Connection Community https://community.connection.com/ Official Technology Community of Connection Wed, 29 Nov 2023 16:04:20 +0000 hourly 1 https://wordpress.org/?v=6.4.1 Microsoft Surface: Built to Bring Out the... https://community.connection.com/microsoft-surface-built-to-bring-out-the-best-of-windows-11/ Nov 29, 2023 Microsoft https://community.connection.com/author/microsoft-author/ https://community.connection.com/wp-content/uploads/2023/11/2408921-Windows11-Surface-BLOG.jpg

Together, Surface and Windows 11 deliver a powerful combination of elegance and engineering. Microsoft’s product developers and usability experts collaborated closely to ensure Surface meets the demands of the modern workplace. The result connects people and their ideas together better, while delivering operational confidence thanks to its robust security and simple management.

A Host of Reasons Why Surface Makes Sense for Your Business

Surface devices are purposely designed for employee productivity—that’s certainly part of the equation. That design, however, takes employee experience seriously, resulting in hardware that workers are proud to carry around. They’re lightweight and thin. Surface and Windows 11 are designed to adapt to each other as the user changes postures, optimizing the experience as a tablet, as a laptop, as a desktop—effortlessly switching automatically between modes. When the Pen is removed, the Pen menu instantly opens.

The display and sound quality make it feel like everyone is in the same room when collaboration is needed. And Surface devices deliver power, performance, and connectivity to ensure employees are free to create and innovate anywhere and anytime.

The ways in which Surface delivers all this are too many to cover, but it’s worth taking a look at an example in more detail. Microsoft engineers wanted Surface to have even more processing power, but they also wanted to increase battery life and performance. On top of that, the designers wanted an even slimmer, lighter form factor.

They achieved it through subtle innovations. For example, when an employee switches to inking, the display automatically increases to 120Hz to provide an optimal experience with the haptic pen. As soon as the Surface is changed to a different mode, the display reverts to 60Hz to reduce battery load. For all these challenges, Surface’s 61% longer battery life on average1 keeps employees working longer between charges.

Explore how Surface's productivity innovations give employees the tools to succeed.

Surface Provides Proven Security

Enhanced employee productivity is just the beginning. Today there’s more and more pressure on IT to make flexible work possible, with increased cyber threats, tight budgets, and distributed employees adding to the challenges. It’s remarkable, then, that organizations report a 58% drop in security incidents with Windows 11 Pro devices.2

That’s made possible by the fact that Microsoft maintains all of the code in the Surface security stack, from firmware to the operating system to the cloud. It’s this unique advantage that creates a holistic approach to endpoint security. Surface devices run the most secure Windows operating system ever, and the CPUs have crypto-processor security measures built in. The combination of Windows 11 and Surface security innovations gives you unprecedented resilience.

Get more detail on how Surface and Windows 11 can help keep your employees and organization safe.

Surface Means Agility and Efficiency for Your IT Teams Too

The pressure on IT staff doesn’t stop with security. Deploying new hardware and maintaining it is a constant effort. Microsoft’s same innovative approach to usability and security is evident here as well: it’s easier than ever to deploy and manage Surface, resulting in 25% faster deployments and 80% fewer helpdesk calls.3

Those savings are thanks to Windows Autopilot, designed, engineered, and tested on Surface to provide a zero-touch deployment experience. Each Surface device arrives from the factory with Windows Autopilot already enabled. And management is easier than ever with Microsoft Intune, the single centralized solution for IT admins to self-serve, manage, and monitor all your Surface devices.*

All this is made possible because Surface has been engineered to work with Windows Autopilot in ways that both increase security and decrease management effort, allowing IT to fully manage Surface devices from Windows 11 down to firmware through a single cloud-based portal.

Boost your IT efficiency with a strategic endpoint management solution from Microsoft and Surface.

There’s more to the story about the innovations that make Surface and Windows 11 such a powerful combination. In coming posts, we’ll take a deeper look into more of the ways in which design and engineering challenges have resulted in extraordinary solutions. The results have produced Surface devices that in combination with the power of Windows 11 ensure employees are equipped to do their best work from anywhere, while providing robust security from chip to cloud and centralized device deployment and management to keep IT staff focused and productive as well.

Explore how Surface and Windows 11 can benefit your business.

*Software license required for some features. Sold separately.

]]>
How to Effectively Leverage AI in Your Data... https://community.connection.com/how-to-effectively-leverage-ai-in-your-data-backup-and-recovery-processes/ Nov 28, 2023 Becky Lawlor https://community.connection.com/author/becky-lawlor/ https://community.connection.com/wp-content/uploads/2023/11/2412812-AI-Backup-Recovery-BLOG.jpg

With businesses generating vast amounts of data daily, the challenge of effectively backing up and recovering this information is more difficult than ever. Lengthy downtimes and incomplete recovery are often the result. This is where artificial intelligence (AI) and machine learning (ML) technologies can help. More than a third (37%) of IT teams are incorporating AI into their tasks,1 and it’s increasingly used in backup and recovery solutions.

For instance, AI-powered systems can prioritize critical data, ensuring that the most vital information is backed up and recovered in case of a data loss event. Similarly, ML algorithms can optimize storage space through advanced deduplication and compression techniques, reducing the overall storage footprint.

At the same time, AI poses a threat to data protection efforts. Three-quarters of industry experts said cyberattacks increased in the past year, and 85% said AI was behind the escalation.2 As cybercriminals increasingly leverage AI to launch sophisticated attacks, data breaches and ransomware incidents become even more challenging to prevent and mitigate. Fortunately, AI and ML also offer a powerful defense against such threats.

How AI Improves Backup and Recovery Efforts

Al algorithms excel at processing massive datasets, identifying patterns, and making intelligent, data-driven decisions. They bring a level of automation and precision that is unparalleled by manual processes. Here are some of the areas where AI-powered solutions can help with data protection:

Monitoring Systems and Making Predictions

AI can determine the most likely scenarios to cause data loss. It can help predict hardware failures and the likelihood of a ransomware attack. ML is an application of AI that learns as it is used and can help analyze data, trends, and unusual activity.

Automating Tasks

One of the most useful features of AI is that it can take over manual work that IT and data employees find tedious. For example, AI-powered systems can automatically back up data based on priorities and objectives—like adjusting backup schedules to meet recovery point objectives (RPO).

Assessing Systems

An AI-powered backup and recovery solution can assess the integrity of systems to confirm processes are working correctly and to ensure compliance. AI can compare data sets against regulatory requirements and identify discrepancies. These solutions are also able to conduct continuous testing versus periodic manual tests. This provides better protection against data loss. AI can even simulate specific scenarios to test response effectiveness and reveal potential problems, so you can make sure your systems are working before you need them.

Checking Data Quality

AI can identify and notify teams of data corruption or errors, so you don’t waste time and space backing up bad data. It can also deduplicate data, as well as find and archive dormant data. These efforts not only optimize resources but speed up data recovery. Also, in the case of a ransomware attack, it can detect ransomware in your systems and backup data to protect against reinfection.

Identifying the Best Path Forward

AI tools can classify and prioritize data, make backup recommendations, and optimize storage. These tools can tell the difference between non-essential and business-critical data. AI can also establish the best steps to data recovery, as well as what needs to be recovered immediately versus what can wait. AI remembers past data recovery experiences and improves its recommendations over time.

Recovering More and Better Data

AI can react more quickly than a human can. Tools can recognize the last good backup, meaning it doesn’t contain corrupted or infected data. The use of AI may help improve and speed recovery efforts. When a data system fails, AI can immediately switch to a backup. It can also restore data in order of importance.

Tracking Unusual Activity

Today’s AI can monitor data systems for user behavior that is out of the ordinary. It can also detect other suspicious or unusual activities within your data storage and backups. Algorithms can determine a baseline of user behaviors and then send alerts when there is unusual activity. It can also recognize potential threats like accessing sensitive data, repeated failed login attempts, large data transfers, or attempts to access unauthorized data.    

AI can also track unusual activity within backup systems, such as changes in frequency, schedules, or file modifications. You can also program AI-powered solutions to spot signatures or other identifiers of known cyberthreats.       

What to Consider when Deploying AI

While AI can offer a host of benefits, it’s important to consider costs, complications, and risks that may be associated with using it in your backup and recovery efforts.

Measuring the Risks

As new AI capabilities emerge, many business leaders have concerns. In fact, 36% of executives and IT managers said AI is one of the top threats to their companies.3 One-third of those said they experienced actual damages from emerging technologies like AI.3 Although the biggest threat is likely to be AI’s use by bad actors, business leaders also worry that misuse of AI by employees puts them at risk for violating data privacy rules. There is also a risk that AI could be a failed investment, as 35% of IT buyers said their AI technologies did not work as expected.1

Creating guidelines for AI use within your company can help curb risk. It’s also important to train employees about its use and their role in protecting data. It’s possible to take advantage of AI capabilities while also minimizing risk. Choosing reputable and communicative AI vendors will help you keep up with the changing technology.

Evaluating Ease of Use

Determine whether an AI solution will easily integrate with your other IT systems. Evaluate how easy it is to implement, use, and optimize. Intuitive dashboards and integrated reporting can help simplify implementation and training.

There is also a learning curve for the technology itself. Algorithms improve as they process more data, so it can take time for machine learning tools to reach their potential. Though poised to take over a lot of data protection tasks, AI tools still require human management and oversight.

Analyze Cost Considerations

AI-powered data protection solutions are being incorporated into many existing solutions and may not have any additional costs associated with it. However, in instances where you are considering either replacing legacy technology or implementing new technology with AI-powered solutions, it helps to perform a comprehensive cost analysis.

Consider the expenses from initial investment to long-term operational expenses, including training, licensing, and ongoing management. Compare those costs with the savings you could see by improving process efficiency through automation and minimizing storage space through intelligent data compression and deduplication. Perhaps most importantly, consider the potential cost savings from reduced downtime and data loss in case of an incident.

AI does help maximize backup storage, so the benefits may outweigh any added costs. Additionally, 31% of organizations saw improved operational efficiency from their AI investments.1 It’s also important to consider the costs of managing the backup technologies yourself versus outsourcing the work to a managed service provider. Although you’re paying for a service, it can improve business efficiency, allow for predictable budgeting, and let IT teams work on projects that improve the business.

Moving Forward with AI

Without an AI-powered solution, you risk drowning in data and falling behind tech-savvy cyberattackers. With the help of the right AI tools, you can manage backups and recovery more efficiently, enhance system security, and maximize data protection. Training employees and performing a cost analysis will help minimize some of the risks and concerns associated with AI.

Connection’s cloud and data center services can help you choose the best backup and recovery solution for your organization. If you want to learn whether AI-powered solutions can help your organization, contact your Connection Account Team for more information.  

Sources:

1 IDC Research, 2022, Insights on the State of AI
2 Deep Instinct, 2023, Generative AI Is Increasing Cyber Attacks
3 Veritas, 2023, New Veritas Research Reveals Nearly Half of Organizations Underestimate Their Level of Risk
]]>
Roundtable Discussion: How to Build an... https://community.connection.com/roundtable-discussion-how-to-build-an-education-cybersecurity-strategy-that-makes-the-grade/ Nov 28, 2023 Bobby Sears https://community.connection.com/author/bobby-sears/ https://community.connection.com/wp-content/uploads/2023/11/2407008-Connected-Cybersecurity-Education-Roundtable-BLOG.jpg

Education remains one of the most vulnerable areas to cybersecurity attacks. Schools, districts, and institutions are all struggling to maintain data privacy and security, as well as safe and secure access to technology and physical resources.

The move to more flexible classroom environments, utilizing both on-premises and cloud applications, has many benefits for both educators and students. However, it also opens schools up to more security threats. As educational organizations also must ensure they are in compliance with PII, HIPAA, FERPA, COPPA, and other regulations, these security requirements can seem daunting.

Recently, we hosted a roundtable featuring experts from Connection’s education segment vertical and professional services department, as well as representatives from Juniper Networks. The panel discussed the threats facing education today, cybersecurity program strategies, technology solutions, and processes that can help your organization move forward with confidence.

Host: James Hilliard

Guests:

Timothy Allen – Director of Operations and Technology in the Professional Services Organization at Connection

Pam Aulakh – Senior Vertical Alliance Manager for K-12 at Connection

Rob Kwiatkowski – Senior Partner Systems Engineer at Juniper Networks

Michael Bergt – Technical Marketing Senior Manager at Juniper Networks

Bobby Sears – Senior Vertical Alliance Manager for Higher Education at Connection

To listen to the recording, register here.

Cybersecurity Attacks in the Education Industry

Education in the United States caters to a vastly diverse range of students from K–12 to higher education, including Masters and PhD programs. With more than 76 million K–12 and college students, education accounts for a large portion of the U.S. population. This translates into a monumental amount of data and information in circulation, as well as the need to safeguard that data.

