and entitlements, we can help. Our MLO Premium engagements give you a full and comprehensive view of your contracts, terms, rights, technology, overall spend, your usage in Microsoft 365, your usage and billing in Azure, and your use of Azure Hybrid Use Benefits—and all that might even help give you the confidence you need to walk into negotiations for your Microsoft contract renewal.

You can expect the following workshops in a Premium MLO assessment:

  • User Profiling: Identify and create profiles of each user group and their unique licensing needs.
  • Cloudstack Discovery: Learn about all the key features underneath the Microsoft 365 family umbrella—which ones you are currently using and which ones you are planning to deploy—and uncover the competing solutions that could be replaced with Microsoft technology at a cost savings.
  • Server and Cloud: Ensure your server environment is properly licensed under current rules, identify any opportunities to save on licensing in Azure with Hybrid Use Benefit, and review plans for eliminating any excess license coverage that is no longer needed.
  • Executive Summary: Compile all relevant details, pricing, and information into a single document that is easily understandable for internal presentations to executives and key decision-makers within your organization.

Recently, a teammate and I were able to help a client save $200,000 by introducing the Microsoft 365 Frontline plans for qualifying users and transitioning SQL Enterprise licensing to SQL Standard licensing covering individual virtual machines. During the MLO process, we uncovered that a large group of employees were using shared devices, thereby qualifying them for the much more affordable Frontline licensing. We also discovered they were still utilizing the unlimited virtualization rights of SQL Enterprise, but because of a recent reorganization and reduction, this was no longer the best financial option for them. After pricing out different scenarios using real time deployment data, we were able to transition them to SQL Standard licensing, saving them annual licensing fees.

Do you know exactly how you are utilizing your Microsoft contract? Is Microsoft 365 E5 the right license for all your users? We can help you answer all your questions with data and proof to get you exactly what you need and pay for only that. Reach out to your Connection Account Team or watch our vlog for more information.

https://www.youtube.com/watch?v=1r4gzVSQqrg
]]>
Navigating Manufacturing Challenges with the... https://community.connection.com/navigating-manufacturing-challenges-with-the-tidc/ Feb 13, 2024 Ryan Spurr https://community.connection.com/author/ryan-spurr/ https://community.connection.com/wp-content/uploads/2024/02/2486910-TIDC-Manufacturing-Blog.jpg

Manufacturing teams require better technology delivery. They are being asked to manage costs, drive growth, and deliver operational excellence in a world full of evolving market challenges. Costs are increasing, supply chain disruptions are common, and technology is rapidly changing.

Adding to the complexity is an evolving workforce of distributed workers, high turnover, and a need to attract the right talent. It’s never been more important for manufacturing organizations to rethink their IT service delivery models and how they align to support business operations, growth, and workforce optimization.

Our Technology Integration and Distribution Center (TIDC) can help manufacturing organizations invest in automation, technology modernization, and leverage our deep technology experience to reduce costs, improve efficiency, and free up IT staff to focus on more strategic initiatives.

Three Key Challenges in Manufacturing

Manufacturing IT teams face a multitude of challenges. Whether it’s dealing with disruptive initiatives, line of business expectations, or the struggle to hire and retain competent talent, the TIDC is well-equipped to assist.

1. Disruptive Initiatives: Central to a manufacturing organization’s growth strategy are disruptive initiatives, such as constructing new facilities, expanding existing ones, or securing new locations. These endeavors significantly impact IT organizations, facilities, and intersecting functions, often imposing a considerable burden on IT to ensure successful execution.

The TIDC plays a vital role in facilitating the seamless development of both facility and IT infrastructure. By providing essential support, The TIDC allows IT organizations to concentrate on meeting business objectives and optimizing operational efficiency.

2. Line of Business Expectations: There’s a shift in the expectations of IT. Workers need the right tools, software, and configurations promptly to enhance productivity. The days of waiting weeks for improperly configured technology are long gone. Manufacturing organizations need the right technology solutions, quick deployment, and ongoing support to meet employee expectations and stay agile.

The TIDC plays a crucial role in delivering the right tools at the right time, freeing up IT staff to focus on more strategic initiatives.

3. Talent Acquisition and Retention: The universal challenge of hiring and retaining skilled talent reverberates across industries, with manufacturing being no exception. An alarming number of companies struggle to secure qualified IT workers.

The right workforce is indispensable for successful business execution, spanning engineers, knowledge workers, and operational roles. Our TIDC steps in by providing the necessary technology solutions, skill sets, and processes to fortify IT teams. Collaborating with our TIDC enables manufacturing organizations to align their IT operations with expectations while focusing on attracting and retaining top-tier talent.

Meeting Manufacturing Challenges with the TIDC

With a recent expansion and investment in infrastructure to double our capacity, the TIDC has the capability to act as an extension of customers’ IT departments, offering a range of services, from provisioning and deployment to logistics and asset management.

These are some of the top tactical solutions that the TIDC currently provides manufacturers:

  1. Windows 11 Migration: With the end of life for Windows 10 approaching, the TIDC helps manufacturers navigate the migration to Windows 11 seamlessly. We can assist in analyzing hardware compatibility, provisioning, deployment, and security enhancements. By relying on the TIDC’s expertise, manufacturing organizations can ensure a smooth transition without disrupting their operations.
  1. Factory in a Box: The TIDC offers a unique solution known as "Factory in a Box." When a manufacturing organization requires equipment for a new facility, expansion, or refresh, the TIDC delivers everything pre-provisioned and ready to use. This includes laptops, desktops, tablets, printers, networking equipment, and more.

    Recognizing that people are manufacturers’ most important asset, especially in today’s tight labor market where manufacturers struggle to find qualified workers, it’s essential to meet employees’ high technological expectations. Whether your IT team delivers endpoints to new employees or replaces an existing device, it’s important to get technology right every time to ensure manufacturers can attract, retain, and optimize the productivity of their talent pool.

    Choosing Connection’s Factory in a Box solution guarantees that your equipment undergoes provisioning, testing, validation, and secure packaging before reaching your site. Opting for a single-source vendor ensures timely delivery, making all your products ready for implementation on the scheduled day. This minimizes downtime and decreases the need for hands-on work on-site. The elimination of installation and setup time not only reduces operational downtime and costs but also enables IT teams to concentrate on other critical tasks.
  1. Depot Services and IT Asset Disposal: The TIDC’s depot services help manufacturers minimize downtime by providing advanced exchange solutions. In case of equipment failures, the TIDC can quickly ship pre-provisioned replacement devices.

    Additionally, the TIDC offers IT asset disposal services, ensuring proper disposal or recycling of old equipment. Manufacturers can utilize these services to manage the end-of-life process efficiently and potentially receive credits towards new equipment.

Remove Stress from Manufacturing Technology Projects

Modern manufacturers must continually adapt, modernize, or transform their facilities to enhance operations. To do so, they rely on a wide array of IT components, including computers, mobility solutions, kiosks, digital signage, edge devices and data centers, networking infrastructure, cameras, IoT sensors, and more.

However, the challenges of staffing, disruptive initiatives, and the shift in line of business expectations can make it challenging to ensure that IT delivers technology punctually, at the right location, and within budget.

Our TIDC is dedicated to ensuring manufacturers experience seamless technology delivery. By leveraging the TIDC’s profound expertise, manufacturers can achieve cost reduction, efficiency improvement, and the liberation of IT staff for strategic initiatives.

Take that next step to improve how you deliver technology to your valued employees in support of major initiatives. Engage Connection’s Manufacturing Practice today!

]]>
Inside Look: Connection’s Technology... https://community.connection.com/inside-look-connections-technology-integration-and-distribution-center/ Jan 30, 2024 Connection https://community.connection.com/author/connection/ https://community.connection.com/wp-content/uploads/2022/04/2461239-InsideLook-TIDC-BLOG.jpg

Interested in becoming a Connection employee? You’ve come to the right place. Follow our Inside Look series to find out what it is like to work in different departments within our organization. You will learn about our open positions and hear from our department leaders on what they watch for in candidates during the interview process. This month we’re featuring our Technology Integration and Distribution Center.

What’s it like to work in Connection’s Technology Integration and Distribution Center (TIDC)?

It’s great to be able to work in the tech industry and know you’re making a difference to companies in the various markets—not only local and national businesses, but also healthcare, retail, manufacturing, and the public sector, including education and state, local, and Federal government.

Connection is a fast-paced business servicing communities throughout North America and—in some accounts—worldwide. The warehouse work is consistently busy, so the day often flies by fast. The facilities are modern with breakrooms, outside social areas, training rooms, an electronic serviced cafeteria, strong physical and digital security, and an amazing culture.  

There is plenty of variety in the work offered across the different departments. Not only are there career opportunities for advancement in the company, but individuals are also able to continuously improve their skills—including handling of different equipment, working with supply chain programs like JD Edwards, and gaining experience in receiving and shipping. With these new skills, you can often move to Lead and Supervisor roles.

And if you’re more technically inclined, there is a whole other part of the operation that focuses on computer configuration, integration, and deployments to the North American markets. This is often referred to as Configuration Services and includes many technical roles, from entry-level configuration technicians through senior technicians to system engineers, project managers, and technical management. What is also exciting here is you can enter the business in the warehouse and work your way into a technical role, while the company assists you in obtaining industry recognized certifications. You may also choose to grow into sales or pre-sales solutions in other departments. 

Working in the Connection warehouse offers a lot to choose from, whether you’re an entry-level warehouse position, a new sales associate, an experienced supply chain international shipper, a quality control expert, a service or configuration technician, a project manager, or a system engineer. Connection’s TIDC has something to offer everyone!        

What is the structure of the department?

There are many departments within the TIDC. In general, there are Warehouse Operations, Quality Control, Inventory Control, Receiving, Shipping, Configuration, and Depot Services. Each of these departments offer career opportunities within the department, as well as movement and advancement to other departments. The departments are generally managed by a Director or Sr. Manager, who will usually have Supervisors or Leads running floor operations. The Directors report to a Vice President over different areas of Configuration and Operations. Also, within the Wilmington location, there are corporate department positions available, for example, entry-level Sales and International Shipping. 

What are the relationships between the TIDC and other areas of the company?

There are many “connections,” so to speak, from the distribution center to other areas of the company, including, in some cases, working directly with our customers and partners. To start with, the TIDC is closely aligned with Product Management, Corporate IT, Finance, and especially with Sales. We have several groups that serve on companywide committees like Safety, Security Compliance, and Facilities Management. In a few areas, we also work directly with our customers and Sales organizations. For example, Project Management works directly with Sales Support, and Service Delivery and our Configuration System Engineers interface with customers on setup. Some departments interface daily with individual departments: Inventory Control often communicates to Finance, and Shipping and Configuration work with Corporate IT platforms, and Human Resources stays in constant contact with all departments.   

The TIDC is hiring! What does it take to be successful in your department and at Connection?

To be successful, you need to offer a positive attitude, try your best, and show up willing to contribute every day. You’ll be working at a company that takes customer service seriously. We watch industry trends and listen to employee and customer feedback—so be prepared to listen, learn, and share.

If someone reading this was coming to interview tomorrow for a role in the TIDC, what interview tips would you give them? 

Candidates should come prepared to share what's important to them today and their aspirations for the future. We like to have an open, honest dialogue to understand your priorities and how we can help you achieve your goals.

What can new hires expect from joining the TIDC?

At first, it will seem like a lot of information coming at you all at once. Don’t worry; try your best, reach out when you have questions, and know the rest of your team is ready to help you learn and excel. Depending on the role, you will be offered training in different areas of operations or configuration. Expect that every day will be busy, often performing work that's similar day to day but also may shift depending on customer needs.  

Also, be sure to wear supportive, comfortable shoes because the building is quite large, and sometimes we have to hustle between other departments. We’ll also provide specific dress code recommendations that will best fit your new role.

And finally, why Connection?

Connection is a multi-billion-dollar, Fortune 1000 company celebrating 40 years of innovation in the fast-paced world of technology solutions and services. We are here to stay and grow. We care about our customers, our employees, our partners, and the changing markets. We invite you to come work for a company that offers competitive industry wages with dynamic opportunities and the room to grow your career in the direction that you choose. Stay local or set goals that may take you to other areas of the country. Whatever you’re interested in, there’s a good chance we can help you achieve your career goals. 

Ready to take the next step?

Could you see yourself working at Connection or for our TIDC? We’re hiring! Keep an eye on our recruiting page and find your dream career! 

]]>
How Connection Can Help You Bridge the IT... https://community.connection.com/how-connection-can-help-you-bridge-the-it-talent-gap/ Dec 28, 2023 Patrick Dja Konan https://community.connection.com/author/patrick-dja-konan/ https://community.connection.com/wp-content/uploads/2023/12/2446509-CNXN-Bridge-IT-Gap-BLOG.jpg

Information technology has become an indispensable part of our modern society, driving innovation, productivity, and economic growth. As businesses continue to rely heavily on technology for operations, the demand for IT talent remains high. According to the U.S. Bureau of Labor Statistics (BLS), employment in computer and information technology is projected to grow by 11% from 2019 to 2029, much faster than the average for all occupations. Finding IT talent will continue to be a challenging task for many organizations, which is why we will explore how Connection also excels at helping companies across the country find and hire IT professionals.  

Leverage Our IT Expertise

As a national provider of IT solutions, Connection also offers staffing services, specializing in helping organizations across various industries find qualified IT professionals to hire. With a network of talent nationwide and a deep understanding of the IT industry, we offer tailored staffing solutions to meet the unique needs of customers. One of our key strengths is our expertise and knowledge of the IT industry, which enables us to truly understand our customers’ technical requirements and match candidates accordingly.

Get Access to an Extensive Network of IT Professionals

For over 30 years, we have built and maintained a vast talent pool of IT professionals with diverse skillsets ranging from helpdesk, developers, systems administrators, cybersecurity experts—all the way to CIOs. Our thorough screening and interview process ensures that hiring managers only review and interview top qualified candidates, saving time and effort in the hiring process.


Take Advantage of Our Flexible Staffing Solutions

Whether you are looking to hire an individual or build a team for a specific project or your IT department, we have various options for both temporary and long-term IT hiring needs:

  • Contract staffing: Get technical expertise for specific IT projects, backfill, or skill openings, available in 60-, 90-day, or more contracts.
  • Contract-to-hire Staffing: For potential permanent positions, we offer a 90-day contract-to-hire program. After 90 working days, you can hire on for no additional conversion fees. 
  • Direct Hire Placement: We offer two budget-friendly options:
    • 16% conversion fee based off the permanent salary offered, includes a 30-day guarantee. 
    • 18% conversion fee based off the permanent salary offered, includes a 90-day guarantee.
  • Payrolling services: Have you found and identified your own candidate, but do not have the approval or financial opening to hire on to your own payroll? With a small administrative fee, we can contract that person back to you.

Streamlined Hiring Process

As an IT partner, we take pride in delivering a seamless and efficient process for our customers. Our dedicated team of technical recruiters works closely with hiring managers to get a better understanding of both their technical and cultural environment, which enables us to fill openings quickly. Additionally, we ensure constant communication and coordination throughout the hiring process, making it hassle-free for our customers and candidates.

No Upfront Cost or Commitment

One of the benefits of working with us is the ability to review and interview our candidates without paying a fee or signing an agreement upfront. This way, you have the flexibility to expand your pool of applicants, go through your own interview process, and only sign our statement of work when you eventually decide to hire a candidate we’ve presented.

Connection offers an array of services including staffing solutions to help organizations hire IT professionals. With our industry expertise and dedication to helping companies solve IT challenges, we have become a one-stop shop and reliable IT partner to many organizations across the country. Our staffing services are designed to help bridge the gap between businesses and IT professionals. If you’re interested in learning more about Connection staffing services or have IT openings you are looking to fill, please reach out to your Account Team to schedule a brief call with our staffing team.

]]>
Backup and Recovery Best Practices for Data... https://community.connection.com/backup-and-recovery-best-practices-for-data-integrity-verification/ Dec 27, 2023 Becky Lawlor https://community.connection.com/author/becky-lawlor/ https://community.connection.com/wp-content/uploads/2023/12/2443621-HPE-CCM-DataIntegrity-BLOG.jpg

When it comes to data protection, the integrity of your data is a linchpin for the reliability and accuracy of your backup and recovery processes. Without rigorous data integrity verification, your organization risks encountering compromised data during recovery processes, which can lead to potential data loss, system downtime, and compromised business continuity. This article will cover how to conduct a comprehensive data integrity check to ensure you're taking a rigorous and proactive approach to maintaining the integrity of your data.

What Is Data Integrity?

Data integrity, in the context of backup and recovery, refers to the consistency and trustworthiness of data over its entire lifecycle. Hardware failures, including disk malfunctions and storage device errors, represent a significant threat to data integrity. These can result in corrupted or lost data. Software errors further compound the challenges of maintaining data integrity. Bugs, glitches, and software malfunctions can introduce inconsistencies or alter data unintentionally. Human errors, whether through accidental deletions, improper data manipulations, or misconfigurations can also threaten the integrity of your data, as can cyber and ransomware attacks.

Recognizing the multifaceted nature of these threats to your data's integrity is crucial to being able to fortify your backup and recovery systems and ensure your data remains reliable.

Planning for Data Integrity Checks

When planning for data integrity checks, there are three key areas to consider:

  • The frequency of checks: Data integrity should be checked at regular intervals. Whether you check it daily, weekly, or monthly should be determined by the nature of the data and its criticality to organizational operations. It's best to strike a balance between minimizing operational disruptions and checking data frequently enough.
  • Key data components to check: Not all data requires the same level of scrutiny. To streamline the integrity-checking process, focus on the most critical data. This will help you allocate resources efficiently and prioritize the verification of the most vital information.
  • Specify acceptable levels of data integrity: Set criteria that data must meet during integrity checks to be deemed reliable. This helps establish clear benchmarks and provides a standard against which the integrity of data can be consistently assessed, whether measured through checksums, hashing algorithms, or other verification methods.

Executing Data Integrity Checks

When executing data integrity checks, you will want to conduct both automated integrity checks as well as manual checks. It's also important to document and log the results of your checks. Here's a deeper dive into each of these areas:

Automated Integrity Checks

Checksum and hashing are two types of automated checks you can conduct to ensure the accuracy of backup data. These methods involve generating unique identifiers of "checksums" for each piece of data using algorithms like MD5, SHA-256, or similar cryptographic hash functions. To conduct a checksum or hashing check, follow these steps:

  • Checksum verification: For each piece of data, generate a checksum using a reliable algorithm. Many file management tools and backup software automatically compute checksums during data storage. During the integrity check, be sure to recalculate the checksum for the current data and compare them against the originally generated checksums. Any discrepancies indicate potential data corruption.
  • Hashing verification: Similar to checksums, generate cryptographic hashes (MD5, SHA-256, etc.) for each data block or file in the backup. Then, recalculate the hashes during the integrity check and compare them with the originally generated hashes. Differences suggest data tampering or corruption.

Manual Verification

To manually verify data, you will need to select representative samples of the data for detailed inspection. These can be randomly or strategically selected subsets of data. You also want to ensure that the samples cover a variety of file types and sizes. Manually inspect the content of the selected files by checking the file structure, headers, and content consistency to verify that it matches the expected information. Then, cross-reference this data with the source data and carefully document any discrepancies, missing files, or alterations.

Log and Document Results

Maintaining detailed logs is important, so be sure to record the results of both automated and manual verification processes. Include information on checksums, hashes, and any identified discrepancies. If you find discrepancies, document the steps taken to address them. This documentation aids in post-incident analysis and process improvement.

Responding to Data Integrity Issues

If a data integrity check identifies discrepancies or potential data integrity issues, the first step is to isolate the compromised data. To do this, you need to determine the extent of the problem and isolate the affected files or datasets.

Once the compromised data is isolated, you need to initiate recovery procedures. This may involve restoring data from unaffected backups that have passed integrity checks. The use of a tiered backup system, where multiple versions of data are stored at different intervals, can be instrumental in ensuring that clean and uncorrupted copies are readily available for recovery. Implementing redundancy and failover mechanisms also adds an extra layer of protection, allowing for a seamless transition to alternative data sources in the event of an integrity issue.

It is also crucial to investigate the root cause of the integrity issues. Start by analyzing logs, error reports, and the sequence of events leading up to the identification of discrepancies. If you can understand whether the issue originated from hardware failures, software glitches, human errors, or malicious activities, then you can implement the appropriate targeted preventive measures and better fortify your data for the future.

Following three key steps—isolating compromised data, swiftly recovering data from clean backups, and investigating the root cause—ensures the restoration of reliable data and contributes to better long-term data protection strategies.

Continuous Improvement

It's important to learn from your data integrity checks and use that knowledge to enhance your data management and protection policies. To continuously learn and improve, follow these three steps:

  • Analyze the results of any integrity check: Look for patterns, recurring issues, or areas for improvement. For instance, if certain types of data consistently show integrity issues, it may mean you need to conduct a closer examination of your storage or handling processes for those specific data types.
  • Update your data integrity policies: As technology evolves and data management requirements change, you'll need to adapt your policies to address emerging challenges. Revisit the frequency of integrity checks, refine the selection of data components to check, and adjust acceptable levels of data integrity based on evolving industry standards and organizational needs.
  • Implement preventative measures: A proactive approach is always the best approach. Based on insights from your integrity checks, you may need to upgrade hardware components, enhance security measures to prevent malicious activities, or implement additional redundancy in your backup systems. Continuous improvement in preventative measures contributes to a more resilient data management infrastructure, reduces the likelihood of data integrity issues, and enhances overall system reliability.

Make Data Integrity Checks a Priority

The diligent execution of data integrity checks isn't merely a technical requirement but a strategic imperative for your backup and recovery strategy and systems. The importance of maintaining trustworthy and reliable backup data cannot be overstated. However, maintaining data integrity is an iterative process requiring constant adaptation and refinement. Frequent, comprehensive data integrity checks ensure a resilient data management culture that can keep pace with the evolving demands of data management and protection.