Unfortunately, the vast amounts of sensitive data, including private information and credentials, makes education a valuable target for cyberattacks. In 2021, 771 institutions were affected by data breaches, impacting nearly 2.6 million records. While the percentage might seem small, the impact is significant, considering the size of some of these breached organizations.

Safeguarding Student Data: Cybersecurity Challenges in Education

The education industry is currently experiencing a myriad of data breaches and cyberattacks due to several challenges, including:

  • Shortage of Cybersecurity Personnel—There has been a significant influx of new devices in schools as a result of increased federal funding recently. However, this surge in technology adoption has not been accompanied by an increase in IT staffing, resulting in a shortage of cybersecurity personnel. Districts are struggling to manage and secure their expanding fleets of devices. Cybersecurity has taken center stage, and CIOs have become concerned.
  • Lack of Funding—Implementing strong security solutions can be costly, and as security measures become more advanced, the expenses for schools can increase significantly. Additionally, ensuring that the appropriate individuals have visibility into security threats can be a complex and challenging task.
  • Onboarding and Securing New Devices—Establishing accountability for bring your own device (BYOD) and Internet of Things (IoT) devices during the onboarding and securing of new devices in educational settings can be challenging. It’s essential to define device ownership and responsibility. Furthermore, it’s crucial to consider what occurs from Day 0 to Day 2+ after deployment. During this phase, educating individuals about potential risks is of utmost importance, especially since a significant percentage of incidents are attributed to social engineering attacks.
  • Training IT Professionals in Educational Settings—The shortage of skilled professionals affects education and other industries. K–12 school districts face a unique challenge as many CIOs come from teaching backgrounds rather than IT. To address this, institutions must invest in on-the-job training and continuous skill development to upskill their existing workforce. However, cybersecurity roles in education may not always offer competitive salaries.

In higher education, the situation is similar, with universities and colleges struggling to recruit and retain qualified IT professionals. Compensation is a factor, but professionals also prioritize work-life balance and flexible work arrangements. The influx of younger generations brings a different mentality, affecting hiring practices. AI plays a growing role in the hiring process, allowing institutions to adapt to the changing workforce dynamics post-pandemic.

  • Meeting Compliance Standards—Compliance is a crucial aspect of education cybersecurity, and ensuring that schools and institutions are compliant with regulations is a challenging yet essential part of protecting data and privacy.

Failure to meet compliance standards can have severe consequences, including penalties and legal issues, which can be detrimental to the reputation and operations of schools and universities for years to come.

Developing a Security Strategy to Make the Grade

To tackle the set of cybersecurity challenges common in the education industry today, consider the following strategies:

  • Adopt a “Zero-trust” Mindset—Adopting a “zero-trust” mindset is a valuable strategy for schools to enhance their protection against cyberattacks. This approach emphasizes a default stance of mistrust towards all entities. The key principle is to identify the data or resources in need of protection and limit access to authorized individuals. This strategy should be customized to suit each organization's unique needs and assets.

Understanding one’s environment is a crucial element in implementing the zero-trust approach. Educational institutions must evaluate their network, devices, and resources to develop an effective security strategy. When undertaking network updates, thorough due diligence is essential to ensure that the selected solutions align with the specific environment.

  • Utilize Security Landscape Optimization ServicesSecurity Landscape Optimization Services can assess an organization’s security profile comprehensively. This consultative approach helps identify strengths and weaknesses in an institution’s security posture. Additionally, there are government resources available, such as the Cybersecurity and Infrastructure Security Agency (CISA) and the National Institute of Standards and Technology (NIST), which can provide valuable information and best practices.
  • Protect Data in the Cloud—The adoption of cloud technologies has significantly increased in education. When implementing cloud technologies, it’s imperative to view cloud services as an extension of an institution’s estate. Regardless of whether data is hosted on-premises or within a cloud-based infrastructure, it’s crucial to consider who has access to the data, how it’s protected, and to maintain visibility over data interactions.
  • Enhance Security Posture with AI—AI offers advanced threat detection, response, and automation that are proficient in recognizing baseline behaviors and identifying outliers that may signal a potential security threat. The adoption of AI in cybersecurity extends to automating responses to known threats, reducing response times.

AI’s role in education goes beyond security; it spans various applications, including enhancing the learning experience, personalizing education, and streamlining administrative processes. AI’s capacity to analyze vast datasets and adapt in real-time is invaluable for an industry that constantly evolves.

Juniper Networks is at the forefront of integrating AI into its products. By leveraging AI, Juniper aims to simplify security management, enhance visibility, and optimize network performance, ultimately ensuring a safer educational environment.

  • Consistently Test for Resiliency—Regularly testing the resiliency of security measures is crucial to maintaining a strong security posture. Third-party testing is vital to ensure security efficacy. Educational institutions should test their security infrastructure at least annually or biannually to validate their controls and keep them up to date.

Zeroing in on Cybersecurity in Education: Continue to Navigate New Threats

Education isn’t just about acquiring knowledge; it’s also about safeguarding it. Protecting your school against cyberattacks is a multifaceted challenge that requires a comprehensive approach. By understanding the unique challenges and risks facing educational institutions, schools and universities can create robust security strategies that protect student data and privacy.

If your school or university is interested in learning more about education security solutions, visit www.connection.com/cybersecurity for additional resources to help you get started.

]]>
So, You Have Microsoft Copilot—Now What? https://community.connection.com/so-you-have-microsoft-copilot-now-what/ Nov 21, 2023 Makayla Mota https://community.connection.com/author/makayla-mota/ https://community.connection.com/wp-content/uploads/2023/11/2405573-MS-CoPilot-BLOG.jpg

The anticipation leading up to the November 1, 2023, release of Microsoft Copilot for enterprise customers was unparalleled. During the Early Access Program (EAP), a multitude of enterprise users, including notable companies such as Visa, General Motors, KPMG, and Lumen Technologies, had the opportunity to utilize Microsoft 365 Copilot. Presently, it is available for all enterprise customers at a cost of $30 per user, per month. Once acquired, understanding how to optimize its use for your business becomes crucial. Additionally, understanding its integration within Microsoft 365, Windows 11, and Copilot with Bing Chat is essential. Connection is available to guide you through the onboarding process.

What capabilities does Copilot have in Windows 11 and how can I make the most of them?

Copilot serves as an AI assistant integrated into Windows 11, aimed at enhancing productivity and nurturing creativity. Operating alongside Bing Chat and ChatGPT plugins, Copilot aids in boosting focus, responding to inquiries, adjusting settings, summarizing information, and launching applications.

Beyond text-based interactions, Copilot in Windows enables image-related actions such as copying, dragging and dropping, or uploading images into the chat for further exploration. Additionally, it allows voice input and facilitates various actions including:

  • “Switch to dark mode”
  • “Turn on do not disturb”
  • “Capture a screenshot”
  • “Summarize this website” (Active tab in Microsoft Edge)
  • “Write a story about a hamster on vacation”
  • “Make me a picture of a sweeping mountain view”

Copilot in Windows 11 is also your assistant in creating AI-generated art. By utilizing AI-driven tools like Bing Chat, Copilot integrated within Windows, and Paint, you can make digital artwork directly from your device! Share details with Copilot, such as preferred colors, artistic styles, and additional sensory elements you wish to incorporate into your artwork. Offer this AI-powered assistant more information to customize your artwork, and watch your vision come to life.

Windows 11 offers an array of AI-driven tools and functionalities designed to enhance user experiences. Users can seamlessly utilize features like the Snipping Tool, voice commands, and intelligent suggestions within File Explorer and the Start menu. Leverage AI for enhanced creativity through applications like Clipchamp, Paint, or the Photos app.

What is Copilot with Bing Chat and how can I use it to enhance my organization?

Copilot with Bing Chat is an AI-fueled chatbot tailored for use within corporate environments. It represents the business-oriented iteration of Bing Chat, equipped with data privacy and governance controls specifically designed for enterprise settings. This enterprise version prioritizes data protection, catering to businesses concerned about privacy and security matters pertaining to generative AI tools. Offered in Preview, Bing Chat Enterprise will be incorporated into selected Microsoft 365 plans at no additional expense.

The primary function of Copilot with Bing Chat is to assist employees in content generation, data analysis, document summarization, skill acquisition, coding, and various other tasks. All these functionalities are conducted with the assurance that both user and business data are safeguarded, preventing leakage outside the organization. Copilot with Bing Chat exclusively accesses data from the public Web within the Bing search index and does not have authorization to organizational resources or content housed within Microsoft 365.

For further insights into Copilot with Bing Chat, various resources are available:

Regarding eligibility, customers possessing licenses for Microsoft 365 E3 or E5, A3 or A5 for faculty, Business Standard, or Business Premium can access Copilot with Bing Chat without extra charges. This benefit persists when Copilot with Bing Chat becomes widely available.

How can Microsoft 365 Copilot assist in my day-to-day work?

Microsoft 365 Copilot functions as your workplace AI assistant, building upon the foundation of Copilot with Bing Chat while possessing its own distinct qualities. It integrates enterprise-grade security, privacy, compliance, and responsible AI, ensuring that all data processing remains within your Microsoft 365 tenant, utilizing technology that Microsoft 365 customers have trusted for an extended period. The highlight of the Microsoft 365 Copilot experience is the Microsoft 365 Chat, surpassing basic Q&A interactions. This feature delves into your entire array of data, including emails, meetings, chats, documents, and online sources, to tackle intricate work-related challenges. Moreover, it seamlessly integrates with widely used Microsoft 365 apps like Word, Excel, PowerPoint, Outlook, and Teams, elevating the daily experience for millions of users.

What are the differences between Copilot with Bing Chat and Microsoft 365 Copilot?

Copilot with Bing Chat operates as a generative AI service grounded solely in data from the public Web within the Bing search index, lacking access to organizational resources or Microsoft 365 content like OneDrive documents or emails.

In contrast, Microsoft 365 Copilot introduces three key elements:

  • Access to data within the Microsoft 365 Graph within your tenant
  • Processing of prompts and responses exclusively within your Microsoft 365 tenant boundary, reinforced by specific security, compliance, and privacy features
  • Integration of this generative AI capability within Microsoft 365 applications such as Teams, Outlook, and Word

Ready to venture into the world of Copilot? The opportunities to enrich your work experience are limitless. Contact your Connection Account Team for more details.

]]>
Retail Cybersecurity Threats and Solutions https://community.connection.com/retail-cybersecurity-threats-and-solutions/ Nov 21, 2023 Brian Gallagher https://community.connection.com/author/brian-gallagher/ https://community.connection.com/wp-content/uploads/2023/11/2393959-Retail-Cybersecurity-BLOG.jpg

Technological innovations have transformed our retail experience. The impact of emerging technologies such as artificial intelligence, IoT, and mobility are significantly improving the customer experience, while at the same time creating more opportunity for security breaches.  The risk is compounded by the fact that each of these emerging technologies increases risk in two ways: first, by increasing the attack surface due to substantial growth in Internet-facing devices, and second, by creating exponentially more data—and bad actors are always looking for an easy path to exploitation. 

Shockingly, 24% of all cyberattacks target retailers, making cybersecurity a paramount concern for this sector. A single data breach causes an average drop of 7.5% in publicly traded stock prices, according to Harvard Business Review, and, according to a Business Wire report in 2019, 21% of consumers will stop shopping with a retailer that has been breached. We have never met a retailer that could survive a 10% drop in overall traffic, let alone 20%.

Both Business Operational Leaders and IT Leadership need to work together to understand the threats, vulnerabilities, and their potential impacts on the long-term brand value. This issue is not an IT issue; cyberattacks are an organizational issue.

Most Common Cyberattacks in Retail

  • Credential Phishing (30.43%): Attackers impersonate legitimate entities, often through email or fake websites, to trick employees into revealing sensitive information like login credentials.
  • Malware (21.74%): Malware, malicious software designed to infiltrate systems and steal data, poses a significant risk to retailers. It can be delivered through deceptive emails or compromised software.
  • Ransomware (13.04%): These attacks involve encrypting a retailer’s data and demanding a ransom for its release. Paying the ransom is not a guarantee of data recovery and may encourage further attacks.
  • Distributed Denial-of-Service (DDoS) Attacks (10.14%): DDoS attacks disrupt online services by overwhelming them with traffic. For retailers, this means websites can become inaccessible during critical shopping seasons.
  • Other Attack Methods (24.65%): While these statistics provide insights into common attack methods, retailers must remain vigilant against a wide range of other threats, including insider threats, supply chain attacks, and zero-day vulnerabilities.

Remediation Strategies

It is crucial for businesses to take proactive measures to protect their systems, customers, and reputation. Such measures include:  

  • Continuous Employee Training: Even at the store level, retailers must invest in cybersecurity training for employees in connected omnichannel environments. All employees must embrace a strong cyber culture.
  • Advanced Security Software: Implement robust endpoint Detection and response (EDR) and extended detection and response (XDR) solutions to detect and mitigate against exploitation-based attacks.
  • Network Security: Employ network monitoring tools to detect and respond to DDoS attacks promptly. Consider cloud-based DDoS protection services for scalability and robust security.
  • Secure Backup and Recovery: Regularly back up data, and test data recovery procedures to ensure business continuity. Ensure malware detection is part of the operational process.
  • Third-party Risk Assessment: Evaluate the security practices of third-party vendors, and conduct third-party exploitation-based testing against your infrastructure.

In a world where omnichannel retail is the norm, retailers must be vigilant guardians of both their own and their customers’ data. At Connection, we understand the importance of creating a secure shopping experience and how it has a direct impact on your bottom-line profits.  Engage our Retail Practice to learn more about the cybersecurity solutions we can help implement in your retail organization.

Reference Links:

digistor.com/what-happens-to-a-companys-reputation-after-a-data-breach/#:~:text=The%202019%20survey%20%E2%80%94%20summarized%20in,a%20business%20post%2Dbreach.%E2%80%9D

https://hbr.org/2023/05/the-devastating-business-impacts-of-a-cyber-breach

https://www.fortinet.com/solutions/industries/retail/retail-cybersecurity-statistics

https://arcticwolf.com/resources/blog/10-major-retail-industry-cyber-attacks/

https://www.threatintelligence.com/blog/retail-cybersecurity

]]>
Know Your Manufacturing Cybersecurity Risk... https://community.connection.com/know-your-manufacturing-cybersecurity-risk-baseline/ Nov 17, 2023 Ryan Spurr https://community.connection.com/author/ryan-spurr/ https://community.connection.com/wp-content/uploads/2023/11/2383527-Blog-MFG-Cybersecurity-Risk-Baseline-BLOG.jpg

Manufacturing is now the #1 most attacked industry.1 The threats are real, and unsecured devices and networks, lack of cyber awareness, and supply chain attacks only heighten the risk. These threats cannot be addressed with technology alone; building a strong policy base and cyber culture is critical.

In a recent roundtable discussion, Connection’s Manufacturing Practice, Professional Services experts, and Cisco all met to discuss imminent threats, cybersecurity program strategies, and technology that sheds light on today’s challenges and the direction manufacturing customers should be prepared to take. Below is a summary of that discussion, including the critical issues in manufacturing cybersecurity today and the strategies to best address them.

Host: James Hilliard
Guests:
Ryan Spurr, Connection Manufacturing Strategy Director
Rob Di Girolamo, Connection Practice Manager for Security and Network Solutions Center
Prithvi Manduva, Cisco Industrial IoT Technical Solutions Architect

To listen to the recording, register here.

Manufacturing: The Most Attacked Industry

Manufacturing has emerged as the top target for cyberattacks, with threats that are real and pervasive. In recent years, the manufacturing sector has experienced a significant shift in its vulnerability to cyber threats. Approximately 24–25% of all cyber incidents now target manufacturing, making it the most attacked industry globally.2

The reasons behind this heightened threat level include attackers increasingly focusing on manufacturing operations, with a 2,200% increase in surveillance in operational technology noted last year.3 These attacks result in 61% of successful breaches now occurring in operational environments, signifying a significant shift from previous years.3

The implications of cyberattacks on manufacturing are far reaching. Beyond compromising intellectual property, they can lead to downtime, financial losses, damage to a company’s reputation, and even impact stock prices—as recent Security and Exchange Commission (SEC) rules have demonstrated.

Top Manufacturing Security Challenges

The rate at which the manufacturing industry is experiencing increasing security risks is due to several challenges, including:

Lack of Visibility

Gaining visibility into the numerous devices and systems on the operational technology (OT) floor is a significant challenge. Different vendors and technologies create individual silos, making it difficult to monitor and secure the entire network. This is especially important when factoring in human error that occurs on the manufacturing floor. Changes made by vendors or personnel on the plant floor can often go unnoticed, creating a potential security risk. Implementing control mechanisms and detailed logs for changes is essential to track and maintain control.

Knowing what’s happening is crucial for securing systems. One tool that can provide visibility into OT is Cisco’s Cybervision, which helps teams understand their environment and develop security policies.

IT and OT Convergence

The convergence of IT and OT introduces a host of new challenges and demands a fundamental shift in the way organizations approach security. Manufacturers must consider the following:

Infrastructure: Simplify and secure the infrastructure connecting IT and OT environments, implementing segmented networks to minimize risk and impact.

Security as a Layered Approach: Address cybersecurity not just as an endpoint protection issue but as a layered approach to secure the entire network.

Collaboration and Coordination: Emphasize collaboration and coordination between IT and OT teams, ensuring that both domains work together to enhance security.

Legacy Devices

Many manufacturing systems and devices have been in operation for years, with no security measures in place. These legacy devices pose a significant security risk on the manufacturing floor for several reasons.

Firstly, these systems often lack the essential security features and updates that modern systems incorporate. Many legacy devices have been in operation for years—and over time, security vulnerabilities have emerged. Manufacturers might be unable to obtain patches or updates from vendors, as support may have been discontinued or the vendor may have even gone out of business. This leaves these systems vulnerable to exploitation by cybercriminals who can target their known weaknesses.

Additionally, legacy systems may not meet current security standards or compliance requirements. As cybersecurity threats evolve and regulations become more stringent, legacy systems can’t keep up. They may lack encryption, access controls, and other security features necessary to protect sensitive data and manufacturing processes, putting the organization at risk of non-compliance.

Ransomware Attacks

70% of ransomware attacks occur on the manufacturing floor, and that number has been growing.4 Ransomware attacks can encrypt critical data, control systems, or entire networks, effectively holding an organization hostage until a ransom is paid. This can result in production downtime, missed deadlines, and compromised product quality.

Implementing a zero-trust architecture can greatly enhance security in manufacturing by adopting a “never trust, always verify” approach. Zero trust assumes that no user or system, whether inside or outside the network, should be trusted by default. It verifies the identity and security posture of every user and device attempting to access resources within the manufacturing environment. This strategy prevents lateral movement within the network, limiting the spread of ransomware or any other cyber threats.

Supply Chain Risks

Relying on external vendors and suppliers introduces supply chain risks, requiring organizations to ensure that they can trust their partners and suppliers. Manufacturers often rely on a complex network of external vendors and suppliers to provide various components, materials, and technologies. This reliance introduces vulnerabilities at multiple touchpoints along the supply chain. If a supplier or vendor experiences a cybersecurity breach, it can have a cascading effect on the manufacturing process.

Malicious actors may seek to compromise a manufacturer’s supply chain to infiltrate their systems. This could involve tactics like planting malware in a supplier’s systems, exploiting vulnerabilities during product shipments, or even conducting insider attacks within a supplier’s organization. These malicious activities can bypass traditional security measures within the manufacturing facility and pose a significant risk to the organization’s security and operations.

Supply chain risks have become more prominent, and it’s crucial to vet and set security standards for vendors and partners. Manufacturers must prioritize robust cybersecurity measures across their entire supply chain to mitigate these risks and ensure the integrity and security of their products and processes.

Complexity

As manufacturing integrates OT and IT, the resulting complexity can overwhelm teams and hinder productivity. As a result of such increasing complexity in manufacturing environments, the desire for simplicity is growing.

Beyond tools such as Cisco’s Cybervision to reduce complexity by providing visibility into OT environments, extended detection and response (XDR) is another advanced security concept that helps manage and secure complex environments like manufacturing floors. It does so by segregating and containing threats to prevent them from spreading across networks.

Lack of Skilled Cybersecurity Professionals

The shortage of skilled cybersecurity practitioners is a significant concern for the manufacturing sector. Upskilling the existing workforce and leveraging automation and artificial intelligence can help bridge this gap.

Providing adequate cybersecurity training to OT personnel is also crucial. Phishing awareness and security education tailored to the manufacturing environment are essential to prevent human errors that could lead to breaches.

Gaining Buy-in from Leadership

Cybersecurity is the responsibility of everyone in an organization. Building a culture of security and awareness is essential. Executives, IT, and OT professionals must work together to enhance security measures. To convince executives to focus on cybersecurity, IT teams should emphasize the impact of disruptions on production and reputation, as well as regulatory compliance.

Cybersecurity Challenges and Solutions for Modern Manufacturers

The manufacturing sector faces an unprecedented wave of cyber threats, making it the primary target for malicious actors. These attacks result in substantial financial losses, downtime, and reputation damage. The increase in cyberattacks can be attributed to a number of factors, including a lack of visibility into the numerous devices and systems on the manufacturing floor, a need for better collaboration between IT and OT teams, and unsecure legacy systems—to name a few.

To thrive in this challenging environment, manufacturers must cultivate a security-focused culture that involves all levels of the organization, from executives to IT and OT professionals. Investing in cybersecurity is not just an option but a necessity to mitigate risks and ensure the resilience of manufacturing operations in an ever-evolving digital landscape.

Sources:

1 IBM, 2023, 2023 X-Force Threat Intelligence Index

2 Statista, 2022, Distribution of cyber attacks across worldwide industries in 2022

3 IBM, 2022, 2022 X-Force Threat Intelligence Index

4 Industrial Cyber, 2023, Ransomware activity in industrial environments almost doubles, with over 70% focused on manufacturing sector

If your business is interested in learning more about manufacturing security solutions, visit www.connection.com/manufacturing or www.connection.com/cybersecurity for additional resources to help you get started.

]]>
A Day in the Life of a Senior Business... https://community.connection.com/a-day-in-the-life-of-a-senior-business-process-analyst/ Nov 16, 2023 Stu Hipwell https://community.connection.com/author/stu-hipwell/ https://community.connection.com/wp-content/uploads/2023/11/2391271-A-Day-in-the-Life-Stu-H-BLOG.jpg

Q1: What does a Senior Business Process Analyst do?

The role of a Business Process Analyst is to identify and improve the processes and workflows within Connection. This involves analyzing data to understand how a process or workflow currently works and working with the business to determine the desired state of that process or workflow. In addition, a Business Process Analyst is also heavily involved with helping our leaders in Connection design new business processes and help support the change management, so the business is prepared for changes that impact their roles and responsibilities.

Q2: What skills are required to successfully do the job?

The skills that have helped me succeed in my role of Senior Business Process Analyst include:

  • Building great relationships with my peers and having a good understanding of the processes and workflows used within Connection
  • Having a strong knowledge of current business processes and workflows and how they impact our business
  • Asking lots of questions of my peers and analyzing data to help determine how business processes and workflows can be improved, become more efficient, or be automated
  • Having strong interpersonal and communication skills and building “trust” with the business teams I work closely with
  • Attention to detail when creating procedure documents, process maps, and reports that play a critical role in helping the business adapt to change

Q3: Can you describe a typical day in your role as a Senior Business Process Analyst?

My role is currently a little bit different than other Business Process Analysts at Connection. For the past four years, I have taken on the role of Administrator of Connect, our internal corporate intranet. In this role, no day is “typical,” which makes the role exciting. On any given day, I could be posting informative news and announcements on our site, collaborating with teams to build resourceful site pages, training and assisting peers with managing their content on our intranet, and creating and sharing best practices to promote the integrity and credibility of Connect. 

Q4: What’s the best part of your job? What’s most challenging?

The best part of my job is being able to collaborate regularly with so many of my peers in Connection that I would rarely work with if I were in another role.

The most challenging part of my job is successfully managing my time to meet the needs of the business. In my Administrator role, no day is like the one before. Some days require me to quickly shift gears to meet a spontaneous or high priority request, which can often change the view of my day. On other days, the times I have dedicated to projects I need to complete, carry on without any issues. The role keeps me on my toes! 

Q5: What do you love most about working at Connection?

I have been with Connection since 1994, and in that time, I have had the opportunity to wear a few different hats in the organization: Account Manager, Sales Manager, Sales Operations, and Business Transformation. I love that my journey at Connection has allowed me to gain several business and personal skills and build amazing relationships with so many of my peers—many of which are like family to me.

]]>
Find the Microsoft Azure Solutions that Fit... https://community.connection.com/find-the-microsoft-azure-solutions-that-fit-your-needs-at-connection/ Nov 09, 2023 Krysten Harper https://community.connection.com/author/krysten-harper/ https://community.connection.com/wp-content/uploads/2023/11/2381465-Connected-Azure-at-CNXN-BLOG.jpg

When you think of Microsoft Azure and all it encompasses, it can start to seem a little overwhelming. I like to think of Azure as an amusement park. Imagine that each ride or restaurant or game in the amusement park is a service Azure offers—such as virtual machines, databases, storage, or advanced computing services like artificial intelligence and machine learning. Just how you can choose which rides to go on at the amusement park, you can choose which services you want to use in Azure.