If you need help with data integrity checks or your backup and recovery strategy, Connection’s cloud and data center services can help. Reach out to your Account Team for more information.

]]>
TechSperience Episode 123: Migrating to... https://community.connection.com/techsperience-episode-123-migrating-to-windows-11-to-boost-productivity-with-ai/ Dec 23, 2023 Connection https://community.connection.com/author/connection/ https://community.connection.com/wp-content/uploads/2024/02/2407125-TechSperience-MigratingToWindows11-16x9-1.jpg

The pace of work has increased exponentially—along with the crush of data, information, and always-on communications. People are struggling to shoulder the weight of it all, while business leaders feel pressure to increase productivity amid economic uncertainty.

New Windows 11 Pro devices are well-positioned to tackle these challenges and accelerate workflows and collaboration with experiences that elevate the potential of everyone on your team. 

In this podcast, we'll discuss what the move to Windows 11 Pro devices can do for you and your users. With simple deployment and advanced security protection, the time to upgrade to Windows 11 is now. 

Host: James Hilliard

Guests: Dan Ortiz, Director of Center of Excellence Workspace Transformation Solutions at Connection

Rob McGilvrey, Americas Specialist for Windows Pro & Modern Endpoints at Microsoft

]]>
Apple’s Commitment to Security: A Deep... https://community.connection.com/apples-commitment-to-security-a-deep-dive-into-mac-hardware-and-software-integration/ Dec 21, 2023 Chris Roux https://community.connection.com/author/chris-roux/ https://community.connection.com/wp-content/uploads/2023/12/2456721-Apple-Commitment-Security-BLOG.jpg

I’ve always been intrigued by Apple’s commitment to creating a seamless user experience while prioritizing advanced security measures. In this article, we’ll explore how Apple achieves this delicate balance by delving into the integration of Mac hardware and software, emphasizing the technologies that work together to enhance security, protect user data, and elevate the overall user experience.

The Foundation of Security at Apple

Apple asserts that the company is at the forefront of providing the most advanced security in personal computers. The foundation of this claim lies in the intricate design of Mac hardware and software, working in harmony to ensure the security, safety, and seamless operation of applications.

Despite historical beliefs that there is a tradeoff between security and user experience, Apple contends that both can coexist. They emphasize securing products by design while simultaneously enhancing the user experience. For enterprise customers, considerations extend to the management needs of IT and security teams.

Evolution of Enterprise Features

Building from the success of iPhone, Apple marked a pivotal moment by offering an opportunity to redefine what it means to be secured by design. Security principles were implemented, eliminating barriers through features like VPN, 802.1X security, encryption, remote wipe management capabilities, and deployment technologies.

Apple’s commitment to the enterprise is evident in the continuous addition of new features to make Mac the preferred platform for businesses. This approach ensures that Mac products seamlessly integrate between hardware and software, offering a powerful ecosystem of applications for intuitive use.

Mac security has evolved in many ways, from the introduction of mobile device management a decade ago to the integration of system integrity protection, hardware features like Touch ID, and the recent transition to Apple Silicon. In addition, the latest release of macOS Sonoma brings additional enterprise security features.

Security Features in Action

Mac security emphasizes hardware-software-service integration for maximum security. Apple Silicon is secure by design, emphasizing memory protection, data protection, secure boot, and the secure enclave. It details the importance of software updates, rapid security response, and new enforcement methods introduced with macOS Sonoma. The built-in encryption, firewall, and data protection on Apple Silicon ensures that data remains secure on disk. Apple’s approach eliminates the need for additional encryption software, providing a robust solution for protecting data at rest. This underscores the interconnectedness of security and management in Apple’s approach.

Apple Business Manager and Managed Apple IDs

Apple Business Manager, Mobile Device Management (MDM), and endpoint security APIs are how organizations can manage and enforce security policies effectively. Businesses use Apple Business Manager as a portal for device management, volume app purchases, and the creation of managed app IDs. Managed Apple IDs give access to iCloud services and new management controls for login and available services. MDM enables over-the-air configuration of settings, security features, and device management. This gives the ability to manage devices with a light touch, ensuring security without disabling functionality.

In addition, there is endpoint security API which allows third-party developers to build applications that can access security data and enforce security policies. This feature ensures that organizations can integrate Mac security with their existing management solutions.

A Secure Future with Mac

To wrap up, we’ve discussed the key takeaways of Apple’s commitment to security, emphasizing the integration of Mac hardware and software, the evolution of security features, real-world impacts on organizations, and the future of secure computing with Mac. Apple’s seamless blend of security and user experience sets the stage for a secure future for individuals and businesses relying on Apple’s innovative products.

Connect with Us

Technology can make or break business success. Having a partner like Connection by your side is invaluable. We go beyond providing hardware and services by empowering your organization to thrive in the digital age.

Whether you’re facing skill gaps in your IT department, need assistance with a complex deployment, or simply want to ensure your technology investments are delivering maximum value, Connection is here to calm the confusion of IT. Our mission is to become your IT department’s IT department, so your organization can fully embrace the benefits of Apple’s modernized deployment strategies and succeed in the hybrid work era. Embrace the future of IT with confidence, supported by a partner you can trust.

To learn more about how we can help you close skill gaps and elevate your IT capabilities, visit Connection’s Apple Practice or reach out to your dedicated Connection Account Team today.

]]>
TechSperience Episode 122: Transforming... https://community.connection.com/techsperience-episode-122-transforming-retail-through-the-power-of-ai/ Dec 20, 2023 Connection https://community.connection.com/author/connection/ https://community.connection.com/wp-content/uploads/2023/12/AI-Retail-Podcast-Image.jpg

The role of artificial intelligence (AI) is becoming increasingly prominent in the retail landscape. Discover how AI is reshaping the retail landscape, from enhancing customer experiences and optimizing supply chains to boosting employee engagement.

Join us as we explore practical applications of AI for retailers and uncover the business benefits it can bring.

Guests:

Brian Gallagher, Retail Strategy Director at Connection

Jamal Khan, Chief Growth and Innovation Officer at Connection

Show Notes:

00:01 Introduction and Overview

02:55 The Evolution of AI Technology

05:43 The Impact of AI on Retail

09:01 The Challenges and Opportunities of AI in Retail

11:58 The Role of AI in Personalized Shopping Experiences and Inventory Management

14:35 The Importance of Data in AI and the Role of AI in Dynamic Pricing

17:02 The Future of Retail with AI and the Impact of AI on Customer Experience

21:10 The Challenges of Data Collection in AI

24:21 The Future of Retail Storefronts with AI

26:44 The Role of AI in Employee Productivity and Enhancing Retail Employee Experience

27:54 AI in Supply Chain Optimization and Sustainability

29:06 Ethical Considerations in AI Implementation

30:45 The Importance of a Common Purpose in AI Integration

32:30 Starting the AI Journey in Retail

34:06 Choosing the Right AI Partner and the Three Stages of AI Adoption

38:32 The AI Ecosystem and its Impact on Retail

40:14 Getting Ready for AI in Retail

42:34 Connection's Approach to AI in Retail

49:41 Final Thoughts on AI in Retail

]]>
Transforming Retail Through the Power of AI https://community.connection.com/transforming-retail-through-the-power-of-ai/ Dec 19, 2023 Jamal Khan https://community.connection.com/author/jamal-khan/ https://community.connection.com/wp-content/uploads/2023/12/2433474-AI-in-Retail-BLOG.jpg

Over the last decade, AI has emerged as a transformative tool, revolutionizing the retail industry and propelling it into the digital age. Breakthroughs in technologies like the transformer neural network, GPU processing, and the democratization of tool sets have paved the way for unprecedented progress.

Within the retail sector, these advancements are influencing everything from inventory management to customer experiences to employee engagement. AI is boosting efficiency, innovation, and business profitability, solidifying it as an indispensable asset for retailers.

Unleashing the Potential: How AI is Transforming Retail

AI is driving a multifaceted transformation in the retail industry, contributing to such factors as: more personalized customer experiences, streamlined inventory management, increased employee engagement, and real-time dynamic pricing.

Customer-Centric Evolution: Understanding and Meeting Consumer Needs

In a market now predominantly shaped by digitally native Gen Z and millennials, the demand for personalized and immersive shopping experiences has surged. Acting as the driving force behind these bespoke interactions, AI can intelligently predict future preferences and seamlessly recommends products based on historical purchases. By integrating AI technologies, retailers can access vast datasets and offer tailored recommendations and experiences that transcend traditional boundaries.

AI is also helping to reshape consumer expectations from mere transactions to immersive lifestyle experiences. This shift can be seen both online and in physical stores, with innovative features such as augmented reality in fitting rooms and interactive displays powered by intelligent algorithms. These advancements mark a departure from the conventional, offering consumers an enriched and personalized journey through the shopping experience.

Inventory Management: A Digital Overhaul

AI has ushered in a revolutionary era in inventory management, fundamentally transforming what was once a labor-intensive and error-prone task into a streamlined and precise operation. The integration of AI brings predictive analytics, demand forecasting, and real-time data processing to the forefront, ensuring that store shelves are consistently stocked with the right products at the right time. This level of precision not only minimizes the risk of stockouts but also maximizes sales opportunities, contributing to enhanced operational efficiency and customer satisfaction.

The predictive capabilities of AI play a pivotal role in reshaping inventory strategies. Retailers can leverage historical data, consumer trends, and external factors to forecast demand accurately. This enables businesses to optimize stock levels, minimizing overstock and understock situations.

Real-time data processing adds an additional layer of agility, allowing retailers to quickly adapt to fluctuations in consumer preferences or unexpected market dynamics. As a result, AI-driven inventory management not only reduces waste but also fosters a more responsive and adaptable retail ecosystem.

Employee Empowerment: Beyond Customer Interactions

While AI is enhancing customer experiences, its impact on employee empowerment is equally significant. From optimizing workflow processes to providing valuable insights, AI contributes to a positive and purpose-driven work environment. The focus extends beyond attracting and retaining talent to ensuring that employees are equipped with the tools and insights needed to excel in their roles.

AI-driven solutions contribute to streamlining operational tasks, enabling employees to focus on higher-value activities that require human ingenuity. This shift in focus allows employees to engage more meaningfully with customers, leveraging AI as a support mechanism rather than a replacement.

By fostering a culture of continuous learning and adaptation, AI empowers employees to navigate the evolving retail landscape with confidence, contributing to increased job satisfaction and overall productivity.

Dynamic Pricing: Real-Time Decision-Making for Increased Profitability

Dynamic pricing, a cornerstone of retail strategy, has undergone a transformative shift with the integration of AI. The traditional challenges retailers faced in establishing real-time dynamic pricing have been significantly mitigated through the capabilities of AI algorithms. These sophisticated algorithms delve into intricate market trends, competitor pricing strategies, and nuanced consumer behaviors, providing retailers with a comprehensive understanding of the pricing landscape.

The real-time analysis and adaptation enabled by AI in dynamic pricing empower retailers to make informed and strategic decisions efficiently. By continuously processing vast amounts of data, AI algorithms can identify optimal pricing points, helping retailers strike a balance between competitiveness and profitability. This not only enhances the retailer's ability to respond to market dynamics promptly but also contributes to the overall improvement of the bottom line.

Navigating the Implementation of AI in Retail

Embarking on your AI journey requires a mindful approach to ethical considerations and successful cross-collaboration. Connection stands ready to assist retailers with crucial aspects such as advisory functions, data orchestration, infrastructure design and optimization, and application re-platforming.

Ethical Considerations

As the retail landscape embraces AI, ethical considerations come to the forefront. Ensuring privacy, addressing concerns related to facial recognition, and mitigating algorithmic bias are critical aspects of responsible AI implementation.

Retailers must navigate these challenges to build trust with their customers and maintain ethical standards in the use of AI technologies. By doing so, retailers not only uphold ethical standards but also strengthen customer trust, positioning themselves as responsible stewards of AI technologies in the dynamic realm of retail.

Collaboration for Success: Cross-Functional Teams and Future Preparedness

Achieving success in AI implementation within the retail sector necessitates a collaborative and cross-functional approach. The formation of cross-functional teams emerges as a critical factor, uniting various departments such as IT, marketing, supply chain, and HR. These teams play a pivotal role in aligning strategies, fostering communication, and mitigating the risk of operational silos.

Preparing for the AI-driven future involves a dual focus on both long-term transformative strategies and short-term wins through tactical solutions. Long-term strategies encompass the fundamental transformation of business processes, organizational structures, and customer engagement models. This involves a strategic shift towards becoming a data-driven business, reimagining supply chain dynamics, and optimizing customer experiences through intelligent AI applications.

Simultaneously, pursuing short-term wins through tactical solutions is crucial for immediate impact and demonstrating the tangible benefits of AI integration. These tactical solutions can include targeted AI applications that address specific pain points within the retail operations. Whether it's optimizing inventory management, enhancing customer interactions, or streamlining HR processes, tactical solutions provide retailers with quick wins that showcase the value and efficiency gains of AI.

This collaborative strategy empowers retailers to stay ahead of the curve, embracing innovation, and delivering enhanced value to both their internal operations and the end customer experience.

The Connection Approach to AI in Retail

The Connection approach to AI in retail encompasses several key pillars, each addressing different aspects to ensure a comprehensive and effective integration of AI technologies. These pillars include:

1. Advisory Functions: Our advisory approach involves understanding the specific industry vertical, such as retail, in depth. This includes knowledge of the unique challenges, processes, and goals within the retail sector. We work closely with retail clients to understand their business models, supply chains, customer engagement strategies, and overall objectives. This understanding is crucial for tailoring AI solutions that align with our clients’ business.

2. Data Orchestration: At Connection, we emphasize the importance of a robust data strategy, helping retailers to organize, manage, and optimize their data assets. Our goal is to ensure that the data used for AI applications is accurate, relevant, and aligned with business goals.

We also encourage flexibility with data. Since not all data is pristine, we help retailers to navigate the challenges of dealing with diverse datasets, including unstructured and dirty data, and provides solutions to derive meaningful insights.

3. Infrastructure Design and Optimization: Connection takes a proactive role in establishing the essential infrastructure supporting AI applications before the initiation of AI initiatives. This involves a comprehensive approach ranging from cloud solutions to edge computing, aligning the infrastructure with the unique requirements of the retail sector.

Recognizing concerns about overspending, we also focus on designing infrastructure that is not only technologically advanced but also cost-efficient, maximizing the value derived from AI investments.

4. Application Re-Platforming (Kinetic Bridging): Connection guides retailers in evaluating and transforming their applications. The focus is on making applications “smart,” enabling them to generate and consume intelligence. This includes reimagining applications for greater efficiency and effectiveness.

Kinetic bridging is a term we use that describes the process of transforming applications to support kinetic actions. This can include actions at the manufacturing level, in-store interactions, and more. The goal is to enhance the responsiveness and intelligence of applications across the retail ecosystem.

These components collectively form our strategy to facilitate the successful integration of AI in the retail sector. By combining industry-specific advisory services, data optimization, infrastructure design, and application re-platforming, we aim to empower retailers to harness the full potential of AI for innovation, efficiency, and competitiveness.

The Future of Retail: Embracing the AI Revolution

The power of AI is indisputably transforming retail. From reshaping customer experiences to revolutionizing inventory management to empowering employees, AI has become a cornerstone of success in the digital age. The imperative for retailers is clear: embrace AI, navigate its challenges responsibly, and forge a path toward a future where innovation and efficiency redefine the retail landscape. Engage Connection’s Retail Practice to get started!

]]>
Manufacturing IT Trends for 2024: Embracing... https://community.connection.com/manufacturing-it-trends-for-2024-embracing-innovation-data-driven-insights-and-workforce-augmentation/ Dec 12, 2023 Ryan Spurr https://community.connection.com/author/ryan-spurr/ https://community.connection.com/wp-content/uploads/2023/11/2427094-Manufacturing-Trends-2024-Blog.jpg

The manufacturing industry is undergoing an accelerated transformation driven by technological advancements, cost management, evolving market demands, workforce challenges, and a growing emphasis on creating a competitive advantage. As we look toward 2024, several key trends are expected to shape the industry, fostering data-driven decision-making, innovation, productivity, and a more empowered and augmented workforce. While some are not new or cutting-edge, the following five trends are poised to significantly impact manufacturing as many organizations plan, pilot, and scale investments to create a smarter manufacturing organization and optimize their value stream.

1. Cybersecurity in Manufacturing: Safeguarding the Digital Manufacturing Ecosystem

Cybersecurity remains a top priority for manufacturers. In 2023, manufacturing remained the number one most attacked industry. The top result of cybersecurity incidents was extortion, accounting for 32% of all successful events and 70% of all ransomware incidents impacting the operational technology (OT) domain, not just traditional IT. The increasing integration of digital technologies into manufacturing processes, including the Industrial Internet of Things (IIoT), has expanded the attack surface, making manufacturers vulnerable to data breaches, ransomware attacks, and disruptions to critical operations. In 2024, we expect manufacturers to invest heavily in cybersecurity measures, including OT cybersecurity assessments, compliance, network segmentation, access control, employee training, and advanced threat detection and prevention solutions. These measures will protect valuable data, ensure operational continuity, obtain and keep cybersecurity insurance, and maintain a competitive edge.

2. Harnessing the Data-rich Environment: Unleashing the Power of Connectivity and Data Integration

Manufacturing facilities generate vast amounts of data from sensors, machinery, and production processes. To put this into perspective, there are an estimated 13 million employees in US manufacturing but an estimated 15 billion IoT and industrial control systems (ICS) devices in use by US manufacturers. This data holds immense potential for improving efficiency, optimizing operations, and making data-driven decisions. In 2024, we expect manufacturers investing in connectivity solutions and data integration platforms to collect, analyze, and visualize this data in real-time, such as IIoT software platforms that leave no device behind, unlock access to data, and integrate bi-directional communications across business systems, hybrid cloud, and the value stream. This will enable manufacturing employees to identify bottlenecks, predict potential failures, optimize production schedules, and make informed decisions to improve quality, reduce costs, and enhance overall performance. 

This same investment will also lay the vital groundwork necessary to unlock advanced solutions such as digital twins, simulation, and artificial intelligence, all of which rely upon timely, accurate, and trusted data orchestration.

3. Vision AI, Generative AI, and Digital Twins: Revolutionizing Operations

Artificial intelligence (AI) transforms manufacturing processes by enabling real-time data analysis, intelligent automation, and predictive maintenance. This topic is so pervasive we can’t escape it, given recent events evolving from large language models (LLMs) such as Generative AI. 

Vision AI, a subset of AI, utilizes computer vision techniques to analyze and interpret visual data from cameras and sensors. This technology is used for defect detection, product identification, quality control, and workplace safety. While machine vision solutions (e.g., automated optical inspection (AOI) machines) are not new, the expansion of the technology unlocks more opportunities, allowing organizations to infer at the edge of dozens of use cases atop the same camera stream, making today’s solutions more flexible and holistically inclusive.

Generative AI, or the branch of AI getting all the attention today, is being used to develop new product designs, optimize production processes, enable workforces to have quicker access to information, and personalize products for specific customer needs. This is an up-and-coming area of AI, especially as manufacturers learn how to leverage their trusted data sources to feed Generative AI and deliver highly feasible and beneficial use cases across various functions. 

Digital twins, virtual representations of physical assets or systems, are being employed to monitor equipment performance, predict potential failures, and optimize production schedules. Digital twins are being utilized to model and represent many aspects of manufacturing from complex supply chains, production factories and equipment, and even complex product platforms. With trusted data and orchestration, manufacturers can leverage digital twins to deliver new insights, enable employees to act and impact the organization, and reduce risk through scenario simulations.

Expect to see further integration of vision AI, generative AI, and digital twins into manufacturing operations, leading to improved quality control, increased efficiency, and enhanced product innovation.

4. Empowering the Workforce with Modern Tools: Workstations, Mobility, and Data

The manufacturing workforce faces a skills gap, as the demand for advanced technical skills in areas like robotics, automation, and data analytics continues to grow. To address this challenge and empower the workforce they do have, manufacturers are increasingly turning to modern workstations, mobility solutions, and data analytics tools. Modern workstations provide workers with the computing power and ergonomic design they need to perform their tasks efficiently. Combined with advances in silicon from companies like NVIDIA, Intel, and AMD, and certified solutions from partners like HPI, HPE, Dell, Lenovo, and others, today’s employees have powerful tools that accelerate high-performance computing and speed time to market.

Mobility solutions, such as tablets and wearable devices, enable workers to access critical information and collaborate seamlessly from anywhere on the factory floor, in the warehouse, or in the field. Data analytics tools provide insights into production processes, equipment performance, and worker productivity, enabling data-driven decision-making and continuous improvement. 

With ongoing workforce challenges, we must empower the manufacturing workforce we can attract and retain with modern tools and data-driven insights, leading to a more skilled, adaptable, and productive work environment.

5. Automation and Technology: Filling the Labor Gap and Enhancing Productivity

The manufacturing industry faces a labor shortage as skilled workers retire and the demand for specialized skills increases. In fact, according to the National Association of Manufacturers, of the 4 million manufacturing jobs needed by 2030, 2.1 million are expected to remain unfilled. To address this challenge, manufacturers are turning to automation and technology to augment their workforce and fill the labor gap. Automation is being used to perform repetitive, error-prone, and dangerous tasks, freeing up human workers to focus on more complex and value-added activities. Collaborative robots, or cobots, work alongside human workers, performing repetitive tasks and enhancing productivity. Technology is also being used to improve training and upskilling programs, enabling workers to acquire the skills they need to adapt to the changing manufacturing landscape, such as modern manufacturing execution or connected worker platforms that aim to provide improved work instruction, on-the-job training, and knowledge transfer to less experienced workers. As workforce gaps continue to pressure organizations’ ability to remain operational or support growth, expect to see a continued focus on automation and technology to augment the workforce, leading to a more efficient, productive, resilient, and adaptable manufacturing sector.