In 2013, only 50% of Fortune 500 companies were using Azure. Today, that number is closer to 95%! According to Markets and Markets, the Cloud Computing Marketplace was valued around $545 billion in 2022 and is projected to reach $1,240 billion by the end of 2027. However, during Microsoft Inspire earlier this year, we learned that 90% of worldwide IT spend has yet to move to the cloud! How do all of these numbers exist at the same time? Because for many companies, moving to the cloud is not an “all or nothing” event. In fact, many of our customers prefer to start by moving one or two workloads over rather than going “all in” right at the beginning. Regardless of where you are in your journey, Connection can help!

At amusement parks, you pay one price for the ticket, regardless of how many rides you plan to go on. With Azure, though, you get a pay-as-you-go pricing model, which means users only pay for the resources and services they use. Because of this flexibility, Azure is used by organizations of all sizes to transform their IT infrastructure and applications without the need for significant upfront investments in hardware and data centers.

Connection Service Offerings

We don’t just do a quick lift and shift and call it good, because too much can go wrong. Connection offers a straightforward, end-to-end, modular solution for organizations seeking to integrate existing workloads into the cloud.

  • Migration Planning: IT Landscape Optimization

Asset Discovery and Optimization was born from software compliance and has evolved to include cloud preparedness, security readiness, modern workplace management, and server optimization. Another option for customers looking to migrate is Cloud Landscape Optimization. We will work with you to recommend the best cloud model to suit your needs, assess which workloads can be moved safely to the cloud, and offer migration strategies to minimize risks.

  • Migration and Optimization: Professional Services

Once you’ve made the decision to migrate, our Azure Specialists and Professional Services teams will help move your data, applications, and infrastructure to Azure with our Azure Migration offering. Connection has earned Microsoft’s Advanced Specialization for Windows Server and SQL Migrations, so we have the knowledge and experience to ensure these projects run as smoothly as possible.

For customers already in Azure, our Azure Optimization Services will do exactly what it sounds like. These services review your existing architecture and uncover potential opportunities for improvement by leveraging Platform as a Service, Automation, and other Azure native tools available within the platform. We also offer a wide variety of services and solutions that support projects involving Azure Virtual Desktop and Azure VMware Solutions.

  • Day-to-Day Management: Managed Services

Looking for more long-term assistance? Our Azure Managed Services offering is great for customers who want to migrate to Azure, but who may not have the skills or bandwidth to manage that environment themselves after the migration.

Step Right Up—and Get Help from Connection

Whether you have already taken the plunge on the amusement park’s roller coaster and are ready to check out our Migration and Optimization Professional Services, or you’re still waiting in anticipation and need to think about Migration Planning through our IT Landscape Optimization Services—or even if you’re content to sit on a bench and hand off riding the rides to someone else with our Day-to-Day Managed Services—Connection has the right fit for your Azure needs. Contact your Account Team for more information in setting up the plan that is right for you.

]]>
Empowering Organizations to Do More with... https://community.connection.com/empowering-organizations-to-do-more-with-remote-management/ Nov 08, 2023 Alex DeRossi https://community.connection.com/author/alex-derossi/ https://community.connection.com/wp-content/uploads/2023/11/2382821-PH-2-Intel-Remote-Management-BLOG.png

One of the longest lasting and seemingly immutable truths about the American workforce has been upended: the notion that employees almost always do their work at a corporate facility. Recently, 58% of Americans surveyed said they have the opportunity to work from home at least once a week, and 35% said they can do so every day, according to McKinsey.1

Another survey by TechTarget’s Enterprise Strategy Group found that predicting work locations is unpredictable, with only 23% of organizations saying all employees who previously worked from an office will return to the office. That number is nearly identical to the percentage of organizations that indicated they will allow many employees to work remotely.2

With so many people now working remotely at least part time, the burden for managing that new reality falls squarely on the often under-resourced IT organization. Remote management of end-user computing—and every technology that enables it—has become far more complicated and far more important than ever. Employees expect and demand a smooth, seamless, and friction-free user experience that allows them to work productively and efficiently.

With the right remote management tools and the proper IT infrastructure, organizations can turn the potential chaos of “work from anywhere” into a scenario where employee location matters far less than employee experience.

Enhancing Productivity and the User Experience

The skyrocketing adoption of mobility and remote/hybrid work means many IT organizations are hard-pressed to keep up with new requirements and demands for high availability, high performance, and secure access at all times. Even seemingly simple tasks such as delivering security patches and operating system updates have become far more important—and challenging—when PCs are more likely to be located outside a corporate facility and accessible over wide-area networks or the cloud.

IT help desks also need next-generation remote management to support end users with password reset requests, performance glitches, application errors, and much more. To lessen employee inconvenience and frustration, updates and fixes must be scheduled outside of “normal” business hours. Of course, this becomes far more challenging because organizations employ people in different time zones and geographies around the world.

There is also the issue of business continuity in the event of an unexpected service interruption, which can take employees offline for hours or longer, resulting in potentially large financial losses, diminished customer satisfaction, and lower employee productivity. In these and other circumstances where remote PC users need around-the-clock support, a much higher level of remote management is essential.

Another important area where remote management comes into play is device administration, where IT organizations have to audit and report on the location and status of every device under their purview. Whether onboarding a new employee or ending access and privileges for exiting employees, IT organizations need to be able to find and understand their PC fleet at all times.

How Connection Makes Employee Empowerment a Reality

With the growing IT complexity of remote/hybrid work environments, it has become far more difficult for internal IT organizations to satisfactorily support remote management without the help of experienced, savvy technology services partners. That’s why, at Connection, we have invested substantial financial, staff, and intellectual resources in remote management.

Connection helps large and small organizations alike with a wide range of end-user computing and remote connectivity requirements. We provide the devices, software, services, and industry knowledge to cover the full spectrum of remote management to ensure around-the-clock productivity and an enhanced employee experience. Working with leading technology partners such as Intel, we can extend the internal IT organization with a wide range of capabilities, including infrastructure planning and configuration, systems integration, deployment services, and support.

This enables organizations to allow staff to work productively from home or other remote locations. It also helps them maximize their substantial and growing investment in digital work processes and cutting-edge workloads that require high-performance, secure, and sustainable PCs to get the job done.

Connection facilitates out-of-the-box operation for all PCs, regardless of location or whether there is an IT support professional at the employee’s location. Connection’s Technology Integration and Distribution Center enables it to support an organization’s diverse PC configuration needs around the world, using proven methodologies and a wide array of technical certifications in PCs, networks, and remote management.

The Remote Management Capabilities of Intel vPro®

Intel vPro® 13th Generation processors are ideally suited for the demanding, uncompromising needs of a remote workforce. Their high performance, robust security, and efficient sustainability features are designed for modernized end-user computing.

For remote management requirements, Intel vPro® processors are engineered with integrated features that make managing a vast fleet of mobile, distributed devices much easier and reliable, without taxing overworked internal IT teams.

Intel® Active Management Technology (AMT) facilitates remote management and troubleshooting. IT team members can connect remotely to an employee’s PC even when the computer is far away from a corporate facility. Intel® AMT can also handle PC monitoring even when the device is turned off or when the operating system is disabled or not functioning properly. Importantly, Intel® AMT is unique in its ability to return a PC to its last known good state, even if the employee isn’t working at that time. Finally, it supports remote out-of-band management over Wi-Fi networks, which provides secure access to devices without having to connect to the corporate local-area network.

Additionally, Intel vPro® processors come with Intel® Endpoint Management Assistant, which makes it easier for IT personnel to manage Intel® EMA- enabled remote endpoints over the cloud, as well as on both sides of corporate network firewalls. Intel® EMA software is a cloud-based solution, supporting both in-band and out-of-band management through an OS-based agent for any Windows platform.

Conclusion

To give employees the flexibility and support they need for remote and hybrid work, organizations need the technology and expertise required to make remote management a valuable part of the overall IT service delivery framework. The combination of Intel vPro® processor technology and market-demonstrated IT services from Connection empowers organizations and their workforces to do essential work, regardless of their work location.

For more information on how Intel and Connection can help your organization do more, be sure to check out our blog post, Custom IT Configurations for Remote Manageability, or contact your Connection Account Team today. 

1 “Americans Are Embracing Flexible Work—and They Want More of It,” McKinsey, June 23, 2022
2 “End-User Computing Trends,” TechTarget’s Enterprise Strategy Group, Feb. 16, 2022

]]>
Upcoming Microsoft 365 for Education... https://community.connection.com/upcoming-microsoft-365-for-education-licensing-changes/ Nov 07, 2023 Makayla Mota https://community.connection.com/author/makayla-mota/ https://community.connection.com/wp-content/uploads/2023/11/2378197-MS-EDU-Licensing-Blog-BLOG.jpg

Does your school use the Microsoft 365 for Education suite? There are two upcoming licensing changes that you need to be aware of! These changes will take place on August 1, 2024—but it is never too early to be prepared. Let Connection help with any questions or concerns you have leading up to, during, and after the transition.

Office 365 A1 Plus Retirement

The Office 365 A1 Plus Program will be retired on August 1, 2024. The program was introduced in 2015 to ease the provisioning burden on IT professionals in education institutions as they moved to the cloud. For qualified schools that purchased Office institution-wide for faculty and staff, the A1 Plus Program included a free subscription and Office desktop apps.

Why Is It Being Retired?

Although it was intended to create an easier transition to the cloud, it ultimately led to complexities and issues that inadvertently steered customers to non-compliancy. Microsoft 365 A3 and A5 licenses are easier to provision now, which both addresses customers’ requirements and the need for a transitional program. 

What Steps Do I Need to Take?

The first step is to check the Microsoft Admin portal to see if you have any A1 Plus licenses in your tenant. 

• Navigate to the Microsoft 365 Admin Portal: https://admin.microsoft.com
• In the navigation menu on the left side of the screen, select Billing > Your Products
• 
Identify any instances of the Office 365 A1 Plus for Faculty and Office 365 A1 Plus for Student assigned licenses

Once you have identified what users are on A1 Plus licenses, you must determine what license they should be assigned. The following SKUs are what is recommended by Microsoft. Work with your Connection Account Team for help with deciphering your needs:

• Office 365 A1: Free online Office productivity and learning tools. Includes Web versions of Word, Excel, PowerPoint, OneNote, Microsoft Teams, and additional classroom tools.

• Microsoft 365 A3: A comprehensive platform for learning and working with integrated security and management. A3 includes premium tools for learning and skill building, increased security, AI-infused productivity tools, and device controls for management and student safety. 

• Microsoft 365 A5: Microsoft 365 A5 provides the most comprehensive platform for teaching, learning, and work. Microsoft 365 A5 is for institutions who want a single productivity, communications, and collaboration platform for work and learning in addition to the most advanced security. 

Of note: for customers who have additional light users or want to use desktop apps, there is an option to purchase Office 365 A3 licenses or Office desktop apps as an add-on.

Users of A1 Plus will not lose their data once it retires. However, if no action is taken prior to the retirement date, users will be downgraded to an A1 license resulting in access to only the online Web apps. 

Microsoft recommends transitioning users early and providing guidance on what they can expect with their new license if changes occur. Please see the FAQ (Frequently Asked Questions) sheet provided by Microsoft and contact your Connection Account Team for more information as you navigate these licensing changes.

Storage Changes

In addition to the A1 Plus program's retirement, Microsoft is changing their storage offerings across the Microsoft 365 for Education suite. Beginning at your next contract renewal—but no sooner than August 1, 2024—all school tenants will receive 100TB of free pooled storage across OneDrive, SharePoint, and Exchange, with an additional 50GB or 100GB of pooled storage per paid user for A3 and A5 subscriptions, respectively (not including Student Use Benefits). 

Of note: technical enforcement will begin August 1, 2024. Most schools are well below their storage allotment. For any mid-enrollment customer over that storage limit on August 1, 2024, Microsoft will provide additional storage at no cost through the length of the customer’s current term.

Schools can also purchase additional pooled storage to add to the tenant pool in 10TB increments for $300 USD (estimated retail) monthly. To find your capacity, use this calculation: 100TB + (#A3 paid users x 50GB) + (#A5 paid users x 100 GB) + (additional storage purchased) = capacity/limit.

Also, effective February 1, 2024, users of Office 365 A1 will be limited to a maximum of 100GB of OneDrive storage within the school tenant’s 100TB of pooled storage. Schools will have the option to purchase additional incremental storage based on their needs.