Let’s Prepare for the Future Together

At Connection, we understand that manufacturers are at different points in their smart manufacturing journey. Our Manufacturing Practice regularly works with manufacturing organizations to help them grow and improve their business through the application of domain experience and enabling technologies.

These five key trends represent just a glimpse into the exciting and transformative future of manufacturing. As technology continues to evolve and market demands shift, manufacturers that embrace innovation, harness the power of data, and empower their workforce will continue to evolve on the smart manufacturing journey, become more competitive, and create market differentiation in their subindustries.

Our Manufacturing Practice has a team of experts from trade, an evolving portfolio of manufacturing solutions, and expertise to assist IT and OT teams by augmenting their existing skillsets with complementary advisory services to help your business accelerate technology adoption where it matters most. 

If you want to learn more about how we support our clients or the topics covered, engage Connection’s Manufacturing Practice to learn more about this technology, available services, and the many use cases that may benefit your organization.

]]>
Bulk Up Security with SIEM and XDR https://community.connection.com/bulk-up-security-with-siem-and-xdr/ Dec 12, 2023 Makayla Mota https://community.connection.com/author/makayla-mota/ https://community.connection.com/wp-content/uploads/2023/12/2426700-Siem-XDR-Security-BLOG.jpg

Ransomware attacks have increased significantly due to the shifting remote and hybrid workforce. Your organization’s IT structure now spans across on-premises, hybrid-cloud, and multi-cloud environments. This gives security and IT operations staff a much larger area to protect as employees now access resources—and your network—from their company-issued or personal devices.

There are many variations of products available for deployment to safeguard against this broadened landscape of threats. While these tools can be immensely helpful in defending specific workloads, assets, and users, they can also complicate the challenging security environment by creating multiple silos for data and detection. Security teams need a better way of viewing threats across both multi-cloud and on-premises environments to help them detect and respond to incidents more quickly and better protect their resources. So, what is the next step in the changing landscape of security operations? The integration of cloud-native security information and management (SIEM) capabilities with extended detection and response (XDR).

What Is XDR?

An XDR platform helps organizations protect their digital ecosystem by collecting, correlating, and analyzing security measurements from endpoints, networks, applications, cloud workloads, and identity infrastructure. By consolidating the staggering amount of information the XDR platform is collecting, your organization’s security operations team can uncover threats and attacks at a much faster pace than having to track multiple products that have been siloed.

XDR enhances the operational efficiency of security operations teams by delivering comprehensive telemetry across integrated workloads. This technology minimizes the volume of alerts that security teams need to investigate by using correlation and behavioral analysis on consolidated threat data—thereby eliminating false positives and low-fidelity alerts. The tools integrated in an XDR system perform automated threat investigation and the remediation of compromised assets, often without requiring human intervention. Security teams can then employ the tailored recommendations provided by the virtual data room (VDR) tools to establish defenses against identified vulnerabilities.

Microsoft 365 Defender and Microsoft Defender for Cloud both live inside the Microsoft XDR solution and contribute to cross-domain security. Microsoft 365 Defender can block an array of threats at the network perimeter to prevent intrusions. It also gathers, correlates, and analyzes threat and alert data—from email, applications, endpoint devices, and identities—by leveraging a combination of artificial intelligence and automation.

Microsoft Defender for Cloud integrates cloud security posture management with cloud workload protection capabilities. This ensures security operations teams can safeguard against cloud threats while continuously evaluating their cloud environment. It alerts them to detected threats in cloud workloads and resources, provides customized recommendations for addressing these threats, and offers suggestions on fortifying cloud assets.

What Is SIEM?

SIEM—pronounced “sim”—is short for security information and event management. SIEM is a solution that detects, analyzes, and responds to security threats before they can harm organizations. SIEM combines security information management with security event management. While collecting data from a range of sources, SIEM identifies abnormal activity with real-time analysis and takes the proper action. With the advancement of AI integration, SIEM technology has evolved to make threat detection and incident responses faster and smarter.

Microsoft Sentinel—a cloud-native SIEM platform—distills extensive data into alerts regarding an organization's security stance by using a correlation engine and AI-driven behavioral analytics to swiftly address identified threats and incidents.

What Are the Benefits of Layering XDR on a SIEM Platform?

Integrating XDR data into SIEM allows organizations to achieve greater value from both technologies. A unified SIEM and XDR environment offers consolidated dashboards to monitor and manage threats seamlessly across multi-cloud, hybrid-cloud, and on-premises environments. This assimilation minimizes billions of pieces of signal data from XDR and various sources into thousands of alerts and tens of incidents, reducing alert fatigue and false positives.

The integration of SIEM and XDR also improves a security operations team’s capacity to conduct centralized, context-driven threat detection, analysis, and response. This step provides a better understanding of past incidents and streamlines proactive measures to prevent the recurrence of similar events.

What Are Microsoft’s SIEM and XDR Platforms?
How Do They Protect Your Environment?

Microsoft Sentinel is a cloud-native SIEM platform. It analyzes security and threat data from devices, applications, infrastructure, and users in the cloud and on-premises. With Microsoft Sentinel, organizations can detect threats they may have missed thanks to Sentinel’s advanced inline orchestration and automation capabilities that accelerate threat response and remediation.

Microsoft 365 Defender

Your Microsoft solution offers XDR for emails, identities, apps, and endpoints. With Microsoft 365 Defender, the following services are included and provide powerfully upgraded XDR capabilities:

Microsoft Defender for Endpoint analyzes behavior signals from within Windows 11 endpoint environments and detects threats that other tools might miss. This process involves employing cloud security analytics to interpret behavioral cues and converts them into useful insights and threat identifications.

Microsoft Defender for Office 365 safeguards against email threats like malicious links and attachments. Organizations can utilize it for shielding Microsoft Exchange environments from widespread, volume-based, and known attacks.

Microsoft Defender for Identity protects cloud-based Azure Active Directory environments from identity-based risks. It can be used to secure user identities and credentials in Active Directory as well as monitor users, entity behavior, and more.

Microsoft Defender for Cloud Apps works across multiple cloud environments—such as virtual machines, containers, databases, and the Internet of things—as a cloud access security guard. It helps organizations protect against threats to and from cloud apps and services. Connection is here to help with your Microsoft Sentinel, Microsoft 365 Defender, and Microsoft Defender for Cloud security needs. Reach out to your Account Team to discuss your options today.

]]>
Get Ready for More Cybersecurity Disclosures https://community.connection.com/get-ready-for-more-cybersecurity-disclosures/ Dec 06, 2023 Ryan Spurr https://community.connection.com/author/ryan-spurr/ https://community.connection.com/wp-content/uploads/2023/12/2423247-MFG-SEC-BLOG.jpg

Over the past few years, we’ve seen a rise in cybersecurity events in manufacturing, both in the public domain and through our client engagements. This also bears out in industry statistics, with manufacturing becoming the #1 most attacked industry two years in a row1 and with a heavy focus of attacks targeting operational technology environments. Despite this increased visibility, many incidents remain hidden as disclosure is left to the organization, ransoms are quietly paid, or post-incident responses are handled without much public exposure. That is all about to change.

The Securities and Exchange Commission (SEC) has adopted new rules to enhance and standardize disclosures regarding cybersecurity risk management, strategy, governance, and incident reporting by public companies. The new rules, which were adopted in November 2022 and became effective in November 2023, require public companies to:

  • Disclose material cybersecurity incidents on Form 8-K within four business days of determining that the incident is material
  • Disclose on an annual basis material information regarding their cybersecurity risk management, strategy, and governance in their annual reports on Form 10-K
  • Disclose whether and how their boards of directors oversee cybersecurity risk
  • Disclose management’s role and expertise in assessing and managing cybersecurity risk and implementing cybersecurity policies and procedures

The SEC’s cybersecurity rule is designed to improve investor access to information about how public companies manage cybersecurity risks. The SEC believes that this information is necessary to investors because cybersecurity incidents can have a significant impact on a company’s financial performance and position.

The First of Many

While this isn’t unique to manufacturing, with a rise in attacks in the industry—and the very first instance of SEC reporting on this subject coming from Clorox, a chemical manufacturer—you should expect more manufacturing companies to publicly report cybersecurity incidents and a generally alarming increase in the number of visible occurrences. In the first case, according to Clorox’s investor documentation, the company had incurred $24M in costs related to the cybersecurity incident according to their Form 8-K.2 In their Q1 2024 reporting, Clorox disclosed a 20% decline in net sales—or a financial impact of $356 million.3

Expect this level of transparency to become the new normal and shed light on the alarming trends in our trade—as well as bring about more insight into cybersecurity risks and the costs associated with successful incidents. The SEC regulations will improve the timeliness and quantitative impacts, and act as a lesson for all. 

Setting an Example

All publicly traded organizations have been put on notice. For private entities, while the regulatory requirements may not apply, don’t expect the standards it sets to stop there. I expect cybersecurity insurance providers and customers to set new contractual expectations on their suppliers, and the shift to this level of scrutiny and investment expectation to enhance the broad manufacturing complex’s security hygiene. 

The SEC rules were designed not only to inform investors but to help public companies improve their cybersecurity posture. By requiring companies to disclose their cybersecurity risk management, strategy, and governance, the SEC is encouraging companies to think critically about their cybersecurity programs and to make necessary investments in cybersecurity solution—a wise strategy for any manufacturing company regardless of their size or classification.

Let’s Make Manufacturing More Secure

At Connection, we understand that manufacturers have a diverse range of equipment and roles in their factories, and it’s essential to meet both cybersecurity best practices while ensuring a highly productive environment. This calls for solutions that meet the needs of IT, security, and operations.

Our Manufacturing Practice regularly works with manufacturing organizations to help them meet security requirements while ensuring operational excellence, providing a great workplace, and applying right-sized technology to enable better outcomes.

If your business is interested in our OT security solutions, engage Connection’s Manufacturing Practice to learn more about available cybersecurity solutions, services, and the many use cases that may benefit your organization.



1 IBM, 2023, X-Force Threat Intelligence Index 2023
2 SEC, 2023, Commission File Number: 1-07151
3 Clorox Company, 2023, Clorox Reports Q1 Fiscal Year 2024 Results, Updates Outlook

]]>
8 Must-ask Questions for a Robust Backup... https://community.connection.com/8-must-ask-questions-for-a-robust-backup-strategy/ Dec 05, 2023 Becky Lawlor https://community.connection.com/author/becky-lawlor/ https://community.connection.com/wp-content/uploads/2023/11/2412812-AI-Backup-Recovery-BLOG2.jpg

Companies that don’t have a data backup and recovery strategy risk data loss with potentially catastrophic consequences to their businesses. They can face extended downtime, loss of revenue, and a decline in customer trust. However, organizations struggle to balance the necessities of data protection with the required time and budget investments.

Eighty-five percent of IT leaders say they predict their company’s data protection budgets will increase. Those who expect increases say budgets will likely grow by an average of 8.3% over the previous year’s spending.1 

To get the most out of your investments, it’s important to develop a backup and recovery strategy. Begin your planning by answering these eight questions. 

1: What kinds of data do we need to protect?
Important data to back up includes proprietary information, customer data, employee data, internal processes, finances and billing, communications, and project data. These types of data can reside within files, applications, databases, containers, servers, hardware, and elsewhere. Understanding and categorizing your data will help you establish your data backup and recovery priorities.

One of the challenges with data protection is that your data is likely to be in a variety of locations. The cloud can help by centralizing data and backups. Many aspects of organizational infrastructure are moving to the cloud because it’s easier to manage.

The ability to support modern work in the cloud is a top consideration for IT leaders and managers looking at enterprise backup solutions. For 15%, it’s the most important feature.1 Cloud-hosted environments can include software as a service (SaaS), platform as a service (PaaS), and infrastructure as a service (IaaS). Cloud solutions also offer the added benefit of protecting data from on-site disasters and attacks.

2: What is our recovery point objective?
Your recovery point objective (RPO) is the point at which you have backed up enough data to get back to business in case of an interruption. Once you know how much lost data is acceptable, you can decide whether you need to back up data daily, hourly, or at some other frequency.

You need this information to establish the correct frequency for your backups, so you don’t lose critical data in an incident. Without knowing your RPO, there could be an unacceptable gap between your last backup and the data loss.

3: What is our recovery time objective?
Your recovery time objective (RTO) is the amount of time it will take you to adequately recover data and systems to have your business up and running.

Without the ability to meet recovery time objectives, your company can’t get back to business and may suffer from revenue loss. Most IT and data center outages cost organizations more than $100,000.2 Extended downtime can also impact your productivity, customer satisfaction, bottom line, and long-term business success.

4: Is there data that requires high availability?
Depending on your industry, type of work, and types of data, you may have data that you want available to always access–or as close to that as possible. Many organizations strive for 99.9999% availability—a goal that's as close to perfect as many systems will get.

Your data protection plan will need to include redundancy safeguards as well as a limit or eliminate interruptions needed for backups. There are costs to achieving redundancy and high availability, so it doesn’t make financial sense for most organizations to designate all their data as high availability.

5: How long do we need to retain data?
Decide how long you want to keep backup data. Determine what is required by law for your industry and for your types of data. Establishing a documented internal retention policy will help you meet regulatory commitments and protect your company from liability.

While you want to save backups of all the data you need, unnecessary backups and copies take up valuable space and resources. However, if you hold on to data too long, you waste time and money by backing up unnecessary data.

6: Is our data clean?
Unclean data may be corrupted, duplicated, inaccurate, incomplete, or unnecessary. If you’re working with data that has errors, you’ll back up those errors. Analyzing bad data can lead to faulty decision-making, and duplicate data is a waste of storage.

You can scrub data by deleting or correcting it as necessary. This may mean clearing formatting, adding missing values, or replacing data with the last clean version.

7: Who will oversee data backup and recovery?
Determine who is responsible for backup and recovery processes. These responsibilities include backup scheduling, testing, compliance, management, and triggering the incident response plan. You can decide whether you want to do this internally or hire a service provider. Different cloud environments also operate under shared responsibility models. This means everyone from data service providers to IT managers to users share in the responsibilities for data. A backup as a service (BaaS) provider can take a lot of responsibility off the plate of busy IT teams.

8: What is immutable storage and do we need it?
Cyber criminals tried to attack 93% of backup repositories in their ransomware efforts, and they affected 75% of those.3 Immutable backup storage protects data that you can’t afford to lose in the case of ransomware, power outage, system failure, natural disaster, human error, power outages, or something else.

It provides a copy of data that cannot be altered, overwritten, or deleted, and should be one of your copies, according to the 3-2-1 rule. That standard means making sure you have three copies of data in two media types, one of which is offsite.

Formulating Your Backup and Recovery Strategy

By delving into these critical questions, you’re not only identifying potential data protection risks, but gaining a deeper understanding of your specific business needs. This will enable you to implement tailored processes and solutions that align with your overall needs and objectives.

As data volume increases and infrastructures become more complex, choosing a managed BaaS provider is becoming an increasingly popular choice for many companies. Industry experts predict the BaaS market will grow by $32.78 billion by 2028.4 Embracing BaaS and disaster recovery as a service (DRaaS) offerings can streamline data backup and recovery and liberate your team to focus on higher-level IT priorities. These services also improve cost efficiency because they scale with you—and you don’t pay for tools or storage you don’t need.

If you need help answering any of these questions or getting started on your backup and recovery strategy, Connection’s cloud and data center services can help. Reach out to your Account Team for more information.

Sources:
2 Uptime Institute, 2023,  Annual Outage Analysis 2023
4 TechNavio, 2023, Backup-as-a-Service (BaaS) Market Analysis
]]>
Microsoft Surface: Built to Bring Out the... https://community.connection.com/microsoft-surface-built-to-bring-out-the-best-of-windows-11/ Nov 29, 2023 Microsoft https://community.connection.com/author/microsoft-author/ https://community.connection.com/wp-content/uploads/2023/11/2408921-Windows11-Surface-BLOG.jpg

Together, Surface and Windows 11 deliver a powerful combination of elegance and engineering. Microsoft’s product developers and usability experts collaborated closely to ensure Surface meets the demands of the modern workplace. The result connects people and their ideas together better, while delivering operational confidence thanks to its robust security and simple management.

A Host of Reasons Why Surface Makes Sense for Your Business

Surface devices are purposely designed for employee productivity—that’s certainly part of the equation. That design, however, takes employee experience seriously, resulting in hardware that workers are proud to carry around. They’re lightweight and thin. Surface and Windows 11 are designed to adapt to each other as the user changes postures, optimizing the experience as a tablet, as a laptop, as a desktop—effortlessly switching automatically between modes. When the Pen is removed, the Pen menu instantly opens.

The display and sound quality make it feel like everyone is in the same room when collaboration is needed. And Surface devices deliver power, performance, and connectivity to ensure employees are free to create and innovate anywhere and anytime.

The ways in which Surface delivers all this are too many to cover, but it’s worth taking a look at an example in more detail. Microsoft engineers wanted Surface to have even more processing power, but they also wanted to increase battery life and performance. On top of that, the designers wanted an even slimmer, lighter form factor.

They achieved it through subtle innovations. For example, when an employee switches to inking, the display automatically increases to 120Hz to provide an optimal experience with the haptic pen. As soon as the Surface is changed to a different mode, the display reverts to 60Hz to reduce battery load. For all these challenges, Surface’s 61% longer battery life on average1 keeps employees working longer between charges.

Explore how Surface's productivity innovations give employees the tools to succeed.

Surface Provides Proven Security

Enhanced employee productivity is just the beginning. Today there’s more and more pressure on IT to make flexible work possible, with increased cyber threats, tight budgets, and distributed employees adding to the challenges. It’s remarkable, then, that organizations report a 58% drop in security incidents with Windows 11 Pro devices.2

That’s made possible by the fact that Microsoft maintains all of the code in the Surface security stack, from firmware to the operating system to the cloud. It’s this unique advantage that creates a holistic approach to endpoint security. Surface devices run the most secure Windows operating system ever, and the CPUs have crypto-processor security measures built in. The combination of Windows 11 and Surface security innovations gives you unprecedented resilience.

Get more detail on how Surface and Windows 11 can help keep your employees and organization safe.

Surface Means Agility and Efficiency for Your IT Teams Too

The pressure on IT staff doesn’t stop with security. Deploying new hardware and maintaining it is a constant effort. Microsoft’s same innovative approach to usability and security is evident here as well: it’s easier than ever to deploy and manage Surface, resulting in 25% faster deployments and 80% fewer helpdesk calls.3

Those savings are thanks to Windows Autopilot, designed, engineered, and tested on Surface to provide a zero-touch deployment experience. Each Surface device arrives from the factory with Windows Autopilot already enabled. And management is easier than ever with Microsoft Intune, the single centralized solution for IT admins to self-serve, manage, and monitor all your Surface devices.*

All this is made possible because Surface has been engineered to work with Windows Autopilot in ways that both increase security and decrease management effort, allowing IT to fully manage Surface devices from Windows 11 down to firmware through a single cloud-based portal.

Boost your IT efficiency with a strategic endpoint management solution from Microsoft and Surface.

There’s more to the story about the innovations that make Surface and Windows 11 such a powerful combination. In coming posts, we’ll take a deeper look into more of the ways in which design and engineering challenges have resulted in extraordinary solutions. The results have produced Surface devices that in combination with the power of Windows 11 ensure employees are equipped to do their best work from anywhere, while providing robust security from chip to cloud and centralized device deployment and management to keep IT staff focused and productive as well.

Explore how Surface and Windows 11 can benefit your business.

*Software license required for some features. Sold separately.

]]>
How to Effectively Leverage AI in Your Data... https://community.connection.com/how-to-effectively-leverage-ai-in-your-data-backup-and-recovery-processes/ Nov 28, 2023 Becky Lawlor https://community.connection.com/author/becky-lawlor/ https://community.connection.com/wp-content/uploads/2023/11/2412812-AI-Backup-Recovery-BLOG.jpg

With businesses generating vast amounts of data daily, the challenge of effectively backing up and recovering this information is more difficult than ever. Lengthy downtimes and incomplete recovery are often the result. This is where artificial intelligence (AI) and machine learning (ML) technologies can help. More than a third (37%) of IT teams are incorporating AI into their tasks,1 and it’s increasingly used in backup and recovery solutions.

For instance, AI-powered systems can prioritize critical data, ensuring that the most vital information is backed up and recovered in case of a data loss event. Similarly, ML algorithms can optimize storage space through advanced deduplication and compression techniques, reducing the overall storage footprint.

At the same time, AI poses a threat to data protection efforts. Three-quarters of industry experts said cyberattacks increased in the past year, and 85% said AI was behind the escalation.2 As cybercriminals increasingly leverage AI to launch sophisticated attacks, data breaches and ransomware incidents become even more challenging to prevent and mitigate. Fortunately, AI and ML also offer a powerful defense against such threats.

How AI Improves Backup and Recovery Efforts

Al algorithms excel at processing massive datasets, identifying patterns, and making intelligent, data-driven decisions. They bring a level of automation and precision that is unparalleled by manual processes. Here are some of the areas where AI-powered solutions can help with data protection:

Monitoring Systems and Making Predictions

AI can determine the most likely scenarios to cause data loss. It can help predict hardware failures and the likelihood of a ransomware attack. ML is an application of AI that learns as it is used and can help analyze data, trends, and unusual activity.

Automating Tasks

One of the most useful features of AI is that it can take over manual work that IT and data employees find tedious. For example, AI-powered systems can automatically back up data based on priorities and objectives—like adjusting backup schedules to meet recovery point objectives (RPO).

Assessing Systems

An AI-powered backup and recovery solution can assess the integrity of systems to confirm processes are working correctly and to ensure compliance. AI can compare data sets against regulatory requirements and identify discrepancies. These solutions are also able to conduct continuous testing versus periodic manual tests. This provides better protection against data loss. AI can even simulate specific scenarios to test response effectiveness and reveal potential problems, so you can make sure your systems are working before you need them.

Checking Data Quality

AI can identify and notify teams of data corruption or errors, so you don’t waste time and space backing up bad data. It can also deduplicate data, as well as find and archive dormant data. These efforts not only optimize resources but speed up data recovery. Also, in the case of a ransomware attack, it can detect ransomware in your systems and backup data to protect against reinfection.

Identifying the Best Path Forward

AI tools can classify and prioritize data, make backup recommendations, and optimize storage. These tools can tell the difference between non-essential and business-critical data. AI can also establish the best steps to data recovery, as well as what needs to be recovered immediately versus what can wait. AI remembers past data recovery experiences and improves its recommendations over time.

Recovering More and Better Data

AI can react more quickly than a human can. Tools can recognize the last good backup, meaning it doesn’t contain corrupted or infected data. The use of AI may help improve and speed recovery efforts. When a data system fails, AI can immediately switch to a backup. It can also restore data in order of importance.

Tracking Unusual Activity

Today’s AI can monitor data systems for user behavior that is out of the ordinary. It can also detect other suspicious or unusual activities within your data storage and backups. Algorithms can determine a baseline of user behaviors and then send alerts when there is unusual activity. It can also recognize potential threats like accessing sensitive data, repeated failed login attempts, large data transfers, or attempts to access unauthorized data.    

AI can also track unusual activity within backup systems, such as changes in frequency, schedules, or file modifications. You can also program AI-powered solutions to spot signatures or other identifiers of known cyberthreats.       

What to Consider when Deploying AI

While AI can offer a host of benefits, it’s important to consider costs, complications, and risks that may be associated with using it in your backup and recovery efforts.

Measuring the Risks

As new AI capabilities emerge, many business leaders have concerns. In fact, 36% of executives and IT managers said AI is one of the top threats to their companies.3 One-third of those said they experienced actual damages from emerging technologies like AI.3 Although the biggest threat is likely to be AI’s use by bad actors, business leaders also worry that misuse of AI by employees puts them at risk for violating data privacy rules. There is also a risk that AI could be a failed investment, as 35% of IT buyers said their AI technologies did not work as expected.1

Creating guidelines for AI use within your company can help curb risk. It’s also important to train employees about its use and their role in protecting data. It’s possible to take advantage of AI capabilities while also minimizing risk. Choosing reputable and communicative AI vendors will help you keep up with the changing technology.

Evaluating Ease of Use

Determine whether an AI solution will easily integrate with your other IT systems. Evaluate how easy it is to implement, use, and optimize. Intuitive dashboards and integrated reporting can help simplify implementation and training.

There is also a learning curve for the technology itself. Algorithms improve as they process more data, so it can take time for machine learning tools to reach their potential. Though poised to take over a lot of data protection tasks, AI tools still require human management and oversight.

Analyze Cost Considerations

AI-powered data protection solutions are being incorporated into many existing solutions and may not have any additional costs associated with it. However, in instances where you are considering either replacing legacy technology or implementing new technology with AI-powered solutions, it helps to perform a comprehensive cost analysis.

Consider the expenses from initial investment to long-term operational expenses, including training, licensing, and ongoing management. Compare those costs with the savings you could see by improving process efficiency through automation and minimizing storage space through intelligent data compression and deduplication. Perhaps most importantly, consider the potential cost savings from reduced downtime and data loss in case of an incident.

AI does help maximize backup storage, so the benefits may outweigh any added costs. Additionally, 31% of organizations saw improved operational efficiency from their AI investments.1 It’s also important to consider the costs of managing the backup technologies yourself versus outsourcing the work to a managed service provider. Although you’re paying for a service, it can improve business efficiency, allow for predictable budgeting, and let IT teams work on projects that improve the business.

Moving Forward with AI

Without an AI-powered solution, you risk drowning in data and falling behind tech-savvy cyberattackers. With the help of the right AI tools, you can manage backups and recovery more efficiently, enhance system security, and maximize data protection. Training employees and performing a cost analysis will help minimize some of the risks and concerns associated with AI.

Connection’s cloud and data center services can help you choose the best backup and recovery solution for your organization. If you want to learn whether AI-powered solutions can help your organization, contact your Connection Account Team for more information.  

Sources:

1 IDC Research, 2022, Insights on the State of AI
2 Deep Instinct, 2023, Generative AI Is Increasing Cyber Attacks
3 Veritas, 2023, New Veritas Research Reveals Nearly Half of Organizations Underestimate Their Level of Risk
]]>
How to Build an Education Cybersecurity... https://community.connection.com/roundtable-discussion-how-to-build-an-education-cybersecurity-strategy-that-makes-the-grade/ Nov 28, 2023 Bobby Sears https://community.connection.com/author/bobby-sears/ https://community.connection.com/wp-content/uploads/2023/11/2407008-Connected-Cybersecurity-Education-Roundtable-BLOG.jpg

Education remains one of the most vulnerable areas to cybersecurity attacks. Schools, districts, and institutions are all struggling to maintain data privacy and security, as well as safe and secure access to technology and physical resources.

The move to more flexible classroom environments, utilizing both on-premises and cloud applications, has many benefits for both educators and students. However, it also opens schools up to more security threats. As educational organizations also must ensure they are in compliance with PII, HIPAA, FERPA, COPPA, and other regulations, these security requirements can seem daunting.

Recently, we hosted a roundtable featuring experts from Connection’s education segment vertical and professional services department, as well as representatives from Juniper Networks. The panel discussed the threats facing education today, cybersecurity program strategies, technology solutions, and processes that can help your organization move forward with confidence.

Host: James Hilliard

Guests:

Timothy Allen – Director of Operations and Technology in the Professional Services Organization at Connection

Pam Aulakh – Senior Vertical Alliance Manager for K-12 at Connection

Rob Kwiatkowski – Senior Partner Systems Engineer at Juniper Networks

Michael Bergt – Technical Marketing Senior Manager at Juniper Networks

Bobby Sears – Senior Vertical Alliance Manager for Higher Education at Connection

To listen to the recording, register here.

Cybersecurity Attacks in the Education Industry

Education in the United States caters to a vastly diverse range of students from K–12 to higher education, including Masters and PhD programs. With more than 76 million K–12 and college students, education accounts for a large portion of the U.S. population. This translates into a monumental amount of data and information in circulation, as well as the need to safeguard that data.

Unfortunately, the vast amounts of sensitive data, including private information and credentials, makes education a valuable target for cyberattacks. In 2021, 771 institutions were affected by data breaches, impacting nearly 2.6 million records. While the percentage might seem small, the impact is significant, considering the size of some of these breached organizations.

Safeguarding Student Data: Cybersecurity Challenges in Education

The education industry is currently experiencing a myriad of data breaches and cyberattacks due to several challenges, including:

  • Shortage of Cybersecurity Personnel—There has been a significant influx of new devices in schools as a result of increased federal funding recently. However, this surge in technology adoption has not been accompanied by an increase in IT staffing, resulting in a shortage of cybersecurity personnel. Districts are struggling to manage and secure their expanding fleets of devices. Cybersecurity has taken center stage, and CIOs have become concerned.
  • Lack of Funding—Implementing strong security solutions can be costly, and as security measures become more advanced, the expenses for schools can increase significantly. Additionally, ensuring that the appropriate individuals have visibility into security threats can be a complex and challenging task.
  • Onboarding and Securing New Devices—Establishing accountability for bring your own device (BYOD) and Internet of Things (IoT) devices during the onboarding and securing of new devices in educational settings can be challenging. It’s essential to define device ownership and responsibility. Furthermore, it’s crucial to consider what occurs from Day 0 to Day 2+ after deployment. During this phase, educating individuals about potential risks is of utmost importance, especially since a significant percentage of incidents are attributed to social engineering attacks.
  • Training IT Professionals in Educational Settings—The shortage of skilled professionals affects education and other industries. K–12 school districts face a unique challenge as many CIOs come from teaching backgrounds rather than IT. To address this, institutions must invest in on-the-job training and continuous skill development to upskill their existing workforce. However, cybersecurity roles in education may not always offer competitive salaries.

In higher education, the situation is similar, with universities and colleges struggling to recruit and retain qualified IT professionals. Compensation is a factor, but professionals also prioritize work-life balance and flexible work arrangements. The influx of younger generations brings a different mentality, affecting hiring practices. AI plays a growing role in the hiring process, allowing institutions to adapt to the changing workforce dynamics post-pandemic.

  • Meeting Compliance Standards—Compliance is a crucial aspect of education cybersecurity, and ensuring that schools and institutions are compliant with regulations is a challenging yet essential part of protecting data and privacy.

Failure to meet compliance standards can have severe consequences, including penalties and legal issues, which can be detrimental to the reputation and operations of schools and universities for years to come.

Developing a Security Strategy to Make the Grade

To tackle the set of cybersecurity challenges common in the education industry today, consider the following strategies:

  • Adopt a “Zero-trust” Mindset—Adopting a “zero-trust” mindset is a valuable strategy for schools to enhance their protection against cyberattacks. This approach emphasizes a default stance of mistrust towards all entities. The key principle is to identify the data or resources in need of protection and limit access to authorized individuals. This strategy should be customized to suit each organization's unique needs and assets.

Understanding one’s environment is a crucial element in implementing the zero-trust approach. Educational institutions must evaluate their network, devices, and resources to develop an effective security strategy. When undertaking network updates, thorough due diligence is essential to ensure that the selected solutions align with the specific environment.

  • Utilize Security Landscape Optimization ServicesSecurity Landscape Optimization Services can assess an organization’s security profile comprehensively. This consultative approach helps identify strengths and weaknesses in an institution’s security posture. Additionally, there are government resources available, such as the Cybersecurity and Infrastructure Security Agency (CISA) and the National Institute of Standards and Technology (NIST), which can provide valuable information and best practices.
  • Protect Data in the Cloud—The adoption of cloud technologies has significantly increased in education. When implementing cloud technologies, it’s imperative to view cloud services as an extension of an institution’s estate. Regardless of whether data is hosted on-premises or within a cloud-based infrastructure, it’s crucial to consider who has access to the data, how it’s protected, and to maintain visibility over data interactions.
  • Enhance Security Posture with AI—AI offers advanced threat detection, response, and automation that are proficient in recognizing baseline behaviors and identifying outliers that may signal a potential security threat. The adoption of AI in cybersecurity extends to automating responses to known threats, reducing response times.

AI’s role in education goes beyond security; it spans various applications, including enhancing the learning experience, personalizing education, and streamlining administrative processes. AI’s capacity to analyze vast datasets and adapt in real-time is invaluable for an industry that constantly evolves.

Juniper Networks is at the forefront of integrating AI into its products. By leveraging AI, Juniper aims to simplify security management, enhance visibility, and optimize network performance, ultimately ensuring a safer educational environment.

  • Consistently Test for Resiliency—Regularly testing the resiliency of security measures is crucial to maintaining a strong security posture. Third-party testing is vital to ensure security efficacy. Educational institutions should test their security infrastructure at least annually or biannually to validate their controls and keep them up to date.

Zeroing in on Cybersecurity in Education: Continue to Navigate New Threats

Education isn’t just about acquiring knowledge; it’s also about safeguarding it. Protecting your school against cyberattacks is a multifaceted challenge that requires a comprehensive approach. By understanding the unique challenges and risks facing educational institutions, schools and universities can create robust security strategies that protect student data and privacy.

If your school or university is interested in learning more about education security solutions, visit www.connection.com/cybersecurity for additional resources to help you get started.

]]>
So, You Have Microsoft Copilot—Now What? https://community.connection.com/so-you-have-microsoft-copilot-now-what/ Nov 21, 2023 Makayla Mota https://community.connection.com/author/makayla-mota/ https://community.connection.com/wp-content/uploads/2023/11/2405573-MS-CoPilot-BLOG.jpg

The anticipation leading up to the November 1, 2023, release of Microsoft Copilot for enterprise customers was unparalleled. During the Early Access Program (EAP), a multitude of enterprise users, including notable companies such as Visa, General Motors, KPMG, and Lumen Technologies, had the opportunity to utilize Microsoft 365 Copilot. Presently, it is available for all enterprise customers at a cost of $30 per user, per month. Once acquired, understanding how to optimize its use for your business becomes crucial. Additionally, understanding its integration within Microsoft 365, Windows 11, and Copilot with Bing Chat is essential. Connection is available to guide you through the onboarding process.

What capabilities does Copilot have in Windows 11 and how can I make the most of them?

Copilot serves as an AI assistant integrated into Windows 11, aimed at enhancing productivity and nurturing creativity. Operating alongside Bing Chat and ChatGPT plugins, Copilot aids in boosting focus, responding to inquiries, adjusting settings, summarizing information, and launching applications.

Beyond text-based interactions, Copilot in Windows enables image-related actions such as copying, dragging and dropping, or uploading images into the chat for further exploration. Additionally, it allows voice input and facilitates various actions including:

  • “Switch to dark mode”
  • “Turn on do not disturb”
  • “Capture a screenshot”
  • “Summarize this website” (Active tab in Microsoft Edge)
  • “Write a story about a hamster on vacation”
  • “Make me a picture of a sweeping mountain view”

Copilot in Windows 11 is also your assistant in creating AI-generated art. By utilizing AI-driven tools like Bing Chat, Copilot integrated within Windows, and Paint, you can make digital artwork directly from your device! Share details with Copilot, such as preferred colors, artistic styles, and additional sensory elements you wish to incorporate into your artwork. Offer this AI-powered assistant more information to customize your artwork, and watch your vision come to life.

Windows 11 offers an array of AI-driven tools and functionalities designed to enhance user experiences. Users can seamlessly utilize features like the Snipping Tool, voice commands, and intelligent suggestions within File Explorer and the Start menu. Leverage AI for enhanced creativity through applications like Clipchamp, Paint, or the Photos app.

What is Copilot with Bing Chat and how can I use it to enhance my organization?

Copilot with Bing Chat is an AI-fueled chatbot tailored for use within corporate environments. It represents the business-oriented iteration of Bing Chat, equipped with data privacy and governance controls specifically designed for enterprise settings. This enterprise version prioritizes data protection, catering to businesses concerned about privacy and security matters pertaining to generative AI tools. Offered in Preview, Bing Chat Enterprise will be incorporated into selected Microsoft 365 plans at no additional expense.

The primary function of Copilot with Bing Chat is to assist employees in content generation, data analysis, document summarization, skill acquisition, coding, and various other tasks. All these functionalities are conducted with the assurance that both user and business data are safeguarded, preventing leakage outside the organization. Copilot with Bing Chat exclusively accesses data from the public Web within the Bing search index and does not have authorization to organizational resources or content housed within Microsoft 365.

For further insights into Copilot with Bing Chat, various resources are available:

Regarding eligibility, customers possessing licenses for Microsoft 365 E3 or E5, A3 or A5 for faculty, Business Standard, or Business Premium can access Copilot with Bing Chat without extra charges. This benefit persists when Copilot with Bing Chat becomes widely available.

How can Microsoft 365 Copilot assist in my day-to-day work?

Microsoft 365 Copilot functions as your workplace AI assistant, building upon the foundation of Copilot with Bing Chat while possessing its own distinct qualities. It integrates enterprise-grade security, privacy, compliance, and responsible AI, ensuring that all data processing remains within your Microsoft 365 tenant, utilizing technology that Microsoft 365 customers have trusted for an extended period. The highlight of the Microsoft 365 Copilot experience is the Microsoft 365 Chat, surpassing basic Q&A interactions. This feature delves into your entire array of data, including emails, meetings, chats, documents, and online sources, to tackle intricate work-related challenges. Moreover, it seamlessly integrates with widely used Microsoft 365 apps like Word, Excel, PowerPoint, Outlook, and Teams, elevating the daily experience for millions of users.

What are the differences between Copilot with Bing Chat and Microsoft 365 Copilot?

Copilot with Bing Chat operates as a generative AI service grounded solely in data from the public Web within the Bing search index, lacking access to organizational resources or Microsoft 365 content like OneDrive documents or emails.

In contrast, Microsoft 365 Copilot introduces three key elements:

  • Access to data within the Microsoft 365 Graph within your tenant
  • Processing of prompts and responses exclusively within your Microsoft 365 tenant boundary, reinforced by specific security, compliance, and privacy features
  • Integration of this generative AI capability within Microsoft 365 applications such as Teams, Outlook, and Word

Ready to venture into the world of Copilot? The opportunities to enrich your work experience are limitless. Contact your Connection Account Team for more details.

]]>
Retail Cybersecurity Threats and Solutions https://community.connection.com/retail-cybersecurity-threats-and-solutions/ Nov 21, 2023 Brian Gallagher https://community.connection.com/author/brian-gallagher/ https://community.connection.com/wp-content/uploads/2023/11/2393959-Retail-Cybersecurity-BLOG.jpg

Technological innovations have transformed our retail experience. The impact of emerging technologies such as artificial intelligence, IoT, and mobility are significantly improving the customer experience, while at the same time creating more opportunity for security breaches.  The risk is compounded by the fact that each of these emerging technologies increases risk in two ways: first, by increasing the attack surface due to substantial growth in Internet-facing devices, and second, by creating exponentially more data—and bad actors are always looking for an easy path to exploitation. 

Shockingly, 24% of all cyberattacks target retailers, making cybersecurity a paramount concern for this sector. A single data breach causes an average drop of 7.5% in publicly traded stock prices, according to Harvard Business Review, and, according to a Business Wire report in 2019, 21% of consumers will stop shopping with a retailer that has been breached. We have never met a retailer that could survive a 10% drop in overall traffic, let alone 20%.

Both Business Operational Leaders and IT Leadership need to work together to understand the threats, vulnerabilities, and their potential impacts on the long-term brand value. This issue is not an IT issue; cyberattacks are an organizational issue.

Most Common Cyberattacks in Retail

  • Credential Phishing (30.43%): Attackers impersonate legitimate entities, often through email or fake websites, to trick employees into revealing sensitive information like login credentials.
  • Malware (21.74%): Malware, malicious software designed to infiltrate systems and steal data, poses a significant risk to retailers. It can be delivered through deceptive emails or compromised software.
  • Ransomware (13.04%): These attacks involve encrypting a retailer’s data and demanding a ransom for its release. Paying the ransom is not a guarantee of data recovery and may encourage further attacks.
  • Distributed Denial-of-Service (DDoS) Attacks (10.14%): DDoS attacks disrupt online services by overwhelming them with traffic. For retailers, this means websites can become inaccessible during critical shopping seasons.
  • Other Attack Methods (24.65%): While these statistics provide insights into common attack methods, retailers must remain vigilant against a wide range of other threats, including insider threats, supply chain attacks, and zero-day vulnerabilities.

Remediation Strategies

It is crucial for businesses to take proactive measures to protect their systems, customers, and reputation. Such measures include:  

  • Continuous Employee Training: Even at the store level, retailers must invest in cybersecurity training for employees in connected omnichannel environments. All employees must embrace a strong cyber culture.
  • Advanced Security Software: Implement robust endpoint Detection and response (EDR) and extended detection and response (XDR) solutions to detect and mitigate against exploitation-based attacks.
  • Network Security: Employ network monitoring tools to detect and respond to DDoS attacks promptly. Consider cloud-based DDoS protection services for scalability and robust security.
  • Secure Backup and Recovery: Regularly back up data, and test data recovery procedures to ensure business continuity. Ensure malware detection is part of the operational process.
  • Third-party Risk Assessment: Evaluate the security practices of third-party vendors, and conduct third-party exploitation-based testing against your infrastructure.

In a world where omnichannel retail is the norm, retailers must be vigilant guardians of both their own and their customers’ data. At Connection, we understand the importance of creating a secure shopping experience and how it has a direct impact on your bottom-line profits.  Engage our Retail Practice to learn more about the cybersecurity solutions we can help implement in your retail organization.

Reference Links:

digistor.com/what-happens-to-a-companys-reputation-after-a-data-breach/#:~:text=The%202019%20survey%20%E2%80%94%20summarized%20in,a%20business%20post%2Dbreach.%E2%80%9D

https://hbr.org/2023/05/the-devastating-business-impacts-of-a-cyber-breach

https://www.fortinet.com/solutions/industries/retail/retail-cybersecurity-statistics

https://arcticwolf.com/resources/blog/10-major-retail-industry-cyber-attacks/

https://www.threatintelligence.com/blog/retail-cybersecurity

]]>
Know Your Manufacturing Cybersecurity Risk... https://community.connection.com/know-your-manufacturing-cybersecurity-risk-baseline/ Nov 17, 2023 Ryan Spurr https://community.connection.com/author/ryan-spurr/ https://community.connection.com/wp-content/uploads/2023/11/2383527-Blog-MFG-Cybersecurity-Risk-Baseline-BLOG.jpg

Manufacturing is now the #1 most attacked industry.1 The threats are real, and unsecured devices and networks, lack of cyber awareness, and supply chain attacks only heighten the risk. These threats cannot be addressed with technology alone; building a strong policy base and cyber culture is critical.

In a recent roundtable discussion, Connection’s Manufacturing Practice, Professional Services experts, and Cisco all met to discuss imminent threats, cybersecurity program strategies, and technology that sheds light on today’s challenges and the direction manufacturing customers should be prepared to take. Below is a summary of that discussion, including the critical issues in manufacturing cybersecurity today and the strategies to best address them.

Host: James Hilliard
Guests:
Ryan Spurr, Connection Manufacturing Strategy Director
Rob Di Girolamo, Connection Practice Manager for Security and Network Solutions Center
Prithvi Manduva, Cisco Industrial IoT Technical Solutions Architect

To listen to the recording, register here.