Why Is Microsoft Making Storage Changes?

After a significant increase of unused accounts, stored files, and data as institutions move to the cloud, there is not an end-of-life plan for these files, putting education institutions and their students at risk for a data breach. Not to mention that stored files no longer in use significantly impact our carbon footprint! Storage of this “dark” data takes up space on servers and results in increased electricity consumption. Microsoft is committed to both security and privacy within a school as well as reducing their carbon footprint.

Help When and Where You Need It

With the help from a free set of tools to manage the entire process from visualizing current storage allocation across OneDrive, SharePoint, and Exchange, to tools that make it easier to manage stored data and files that are no longer needed, Microsoft is committed to helping schools with this transition. Currently, most schools are well below their storage allotment. To see your school’s storage profile and access the new storage management tools, go to the Microsoft 365 Admin Center. Your Account Team at Connection is here to provide additional licensing and storage guidance as you begin to delve into your school’s profile to determine what steps you need to take to prepare for the upcoming changes. Our Premium Microsoft Landscape Optimization offers a User Profile and Cloudstack workshop to help you discern your options and provide a tactical approach to support your Microsoft investment strategy. Reach out to your Connection Account Team or watch our vlog for more information.

https://www.youtube.com/watch?v=ILIAFh7Zk0I
]]>
TechSperience Episode 121: Leveraging... https://community.connection.com/techsperience-episode-121-leveraging-advanced-technologies-to-modernize-manufacturing/ Nov 06, 2023 Connection https://community.connection.com/author/connection/ https://community.connection.com/wp-content/uploads/2023/11/2384567-TechSperience-Podcast-121-BUZZ1.jpg

We’re at an inflection point in U.S. manufacturing. Those that are not investing in advanced technologies today will quickly find themselves uncompetitive. Those that are beginning to modernize their facilities, however, are achieving smarter and more digitally excellent design and production. In this podcast, we'll explore how manufacturers can leverage advanced technologies to modernize their spaces and ultimately yield big business benefits.

Host: James Hilliard

Guests: Blake Kerrigan, Senior Director for ThinkEdge Business Group at Lenovo

Zihan Wang, Global Business Development Manager at NVIDIA

Ryan Spurr, Manufacturing Strategy Director at Connection

Show Notes:

[0:55] Are there one or two trends or issues across manufacturing that are leading teams to recognize the need to modernize today?

[4:52] What other trends from a technological standpoint are you seeing regarding manufacturers' need to modernize their facilities?

[7:00] AI is helping the manufacturing industry modernize faster. What are teams looking to do with AI?

[10:25] What are some of the leading cutting-edge manufacturers doing? What can we learn from them?

[14:01] How much education is needed to assist manufacturers with what they need to begin the modernization process?

[21:45] What are some case study examples of how manufacturers have modernized their facilities recently?

[25:00] How did our teams help Trek Bikes modernize their research and development manufacturing operations?

[28:01] How's Lenovo helping automotive manufacturers modernize the early stages of their manufacturing production operations?

[31:56] How has our team assisted Pegatron with modernizing its mass production? [35:04] How can adopting smart technologies in manufacturing help with cost savings?

[37:55] To continue the conversation, visit www.connection.com/manufacturing and our Manufacturing Practice can help jumpstart your modernization process.

]]>
The Factory of Tomorrow Is the Factory of Today https://community.connection.com/the-factory-of-tomorrow-is-the-factory-of-today/ Oct 31, 2023 James Rust https://community.connection.com/author/james-rust/ https://community.connection.com/wp-content/uploads/2023/10/2371335-Smart-Factory-Blog.jpg

For years, people have dreamed of automated factories and operations that can sustain themselves autonomously. While we haven’t quite reached that level, leading manufacturers have leapt toward that goal with the application of feasible and proven smart technologies in recent years. These new advances are revolutionizing manufacturing and can offer companies a competitive advantage.

The Senses of the Smart Factory

Industrial sensors have become a vital part of modern manufacturing. Not only can a wide variety of physical quantities such as temperature, pressure, flow, level, and location be monitored—the data can be used to automate all kinds of industrial processes. 

Where maintenance personnel once had to go and manually check pressure and temperature to see if an issue was starting to appear, they can now perform other tasks while sensors keep an eye on these metrics and alert them as soon as there is a problem. This continuous monitoring allows them to address issues as quickly as possible, without wasting time periodically checking for problems.

Industrial sensors can be just as valuable for production as for maintenance. Temperature can drastically affect a manufacturing process, and monitoring these levels will ensure that products are manufactured to the correct specifications.

Industrial sensors are essential to many industrial processes, helping to improve efficiency, quality, and safety. For example, flow sensors measure the flow rate of raw materials and finished products to ensure that production lines are running efficiently. Temperature sensors monitor the temperature of furnaces and other equipment to ensure products are manufactured to the correct specifications. Level sensors monitor the level of liquids and solids in tanks and containers to ensure that there is enough material to keep the production process running and prevent overflow. 

Smart cameras can “see” what is going on in the operation and, by using artificial intelligence, can analyze and interpret images. Thanks to advances in AI, anything you can train a human to watch for on a security camera monitor, you can teach a camera to do just as well. Successful implementation has already occurred for use cases in quality control, process optimization, and safety.

Contaminants in Pharmaceutical Manufacturing can be detected throughout the process, ensuring every pill is what you expect, when you take it. Issues in the manufacturing process can be spotted without the need for a person to conduct exhaustive studies. Most importantly, safety hazards such as spills and leaking gas can be detected, and the right people can be immediately notified.

The Brain of the Smart Factory

Industrial Internet of Things (IIoT) software platforms pull together data from industrial sensors, cameras, and controllers to paint a clear picture of the factory floor. The raw data can be processed at the edge to drive automation and then sent to up the stack to other systems or stakeholders, offering management real-time visibility into their operation. It also enables predictive maintenance to lower downtime, optimization of the production line by reducing waste, and the insight needed to develop new processes and products. When this data is processed at the edge, it does not have to travel to a central cloud server and back, which is especially important where low latency or autonomous operations are critical. Most operations have many legacy devices or tools that are older but can’t be connected to a modern network. Smart edge devices, specifically designed for manufacturing, can connect to any machine and ensure it becomes part of your IIoT stack leaving no device behind. If you’re curious about edge devices, check out my post.

The Limbs of the Smart Factory

Automated Mobile Robots and Automated Guided Vehicles (AMR/AGVs) are a type of smart technology that is becoming increasingly popular in the manufacturing industry. AMR/AGVs are used to automate a variety of tasks such as material handling, order fulfillment, and assembly. By automating repetitive tasks, AMR/AGVs can help to free up human workers to focus on more complex tasks such as machine repair and product development, which leads to increased efficiency and productivity. These robots have relatively low maintenance costs and may be less expensive than hiring additional staff for growing companies. AMR/AGVs can even help to improve safety in the workplace by automating tasks that are dangerous yet error prone due to repetition. One of their most valuable additions to a factory is the flexibility they bring. AMR/AGVs are able to reconfigure production lines quickly and easily, meaning workers won’t have nearly as much setup time. This can be helpful for manufacturers who have a high mix/low volume product offering or who need to be able to quickly adapt to changes in demand.

The Smart Factory Is Here—Let It Work for You

All of these factors described in a smart factory result in a business that is capable of producing finished goods with higher quality and safety standards, and greater efficiency. These technologies may be new, but they are far from unproven. Smart factories already exist, and the companies that implement them have seen tremendous benefits.

Since there are so many technologies to implement in an Industry 4.0 journey, many manufacturers have opted to simply worry about it down the line and focus on current issues. The truth is that investing in these technologies now will solve many of the challenges factories face today, and surely face down the line—like competitors with significantly lower costs. 

Transforming your operation may seem daunting, but that’s why Connection has partners who handle every piece of the transition and have successfully managed these changes for customers. If you’re ready to get started with smart technologies, engage the Manufacturing Practice at Connection today. We’ll make sure you have everything you need to reap the benefits of a smart factory and see incredible results.

]]>
A Strong Foundation Is Essential for AI... https://community.connection.com/a-strong-foundation-is-essential-for-ai-retail-solutions/ Oct 26, 2023 Brian Gallagher https://community.connection.com/author/brian-gallagher/ https://community.connection.com/wp-content/uploads/2023/10/2363171-Retail-AI-Foundation-Blog.jpg

In today’s hyper-competitive retail landscape, staying ahead of the curve requires more than just attractive storefronts and competitive pricing. Retailers are increasingly turning to artificial intelligence (AI) to gain a competitive edge. However, successful implementation of AI in retail hinges on two key elements: 

  • A strong understanding of your brand 
  • A solid technology infrastructure foundation

Your entire organization must be aligned to your brand mission. Only then will you be able to leverage AI in a way that optimizes your business outcomes. For AI solutions, look to the technology leaders to be sure you have a robust foundation built upon four key pillars: data, networking, edge computing, and security. 

As only you understand the value of your brand, I want to walk through the foundational technologies that you need to bring your vision to life.

Data: The Lifeblood of AI in Retail

Data is the lifeblood of AI, and this is especially true in retail. Retailers deal with vast amounts of data daily, including sales transactions, inventory levels, customer preferences, and more. To harness the power of AI, retailers must first establish a comprehensive data strategy. This involves collecting, storing, and managing data efficiently.

Since data serves as the raw material for AI algorithms, it is critical to understand the data that aligns most closely with your brand attributes. The data will allow you to understand customer behavior, predict trends, optimize supply chains, and personalize marketing efforts. Perhaps the most important outcome is how data can provide customer insights to help retailers create a more personalized experience.

Networking: Enabling Data Flow and Real-time Insights

Data alone is not enough; it needs to flow seamlessly within an organization. Networking plays a pivotal role in this process. The challenge for retailers is the dispersed network of stores, warehouses, and distribution centers. A robust networking infrastructure ensures that data from these various locations can be collected and transmitted efficiently. Providing real-time inventory, omnichannel customer engagement, and employee solutions is key in our modern retailing world.

Edge Computers: Bringing AI to the Front Lines

While centralized data processing has its merits, in retail, many AI applications benefit from edge computing. One might argue that AI at the edge is the most critical step in providing a hyper-personalized experience to your customers. Edge computers are devices located close to where data is generated, such as in-store cameras or sensors. These devices can process data locally, reducing latency and enabling real-time decision-making.

In retail, edge computers are instrumental in applications like AI-kiosks or shelf monitoring. AI-kiosks for shopping or self-checkout can change both the customer experience but also improve employee productivity and loss prevention. Cameras mounted on store shelves can analyze product availability, price accuracy, and planogram compliance in real-time. This information can trigger alerts for store associates to take immediate action, ensuring shelves are always well-stocked and organized.  All these features are done at the edge to optimize an outcome specific to a store, customer, or employee.

Security: Safeguarding Customer Trust

In the age of AI, the security of data and AI systems is paramount. A security breach can result in severe reputational damage and legal consequences that your brand and income statement may never recover from again.

Implementing robust security measures is non-negotiable when building an AI foundation for retail. This includes encryption, access controls, and continuous monitoring of AI systems. Retailers must also comply with data protection regulations, such as GDPR or CCPA, to maintain customer trust and avoid hefty fines. AI models themselves can be vulnerable to attacks, including adversarial attacks and data poisoning. Retailers need to invest in AI security solutions to protect their models from manipulation and ensure they make accurate predictions.

What’s Next?

The complexity of AI and the infrastructure needed to optimize your outcomes require a fresh look at the alignment of your internal teams and the alignment with a trusted third-party partner. AI solutions are developing so quickly over the next 24–36 months that managing the process internally is no longer an option. Choosing a trusted partner now ensures that AI solutions align with your brand mission.At the end of the day, there is nothing more important than your brand. AI and the technologies that enable it are just tools to delight your internal and external customers. Connection would be thrilled to support your journey. Engage Connection’s Retail Practice or your Account Team today to get started!

]]>
Apple’s Modernized Deployment Strategies... https://community.connection.com/apples-modernized-deployment-strategies-for-hybrid-work/ Oct 13, 2023 Chris Roux https://community.connection.com/author/chris-roux/ https://community.connection.com/wp-content/uploads/2023/10/2363868-Apple-Deployment-Stategies-BLOG.jpg

In an increasingly digital world, Apple products have become ubiquitous in businesses of all sizes and across diverse industries. Mac, iPhone, iPad, and Apple Watch are being leveraged in ways that were once unimaginable. Today, we delve into Apple’s modernized deployment strategies for hybrid work, focusing on their commitment to user experience, security, and overall efficiency.

Ensuring User-centricity and Security

Apple’s success in the corporate world can be attributed to its unwavering dedication to enhancing user experience while maintaining the highest standards of security. Apple recognizes the concerns of its customers—especially when it comes to security—and has taken significant steps to make Mac one of the most secure computing platforms.

Over the past decade, Apple has introduced a range of security features to the Mac, including anti-malware protections, system integrity protection, and hardware integration with Touch ID. These measures, coupled with free annual updates, have fortified Mac security while preserving the user experience. With the advent of Apple Silicon, Mac users can enjoy even greater security and faster security updates, ensuring their devices remain protected in a rapidly evolving digital landscape.

Deployment and Management for the Hybrid Work Era

As businesses increasingly adopt hybrid work models, the importance of effective deployment and management of a device platform like Mac has never been more critical. Apple offers a comprehensive approach to streamline these processes.

Apple Business Manager: The journey begins with Apple Business Manager, a free service designed to simplify deployments. It enables remote configuration and management of Apple devices, making it essential for organizations looking to achieve zero-touch deployment. By enrolling devices in Apple Business Manager, IT administrators gain the ability to assign and configure devices with ease.

Choosing the Right MDM Solution: It’s vital to select a mobile device management (MDM) solution that leverages Apple’s native APIs effectively. Mapping out your organization’s management requirements and evaluating MDM solutions against those needs is crucial. Additionally, selecting a vendor capable of keeping up with Apple’s annual OS updates is essential for maintaining security. Connection offers a great lineup of MDM solutions—including Jamf, VMware Workspace ONE, and Microsoft Intune.

Endpoint Security Framework: Apple’s Endpoint Security Framework offers a user-space replacement for low-level operating system event monitoring. Organizations should collaborate with security vendors that utilize this framework to stay on top of Apple’s security updates to minimize vulnerabilities.

Zero-touch Deployment: Zero-touch deployment automates the setup process for Mac, allowing for a seamless—and superior—user experience, right out of the box. It not only saves time but also ensures compliance and enhances security.

Closing Skill Gaps with Connection: Bridging the IT Divide

In the dynamic world of technology, staying ahead of the curve can be a daunting task for many organizations. Rapid advancements, new security threats, and evolving user expectations mean that IT departments often face skill gaps that can hinder their ability to fully harness the potential of Apple’s innovative solutions. At Connection, the focus is not just on providing technology but also on becoming a strategic partner in your digital journey. Here’s how Connection can help you close those skill gaps and ensure your IT team is always in sync with the latest advancements.

Expertise at Your Fingertips: With Connection, you gain access to a team of seasoned professionals who live and breathe technology. Whether you’re a small business or a large enterprise, our experts are here to assist. We understand that the IT landscape can be overwhelming, and our goal is to simplify it for you.

Technology Integration and Distribution Center (TIDC): Located in Wilmington, Ohio, our state-of-the-art TIDC spans 50,000 square feet. This center is not just a facility; it’s where we transform your IT vision into reality. From provisioning and configuring devices to managing large-scale deployments, the TIDC is equipped to handle it all. Our experience includes provisioning and deploying some of the largest Apple device deployments on record—so you can trust us to handle your project with precision.

Jamf Managed Service Provider: As a Jamf Managed Service Provider, we offer a comprehensive suite of services that extends beyond device provisioning. We can help you implement identity and security services such as Jamf Connect and Jamf Protect. Our expertise in these solutions ensures that your Apple ecosystem remains secure and user-friendly.

Warranty and Advanced Services: Our support doesn’t stop at deployment. We offer in- and out-of-warranty repair services through the TIDC, ensuring that your devices stay in optimal condition. Additionally, our advanced services portfolio includes options like advanced exchange and re-deployment, further enhancing the longevity and efficiency of your Apple devices.

Tailored Solutions for Your Industry: Whether you’re in business solutions, enterprise, public sector, retail, or healthcare, Connection has industry-specific expertise to cater to your unique needs. We understand that each sector comes with its own set of challenges and opportunities, and our solutions are designed to align with your goals.

Continuous Learning and Collaboration: Technology is an ever-evolving field, and staying current is imperative. Connection facilitates ongoing learning and collaboration opportunities for your IT team. We offer training sessions, workshops, and knowledge sharing to ensure your team remains up to date with the latest trends and best practices.

Connect with Us

Technology can make or break business success. Having a partner like Connection by your side is invaluable. We go beyond providing hardware and services; we empower your organization to thrive in the digital age.

Whether you’re facing skill gaps in your IT department, need assistance with a complex deployment, or simply want to ensure your technology investments are delivering maximum value, Connection is here to calm the confusion of IT. Our mission is to become your IT department’s IT department, so your organization can fully embrace the benefits of Apple’s modernized deployment strategies and succeed in the hybrid work era. Embrace the future of IT with confidence, supported by a partner you can trust.

To learn more about how we can help you close skill gaps and elevate your IT capabilities, visit Connection’s Apple Practice or reach out to your dedicated Connection Account Team today.  

]]>
Changes Coming to Microsoft’s CSP https://community.connection.com/changes-coming-to-microsofts-csp/ Oct 12, 2023 Carrie Pecoraro https://community.connection.com/author/carrie-alicata/ https://community.connection.com/wp-content/uploads/2023/10/2356200-Changes-Coming-to-CSP-BLOG.jpg

Over the past few years, Microsoft has been slowly replacing its legacy CSP offers with the New Commerce Experience, known as NCE. Microsoft is concluding this transition with the last step of phasing out legacy seat-based licensing in the commercial space and the introduction of NCE into the public sector. 

Beginning in 2024, NCE offers will be available for non-profit, government community cloud, and academic customers. All legacy subscriptions must migrate to NCE upon their 2024 renewal date. Please stay tuned for additional timeline updates as we receive them.

What Is New Commerce Experience and What Does It Mean for Your Organization?

New Commerce Experience, in a nutshell, is an updated set of terms and offers available to CSP customers. Customers can choose to maintain much of the flexibility with monthly commitment options, which allow them to make changes or cancel subscriptions upon each monthly renewal, or they can maintain current pricing by choosing an annual commitment term with either annual or monthly installments. Limited products are available for purchase as a three-year commitment, including Defender Threat Intelligence, Microsoft Sales Copilot, Teams Room Pro, and many Dynamics 365 offers.

Microsoft will be migrating all customers to an annual term with the same billing frequency (monthly or annual) that customers have in legacy today if no action is taken prior to their renewal date. In advance of your 2024 renewals, coordinate with your Connection Account Team to discuss your options and make sure the path forward is the best fit for your organization.

What Are the Benefits of Moving to NCE for My Company?

While one of the key differences between the legacy CSP terms and the NCE terms does include replacing the ability for customers to reduce their license count at any time with a 7-day reduction window upon their monthly, annual, or triennial renewal, there are many other features that make NCE stand out. 

Some of these features include the ability to align renewal dates between different subscriptions, either upon initial purchase or by scheduling this change in advance of renewal, purchasing add-on subscriptions independently of the parent product it is linked to, and upgrading products in the middle of your commitment term. Additionally, Microsoft offers the ability to enable overages for the minutes included in your calling plans so you can be billed in arrears instead of having to add credits prior to going over your minutes. For more information, please reach out to your Connection Account Team today, and engage the vast wealth of knowledge from within our Cloud Center of Excellence to find out how Connection can introduce you to the New Commerce Experience and take your projects to the next level.

]]>
The Power of User Profiling and... https://community.connection.com/the-power-of-user-profiling-and-connections-premium-landscape-optimization-process/ Oct 10, 2023 Laura Cox https://community.connection.com/author/laura-cox/ https://community.connection.com/wp-content/uploads/2023/10/2355519-The-Power-of-User-Profiling-Blog.jpg

In today’s technology driven world, Microsoft licensing can be highly complex. Trying to figure out which product suites contain all the functionality and feature sets your organization needs can be challenging. The old adage of a “one-size-fits-all” mentality in technology is not smart, cost effective, or productive. Especially now, when Microsoft offers so many Office suites, both on premises and in the cloud. Why wouldn’t you want to map out the correct product needs for each user group inside your company based on actual needs and usage?

There is real value in understanding your customer and all the different user groups within your organization. To know which products they are using—and what they truly need to do their jobs and to do them well—is imperative. Take, for example, the CEO of a global company. He may have specific Microsoft product needs that would require a Microsoft 365 E5 license for availability and extra security when he travels. Or we can break it down by vertical—say manufacturing—where you can have a floor worker who shares a kiosk workstation with other users during opposite shifts. These users may need Microsoft 365 F3 as they use Office Online only. In that same manufacturing example, you have Finance and HR, which would typically fall into your general knowledge user, so Microsoft 365 E3 might be the right fit for them. As we see our customers make these key decisions, it’s important to understand these end-user use cases to map the correct technologies to the correct people with precision. 

That’s where my team comes in. The XLO Team offers User Profiling Workshops as part of our Microsoft Landscape Optimization (MLO) Premium Assessment. Through a series of workshops, the MLO Premium Assessment will provide clarity and insight on your Microsoft investment strategy, while also showing a tactical approach based on your options. Evolving technology as well as the variations of modern work environments—such as virtualization, supporting a remote or hybrid workforce, security, and cloud—make these strategic decisions more important than ever for successful outcomes, and user profiling is a big part of that process.

During the User Profile Workshop, we talk with customers about how to define the various types of Microsoft users in their organization. Based on needs and usage, we map out various cost scenarios—taking into account current and future projects—to help determine which products are best suited for them and the most cost-effective option available. We are able to compare the costs associated with the Office suite with the required additional products of the top-tier Microsoft suites. From a return-on-investment standpoint, when customers go through this profiling workshop, we tend to see a much higher technology adoption rate and greater collaboration in Teams, leading to increased business efficiencies.

The next time you’re faced with a big Microsoft decision such as an agreement renewal, it’s vital to take a step back and look at your people and how they use their Microsoft technology. These technologies evolve by the day, so it's important to understand your options by breaking it down to the core of who needs what tools to succeed. You’ll have happy people, with the latest technologies at their fingertips, driving efficiency and profitability for your organization!

Reach out to your Connection Account Team for more information on the User Profiling Workshop and our Microsoft Landscape Optimization Premium Assessment. For more information, check out our vlog below.

https://youtu.be/4g5Ij5-1Ks4

]]>
Top Ten Technology Product Picks for October... https://community.connection.com/top-ten-technology-product-picks-for-october-2023/ Oct 09, 2023 Wilson Nunnari https://community.connection.com/author/wilson-nunnari/ https://community.connection.com/wp-content/uploads/2023/10/2350054-Oct-Top-Products-BLOG.jpg

As we transition into fall and the weather continues to change, check out these top products of the month for great deals for school and work readiness. This month, Connection presents some of our best monitors and storage to get you and your business ready for autumn. Read our Monitor Buying Guide and Storage Buying Guide to help you make the smartest investment for your work life. Check back often for our most popular technology products and the best deals Connection finds for you.


MSI Gaming Monitor

  • 24" curved display
  • FreeSync technology
  • HDMI, DisplayPort connectors
  • 3000:1 contrast ratio

Get the best visuals on your victory with the MSI Gaming Monitor. With FreeSync technology and a fast refresh rate, this MSI monitor can keep up with your fastest game play. And a high contrast ratio means stunning visuals and sharp colors so you can always see what’s around the next corner. Pick up this powerful gaming monitor today and save big! Check out our Gaming Technology page for more gaming considerations and solutions.


1TB Seagate LaCie Rugged Portable Hard Drive

  • Drop, liquid, and crush resistance
  • 130Mbps data transfer rate
  • USB-C port

Protect your data with a rugged and portable external hard drive. Featuring a USB-C connector, the LaCie 1TB external drive has fast data transfer and is compatible with the latest computers. Its rugged design ensures your data stays safe with resistance to drops, liquid damage, and being crushed.


23.8" Dell HD Monitor

  • 23.8" widescreen display
  • 1920 x 1080 resolution
  • HDMI, DisplayPort, USB Type A and B

Supersize your desktop with a 23.8" Dell monitor. With its widescreen display, this monitor will enable you to multitask like never before. It features all the latest ports with HDMI and multiple versions of USB—in addition to its power connector. It also has the ability to reduce blue light with ComfortView Plus technology, saving your eyes and keeping you focused.


Logitech Wireless Desktop Keyboard and Mouse

  • Concave keys
  • Cushioned palm rest
  • USB Type A wireless receiver

Enhance your typing comfort with the Logitech Wireless Keyboard. It features concave keys, a comfort-enhancing cushion palm rest, and hyper-fast scrolling on the included mouse. All these features will improve your comfort and enhance your productivity.