Manufacturing: The Most Attacked Industry

Manufacturing has emerged as the top target for cyberattacks, with threats that are real and pervasive. In recent years, the manufacturing sector has experienced a significant shift in its vulnerability to cyber threats. Approximately 24–25% of all cyber incidents now target manufacturing, making it the most attacked industry globally.2

The reasons behind this heightened threat level include attackers increasingly focusing on manufacturing operations, with a 2,200% increase in surveillance in operational technology noted last year.3 These attacks result in 61% of successful breaches now occurring in operational environments, signifying a significant shift from previous years.3

The implications of cyberattacks on manufacturing are far reaching. Beyond compromising intellectual property, they can lead to downtime, financial losses, damage to a company’s reputation, and even impact stock prices—as recent Security and Exchange Commission (SEC) rules have demonstrated.

Top Manufacturing Security Challenges

The rate at which the manufacturing industry is experiencing increasing security risks is due to several challenges, including:

Lack of Visibility

Gaining visibility into the numerous devices and systems on the operational technology (OT) floor is a significant challenge. Different vendors and technologies create individual silos, making it difficult to monitor and secure the entire network. This is especially important when factoring in human error that occurs on the manufacturing floor. Changes made by vendors or personnel on the plant floor can often go unnoticed, creating a potential security risk. Implementing control mechanisms and detailed logs for changes is essential to track and maintain control.

Knowing what’s happening is crucial for securing systems. One tool that can provide visibility into OT is Cisco’s Cybervision, which helps teams understand their environment and develop security policies.

IT and OT Convergence

The convergence of IT and OT introduces a host of new challenges and demands a fundamental shift in the way organizations approach security. Manufacturers must consider the following:

Infrastructure: Simplify and secure the infrastructure connecting IT and OT environments, implementing segmented networks to minimize risk and impact.

Security as a Layered Approach: Address cybersecurity not just as an endpoint protection issue but as a layered approach to secure the entire network.

Collaboration and Coordination: Emphasize collaboration and coordination between IT and OT teams, ensuring that both domains work together to enhance security.

Legacy Devices

Many manufacturing systems and devices have been in operation for years, with no security measures in place. These legacy devices pose a significant security risk on the manufacturing floor for several reasons.

Firstly, these systems often lack the essential security features and updates that modern systems incorporate. Many legacy devices have been in operation for years—and over time, security vulnerabilities have emerged. Manufacturers might be unable to obtain patches or updates from vendors, as support may have been discontinued or the vendor may have even gone out of business. This leaves these systems vulnerable to exploitation by cybercriminals who can target their known weaknesses.

Additionally, legacy systems may not meet current security standards or compliance requirements. As cybersecurity threats evolve and regulations become more stringent, legacy systems can’t keep up. They may lack encryption, access controls, and other security features necessary to protect sensitive data and manufacturing processes, putting the organization at risk of non-compliance.

Ransomware Attacks

70% of ransomware attacks occur on the manufacturing floor, and that number has been growing.4 Ransomware attacks can encrypt critical data, control systems, or entire networks, effectively holding an organization hostage until a ransom is paid. This can result in production downtime, missed deadlines, and compromised product quality.

Implementing a zero-trust architecture can greatly enhance security in manufacturing by adopting a “never trust, always verify” approach. Zero trust assumes that no user or system, whether inside or outside the network, should be trusted by default. It verifies the identity and security posture of every user and device attempting to access resources within the manufacturing environment. This strategy prevents lateral movement within the network, limiting the spread of ransomware or any other cyber threats.

Supply Chain Risks

Relying on external vendors and suppliers introduces supply chain risks, requiring organizations to ensure that they can trust their partners and suppliers. Manufacturers often rely on a complex network of external vendors and suppliers to provide various components, materials, and technologies. This reliance introduces vulnerabilities at multiple touchpoints along the supply chain. If a supplier or vendor experiences a cybersecurity breach, it can have a cascading effect on the manufacturing process.

Malicious actors may seek to compromise a manufacturer’s supply chain to infiltrate their systems. This could involve tactics like planting malware in a supplier’s systems, exploiting vulnerabilities during product shipments, or even conducting insider attacks within a supplier’s organization. These malicious activities can bypass traditional security measures within the manufacturing facility and pose a significant risk to the organization’s security and operations.

Supply chain risks have become more prominent, and it’s crucial to vet and set security standards for vendors and partners. Manufacturers must prioritize robust cybersecurity measures across their entire supply chain to mitigate these risks and ensure the integrity and security of their products and processes.

Complexity

As manufacturing integrates OT and IT, the resulting complexity can overwhelm teams and hinder productivity. As a result of such increasing complexity in manufacturing environments, the desire for simplicity is growing.

Beyond tools such as Cisco’s Cybervision to reduce complexity by providing visibility into OT environments, extended detection and response (XDR) is another advanced security concept that helps manage and secure complex environments like manufacturing floors. It does so by segregating and containing threats to prevent them from spreading across networks.

Lack of Skilled Cybersecurity Professionals

The shortage of skilled cybersecurity practitioners is a significant concern for the manufacturing sector. Upskilling the existing workforce and leveraging automation and artificial intelligence can help bridge this gap.

Providing adequate cybersecurity training to OT personnel is also crucial. Phishing awareness and security education tailored to the manufacturing environment are essential to prevent human errors that could lead to breaches.

Gaining Buy-in from Leadership

Cybersecurity is the responsibility of everyone in an organization. Building a culture of security and awareness is essential. Executives, IT, and OT professionals must work together to enhance security measures. To convince executives to focus on cybersecurity, IT teams should emphasize the impact of disruptions on production and reputation, as well as regulatory compliance.

Cybersecurity Challenges and Solutions for Modern Manufacturers

The manufacturing sector faces an unprecedented wave of cyber threats, making it the primary target for malicious actors. These attacks result in substantial financial losses, downtime, and reputation damage. The increase in cyberattacks can be attributed to a number of factors, including a lack of visibility into the numerous devices and systems on the manufacturing floor, a need for better collaboration between IT and OT teams, and unsecure legacy systems—to name a few.

To thrive in this challenging environment, manufacturers must cultivate a security-focused culture that involves all levels of the organization, from executives to IT and OT professionals. Investing in cybersecurity is not just an option but a necessity to mitigate risks and ensure the resilience of manufacturing operations in an ever-evolving digital landscape.

Sources:

1 IBM, 2023, 2023 X-Force Threat Intelligence Index

2 Statista, 2022, Distribution of cyber attacks across worldwide industries in 2022

3 IBM, 2022, 2022 X-Force Threat Intelligence Index

4 Industrial Cyber, 2023, Ransomware activity in industrial environments almost doubles, with over 70% focused on manufacturing sector

If your business is interested in learning more about manufacturing security solutions, visit www.connection.com/manufacturing or www.connection.com/cybersecurity for additional resources to help you get started.

]]>
A Day in the Life of a Senior Business... https://community.connection.com/a-day-in-the-life-of-a-senior-business-process-analyst/ Nov 16, 2023 Stu Hipwell https://community.connection.com/author/stu-hipwell/ https://community.connection.com/wp-content/uploads/2023/11/2391271-A-Day-in-the-Life-Stu-H-BLOG.jpg

Q1: What does a Senior Business Process Analyst do?

The role of a Business Process Analyst is to identify and improve the processes and workflows within Connection. This involves analyzing data to understand how a process or workflow currently works and working with the business to determine the desired state of that process or workflow. In addition, a Business Process Analyst is also heavily involved with helping our leaders in Connection design new business processes and help support the change management, so the business is prepared for changes that impact their roles and responsibilities.

Q2: What skills are required to successfully do the job?

The skills that have helped me succeed in my role of Senior Business Process Analyst include:

  • Building great relationships with my peers and having a good understanding of the processes and workflows used within Connection
  • Having a strong knowledge of current business processes and workflows and how they impact our business
  • Asking lots of questions of my peers and analyzing data to help determine how business processes and workflows can be improved, become more efficient, or be automated
  • Having strong interpersonal and communication skills and building “trust” with the business teams I work closely with
  • Attention to detail when creating procedure documents, process maps, and reports that play a critical role in helping the business adapt to change

Q3: Can you describe a typical day in your role as a Senior Business Process Analyst?

My role is currently a little bit different than other Business Process Analysts at Connection. For the past four years, I have taken on the role of Administrator of Connect, our internal corporate intranet. In this role, no day is “typical,” which makes the role exciting. On any given day, I could be posting informative news and announcements on our site, collaborating with teams to build resourceful site pages, training and assisting peers with managing their content on our intranet, and creating and sharing best practices to promote the integrity and credibility of Connect. 

Q4: What’s the best part of your job? What’s most challenging?

The best part of my job is being able to collaborate regularly with so many of my peers in Connection that I would rarely work with if I were in another role.

The most challenging part of my job is successfully managing my time to meet the needs of the business. In my Administrator role, no day is like the one before. Some days require me to quickly shift gears to meet a spontaneous or high priority request, which can often change the view of my day. On other days, the times I have dedicated to projects I need to complete, carry on without any issues. The role keeps me on my toes! 

Q5: What do you love most about working at Connection?

I have been with Connection since 1994, and in that time, I have had the opportunity to wear a few different hats in the organization: Account Manager, Sales Manager, Sales Operations, and Business Transformation. I love that my journey at Connection has allowed me to gain several business and personal skills and build amazing relationships with so many of my peers—many of which are like family to me.

]]>
Find the Microsoft Azure Solutions that Fit... https://community.connection.com/find-the-microsoft-azure-solutions-that-fit-your-needs-at-connection/ Nov 09, 2023 Krysten Harper https://community.connection.com/author/krysten-harper/ https://community.connection.com/wp-content/uploads/2023/11/2381465-Connected-Azure-at-CNXN-BLOG.jpg

When you think of Microsoft Azure and all it encompasses, it can start to seem a little overwhelming. I like to think of Azure as an amusement park. Imagine that each ride or restaurant or game in the amusement park is a service Azure offers—such as virtual machines, databases, storage, or advanced computing services like artificial intelligence and machine learning. Just how you can choose which rides to go on at the amusement park, you can choose which services you want to use in Azure.

In 2013, only 50% of Fortune 500 companies were using Azure. Today, that number is closer to 95%! According to Markets and Markets, the Cloud Computing Marketplace was valued around $545 billion in 2022 and is projected to reach $1,240 billion by the end of 2027. However, during Microsoft Inspire earlier this year, we learned that 90% of worldwide IT spend has yet to move to the cloud! How do all of these numbers exist at the same time? Because for many companies, moving to the cloud is not an “all or nothing” event. In fact, many of our customers prefer to start by moving one or two workloads over rather than going “all in” right at the beginning. Regardless of where you are in your journey, Connection can help!

At amusement parks, you pay one price for the ticket, regardless of how many rides you plan to go on. With Azure, though, you get a pay-as-you-go pricing model, which means users only pay for the resources and services they use. Because of this flexibility, Azure is used by organizations of all sizes to transform their IT infrastructure and applications without the need for significant upfront investments in hardware and data centers.

Connection Service Offerings

We don’t just do a quick lift and shift and call it good, because too much can go wrong. Connection offers a straightforward, end-to-end, modular solution for organizations seeking to integrate existing workloads into the cloud.

  • Migration Planning: IT Landscape Optimization

Asset Discovery and Optimization was born from software compliance and has evolved to include cloud preparedness, security readiness, modern workplace management, and server optimization. Another option for customers looking to migrate is Cloud Landscape Optimization. We will work with you to recommend the best cloud model to suit your needs, assess which workloads can be moved safely to the cloud, and offer migration strategies to minimize risks.

  • Migration and Optimization: Professional Services

Once you’ve made the decision to migrate, our Azure Specialists and Professional Services teams will help move your data, applications, and infrastructure to Azure with our Azure Migration offering. Connection has earned Microsoft’s Advanced Specialization for Windows Server and SQL Migrations, so we have the knowledge and experience to ensure these projects run as smoothly as possible.

For customers already in Azure, our Azure Optimization Services will do exactly what it sounds like. These services review your existing architecture and uncover potential opportunities for improvement by leveraging Platform as a Service, Automation, and other Azure native tools available within the platform. We also offer a wide variety of services and solutions that support projects involving Azure Virtual Desktop and Azure VMware Solutions.

  • Day-to-Day Management: Managed Services

Looking for more long-term assistance? Our Azure Managed Services offering is great for customers who want to migrate to Azure, but who may not have the skills or bandwidth to manage that environment themselves after the migration.

Step Right Up—and Get Help from Connection

Whether you have already taken the plunge on the amusement park’s roller coaster and are ready to check out our Migration and Optimization Professional Services, or you’re still waiting in anticipation and need to think about Migration Planning through our IT Landscape Optimization Services—or even if you’re content to sit on a bench and hand off riding the rides to someone else with our Day-to-Day Managed Services—Connection has the right fit for your Azure needs. Contact your Account Team for more information in setting up the plan that is right for you.

]]>
Empowering Organizations to Do More with... https://community.connection.com/empowering-organizations-to-do-more-with-remote-management/ Nov 08, 2023 Alex DeRossi https://community.connection.com/author/alex-derossi/ https://community.connection.com/wp-content/uploads/2023/11/2382821-PH-2-Intel-Remote-Management-BLOG.png

One of the longest lasting and seemingly immutable truths about the American workforce has been upended: the notion that employees almost always do their work at a corporate facility. Recently, 58% of Americans surveyed said they have the opportunity to work from home at least once a week, and 35% said they can do so every day, according to McKinsey.1

Another survey by TechTarget’s Enterprise Strategy Group found that predicting work locations is unpredictable, with only 23% of organizations saying all employees who previously worked from an office will return to the office. That number is nearly identical to the percentage of organizations that indicated they will allow many employees to work remotely.2

With so many people now working remotely at least part time, the burden for managing that new reality falls squarely on the often under-resourced IT organization. Remote management of end-user computing—and every technology that enables it—has become far more complicated and far more important than ever. Employees expect and demand a smooth, seamless, and friction-free user experience that allows them to work productively and efficiently.

With the right remote management tools and the proper IT infrastructure, organizations can turn the potential chaos of “work from anywhere” into a scenario where employee location matters far less than employee experience.

Enhancing Productivity and the User Experience

The skyrocketing adoption of mobility and remote/hybrid work means many IT organizations are hard-pressed to keep up with new requirements and demands for high availability, high performance, and secure access at all times. Even seemingly simple tasks such as delivering security patches and operating system updates have become far more important—and challenging—when PCs are more likely to be located outside a corporate facility and accessible over wide-area networks or the cloud.

IT help desks also need next-generation remote management to support end users with password reset requests, performance glitches, application errors, and much more. To lessen employee inconvenience and frustration, updates and fixes must be scheduled outside of “normal” business hours. Of course, this becomes far more challenging because organizations employ people in different time zones and geographies around the world.

There is also the issue of business continuity in the event of an unexpected service interruption, which can take employees offline for hours or longer, resulting in potentially large financial losses, diminished customer satisfaction, and lower employee productivity. In these and other circumstances where remote PC users need around-the-clock support, a much higher level of remote management is essential.

Another important area where remote management comes into play is device administration, where IT organizations have to audit and report on the location and status of every device under their purview. Whether onboarding a new employee or ending access and privileges for exiting employees, IT organizations need to be able to find and understand their PC fleet at all times.

How Connection Makes Employee Empowerment a Reality

With the growing IT complexity of remote/hybrid work environments, it has become far more difficult for internal IT organizations to satisfactorily support remote management without the help of experienced, savvy technology services partners. That’s why, at Connection, we have invested substantial financial, staff, and intellectual resources in remote management.

Connection helps large and small organizations alike with a wide range of end-user computing and remote connectivity requirements. We provide the devices, software, services, and industry knowledge to cover the full spectrum of remote management to ensure around-the-clock productivity and an enhanced employee experience. Working with leading technology partners such as Intel, we can extend the internal IT organization with a wide range of capabilities, including infrastructure planning and configuration, systems integration, deployment services, and support.

This enables organizations to allow staff to work productively from home or other remote locations. It also helps them maximize their substantial and growing investment in digital work processes and cutting-edge workloads that require high-performance, secure, and sustainable PCs to get the job done.

Connection facilitates out-of-the-box operation for all PCs, regardless of location or whether there is an IT support professional at the employee’s location. Connection’s Technology Integration and Distribution Center enables it to support an organization’s diverse PC configuration needs around the world, using proven methodologies and a wide array of technical certifications in PCs, networks, and remote management.

The Remote Management Capabilities of Intel vPro®

Intel vPro® 13th Generation processors are ideally suited for the demanding, uncompromising needs of a remote workforce. Their high performance, robust security, and efficient sustainability features are designed for modernized end-user computing.

For remote management requirements, Intel vPro® processors are engineered with integrated features that make managing a vast fleet of mobile, distributed devices much easier and reliable, without taxing overworked internal IT teams.

Intel® Active Management Technology (AMT) facilitates remote management and troubleshooting. IT team members can connect remotely to an employee’s PC even when the computer is far away from a corporate facility. Intel® AMT can also handle PC monitoring even when the device is turned off or when the operating system is disabled or not functioning properly. Importantly, Intel® AMT is unique in its ability to return a PC to its last known good state, even if the employee isn’t working at that time. Finally, it supports remote out-of-band management over Wi-Fi networks, which provides secure access to devices without having to connect to the corporate local-area network.

Additionally, Intel vPro® processors come with Intel® Endpoint Management Assistant, which makes it easier for IT personnel to manage Intel® EMA- enabled remote endpoints over the cloud, as well as on both sides of corporate network firewalls. Intel® EMA software is a cloud-based solution, supporting both in-band and out-of-band management through an OS-based agent for any Windows platform.

Conclusion

To give employees the flexibility and support they need for remote and hybrid work, organizations need the technology and expertise required to make remote management a valuable part of the overall IT service delivery framework. The combination of Intel vPro® processor technology and market-demonstrated IT services from Connection empowers organizations and their workforces to do essential work, regardless of their work location.

For more information on how Intel and Connection can help your organization do more, be sure to check out our blog post, Custom IT Configurations for Remote Manageability, or contact your Connection Account Team today. 

1 “Americans Are Embracing Flexible Work—and They Want More of It,” McKinsey, June 23, 2022
2 “End-User Computing Trends,” TechTarget’s Enterprise Strategy Group, Feb. 16, 2022

]]>
Upcoming Microsoft 365 for Education... https://community.connection.com/upcoming-microsoft-365-for-education-licensing-changes/ Nov 07, 2023 Makayla Mota https://community.connection.com/author/makayla-mota/ https://community.connection.com/wp-content/uploads/2023/11/2378197-MS-EDU-Licensing-Blog-BLOG.jpg

Does your school use the Microsoft 365 for Education suite? There are two upcoming licensing changes that you need to be aware of! These changes will take place on August 1, 2024—but it is never too early to be prepared. Let Connection help with any questions or concerns you have leading up to, during, and after the transition.

Office 365 A1 Plus Retirement

The Office 365 A1 Plus Program will be retired on August 1, 2024. The program was introduced in 2015 to ease the provisioning burden on IT professionals in education institutions as they moved to the cloud. For qualified schools that purchased Office institution-wide for faculty and staff, the A1 Plus Program included a free subscription and Office desktop apps.

Why Is It Being Retired?

Although it was intended to create an easier transition to the cloud, it ultimately led to complexities and issues that inadvertently steered customers to non-compliancy. Microsoft 365 A3 and A5 licenses are easier to provision now, which both addresses customers’ requirements and the need for a transitional program. 

What Steps Do I Need to Take?

The first step is to check the Microsoft Admin portal to see if you have any A1 Plus licenses in your tenant. 

• Navigate to the Microsoft 365 Admin Portal: https://admin.microsoft.com
• In the navigation menu on the left side of the screen, select Billing > Your Products
• 
Identify any instances of the Office 365 A1 Plus for Faculty and Office 365 A1 Plus for Student assigned licenses

Once you have identified what users are on A1 Plus licenses, you must determine what license they should be assigned. The following SKUs are what is recommended by Microsoft. Work with your Connection Account Team for help with deciphering your needs:

• Office 365 A1: Free online Office productivity and learning tools. Includes Web versions of Word, Excel, PowerPoint, OneNote, Microsoft Teams, and additional classroom tools.

• Microsoft 365 A3: A comprehensive platform for learning and working with integrated security and management. A3 includes premium tools for learning and skill building, increased security, AI-infused productivity tools, and device controls for management and student safety. 

• Microsoft 365 A5: Microsoft 365 A5 provides the most comprehensive platform for teaching, learning, and work. Microsoft 365 A5 is for institutions who want a single productivity, communications, and collaboration platform for work and learning in addition to the most advanced security. 

Of note: for customers who have additional light users or want to use desktop apps, there is an option to purchase Office 365 A3 licenses or Office desktop apps as an add-on.

Users of A1 Plus will not lose their data once it retires. However, if no action is taken prior to the retirement date, users will be downgraded to an A1 license resulting in access to only the online Web apps. 

Microsoft recommends transitioning users early and providing guidance on what they can expect with their new license if changes occur. Please see the FAQ (Frequently Asked Questions) sheet provided by Microsoft and contact your Connection Account Team for more information as you navigate these licensing changes.

Storage Changes

In addition to the A1 Plus program's retirement, Microsoft is changing their storage offerings across the Microsoft 365 for Education suite. Beginning at your next contract renewal—but no sooner than August 1, 2024—all school tenants will receive 100TB of free pooled storage across OneDrive, SharePoint, and Exchange, with an additional 50GB or 100GB of pooled storage per paid user for A3 and A5 subscriptions, respectively (not including Student Use Benefits). 