14" HP EliteBook 845 G9 Laptop

  • 16GB RAM
  • 512GB storage
  • USB Type A and C, HDMI 2.0, and stereo connectors

Featuring an AMD Ryzen 7 processor, the HP EliteBook 845 G9 has the power to help you get your work done with ease. This rugged business laptop features enhanced system and graphic performance and is ideal for mobile professionals. It perfects conferencing capabilities with HP Presence and supercharges your productivity on the go.


6TB Western Digital My Book Desktop

  • USB 3.0 connector
  • Up to 5Gbps data transfer speed
  • Password protection with hardware encryption

Get all the storage you will ever need with the WD 6TB Desktop Hard Drive. Compatible with Apple and Windows software, this hard drive has all the space you need for important files, photos, and videos and can be set to back up automatically in accordance with your schedule.


27" LG 4K Ultra HD LED-LCD Monitor

  • 27" 4K UHD display
  • HDMI, DisplayPort, USB Type C and A, stereo connectors
  • FreeSync Technology

This 27" LG Monitor is a powerhouse that features everything you need in a widescreen monitor. Amazing graphics with 4K Ultra HD resolution will accurately display anything you want. And the dual integrated speakers let you listen easily. And with great savings, you can enjoy all this technology without breaking the bank!


1TB WD Elements USB 3.0 Portable Hard Drive

  • USB Type A and C connectors
  • Up to 500Mbps transfer speeds
  • Small and light form factor for portability

The WD 1TB Elements Portable Hard Drive is a highly portable, technologically advanced external drive. Featuring USB 3.0, it has reliable and fast data transfer rates and universal connectivity. It offers great value and enough storage for almost any user!


Logitech K350 Wireless Keyboard

  • USB Type A wireless connector
  • Contoured palm rest
  • Wave sculpted keys

Look no further than the Logitech K350 Keyboard for a feature-packed wireless keyboard at a great value. Its ergonomic shape will prevent fatigue, and the palm rest delivers comfort for a long work day. Plus, it conveniently connects to your computer with a plug-and-play USB-A connector.


Brother HL-L2350DW Compact Laser Printer

  • Print speeds up to 32 ppm
  • 250-sheet capacity
  • Two-sided printing
  • Built-in wireless connectivity

The Brother Compact Laser Printer is a great value for compact productivity. With print speeds of up to 32 pages per minute and automatic two-sided printing, this printer will solve all your printing needs. It has a 250-sheet capacity, improving efficiency with fewer refills. Save today with this high-value printer!


Connection offers the best deals and variety of technology products for your work or home office. As we get further into fall, the preceding products will upgrade any professional space at a great value. For additional great products check out our Business Technology page.

]]>
The Power of Partnering with a Pro for AV... https://community.connection.com/the-power-of-partnering-with-a-pro-for-av-solution-success/ Oct 05, 2023 Jim Carter https://community.connection.com/author/james-carter/ https://community.connection.com/wp-content/uploads/2023/10/2343271-Blog-Post-CTS-D-BLOG.png

Organizations are adopting AV and conference room solutions at a rapid rate. The rise in hybrid work—along with technological advancements making AV solutions simpler and more affordable—are contributing to the growth of AV solutions.

As the adoption of these new technologies grows, so do the accompanying complications and risks. Organizations that do not work with an expert when designing and implementing their AV solutions risk ineffective and inefficient setups, wasted resources, security events, and more.

Connection can help overcome these challenges by providing customized, intuitive AV solutions. As Certified Technology Specialists, our expertise helps to ensure a seamless and successful AV implementation.

The Rise in Demand for Conference Room AV Solutions

The pro AV market is poised to grow by 90.51 billion USD from 2020 to 2025, a compound annual growth rate (CAGR) of 7.31%. We are seeing similar growth at Connection. In 2021, our Digital Signage Practice (DSP) achieved 41% growth, its highest sales level since its inception in 2008. 

This growth can be primarily attributed to two factors: the rise in hybrid and flexible workplaces, as well as the advancements in AV technology helping to make solutions simpler and more affordable.

Flexible and Hybrid Workforces 

The rise of hybrid workforces is one factor we’ve seen that’s led to an increased reliance on AV and conference rooms. With more than half of workers now hybrid, companies need reliable and effective tools for remote collaboration, virtual meetings, and seamless communication between on-site and remote teams. 

Although there is a greater need for collaboration technology to enhance the hybrid work experience, the quality of that technology remains lacking. In fact, less than 8% of the 90 million conference rooms worldwide are currently video enabled. As hybrid workforces continue to proliferate, organizations will need to adopt AV solutions that will allow all of their workers to feel like they are able to contribute in meetings equally—no matter where they are working.

Technology Advancements

Advancements in conference room technology is another factor that’s fueling the implementation of new AV solutions. High-resolution displays, improved audio systems, and other new technologies have all transformed the conference room experience. These innovations provide better quality, greater flexibility, and enhanced user experiences.

These upgrades have made AV solutions simpler and easier to use. For example, a separate piece of hardware used to be necessary to convert the video signal for streaming capabilities. Now, that can be done internally, by either a PC or as part of the internal compute of a complete sound bar solution.

AV technological advancements have also led to cost savings. While AV technology was once associated with high costs, advancements have made it more accessible and affordable. As prices for quality AV equipment decrease, a wider range of businesses can afford to integrate AV solutions.

Why Expertise Matters: The Complexities of AV/Conference Room Setup

Navigating the complexities of AV/IT conference room setup has become increasingly intricate. From selecting the right equipment to ensuring compatibility, optimal performance, and user-friendly interfaces, the end-to-end process can be fraught with risks—without the guidance of an expert. 

Risks of AV Design Without Expert Input

These are some of the specific setbacks that organizations who attempt to design and implement AV solutions on their own face.

Wasted Time and Decreased Productivity

Time and productivity in meetings consistently get squandered due to inefficient conference room equipment. In fact, around 15% of time spent in meetings is wasted, primarily due to inefficient conference room equipment. Difficulties like connecting to a display, launching video calls, or switching presenters during virtual meetings all waste time and productivity. 

Incompatible Equipment

Purchasing incompatible equipment that doesn’t work well with existing systems can result in frustrating issues like poor audio and video quality—or even complete system failures—during meetings. There are also several different idiosyncrasies that you may not be aware of until you’ve had the experience of designing multiple conference room spaces. 

For example, Teams only allows one camera, while Zoom allows multiple. If an organization decides down the road that they’d like to switch from Zoom to Teams, they’d only be able to access one of their cameras. Working with an expert ensures you’re up to date on these types of features of different systems, and that your new technology will work optimally with your existing setup. 

Purchasing the Wrong Equipment

Not purchasing the right equipment for the right space is another common pitfall. For example, organizations may not have the appropriate audio for the size of the conference room or experience an echo due to digital signal processing. They also risk not getting the right-sized display for their current setup, so people in certain areas have a hard time seeing the visual.

Incorrectly purchased equipment can result in wasted financial resources. You might end up spending money on components that don't meet your needs or can't be integrated into your existing infrastructure. 

For example, our AV/IT team recently worked with a company that experienced issues with their wiring diagram after working with a distribution partner. Since their issues weren’t fully apparent until after their 60-day warranty had ended, they had to pay for someone else to fix it. In addition to that added cost, they also spent a significant amount of time swapping out equipment that was bought as a mistake. 

Security Risks

AV equipment can be vulnerable to security risks. Without proper security measures, your AV system could become a potential entry point for cyberattacks. 

Experts can help to ensure you have essential security measures such as encryption, firewall configurations, or intrusion detection systems. They can also identify potential security vulnerabilities and set up proper access controls and authentication protocols to safeguard your systems. 

Navigating the Maze: How a Professional AV/IT Partner Can Help

Entrusting these tasks to an expert partner not only mitigates potential risks, but also guarantees a tailored solution that aligns precisely with your specific business needs.

Connection offers an extension to their well-established Digital Signage Practice, the  Collaboration and AV/IT practice segment. As such, we are able to provide a comprehensive solution and strategy, from design to deployment. These are the steps we take to ensure success.

Expert Assessments

Our team starts with a consultation to assess your space and needs for optimal AV setup. We take into consideration such factors as: how to best design a solution in accordance with the shape of the room, how many speakers to use in a room of a certain dimension, how far away a person would need to be to see a certain display, etc. Understanding these intricacies in advance ensures a smoother implementation process down the line.

Vendor-agnostic Recommendations

After assessing the space, we then select the best technology for your specific needs. This is based on our deep understanding of the latest AV equipment, their features, and their compatibility. 

We are vendor agnostic, so we deliver unbiased recommendations as to what makes the most sense for specific needs. This ensures a more seamless integration process and the best possible performance in the end. 

Customized Solutions

Depending on your unique requirements, we’ll design customized solutions that are tailored to meet specific needs. We focus on creating the most user-friendly interfaces and workflows by designing intuitive control systems that make it easy for users to operate the AV equipment, minimizing the learning curve and maximizing user adoption.

The Certified Technology Specialist: Ensuring Excellence

When selecting an AV partner, one of the most important elements to consider is whether they hold the CTS (Certified Technology Specialist) certification. In fact, according to the AVIXA® META: Pro-AV Channel Employment Reportmore than 80% of firms prefer or require CTS holders for higher level engineering and technician positions. 

To assure our clients that our specialists meet the highest industry standards, Connection’s Digital Signage, Collaboration, and AV/IT Practice regularly seeks out new certifications for its team of Business Development Specialists.

Recently, digital signage expert Jim Carter, Sr. Business Specialist for Collaboration and AV/IT, acquired the CTS-D (Design) certification. This specialized certificate has a pass rate of only 58% and ensures that clients receive the advanced design skills needed for complex AV projects that involve designing intricate and integrated systems.

Future-Proof Your AV Solutions with Connection

Professional AV/IT services are an essential investment in today’s evolving work landscape. With increasingly flexible work arrangements, well-designed AV spaces help to enhance collaboration and productivity, no matter where employees are working from.However, the complexity of AV design cannot be underestimated. The risks of implementing AV solutions without an AV/IT expert are substantial. That’s where Connection can help. Our expertise as Certified Technology Specialists ensures seamless, tailor-made, and intuitive AV solutions for future-ready conference rooms.

]]>
Migrate to the Cloud with Azure VMware Solution https://community.connection.com/migrate-to-the-cloud-with-azure-vmware-solution/ Sep 29, 2023 Makayla Mota https://community.connection.com/author/makayla-mota/ https://community.connection.com/wp-content/uploads/2022/12/1985808-AzureVM-BLOG-Feature-Image.jpg

Do you have a cloud migration strategy in place? With so many options and considerations, it can be an overwhelming process to say the least. Imagine a way to support an expanding remote workforce and the ability to anticipate data center changes all while seamlessly modernizing your workloads and remaining consistent in your operations. 

Built by Microsoft, the Azure VMware Solution (AVS) constructs a fast track to the cloud by migrating or extending existing VMware workloads from on-premises environments to Azure without the cost, effort, or risk of retooling operations. The struggle for organizations relying on on-premises infrastructures has always been keeping up with changes on-demand. AVS lets you move your workloads from your data center to Azure, thereby integrating additional Azure services while continuing to manage your IT environments with the same VMware tools and functionality you already know and love. Because you can choose which workloads to migrate and when, you are given flexibility to accelerate your cloud migration at your own pace.

Top Benefits 

Reduced IT Costs: Azure Hybrid Benefit can save you up to 80% by running your VMware apps on Windows Server and SQL Server licenses with Software Assurance to Azure VMware Solution. You can also receive free extended security updates for Windows Server and SQL Server 2008 and 2012 licenses with Software Assurance for three-plus years after the End of Extended Support date. Reduce costs even further by selecting one- or three-year Reserved Instances for Azure VMware Solution.

Data Center Consolidation: Consolidate your data center footprint when you reduce or retire your VMware-based virtual machines using a one-time redeployment. You can shift any or all vSphere workloads to Azure in a scalable, automated, and nondisruptive way and be assured of operational continuity without the complexity of refactoring.

Application Modernization: With AVS, you can keep managing your migrated environments with the same VMware tools you already know, while you are modernizing your applications with Azure-native management, security, and services. It's a simple and flexible way to take on modernization at your leisure. 

Security: AVS is Azure, so you can run your VMware platforms while feeling secure in your ability to protect your workloads with built-in controls and services across identity, data, networking, and apps. You will also get continuous protection from Microsoft Defender for Cloud. Security is always top of mind when supporting remote and hybrid workers and with more sophisticated threats on the rise, it is understandable to have concerns. Extend protection to hybrid environments and easily integrate partner solutions in Azure. 

Disaster Recovery: Did you know that by using a VMware Stack deployed in Azure, you are automatically setting up an on-demand disaster recovery site for an on-premises data center? The VMware Site Recovery Manager (SRM) brings proven data recovery capabilities to Azure VMware Solution by offering a streamlined experience for installation and lifecycle management directly through the Azure portal.