Of note: technical enforcement will begin August 1, 2024. Most schools are well below their storage allotment. For any mid-enrollment customer over that storage limit on August 1, 2024, Microsoft will provide additional storage at no cost through the length of the customer’s current term.

Schools can also purchase additional pooled storage to add to the tenant pool in 10TB increments for $300 USD (estimated retail) monthly. To find your capacity, use this calculation: 100TB + (#A3 paid users x 50GB) + (#A5 paid users x 100 GB) + (additional storage purchased) = capacity/limit.

Also, effective February 1, 2024, users of Office 365 A1 will be limited to a maximum of 100GB of OneDrive storage within the school tenant’s 100TB of pooled storage. Schools will have the option to purchase additional incremental storage based on their needs.

Why Is Microsoft Making Storage Changes?

After a significant increase of unused accounts, stored files, and data as institutions move to the cloud, there is not an end-of-life plan for these files, putting education institutions and their students at risk for a data breach. Not to mention that stored files no longer in use significantly impact our carbon footprint! Storage of this “dark” data takes up space on servers and results in increased electricity consumption. Microsoft is committed to both security and privacy within a school as well as reducing their carbon footprint.

Help When and Where You Need It

With the help from a free set of tools to manage the entire process from visualizing current storage allocation across OneDrive, SharePoint, and Exchange, to tools that make it easier to manage stored data and files that are no longer needed, Microsoft is committed to helping schools with this transition. Currently, most schools are well below their storage allotment. To see your school’s storage profile and access the new storage management tools, go to the Microsoft 365 Admin Center. Your Account Team at Connection is here to provide additional licensing and storage guidance as you begin to delve into your school’s profile to determine what steps you need to take to prepare for the upcoming changes. Our Premium Microsoft Landscape Optimization offers a User Profile and Cloudstack workshop to help you discern your options and provide a tactical approach to support your Microsoft investment strategy. Reach out to your Connection Account Team or watch our vlog for more information.

https://www.youtube.com/watch?v=ILIAFh7Zk0I
]]>
TechSperience Episode 121: Leveraging... https://community.connection.com/techsperience-episode-121-leveraging-advanced-technologies-to-modernize-manufacturing/ Nov 06, 2023 Connection https://community.connection.com/author/connection/ https://community.connection.com/wp-content/uploads/2023/11/2384567-TechSperience-Podcast-121-BUZZ1.jpg

We’re at an inflection point in U.S. manufacturing. Those that are not investing in advanced technologies today will quickly find themselves uncompetitive. Those that are beginning to modernize their facilities, however, are achieving smarter and more digitally excellent design and production. In this podcast, we'll explore how manufacturers can leverage advanced technologies to modernize their spaces and ultimately yield big business benefits.

Host: James Hilliard

Guests: Blake Kerrigan, Senior Director for ThinkEdge Business Group at Lenovo

Zihan Wang, Global Business Development Manager at NVIDIA

Ryan Spurr, Manufacturing Strategy Director at Connection

Show Notes:

[0:55] Are there one or two trends or issues across manufacturing that are leading teams to recognize the need to modernize today?

[4:52] What other trends from a technological standpoint are you seeing regarding manufacturers' need to modernize their facilities?

[7:00] AI is helping the manufacturing industry modernize faster. What are teams looking to do with AI?

[10:25] What are some of the leading cutting-edge manufacturers doing? What can we learn from them?

[14:01] How much education is needed to assist manufacturers with what they need to begin the modernization process?

[21:45] What are some case study examples of how manufacturers have modernized their facilities recently?

[25:00] How did our teams help Trek Bikes modernize their research and development manufacturing operations?

[28:01] How's Lenovo helping automotive manufacturers modernize the early stages of their manufacturing production operations?

[31:56] How has our team assisted Pegatron with modernizing its mass production? [35:04] How can adopting smart technologies in manufacturing help with cost savings?

[37:55] To continue the conversation, visit www.connection.com/manufacturing and our Manufacturing Practice can help jumpstart your modernization process.

]]>
The Factory of Tomorrow Is the Factory of Today https://community.connection.com/the-factory-of-tomorrow-is-the-factory-of-today/ Oct 31, 2023 James Rust https://community.connection.com/author/james-rust/ https://community.connection.com/wp-content/uploads/2023/10/2371335-Smart-Factory-Blog.jpg

For years, people have dreamed of automated factories and operations that can sustain themselves autonomously. While we haven’t quite reached that level, leading manufacturers have leapt toward that goal with the application of feasible and proven smart technologies in recent years. These new advances are revolutionizing manufacturing and can offer companies a competitive advantage.

The Senses of the Smart Factory

Industrial sensors have become a vital part of modern manufacturing. Not only can a wide variety of physical quantities such as temperature, pressure, flow, level, and location be monitored—the data can be used to automate all kinds of industrial processes. 

Where maintenance personnel once had to go and manually check pressure and temperature to see if an issue was starting to appear, they can now perform other tasks while sensors keep an eye on these metrics and alert them as soon as there is a problem. This continuous monitoring allows them to address issues as quickly as possible, without wasting time periodically checking for problems.

Industrial sensors can be just as valuable for production as for maintenance. Temperature can drastically affect a manufacturing process, and monitoring these levels will ensure that products are manufactured to the correct specifications.

Industrial sensors are essential to many industrial processes, helping to improve efficiency, quality, and safety. For example, flow sensors measure the flow rate of raw materials and finished products to ensure that production lines are running efficiently. Temperature sensors monitor the temperature of furnaces and other equipment to ensure products are manufactured to the correct specifications. Level sensors monitor the level of liquids and solids in tanks and containers to ensure that there is enough material to keep the production process running and prevent overflow. 

Smart cameras can “see” what is going on in the operation and, by using artificial intelligence, can analyze and interpret images. Thanks to advances in AI, anything you can train a human to watch for on a security camera monitor, you can teach a camera to do just as well. Successful implementation has already occurred for use cases in quality control, process optimization, and safety.

Contaminants in Pharmaceutical Manufacturing can be detected throughout the process, ensuring every pill is what you expect, when you take it. Issues in the manufacturing process can be spotted without the need for a person to conduct exhaustive studies. Most importantly, safety hazards such as spills and leaking gas can be detected, and the right people can be immediately notified.

The Brain of the Smart Factory

Industrial Internet of Things (IIoT) software platforms pull together data from industrial sensors, cameras, and controllers to paint a clear picture of the factory floor. The raw data can be processed at the edge to drive automation and then sent to up the stack to other systems or stakeholders, offering management real-time visibility into their operation. It also enables predictive maintenance to lower downtime, optimization of the production line by reducing waste, and the insight needed to develop new processes and products. When this data is processed at the edge, it does not have to travel to a central cloud server and back, which is especially important where low latency or autonomous operations are critical. Most operations have many legacy devices or tools that are older but can’t be connected to a modern network. Smart edge devices, specifically designed for manufacturing, can connect to any machine and ensure it becomes part of your IIoT stack leaving no device behind. If you’re curious about edge devices, check out my post.

The Limbs of the Smart Factory

Automated Mobile Robots and Automated Guided Vehicles (AMR/AGVs) are a type of smart technology that is becoming increasingly popular in the manufacturing industry. AMR/AGVs are used to automate a variety of tasks such as material handling, order fulfillment, and assembly. By automating repetitive tasks, AMR/AGVs can help to free up human workers to focus on more complex tasks such as machine repair and product development, which leads to increased efficiency and productivity. These robots have relatively low maintenance costs and may be less expensive than hiring additional staff for growing companies. AMR/AGVs can even help to improve safety in the workplace by automating tasks that are dangerous yet error prone due to repetition. One of their most valuable additions to a factory is the flexibility they bring. AMR/AGVs are able to reconfigure production lines quickly and easily, meaning workers won’t have nearly as much setup time. This can be helpful for manufacturers who have a high mix/low volume product offering or who need to be able to quickly adapt to changes in demand.

The Smart Factory Is Here—Let It Work for You

All of these factors described in a smart factory result in a business that is capable of producing finished goods with higher quality and safety standards, and greater efficiency. These technologies may be new, but they are far from unproven. Smart factories already exist, and the companies that implement them have seen tremendous benefits.

Since there are so many technologies to implement in an Industry 4.0 journey, many manufacturers have opted to simply worry about it down the line and focus on current issues. The truth is that investing in these technologies now will solve many of the challenges factories face today, and surely face down the line—like competitors with significantly lower costs. 

Transforming your operation may seem daunting, but that’s why Connection has partners who handle every piece of the transition and have successfully managed these changes for customers. If you’re ready to get started with smart technologies, engage the Manufacturing Practice at Connection today. We’ll make sure you have everything you need to reap the benefits of a smart factory and see incredible results.

]]>
A Strong Foundation Is Essential for AI... https://community.connection.com/a-strong-foundation-is-essential-for-ai-retail-solutions/ Oct 26, 2023 Brian Gallagher https://community.connection.com/author/brian-gallagher/ https://community.connection.com/wp-content/uploads/2023/10/2363171-Retail-AI-Foundation-Blog.jpg

In today’s hyper-competitive retail landscape, staying ahead of the curve requires more than just attractive storefronts and competitive pricing. Retailers are increasingly turning to artificial intelligence (AI) to gain a competitive edge. However, successful implementation of AI in retail hinges on two key elements: 

  • A strong understanding of your brand 
  • A solid technology infrastructure foundation

Your entire organization must be aligned to your brand mission. Only then will you be able to leverage AI in a way that optimizes your business outcomes. For AI solutions, look to the technology leaders to be sure you have a robust foundation built upon four key pillars: data, networking, edge computing, and security. 

As only you understand the value of your brand, I want to walk through the foundational technologies that you need to bring your vision to life.

Data: The Lifeblood of AI in Retail

Data is the lifeblood of AI, and this is especially true in retail. Retailers deal with vast amounts of data daily, including sales transactions, inventory levels, customer preferences, and more. To harness the power of AI, retailers must first establish a comprehensive data strategy. This involves collecting, storing, and managing data efficiently.

Since data serves as the raw material for AI algorithms, it is critical to understand the data that aligns most closely with your brand attributes. The data will allow you to understand customer behavior, predict trends, optimize supply chains, and personalize marketing efforts. Perhaps the most important outcome is how data can provide customer insights to help retailers create a more personalized experience.

Networking: Enabling Data Flow and Real-time Insights

Data alone is not enough; it needs to flow seamlessly within an organization. Networking plays a pivotal role in this process. The challenge for retailers is the dispersed network of stores, warehouses, and distribution centers. A robust networking infrastructure ensures that data from these various locations can be collected and transmitted efficiently. Providing real-time inventory, omnichannel customer engagement, and employee solutions is key in our modern retailing world.

Edge Computers: Bringing AI to the Front Lines

While centralized data processing has its merits, in retail, many AI applications benefit from edge computing. One might argue that AI at the edge is the most critical step in providing a hyper-personalized experience to your customers. Edge computers are devices located close to where data is generated, such as in-store cameras or sensors. These devices can process data locally, reducing latency and enabling real-time decision-making.

In retail, edge computers are instrumental in applications like AI-kiosks or shelf monitoring. AI-kiosks for shopping or self-checkout can change both the customer experience but also improve employee productivity and loss prevention. Cameras mounted on store shelves can analyze product availability, price accuracy, and planogram compliance in real-time. This information can trigger alerts for store associates to take immediate action, ensuring shelves are always well-stocked and organized.  All these features are done at the edge to optimize an outcome specific to a store, customer, or employee.

Security: Safeguarding Customer Trust

In the age of AI, the security of data and AI systems is paramount. A security breach can result in severe reputational damage and legal consequences that your brand and income statement may never recover from again.

Implementing robust security measures is non-negotiable when building an AI foundation for retail. This includes encryption, access controls, and continuous monitoring of AI systems. Retailers must also comply with data protection regulations, such as GDPR or CCPA, to maintain customer trust and avoid hefty fines. AI models themselves can be vulnerable to attacks, including adversarial attacks and data poisoning. Retailers need to invest in AI security solutions to protect their models from manipulation and ensure they make accurate predictions.

What’s Next?

The complexity of AI and the infrastructure needed to optimize your outcomes require a fresh look at the alignment of your internal teams and the alignment with a trusted third-party partner. AI solutions are developing so quickly over the next 24–36 months that managing the process internally is no longer an option. Choosing a trusted partner now ensures that AI solutions align with your brand mission.At the end of the day, there is nothing more important than your brand. AI and the technologies that enable it are just tools to delight your internal and external customers. Connection would be thrilled to support your journey. Engage Connection’s Retail Practice or your Account Team today to get started!

]]>
Apple’s Modernized Deployment Strategies... https://community.connection.com/apples-modernized-deployment-strategies-for-hybrid-work/ Oct 13, 2023 Chris Roux https://community.connection.com/author/chris-roux/ https://community.connection.com/wp-content/uploads/2023/10/2363868-Apple-Deployment-Stategies-BLOG.jpg

In an increasingly digital world, Apple products have become ubiquitous in businesses of all sizes and across diverse industries. Mac, iPhone, iPad, and Apple Watch are being leveraged in ways that were once unimaginable. Today, we delve into Apple’s modernized deployment strategies for hybrid work, focusing on their commitment to user experience, security, and overall efficiency.

Ensuring User-centricity and Security

Apple’s success in the corporate world can be attributed to its unwavering dedication to enhancing user experience while maintaining the highest standards of security. Apple recognizes the concerns of its customers—especially when it comes to security—and has taken significant steps to make Mac one of the most secure computing platforms.

Over the past decade, Apple has introduced a range of security features to the Mac, including anti-malware protections, system integrity protection, and hardware integration with Touch ID. These measures, coupled with free annual updates, have fortified Mac security while preserving the user experience. With the advent of Apple Silicon, Mac users can enjoy even greater security and faster security updates, ensuring their devices remain protected in a rapidly evolving digital landscape.

Deployment and Management for the Hybrid Work Era

As businesses increasingly adopt hybrid work models, the importance of effective deployment and management of a device platform like Mac has never been more critical. Apple offers a comprehensive approach to streamline these processes.

Apple Business Manager: The journey begins with Apple Business Manager, a free service designed to simplify deployments. It enables remote configuration and management of Apple devices, making it essential for organizations looking to achieve zero-touch deployment. By enrolling devices in Apple Business Manager, IT administrators gain the ability to assign and configure devices with ease.

Choosing the Right MDM Solution: It’s vital to select a mobile device management (MDM) solution that leverages Apple’s native APIs effectively. Mapping out your organization’s management requirements and evaluating MDM solutions against those needs is crucial. Additionally, selecting a vendor capable of keeping up with Apple’s annual OS updates is essential for maintaining security. Connection offers a great lineup of MDM solutions—including Jamf, VMware Workspace ONE, and Microsoft Intune.

Endpoint Security Framework: Apple’s Endpoint Security Framework offers a user-space replacement for low-level operating system event monitoring. Organizations should collaborate with security vendors that utilize this framework to stay on top of Apple’s security updates to minimize vulnerabilities.

Zero-touch Deployment: Zero-touch deployment automates the setup process for Mac, allowing for a seamless—and superior—user experience, right out of the box. It not only saves time but also ensures compliance and enhances security.

Closing Skill Gaps with Connection: Bridging the IT Divide

In the dynamic world of technology, staying ahead of the curve can be a daunting task for many organizations. Rapid advancements, new security threats, and evolving user expectations mean that IT departments often face skill gaps that can hinder their ability to fully harness the potential of Apple’s innovative solutions. At Connection, the focus is not just on providing technology but also on becoming a strategic partner in your digital journey. Here’s how Connection can help you close those skill gaps and ensure your IT team is always in sync with the latest advancements.

Expertise at Your Fingertips: With Connection, you gain access to a team of seasoned professionals who live and breathe technology. Whether you’re a small business or a large enterprise, our experts are here to assist. We understand that the IT landscape can be overwhelming, and our goal is to simplify it for you.

Technology Integration and Distribution Center (TIDC): Located in Wilmington, Ohio, our state-of-the-art TIDC spans 50,000 square feet. This center is not just a facility; it’s where we transform your IT vision into reality. From provisioning and configuring devices to managing large-scale deployments, the TIDC is equipped to handle it all. Our experience includes provisioning and deploying some of the largest Apple device deployments on record—so you can trust us to handle your project with precision.

Jamf Managed Service Provider: As a Jamf Managed Service Provider, we offer a comprehensive suite of services that extends beyond device provisioning. We can help you implement identity and security services such as Jamf Connect and Jamf Protect. Our expertise in these solutions ensures that your Apple ecosystem remains secure and user-friendly.

Warranty and Advanced Services: Our support doesn’t stop at deployment. We offer in- and out-of-warranty repair services through the TIDC, ensuring that your devices stay in optimal condition. Additionally, our advanced services portfolio includes options like advanced exchange and re-deployment, further enhancing the longevity and efficiency of your Apple devices.

Tailored Solutions for Your Industry: Whether you’re in business solutions, enterprise, public sector, retail, or healthcare, Connection has industry-specific expertise to cater to your unique needs. We understand that each sector comes with its own set of challenges and opportunities, and our solutions are designed to align with your goals.

Continuous Learning and Collaboration: Technology is an ever-evolving field, and staying current is imperative. Connection facilitates ongoing learning and collaboration opportunities for your IT team. We offer training sessions, workshops, and knowledge sharing to ensure your team remains up to date with the latest trends and best practices.

Connect with Us

Technology can make or break business success. Having a partner like Connection by your side is invaluable. We go beyond providing hardware and services; we empower your organization to thrive in the digital age.

Whether you’re facing skill gaps in your IT department, need assistance with a complex deployment, or simply want to ensure your technology investments are delivering maximum value, Connection is here to calm the confusion of IT. Our mission is to become your IT department’s IT department, so your organization can fully embrace the benefits of Apple’s modernized deployment strategies and succeed in the hybrid work era. Embrace the future of IT with confidence, supported by a partner you can trust.

To learn more about how we can help you close skill gaps and elevate your IT capabilities, visit Connection’s Apple Practice or reach out to your dedicated Connection Account Team today.  

]]>
The Power of User Profiling and... https://community.connection.com/the-power-of-user-profiling-and-connections-premium-landscape-optimization-process/ Oct 10, 2023 Laura Cox https://community.connection.com/author/laura-cox/ https://community.connection.com/wp-content/uploads/2023/10/2355519-The-Power-of-User-Profiling-Blog.jpg

In today’s technology driven world, Microsoft licensing can be highly complex. Trying to figure out which product suites contain all the functionality and feature sets your organization needs can be challenging. The old adage of a “one-size-fits-all” mentality in technology is not smart, cost effective, or productive. Especially now, when Microsoft offers so many Office suites, both on premises and in the cloud. Why wouldn’t you want to map out the correct product needs for each user group inside your company based on actual needs and usage?

There is real value in understanding your customer and all the different user groups within your organization. To know which products they are using—and what they truly need to do their jobs and to do them well—is imperative. Take, for example, the CEO of a global company. He may have specific Microsoft product needs that would require a Microsoft 365 E5 license for availability and extra security when he travels. Or we can break it down by vertical—say manufacturing—where you can have a floor worker who shares a kiosk workstation with other users during opposite shifts. These users may need Microsoft 365 F3 as they use Office Online only. In that same manufacturing example, you have Finance and HR, which would typically fall into your general knowledge user, so Microsoft 365 E3 might be the right fit for them. As we see our customers make these key decisions, it’s important to understand these end-user use cases to map the correct technologies to the correct people with precision. 

That’s where my team comes in. The XLO Team offers User Profiling Workshops as part of our Microsoft Landscape Optimization (MLO) Premium Assessment. Through a series of workshops, the MLO Premium Assessment will provide clarity and insight on your Microsoft investment strategy, while also showing a tactical approach based on your options. Evolving technology as well as the variations of modern work environments—such as virtualization, supporting a remote or hybrid workforce, security, and cloud—make these strategic decisions more important than ever for successful outcomes, and user profiling is a big part of that process.

During the User Profile Workshop, we talk with customers about how to define the various types of Microsoft users in their organization. Based on needs and usage, we map out various cost scenarios—taking into account current and future projects—to help determine which products are best suited for them and the most cost-effective option available. We are able to compare the costs associated with the Office suite with the required additional products of the top-tier Microsoft suites. From a return-on-investment standpoint, when customers go through this profiling workshop, we tend to see a much higher technology adoption rate and greater collaboration in Teams, leading to increased business efficiencies.

The next time you’re faced with a big Microsoft decision such as an agreement renewal, it’s vital to take a step back and look at your people and how they use their Microsoft technology. These technologies evolve by the day, so it's important to understand your options by breaking it down to the core of who needs what tools to succeed. You’ll have happy people, with the latest technologies at their fingertips, driving efficiency and profitability for your organization!

Reach out to your Connection Account Team for more information on the User Profiling Workshop and our Microsoft Landscape Optimization Premium Assessment. For more information, check out our vlog below.

https://youtu.be/4g5Ij5-1Ks4

]]>
Top Ten Technology Product Picks for October... https://community.connection.com/top-ten-technology-product-picks-for-october-2023/ Oct 09, 2023 Wilson Nunnari https://community.connection.com/author/wilson-nunnari/ https://community.connection.com/wp-content/uploads/2023/10/2350054-Oct-Top-Products-BLOG.jpg

As we transition into fall and the weather continues to change, check out these top products of the month for great deals for school and work readiness. This month, Connection presents some of our best monitors and storage to get you and your business ready for autumn. Read our Monitor Buying Guide and Storage Buying Guide to help you make the smartest investment for your work life. Check back often for our most popular technology products and the best deals Connection finds for you.


MSI Gaming Monitor

  • 24" curved display
  • FreeSync technology
  • HDMI, DisplayPort connectors
  • 3000:1 contrast ratio

Get the best visuals on your victory with the MSI Gaming Monitor. With FreeSync technology and a fast refresh rate, this MSI monitor can keep up with your fastest game play. And a high contrast ratio means stunning visuals and sharp colors so you can always see what’s around the next corner. Pick up this powerful gaming monitor today and save big! Check out our Gaming Technology page for more gaming considerations and solutions.


1TB Seagate LaCie Rugged Portable Hard Drive

  • Drop, liquid, and crush resistance
  • 130Mbps data transfer rate
  • USB-C port

Protect your data with a rugged and portable external hard drive. Featuring a USB-C connector, the LaCie 1TB external drive has fast data transfer and is compatible with the latest computers. Its rugged design ensures your data stays safe with resistance to drops, liquid damage, and being crushed.


23.8" Dell HD Monitor

  • 23.8" widescreen display
  • 1920 x 1080 resolution
  • HDMI, DisplayPort, USB Type A and B

Supersize your desktop with a 23.8" Dell monitor. With its widescreen display, this monitor will enable you to multitask like never before. It features all the latest ports with HDMI and multiple versions of USB—in addition to its power connector. It also has the ability to reduce blue light with ComfortView Plus technology, saving your eyes and keeping you focused.


Logitech Wireless Desktop Keyboard and Mouse

  • Concave keys
  • Cushioned palm rest
  • USB Type A wireless receiver

Enhance your typing comfort with the Logitech Wireless Keyboard. It features concave keys, a comfort-enhancing cushion palm rest, and hyper-fast scrolling on the included mouse. All these features will improve your comfort and enhance your productivity.


14" HP EliteBook 845 G9 Laptop

  • 16GB RAM
  • 512GB storage
  • USB Type A and C, HDMI 2.0, and stereo connectors

Featuring an AMD Ryzen 7 processor, the HP EliteBook 845 G9 has the power to help you get your work done with ease. This rugged business laptop features enhanced system and graphic performance and is ideal for mobile professionals. It perfects conferencing capabilities with HP Presence and supercharges your productivity on the go.


6TB Western Digital My Book Desktop

  • USB 3.0 connector
  • Up to 5Gbps data transfer speed
  • Password protection with hardware encryption

Get all the storage you will ever need with the WD 6TB Desktop Hard Drive. Compatible with Apple and Windows software, this hard drive has all the space you need for important files, photos, and videos and can be set to back up automatically in accordance with your schedule.


27" LG 4K Ultra HD LED-LCD Monitor

  • 27" 4K UHD display
  • HDMI, DisplayPort, USB Type C and A, stereo connectors
  • FreeSync Technology

This 27" LG Monitor is a powerhouse that features everything you need in a widescreen monitor. Amazing graphics with 4K Ultra HD resolution will accurately display anything you want. And the dual integrated speakers let you listen easily. And with great savings, you can enjoy all this technology without breaking the bank!


1TB WD Elements USB 3.0 Portable Hard Drive

  • USB Type A and C connectors
  • Up to 500Mbps transfer speeds
  • Small and light form factor for portability

The WD 1TB Elements Portable Hard Drive is a highly portable, technologically advanced external drive. Featuring USB 3.0, it has reliable and fast data transfer rates and universal connectivity. It offers great value and enough storage for almost any user!


Logitech K350 Wireless Keyboard

  • USB Type A wireless connector
  • Contoured palm rest
  • Wave sculpted keys

Look no further than the Logitech K350 Keyboard for a feature-packed wireless keyboard at a great value. Its ergonomic shape will prevent fatigue, and the palm rest delivers comfort for a long work day. Plus, it conveniently connects to your computer with a plug-and-play USB-A connector.


Brother HL-L2350DW Compact Laser Printer

  • Print speeds up to 32 ppm
  • 250-sheet capacity
  • Two-sided printing
  • Built-in wireless connectivity

The Brother Compact Laser Printer is a great value for compact productivity. With print speeds of up to 32 pages per minute and automatic two-sided printing, this printer will solve all your printing needs. It has a 250-sheet capacity, improving efficiency with fewer refills. Save today with this high-value printer!


Connection offers the best deals and variety of technology products for your work or home office. As we get further into fall, the preceding products will upgrade any professional space at a great value. For additional great products check out our Business Technology page.

]]>
The Power of Partnering with a Pro for AV... https://community.connection.com/the-power-of-partnering-with-a-pro-for-av-solution-success/ Oct 05, 2023 Jim Carter https://community.connection.com/author/james-carter/ https://community.connection.com/wp-content/uploads/2023/10/2343271-Blog-Post-CTS-D-BLOG.png

Organizations are adopting AV and conference room solutions at a rapid rate. The rise in hybrid work—along with technological advancements making AV solutions simpler and more affordable—are contributing to the growth of AV solutions.

As the adoption of these new technologies grows, so do the accompanying complications and risks. Organizations that do not work with an expert when designing and implementing their AV solutions risk ineffective and inefficient setups, wasted resources, security events, and more.

Connection can help overcome these challenges by providing customized, intuitive AV solutions. As Certified Technology Specialists, our expertise helps to ensure a seamless and successful AV implementation.

The Rise in Demand for Conference Room AV Solutions

The pro AV market is poised to grow by 90.51 billion USD from 2020 to 2025, a compound annual growth rate (CAGR) of 7.31%. We are seeing similar growth at Connection. In 2021, our Digital Signage Practice (DSP) achieved 41% growth, its highest sales level since its inception in 2008. 

This growth can be primarily attributed to two factors: the rise in hybrid and flexible workplaces, as well as the advancements in AV technology helping to make solutions simpler and more affordable.

Flexible and Hybrid Workforces 

The rise of hybrid workforces is one factor we’ve seen that’s led to an increased reliance on AV and conference rooms. With more than half of workers now hybrid, companies need reliable and effective tools for remote collaboration, virtual meetings, and seamless communication between on-site and remote teams. 

Although there is a greater need for collaboration technology to enhance the hybrid work experience, the quality of that technology remains lacking. In fact, less than 8% of the 90 million conference rooms worldwide are currently video enabled. As hybrid workforces continue to proliferate, organizations will need to adopt AV solutions that will allow all of their workers to feel like they are able to contribute in meetings equally—no matter where they are working.

Technology Advancements

Advancements in conference room technology is another factor that’s fueling the implementation of new AV solutions. High-resolution displays, improved audio systems, and other new technologies have all transformed the conference room experience. These innovations provide better quality, greater flexibility, and enhanced user experiences.

These upgrades have made AV solutions simpler and easier to use. For example, a separate piece of hardware used to be necessary to convert the video signal for streaming capabilities. Now, that can be done internally, by either a PC or as part of the internal compute of a complete sound bar solution.

AV technological advancements have also led to cost savings. While AV technology was once associated with high costs, advancements have made it more accessible and affordable. As prices for quality AV equipment decrease, a wider range of businesses can afford to integrate AV solutions.

Why Expertise Matters: The Complexities of AV/Conference Room Setup

Navigating the complexities of AV/IT conference room setup has become increasingly intricate. From selecting the right equipment to ensuring compatibility, optimal performance, and user-friendly interfaces, the end-to-end process can be fraught with risks—without the guidance of an expert. 

Risks of AV Design Without Expert Input

These are some of the specific setbacks that organizations who attempt to design and implement AV solutions on their own face.

Wasted Time and Decreased Productivity

Time and productivity in meetings consistently get squandered due to inefficient conference room equipment. In fact, around 15% of time spent in meetings is wasted, primarily due to inefficient conference room equipment. Difficulties like connecting to a display, launching video calls, or switching presenters during virtual meetings all waste time and productivity. 

Incompatible Equipment

Purchasing incompatible equipment that doesn’t work well with existing systems can result in frustrating issues like poor audio and video quality—or even complete system failures—during meetings. There are also several different idiosyncrasies that you may not be aware of until you’ve had the experience of designing multiple conference room spaces. 

For example, Teams only allows one camera, while Zoom allows multiple. If an organization decides down the road that they’d like to switch from Zoom to Teams, they’d only be able to access one of their cameras. Working with an expert ensures you’re up to date on these types of features of different systems, and that your new technology will work optimally with your existing setup. 

Purchasing the Wrong Equipment

Not purchasing the right equipment for the right space is another common pitfall. For example, organizations may not have the appropriate audio for the size of the conference room or experience an echo due to digital signal processing. They also risk not getting the right-sized display for their current setup, so people in certain areas have a hard time seeing the visual.

Incorrectly purchased equipment can result in wasted financial resources. You might end up spending money on components that don't meet your needs or can't be integrated into your existing infrastructure. 

For example, our AV/IT team recently worked with a company that experienced issues with their wiring diagram after working with a distribution partner. Since their issues weren’t fully apparent until after their 60-day warranty had ended, they had to pay for someone else to fix it. In addition to that added cost, they also spent a significant amount of time swapping out equipment that was bought as a mistake. 

Security Risks

AV equipment can be vulnerable to security risks. Without proper security measures, your AV system could become a potential entry point for cyberattacks. 

Experts can help to ensure you have essential security measures such as encryption, firewall configurations, or intrusion detection systems. They can also identify potential security vulnerabilities and set up proper access controls and authentication protocols to safeguard your systems. 

Navigating the Maze: How a Professional AV/IT Partner Can Help

Entrusting these tasks to an expert partner not only mitigates potential risks, but also guarantees a tailored solution that aligns precisely with your specific business needs.

Connection offers an extension to their well-established Digital Signage Practice, the  Collaboration and AV/IT practice segment. As such, we are able to provide a comprehensive solution and strategy, from design to deployment. These are the steps we take to ensure success.

Expert Assessments

Our team starts with a consultation to assess your space and needs for optimal AV setup. We take into consideration such factors as: how to best design a solution in accordance with the shape of the room, how many speakers to use in a room of a certain dimension, how far away a person would need to be to see a certain display, etc. Understanding these intricacies in advance ensures a smoother implementation process down the line.

Vendor-agnostic Recommendations

After assessing the space, we then select the best technology for your specific needs. This is based on our deep understanding of the latest AV equipment, their features, and their compatibility. 

We are vendor agnostic, so we deliver unbiased recommendations as to what makes the most sense for specific needs. This ensures a more seamless integration process and the best possible performance in the end. 

Customized Solutions

Depending on your unique requirements, we’ll design customized solutions that are tailored to meet specific needs. We focus on creating the most user-friendly interfaces and workflows by designing intuitive control systems that make it easy for users to operate the AV equipment, minimizing the learning curve and maximizing user adoption.

The Certified Technology Specialist: Ensuring Excellence

When selecting an AV partner, one of the most important elements to consider is whether they hold the CTS (Certified Technology Specialist) certification. In fact, according to the AVIXA® META: Pro-AV Channel Employment Reportmore than 80% of firms prefer or require CTS holders for higher level engineering and technician positions. 

To assure our clients that our specialists meet the highest industry standards, Connection’s Digital Signage, Collaboration, and AV/IT Practice regularly seeks out new certifications for its team of Business Development Specialists.

Recently, digital signage expert Jim Carter, Sr. Business Specialist for Collaboration and AV/IT, acquired the CTS-D (Design) certification. This specialized certificate has a pass rate of only 58% and ensures that clients receive the advanced design skills needed for complex AV projects that involve designing intricate and integrated systems.

Future-Proof Your AV Solutions with Connection

Professional AV/IT services are an essential investment in today’s evolving work landscape. With increasingly flexible work arrangements, well-designed AV spaces help to enhance collaboration and productivity, no matter where employees are working from.However, the complexity of AV design cannot be underestimated. The risks of implementing AV solutions without an AV/IT expert are substantial. That’s where Connection can help. Our expertise as Certified Technology Specialists ensures seamless, tailor-made, and intuitive AV solutions for future-ready conference rooms.

]]>
Migrate to the Cloud with Azure VMware Solution https://community.connection.com/migrate-to-the-cloud-with-azure-vmware-solution/ Sep 29, 2023 Makayla Mota https://community.connection.com/author/makayla-mota/ https://community.connection.com/wp-content/uploads/2022/12/1985808-AzureVM-BLOG-Feature-Image.jpg

Do you have a cloud migration strategy in place? With so many options and considerations, it can be an overwhelming process to say the least. Imagine a way to support an expanding remote workforce and the ability to anticipate data center changes all while seamlessly modernizing your workloads and remaining consistent in your operations. 

Built by Microsoft, the Azure VMware Solution (AVS) constructs a fast track to the cloud by migrating or extending existing VMware workloads from on-premises environments to Azure without the cost, effort, or risk of retooling operations. The struggle for organizations relying on on-premises infrastructures has always been keeping up with changes on-demand. AVS lets you move your workloads from your data center to Azure, thereby integrating additional Azure services while continuing to manage your IT environments with the same VMware tools and functionality you already know and love. Because you can choose which workloads to migrate and when, you are given flexibility to accelerate your cloud migration at your own pace.

Top Benefits 

Reduced IT Costs: Azure Hybrid Benefit can save you up to 80% by running your VMware apps on Windows Server and SQL Server licenses with Software Assurance to Azure VMware Solution. You can also receive free extended security updates for Windows Server and SQL Server 2008 and 2012 licenses with Software Assurance for three-plus years after the End of Extended Support date. Reduce costs even further by selecting one- or three-year Reserved Instances for Azure VMware Solution.

Data Center Consolidation: Consolidate your data center footprint when you reduce or retire your VMware-based virtual machines using a one-time redeployment. You can shift any or all vSphere workloads to Azure in a scalable, automated, and nondisruptive way and be assured of operational continuity without the complexity of refactoring.

Application Modernization: With AVS, you can keep managing your migrated environments with the same VMware tools you already know, while you are modernizing your applications with Azure-native management, security, and services. It's a simple and flexible way to take on modernization at your leisure. 

Security: AVS is Azure, so you can run your VMware platforms while feeling secure in your ability to protect your workloads with built-in controls and services across identity, data, networking, and apps. You will also get continuous protection from Microsoft Defender for Cloud. Security is always top of mind when supporting remote and hybrid workers and with more sophisticated threats on the rise, it is understandable to have concerns. Extend protection to hybrid environments and easily integrate partner solutions in Azure. 

Disaster Recovery: Did you know that by using a VMware Stack deployed in Azure, you are automatically setting up an on-demand disaster recovery site for an on-premises data center? The VMware Site Recovery Manager (SRM) brings proven data recovery capabilities to Azure VMware Solution by offering a streamlined experience for installation and lifecycle management directly through the Azure portal.

Ready to Get Started?

Our Connection Cloud Specialists are here to help you begin your journey. We will work with you to create, plan, implement, and expand your Azure environment using the same VMware tools and functionality you already know, allowing you to streamline and modernize your environment at your own pace. 

]]>
Windows 11 Pro Devices: Your Cybersecurity... https://community.connection.com/windows-11-pro-devices-your-cybersecurity-guardian-in-the-hybrid-era/ Sep 27, 2023 Ashley Lofaro https://community.connection.com/author/ashley-lofaro/ https://community.connection.com/wp-content/uploads/2023/09/2336221-Windows11ProDevicesCybersecurity-BLOG.jpg

Hybrid or “anywhere” work has become commonplace for business and technology professionals. Yet, this increased accessibility and flexibility in work locations have also ushered in a wave of new threats and risks.

Three quarters of security decision makers at the VP level and above feel the move to hybrid work leaves their organization more vulnerable to security threats. And cybersecurity issues and risks are top concerns for business leaders, who worry about issues like malware, stolen credentials, devices that lack security updates, and physical attacks on lost or stolen devices.

New Windows 11 Pro devices are well-positioned to take on these security challenges brought on by the new era of hybrid work. With simple deployment and advanced security protection, the time to upgrade to Windows 11 is now.

Windows 11 Pro Upgrade: A Simple and Seamless Deployment

Windows 11 Pro is built on the same foundational architecture as Windows 10, providing the basis for a smooth and straightforward upgrade. Additionally, Microsoft has designed Windows 11 Pro to be compatible with 99.7% of apps, meaning that practically all of the apps you're used to on your previous OS will continue to work.

Neglecting OS version updates is especially inadvisable. Once an update has been released, OS vendors only continue supporting the previous version for a limited time. This will soon be the case for Windows 10 as a whole; end of support for Windows 10 is on October 14, 2025.

To ensure a seamless upgrade by the designated time, companies should initiate the process now. This begins with ensuring that you have the necessary foundation, which entails addressing two key questions: "Do we possess the required hardware?" and "Will our apps be compatible?"

Do We Have the Necessary Hardware?

Windows 11 needs to operate on relatively newer hardware. Here’s an overview of some of the key minimum requirements:

  • RAM: 4 gigabytes or more
  • Processor: Minimum of 1 gigahertz or faster with 2 or more cores on a compatible 64-bit processor
  • TPM: Trusted Platform Module (TPM) version 2.0. Check here for instructions on how your PC might be enabled to meet this requirement.
  • Graphics card: Compatible with DirectX 12 or later with Windows Display Driver Model 2.0
  • Display resolution: High-definition (720p) display that is greater than 9" diagonally

See the full list of Windows 11 requirements, including feature-specific requirements like a sensor for presence detection, and a speaker and microphone for modern work. To easily check for compatibility, you can run Microsoft’s PC Health Check app.

Are My Apps Compatible?

After verifying that your hardware and systems meet the Windows 11 requirements, the next step is to determine if your apps will be compatible with Windows 11 Pro.

Fortunately, Windows 11 Pro is designed with 99.7% compatibility, so virtually all the apps you were accustomed to using on your previous operating systems will continue to function seamlessly. For Windows 10 users, line-of-business software is also compatible.

For added assurance of compatibility, the App Assure program was designed to assist Microsoft users in resolving any application compatibility issues before upgrading to Windows 11 Pro. Moreover, Test Base helps businesses to validate and test their applications on secure virtual machines before transitioning to Windows 11 Pro.

Windows 11 Pro Devices: Powerful Security from Chip to Cloud

Companies can receive the best security protection by deploying new modern Windows 11 Pro devices with security protection built in.

With phishing safeguards, passwordless security, and app control, organizations report a 58% drop in security incidents with Windows 11 Pro devices compared to Windows 10. Additionally, 2.8 times fewer instances of identity theft are reported.

Built upon the zero-trust model, modern Windows 11 Pro devices focus on giving the right people the right access at the right time, based on these three core principles:

  1. Verify explicitly: Reduce risk by explicitly verifying data points such as user identity, location, and device health for every access request, without exception.
  2. Use least privileged access: When verified, give people and devices access to only necessary resources for the necessary amount of time.
  3. Assume breach: Operate in a manner that minimizes blast radius and segment access. Vary end-to-end encryption, and use analytics to get visibility, drive threat detection, and improve defenses.

Windows 11 Pro Devices: Security at Every Level

In line with the zero-trust model, new modern Windows 11 Pro devices build security in to every level—from the core of your PC, all the way to the cloud. Below are some of the new security features and capabilities in Windows 11 Pro

Hardware

Receive built-in hardware protection out of the box with Windows 11 Pro devices through:

  • Hardware root-of-trust: Protect critical resources such as Windows Hello with a hardware-based root of trust. Windows Defender System Guard helps protect and maintain the integrity of the system as it starts up and validates that system integrity has truly been maintained through local and remote attestation.
  • TPM 2.0: The tamper-proof Trusted Platform Module (TPM) is now standard in today’s Windows 11 Pro devices. This chip provides specialized encryption features and enables upgraded cutting-edge security functions.
  • Microsoft Pluton: Microsoft Pluton offers extra protection for data-sensitive scenarios. Pluton technology is integrated directly into the PC's processor, hardening new Windows 11 Pro devices with ongoing protection for identities, data, and applications.
  • Virtualization-based security: To safeguard user credentials and essential system functions, virtualization-based security (VBS) and hypervisor-protected code integrity (HVCI) are already enabled on new Windows 11 Pro devices. VBS protects against malicious exploits by hosting a secure kernel separated from the operating system.
  • Secured-core PCs: Secured-core PCs come with the advanced security features of Windows 11 Pro turned on, protecting your most sensitive data from advanced firmware-level attacks. These devices are recommended for people handling sensitive data like intellectual property, financial records, or classified information.

Operating System

Guard your system and information from the moment it starts up with these Windows 11 Pro measures:

  • System security: Powerful system security safeguards credentials, code integrity, and network access. When a Windows 11 Pro device starts, Secure Boot and Trusted Boot work together to prevent malware and corrupted components from loading.
  • Virus and threat protection: Windows 11 Pro delivers intelligent protection against viruses and other threats. One of the ways is through the vulnerable driver blocklist, enabled by default on new devices, which prevents vulnerable versions of drivers from running.
  • Network security: Windows 11 Pro offers multiple layers of protection to strengthen network security. Windows Defender Firewall is one that reduces the attack surface of a device, safeguards sensitive data, and extends the value of existing investments.
  • Encryption and data protection: BitLocker and Windows Information Protection reduce the risk of lost or stolen data with advanced encryption.

Application

Combat common application attacks from the moment a device is provisioned with app security features such as:

  • Smart App Control: Adding significant protection from new and emerging threats, new Windows 11 Pro devices automatically ship with Smart App Control to block malicious or untrusted apps.
  • Defender Application Guard: Using virtualization-based security (VBS), Application Guard isolates untrusted websites and Microsoft Office files in containers.
  • Defender Application Control: To control what apps and drivers run on managed Windows 11 Pro devices, Windows Defender Application Control (WDAC) isolates enterprise-defined untrusted websites in virtual containers and helps prevent old and newly emerging attacks.

Identity

Protect access to sensitive information and safeguard identities with the latest security innovations like:

  • Enhanced phishing protection: Enhanced phishing protection with Microsoft Defender SmartScreen helps thwart credential theft by warning users when they enter their Microsoft credentials into a malicious website.
  • Passwordless security: Windows Hello for Business allows you to lose the passwords and sign in with PIN, face, or fingerprint.

Cloud

Extend security to the cloud to help protect devices, data, apps, and identities from anywhere. Some capabilities include:

  • Modern Device Management (MDM): Windows 11 Pro devices support MDM so that IT pros can manage company security policies and business applications without compromising user privacy on corporate or employee-owned devices. Connection partners with Microsoft to offer MDM services that help organizations improve security and service delivery while ensuring that all devices comply with corporate rules and policies.
  • Remote wipe: Windows 11 Pro devices support the Remote Wipe configuration service provider (CSP) so that MDM solutions can remotely reset the device and remove user accounts and data, reset the device and clean the drive, and reset the device but persist user accounts and data in the case of a lost or stolen device.

Securely Embrace the Future of Work with Windows 11 Pro Devices

As hybrid workforces grow and cyber threats advance, Windows 11 Pro emerges not just as an upgrade, but on new modern devices, as a guardian of your security. With simple deployment and advanced security protection—from your PC all the way to the cloud—Windows 11 Pro devices provide the assurance you need to enable secure hybrid work.

To learn more about how Connection can help with your Windows 11 Pro device refresh, contact us today.

]]>
It’s All about the GPUs https://community.connection.com/its-all-about-the-gpus/ Sep 26, 2023 James Rust https://community.connection.com/author/james-rust/ https://community.connection.com/wp-content/uploads/2023/09/2334614-BH-GPU-Manufacturing-BLOG.png

GPU usage in the data center has been steadily growing for the past few years and now accounts for 46.1% of the revenue share in the data center.1 This number is only expected to go up—and with good reason. The parallel processing power of a GPU is exponentially greater than that of a CPU: a typical CPU has less than a hundred cores, while GPUs can have thousands. Their high bandwidth allows them to access data quickly and complete processing for complex computations far better than a traditional CPU. All these advantages have changed the landscape in data processing, but a GPU in a data center is no longer enough.

GPUs at the Edge

Thanks to the incredible amount of data generated by industry 4.0 technology, computations have been moved to the edge to save bandwidth and lower energy consumption. By offloading computationally intensive tasks to GPUs, edge devices can improve their performance and responsiveness while reducing the amount of data that needs to be sent to the cloud. Naturally, GPUs have started to see higher use at the edge, especially when processing data generated from smart cameras, self-driving cars, and medical devices.  In many cases, these computations need to be processed as quickly as possible to make real-time decisions. As a result, GPUs have seen increasing usage. 

Quicker Decisions 

This kind of computational power enables the processing of 2D images (nothing more than a large data set to a computer), allowing computer vision applications to function. For example, GPUs can process images and videos from smart cameras in real time. This can be used for facial recognition, object detection, quality control, and traffic monitoring tasks. GPUs can also be used to analyze data from industrial robots to improve their performance and safety. As edge computing grows, GPUs will play an increasingly important role in enabling these and other applications in manufacturing. GPU prices are dropping, but this trend may not last with the rise of AI applications in business. Investing in the data center now may be the best bet for those looking to take full advantage of the promise of Industry 4.0.

Collaboration Is the Key to Implementing Complex Solutions

Bringing GPUs to the edge is by no means easy. High-performance tools generally demand more energy and space, and GPUs are no exception. Another challenge is the high heat generated by the devices, and plenty of factory floors still lack climate control. It can be difficult to consider everything when outfitting a new solution, which is why Connection works with so many partners to ensure our customers have everything they need from the right edge compute solutions inclusive of fanless and industrial hardware designed to perform in any manufacturing environment. 

If you’re looking for ways to decrease your data cost or need to ramp up your infrastructure for industry 4.0 applications, engage Connection’s Manufacturing Practice today to get started. 

]]>
Modernize Your Data Center with AMD https://community.connection.com/modernize-your-data-center-with-amd/ Sep 26, 2023 Ephraim Gehr https://community.connection.com/author/ephraim-gehr/ https://community.connection.com/wp-content/uploads/2023/09/2339548-Modernize-Your-Data-Center-with-AMD-BLOG.jpg

There are three major pain points that customers are facing in their environment. Software licensing costs, heating/cooling costs, and green initiatives are on the top of everyone’s mind. The push to maintain a higher level of service while reducing operating costs is a driving reason we look to new technologies for answers. Corporate green initiatives mean every watt must be utilized efficiently. Cuts must be made to consumption of resources.

Overpaying for Software Licensing Fees

Software licensing fees are based on the number of cores you have in a server. It’s well known that software licensing costs are ten to forty times more than the cost of the server on which it resides. If we can reduce the core count while maintaining the required performance of your server, we can save your company a great deal on software fees. Condensing more performance into the latest 5nm based 4th gen AMD EPYC™ processors allows us to do precisely that. This can be accomplished in server offerings from all the major server OEMs. Use this savings to refresh a cluster or to upgrade software to solutions that provide more automation and reduce maintenance demands on your IT department staff. Bottom line—use the latest technology from AMD to improve your operating efficiencies.

Consuming Too Much Power and Cooling for Data Centers

When a one processor system can accomplish more work than two, we reduce the number of cores. Doing so reduces the data center footprint. With the exponential increase in data businesses are generating, more can be housed in the same footprint. This drives down costs associated with real estate, power consumption, and cooling. And with AMD EPYC™ processors all in one feature, you get the same I/O, memory, and memory bandwidth to accomplish your goals—regardless of the number of cores you configure.

Meeting Company Sustainability Initiatives

More companies are adding green initiatives. Ken Bartels, AMD-focused Technical Sales Executive at Connection, has this to say: “When comparing integer performance for a recent large data center opportunity, we found that AMD Genoa (4th generation) over AMD Milan (3rd generation) has a 35% better performance per core in an example workload. AMD’s latest generation also provided a 22% improved performance per watt.” Using AMD’s TCO tool, we can calculate CO2 emissions you will reduce and kWh saved by making the move to advanced server solutions powered by AMD EPYC™. Let us help you attain those goals with the most efficient data center processors from AMD. You can learn more about how AMD helps meet sustainability goals on their blog.

Help Navigating Your Next Data Center Refresh Is Available

Whether it’s a single server or complete data center refresh, keeping data center costs down while delivering more value to your company is more critical to overall business success than ever before. Meeting more stringent green initiatives sets your company apart from competitors. AMD EPYC™ powered solutions from Connection can make those impacts to your TCO. Take a look at the newest case studies to see what EPYC is doing for customers like you. Get more information on AMD EPYC™ based data center solutions from Connection. Then reach out to your Account Manager and request an AMD TCO Analysis to get started.

]]>
Flying the Friendly Skies with Microsoft Copilot https://community.connection.com/flying-the-friendly-skies-with-microsoft-copilot/ Sep 19, 2023 John Ryan https://community.connection.com/author/john-ryan/ https://community.connection.com/wp-content/uploads/2023/09/2329277-Microsoft-Blog.jpg

When I hear the word “copilot,” I immediately think about airplanes and passenger jets, and how flying a plane safely requires both a pilot and a copilot. In commercial aviation, there is a distinct rank and order between these two roles, with the pilot being a licensed, experienced professional, acting as the final decision-maker while onboard. They are tasked with remaining calm under pressure, operating, and controlling their aircraft according to planned flight paths and during takeoffs and landings—while simultaneously monitoring the numerous systems present and required to keep an airplane safely in the sky. The copilot has similar roles and responsibilities, most importantly that they take their orders from the pilot. Copilots can also fly the plane if the pilot is unavailable, take the lead on radio communications, assist with flight planning and navigation, acquire weather briefings, monitor the plane’s instruments and systems, and keep the pilot aware of the status of these details. Essentially, the pilot and copilot are responsible for moving an airplane and its contents from one defined place to the next.

When it comes to Microsoft Copilot, I see a similar division of labor between the human individual who is in charge of what information goes into their Microsoft environment (aka, the Microsoft Graph—made up of data in your Microsoft Cloud Services such as Teams, Word, Excel, PowerPoint, Outlook, etc.) and what this individual tasks their copilot with via ChatGPT, the AI-powered Large Language Model chatbot and digital assistant. Taking this view helped me understand the meaning and power of Microsoft Copilot—and reduced my initial hesitation of using it!

You Will Always Be the Pilot

There is a certain creativity factor that we as human “pilots” bring to the forefront of what we do with our data that Microsoft Copilot will never have; this is the unmistakable difference between the human brain and AI. Microsoft Copilot does not make you smarter. You do not teach Copilot or make it smarter either—it does not learn from your data, your queries, or your inputs. Copilot does not make you more creative, but it can help you review and compile and format years and volumes of research into a more organized and easier to understand outline, or a rough draft. It does this by tapping into ChatGPT’s machine learning algorithms, which have been trained with data from the Internet.

Imagine the Possibilities of Working Together

Copilot is going to enable us to save so much time when searching for compelling, relevant information. But it is particularly important to note that getting the most from Copilot will require practice, particularly when wording requests. Copilot has no imagination, so you—the end user, the pilot—must use your creativity to get the most from Microsoft Copilot. Microsoft Copilot will access the data, your data, that has and always will contain the biases of the sources; however, the immeasurable benefits of harnessing the power of Microsoft Copilot within your organization will be worth your time and effort. Imagine being able to pull together and summarize hundreds of pages of text for your next research project, having help to create the first draft of your findings in a PowerPoint slide (even though you are terrible at PowerPoint), and then, translating it all into a language you have never spoken. The thought of that absolutely amazes me!

Outputs and creations like this clearly indicate how AI users will have an advantage over non-users, even though AI will always need guardrails in place to tease out biased or false information. The ability we have as the “pilots” to separate any false information from meaningful and actionable insights and put that into practice for the future good of humankind is truly a thing to behold. Stay tuned for more Copilot information from Connection.

]]>
Tackling Tech Challenges with Our TIDC https://community.connection.com/tackling-tech-challenges-with-our-tidc/ Sep 12, 2023 Steven Crowthers https://community.connection.com/author/steven-crowthers/ https://community.connection.com/wp-content/uploads/2023/09/2312822-TIDC-BLOG.jpg

Businesses today are experiencing a myriad of challenges as they attempt to configure, integrate, and deploy a high volume of new technologies. They are navigating complex integration processes, a lack of system standardization, resource constraints, legacy systems, cost overruns, and security concerns, among other obstacles. 

The escalating costs directly related to these challenges are significant. Poor integrations and lack of resources are costing businesses around $500,000 per year. For a more streamlined, scalable, and cost-effective configuration and integration process, organizations are in need of expert support.

Connection’s state-of-the-art Technology Integration and Distribution Center (TIDC) is well-positioned to provide that support. With an unwavering level of commitment to customer success, we design completely customized and tailored solutions to address these key challenges.

Our success can be attributed to two key principles: taking a customer-centric approach and embracing lean manufacturing principles and agile operations. Ultimately, these processes yield big business benefits for our customers, including streamlined processes, increased security, and accelerated growth, among others. Here’s how our unique approach helps to make that happen.

The TIDC Recipe for Success: A Customer-centric Approach and Agile Operations

The TIDC is widely recognized as a leading IT services and solutions provider, in large part due to our two-prong approach: leading with customer-centric and customer experience models and embracing lean manufacturing principles and agile operations.

Customer-centric and Customer Experience Models

At the TIDC, our foremost priority is the satisfaction and success of our clients. We have developed a customer-centric and customer experience model that lies at the heart of our operations. This model includes four main components:

  • Proactive support: Anticipating customer needs and resolving issues before they become problems, helping to enhance customer satisfaction and reduce potential negative impacts on the customer experience.
  • Continuous improvement: Regularly analyzing customer feedback, metrics, and data to identify areas for improvement and continually refine the customer experience.
  • Empowered employees: Creating a customer-centric culture starts from within the organization. Empowering employees to take ownership of customer interactions and providing them with the necessary training and tools to deliver exceptional service.
  • Consistency and reliability: Building trust with customers by consistently delivering on promises and ensuring a reliable experience across all interactions.

Each customer has unique business objectives, technology infrastructure, and operational requirements. By deeply understanding our clients’ needs, preferences, and pain points, we can tailor our offerings to exceed their expectations consistently. This delivers more value and ensures that customers get the most out of their investments.

For example, we recently worked with a client that was operating in a highly regulated industry, facing stringent data security requirements during their system integration. The TIDC implemented robust security measures and compliance protocols, ensuring that all data exchanges were secure and in line with industry regulations.

Another enterprise client of ours had a complex IT landscape, with multiple legacy systems and modern applications that needed to communicate seamlessly. The TIDC’s deep expertise in handling diverse technologies enabled a successful integration, improving overall operational efficiency.

Because of the TIDC’s customer-centric approach, we were able to deliver tailored services and solutions that aligned seamlessly with our client’s business goals and optimized their end-user experience.

Lean Manufacturing Principles and Agile Operations

The TIDC has also embraced Lean Manufacturing Principles, a systematic approach to optimize processes and eliminate waste, ultimately improving the efficiency and effectiveness of operations. Several principles underpin Lean Manufacturing, and some of the key ones are:

  • 5S Methodology: The 5S methodology consists of five Japanese terms: Seiri (Sort), Seiton (Set in Order), Seiso (Shine), Seiketsu (Standardize), and Shitsuke (Sustain). This principle aims to create a clean, organized, and standardized work environment, reducing wasted time and resources while enhancing safety and productivity.
  • Visualization Toolsets: Visual management tools are used to provide real-time information on key performance indicators (KPIs), progress, and issues. Visualizing data and processes helps teams identify bottlenecks, inefficiencies, and opportunities for improvement.
  • MDI (Managing for Daily Improvement): MDI involves conducting regular short meetings to discuss performance metrics and improvement initiatives. These daily huddles foster a culture of continuous improvement, enabling teams to address challenges promptly and make data-driven decisions. The process enables continuous enhancement of our workflows and ensures that we stay ahead of the curve.

We have gained remarkable benefits by integrating these principles into our operations, including:

  • Improved product quality: By reducing waste and streamlining processes, Lean Manufacturing helps maintain consistent product quality, ensuring customers receive reliable and defect-free products.
  • Faster delivery times: Lean principles optimize production and distribution processes, leading to faster turnaround times. Customers benefit from shorter lead times, receiving their orders promptly.

For example, we recently helped a client who had a tight deadline for integrating their new software with existing infrastructure. The TIDC’s quick deployment and efficient project management ensured a timely integration, preventing disruptions to their day-to-day operations.

  • Enhanced flexibility: Lean practices enable companies to respond quickly to changes in customer demand, allowing for greater flexibility in accommodating varying requirements.

For example, we recently worked with a client who required a scalable and cost-effective solution to integrate their e-commerce platform with their back-end inventory system. The TIDC’s scalable architecture enabled them to handle a growing customer base seamlessly, leading to increased sales and revenue.

  • Lower costs: By eliminating waste and inefficiencies, Lean Manufacturing reduces operating costs. This cost optimization can result in more competitive pricing for customers.
  • Increased customer satisfaction: Consistent product quality, faster delivery, and better responsiveness contribute to improved customer satisfaction and loyalty.
  • Customization: Lean principles can enable efficient customization of products and services, meeting individual customer needs effectively.

For example, a medium-sized enterprise that we recently worked with needed to integrate their CRM, ERP, and inventory management systems to optimize their operations. The TIDC’s expert team designed a custom integration solution that streamlined processes, resulting in a significant reduction in operational costs and improved customer satisfaction.

  • Sustainability: By reducing waste and resource consumption, Lean Manufacturing aligns with sustainability goals, appealing to environmentally-conscious customers.

Overall, the implementation of Lean Manufacturing principles benefits both companies and customers. It drives continuous improvement, streamlines processes, and ultimately delivers higher value products and services, ensuring a positive experience for customers.

Seamless and Affordable Technology Integrations Through  the TIDC

By leveraging a customer-centric experience model and Lean Manufacturing Principles, Connection has consistently driven success for our customers and allowed them to achieve better outcomes. Our approach not only has established the TIDC as a true differentiator in the IT services industry, but also enables us to exceed client expectations, deliver innovative solutions, and propel their business growth.

To discuss how the TIDC can bring value to your organization and support your IT services requirements, contact a Connection expert. We’ll help to streamline the configuration, deployment, and support of your IT today.

]]>
TechSperience Episode 120: How to Modernize... https://community.connection.com/techsperience-episode-120-how-to-modernize-your-data-center-and-save-big-with-amd/ Sep 09, 2023 Connection https://community.connection.com/author/connection/ https://community.connection.com/wp-content/uploads/2023/09/2339548-AMD-DataCenter-Podcast-BUZZ.jpg

Modernizing your data center is crucial to your organization's long-term success. In this podcast, we'll better define what data center modernization can look like for different organizations, talk through some of the ideas and promises from AMD, and offer up stories of where teams can succeed.

Host: James Hilliard

Guests: Kristin Hintlian – AMD Channel Sales Manager for Connection

Ken Bartels – Connection Technical Sales Executive for AMD

Show Notes:

[0:45] Modernization can mean a lot of different things to a lot of different people. What does a modern data center mean to customers?

[2:37] Are newer companies also looking to modernize due to how quickly the market is moving?

[4:40] What are some of the biggest and smallest data centers that you've been to, and how have they been able to modernize?

[7:00] What are the "people" challenges when modernizing data centers?

[11:40] Organizations are facing three big challenges surrounding data center modernization: needing better performance, reducing energy consumption, and reducing software licensing fees. How does AMD address these challenges?

[17:45] What cost savings in software licensing fees are customers seeing?

[19:35] Are there specific industries that are leading the modernization charge?

[21:50] What are some of the ways teams that have modernized with AMD have been able to push their healthcare organization forward?

[24:40] What are some examples in the manufacturing space where AMD has been able to help companies move forward?

[27:35] Walk us through some typical customer interactions in terms of how they can get an overall cost of ownership view of where they are at vs. adding new technologies.

[30:40] After the initial TCO analysis is completed, how can customers then get a good roadmap of how to get started based on their business goals?

[32:45] Reach out to your Connection account team for a TCO analysis to see what your data center modernization journey could look like.

]]>
Azure Virtual Desktop: Connection Managed... https://community.connection.com/azure-virtual-desktop-connection-managed-services/ Sep 06, 2023 Makayla Mota https://community.connection.com/author/makayla-mota/ https://community.connection.com/wp-content/uploads/2023/09/2314800-AVD-BLOG.jpg

How is your organization providing remote access to desktop environments?

Azure Virtual Desktop (AVD) is a Desktop as a Service (DaaS) solution provided by Microsoft as part of the Azure cloud-computing program. It allows organizations to create and manage virtualized desktop environments in the cloud, enabling them to deliver Windows desktops and applications to end users on various devices such as computers, tablets, and smartphones. With so many organizations continuing to embrace hybrid working environments, AVD is a useful way to provide remote work solutions like delivering legacy applications, consistency across desktop experiences, and secure access to confidential and sensitive data. 

Key features of AVD that enable you to create a scalable and flexible environment:

  • Create a full desktop virtualization environment in your Azure subscription without running any gateway servers.
  • Publish host pools as needed to accommodate diverse workloads.
  • Bring your own image for production workloads or test from the Azure Gallery.
  • Reduce costs with pooled, multi-session resources. 
  • Provide individual ownership through personal (persistent) desktops.
  • Manage costs by using auto-scale to automatically increase or decrease capacity based on time of day, specific days of the week, or as demand changes.

Ready to Get Started?

Connection is a Microsoft-certified Azure Expert Managed Service Provider, and we are here to help you design, implement, and manage your AVD environment. Our AVD Managed Service supports your organization through five core components:

  1. Managed Implementation: Whether you need management for a new environment or an existing infrastructure, your Connection Account Team will configure and administer every aspect of your AVD. 
  2. Cost and Performance Optimization: We will help to auto-scale resources to make your performance more efficient, while reducing compute and storage costs by adjusting resources to user demand.
  3. Security and Compliance: By enabling Azure Active Directory multi-factor authentication (MFA) and conditional access, Connection will ensure that your environment is safe. We also provide network security, anti-virus configuration, and operating system patch management.
  4. Image Creation and Management: We will assist you in the creation of desktop images from gallery, VM, or existing custom images and manage AVD image host pools, versioning, backup, and disaster recovery.
  5. Monitoring and Support: Take advantage of our proactive incident and problem management. Your AVD environment is backed by our 24 x 7 x 365 customer support team of engineers who are certified Azure Experts.

Azure Hybrid Benefit

As you consider migrating to Azure to support your organization’s remote workers through AVD, you may also want to take advantage of Azure Hybrid Benefit to offset costs if you qualify. If you have existing on-premises Windows Server or SQL Server licenses with active Software Assurance or Linux licenses, you can bring those licenses to Azure and create a more cost-effective way to maintain a flexible hybrid environment. By reusing your existing licenses with Azure Hybrid Benefit, you’re only paying for the additional infrastructure, whereas, with cloud services from other providers you would be required to pay for both the infrastructure and the server licenses. 

How Can You Qualify for Azure Hybrid Benefit through Connection? 

  • Achieve Cost Savings by applying your existing Windows Server, SQL Server licenses, and Linux subscriptions to Azure Hybrid Benefit. Customers can realize up to 76% in savings with Azure Hybrid Benefit for Linux.1
  • Modernize and Manage a Flexible Hybrid Environment by utilizing Azure services with your on-premises infrastructure. Connection can help you modernize and manage your infrastructure and test cloud specific services with Azure solutions.
  • Leverage adjacent Azure services and benefits with Azure Hybrid Benefit. Offers and updates are available to maximize cost savings and optimize your business applications.

Your Account Team at Connection can help you navigate your Azure needs, from migrations to benefits and the optimization of your environment.

1The 76% savings is based on one standard D2s v3 Azure VM with RHEL or SLES subscription in the East U.S. region running at a pay-as-you-go rate vs a reduced rate for a 3-year Reserved Instance. Based on Azure pricing as of October 2022. Prices subject to change. Actual savings may vary based on location, instance type, or usage.

]]>