Ready to Get Started?

Our Connection Cloud Specialists are here to help you begin your journey. We will work with you to create, plan, implement, and expand your Azure environment using the same VMware tools and functionality you already know, allowing you to streamline and modernize your environment at your own pace. 

]]>
Windows 11 Pro Devices: Your Cybersecurity... https://community.connection.com/windows-11-pro-devices-your-cybersecurity-guardian-in-the-hybrid-era/ Sep 27, 2023 Ashley Lofaro https://community.connection.com/author/ashley-lofaro/ https://community.connection.com/wp-content/uploads/2023/09/2336221-Windows11ProDevicesCybersecurity-BLOG.jpg

Hybrid or “anywhere” work has become commonplace for business and technology professionals. Yet, this increased accessibility and flexibility in work locations have also ushered in a wave of new threats and risks.

Three quarters of security decision makers at the VP level and above feel the move to hybrid work leaves their organization more vulnerable to security threats. And cybersecurity issues and risks are top concerns for business leaders, who worry about issues like malware, stolen credentials, devices that lack security updates, and physical attacks on lost or stolen devices.

New Windows 11 Pro devices are well-positioned to take on these security challenges brought on by the new era of hybrid work. With simple deployment and advanced security protection, the time to upgrade to Windows 11 is now.

Windows 11 Pro Upgrade: A Simple and Seamless Deployment

Windows 11 Pro is built on the same foundational architecture as Windows 10, providing the basis for a smooth and straightforward upgrade. Additionally, Microsoft has designed Windows 11 Pro to be compatible with 99.7% of apps, meaning that practically all of the apps you're used to on your previous OS will continue to work.

Neglecting OS version updates is especially inadvisable. Once an update has been released, OS vendors only continue supporting the previous version for a limited time. This will soon be the case for Windows 10 as a whole; end of support for Windows 10 is on October 14, 2025.

To ensure a seamless upgrade by the designated time, companies should initiate the process now. This begins with ensuring that you have the necessary foundation, which entails addressing two key questions: "Do we possess the required hardware?" and "Will our apps be compatible?"

Do We Have the Necessary Hardware?

Windows 11 needs to operate on relatively newer hardware. Here’s an overview of some of the key minimum requirements:

  • RAM: 4 gigabytes or more
  • Processor: Minimum of 1 gigahertz or faster with 2 or more cores on a compatible 64-bit processor
  • TPM: Trusted Platform Module (TPM) version 2.0. Check here for instructions on how your PC might be enabled to meet this requirement.
  • Graphics card: Compatible with DirectX 12 or later with Windows Display Driver Model 2.0
  • Display resolution: High-definition (720p) display that is greater than 9" diagonally

See the full list of Windows 11 requirements, including feature-specific requirements like a sensor for presence detection, and a speaker and microphone for modern work. To easily check for compatibility, you can run Microsoft’s PC Health Check app.

Are My Apps Compatible?

After verifying that your hardware and systems meet the Windows 11 requirements, the next step is to determine if your apps will be compatible with Windows 11 Pro.

Fortunately, Windows 11 Pro is designed with 99.7% compatibility, so virtually all the apps you were accustomed to using on your previous operating systems will continue to function seamlessly. For Windows 10 users, line-of-business software is also compatible.

For added assurance of compatibility, the App Assure program was designed to assist Microsoft users in resolving any application compatibility issues before upgrading to Windows 11 Pro. Moreover, Test Base helps businesses to validate and test their applications on secure virtual machines before transitioning to Windows 11 Pro.

Windows 11 Pro Devices: Powerful Security from Chip to Cloud

Companies can receive the best security protection by deploying new modern Windows 11 Pro devices with security protection built in.

With phishing safeguards, passwordless security, and app control, organizations report a 58% drop in security incidents with Windows 11 Pro devices compared to Windows 10. Additionally, 2.8 times fewer instances of identity theft are reported.

Built upon the zero-trust model, modern Windows 11 Pro devices focus on giving the right people the right access at the right time, based on these three core principles:

  1. Verify explicitly: Reduce risk by explicitly verifying data points such as user identity, location, and device health for every access request, without exception.
  2. Use least privileged access: When verified, give people and devices access to only necessary resources for the necessary amount of time.
  3. Assume breach: Operate in a manner that minimizes blast radius and segment access. Vary end-to-end encryption, and use analytics to get visibility, drive threat detection, and improve defenses.

Windows 11 Pro Devices: Security at Every Level

In line with the zero-trust model, new modern Windows 11 Pro devices build security in to every level—from the core of your PC, all the way to the cloud. Below are some of the new security features and capabilities in Windows 11 Pro

Hardware

Receive built-in hardware protection out of the box with Windows 11 Pro devices through:

  • Hardware root-of-trust: Protect critical resources such as Windows Hello with a hardware-based root of trust. Windows Defender System Guard helps protect and maintain the integrity of the system as it starts up and validates that system integrity has truly been maintained through local and remote attestation.
  • TPM 2.0: The tamper-proof Trusted Platform Module (TPM) is now standard in today’s Windows 11 Pro devices. This chip provides specialized encryption features and enables upgraded cutting-edge security functions.
  • Microsoft Pluton: Microsoft Pluton offers extra protection for data-sensitive scenarios. Pluton technology is integrated directly into the PC's processor, hardening new Windows 11 Pro devices with ongoing protection for identities, data, and applications.
  • Virtualization-based security: To safeguard user credentials and essential system functions, virtualization-based security (VBS) and hypervisor-protected code integrity (HVCI) are already enabled on new Windows 11 Pro devices. VBS protects against malicious exploits by hosting a secure kernel separated from the operating system.
  • Secured-core PCs: Secured-core PCs come with the advanced security features of Windows 11 Pro turned on, protecting your most sensitive data from advanced firmware-level attacks. These devices are recommended for people handling sensitive data like intellectual property, financial records, or classified information.

Operating System

Guard your system and information from the moment it starts up with these Windows 11 Pro measures:

  • System security: Powerful system security safeguards credentials, code integrity, and network access. When a Windows 11 Pro device starts, Secure Boot and Trusted Boot work together to prevent malware and corrupted components from loading.
  • Virus and threat protection: Windows 11 Pro delivers intelligent protection against viruses and other threats. One of the ways is through the vulnerable driver blocklist, enabled by default on new devices, which prevents vulnerable versions of drivers from running.
  • Network security: Windows 11 Pro offers multiple layers of protection to strengthen network security. Windows Defender Firewall is one that reduces the attack surface of a device, safeguards sensitive data, and extends the value of existing investments.
  • Encryption and data protection: BitLocker and Windows Information Protection reduce the risk of lost or stolen data with advanced encryption.

Application

Combat common application attacks from the moment a device is provisioned with app security features such as:

  • Smart App Control: Adding significant protection from new and emerging threats, new Windows 11 Pro devices automatically ship with Smart App Control to block malicious or untrusted apps.
  • Defender Application Guard: Using virtualization-based security (VBS), Application Guard isolates untrusted websites and Microsoft Office files in containers.
  • Defender Application Control: To control what apps and drivers run on managed Windows 11 Pro devices, Windows Defender Application Control (WDAC) isolates enterprise-defined untrusted websites in virtual containers and helps prevent old and newly emerging attacks.

Identity

Protect access to sensitive information and safeguard identities with the latest security innovations like:

  • Enhanced phishing protection: Enhanced phishing protection with Microsoft Defender SmartScreen helps thwart credential theft by warning users when they enter their Microsoft credentials into a malicious website.
  • Passwordless security: Windows Hello for Business allows you to lose the passwords and sign in with PIN, face, or fingerprint.

Cloud

Extend security to the cloud to help protect devices, data, apps, and identities from anywhere. Some capabilities include:

  • Modern Device Management (MDM): Windows 11 Pro devices support MDM so that IT pros can manage company security policies and business applications without compromising user privacy on corporate or employee-owned devices. Connection partners with Microsoft to offer MDM services that help organizations improve security and service delivery while ensuring that all devices comply with corporate rules and policies.
  • Remote wipe: Windows 11 Pro devices support the Remote Wipe configuration service provider (CSP) so that MDM solutions can remotely reset the device and remove user accounts and data, reset the device and clean the drive, and reset the device but persist user accounts and data in the case of a lost or stolen device.

Securely Embrace the Future of Work with Windows 11 Pro Devices

As hybrid workforces grow and cyber threats advance, Windows 11 Pro emerges not just as an upgrade, but on new modern devices, as a guardian of your security. With simple deployment and advanced security protection—from your PC all the way to the cloud—Windows 11 Pro devices provide the assurance you need to enable secure hybrid work.

To learn more about how Connection can help with your Windows 11 Pro device refresh, contact us today.

]]>
It’s All about the GPUs https://community.connection.com/its-all-about-the-gpus/ Sep 26, 2023 James Rust https://community.connection.com/author/james-rust/ https://community.connection.com/wp-content/uploads/2023/09/2334614-BH-GPU-Manufacturing-BLOG.png

GPU usage in the data center has been steadily growing for the past few years and now accounts for 46.1% of the revenue share in the data center.1 This number is only expected to go up—and with good reason. The parallel processing power of a GPU is exponentially greater than that of a CPU: a typical CPU has less than a hundred cores, while GPUs can have thousands. Their high bandwidth allows them to access data quickly and complete processing for complex computations far better than a traditional CPU. All these advantages have changed the landscape in data processing, but a GPU in a data center is no longer enough.

GPUs at the Edge

Thanks to the incredible amount of data generated by industry 4.0 technology, computations have been moved to the edge to save bandwidth and lower energy consumption. By offloading computationally intensive tasks to GPUs, edge devices can improve their performance and responsiveness while reducing the amount of data that needs to be sent to the cloud. Naturally, GPUs have started to see higher use at the edge, especially when processing data generated from smart cameras, self-driving cars, and medical devices.  In many cases, these computations need to be processed as quickly as possible to make real-time decisions. As a result, GPUs have seen increasing usage. 

Quicker Decisions 

This kind of computational power enables the processing of 2D images (nothing more than a large data set to a computer), allowing computer vision applications to function. For example, GPUs can process images and videos from smart cameras in real time. This can be used for facial recognition, object detection, quality control, and traffic monitoring tasks. GPUs can also be used to analyze data from industrial robots to improve their performance and safety. As edge computing grows, GPUs will play an increasingly important role in enabling these and other applications in manufacturing. GPU prices are dropping, but this trend may not last with the rise of AI applications in business. Investing in the data center now may be the best bet for those looking to take full advantage of the promise of Industry 4.0.

Collaboration Is the Key to Implementing Complex Solutions

Bringing GPUs to the edge is by no means easy. High-performance tools generally demand more energy and space, and GPUs are no exception. Another challenge is the high heat generated by the devices, and plenty of factory floors still lack climate control. It can be difficult to consider everything when outfitting a new solution, which is why Connection works with so many partners to ensure our customers have everything they need from the right edge compute solutions inclusive of fanless and industrial hardware designed to perform in any manufacturing environment. 

If you’re looking for ways to decrease your data cost or need to ramp up your infrastructure for industry 4.0 applications, engage Connection’s Manufacturing Practice today to get started. 

]]>
Modernize Your Data Center with AMD https://community.connection.com/modernize-your-data-center-with-amd/ Sep 26, 2023 Ephraim Gehr https://community.connection.com/author/ephraim-gehr/ https://community.connection.com/wp-content/uploads/2023/09/2339548-Modernize-Your-Data-Center-with-AMD-BLOG.jpg

There are three major pain points that customers are facing in their environment. Software licensing costs, heating/cooling costs, and green initiatives are on the top of everyone’s mind. The push to maintain a higher level of service while reducing operating costs is a driving reason we look to new technologies for answers. Corporate green initiatives mean every watt must be utilized efficiently. Cuts must be made to consumption of resources.

Overpaying for Software Licensing Fees

Software licensing fees are based on the number of cores you have in a server. It’s well known that software licensing costs are ten to forty times more than the cost of the server on which it resides. If we can reduce the core count while maintaining the required performance of your server, we can save your company a great deal on software fees. Condensing more performance into the latest 5nm based 4th gen AMD EPYC™ processors allows us to do precisely that. This can be accomplished in server offerings from all the major server OEMs. Use this savings to refresh a cluster or to upgrade software to solutions that provide more automation and reduce maintenance demands on your IT department staff. Bottom line—use the latest technology from AMD to improve your operating efficiencies.

Consuming Too Much Power and Cooling for Data Centers

When a one processor system can accomplish more work than two, we reduce the number of cores. Doing so reduces the data center footprint. With the exponential increase in data businesses are generating, more can be housed in the same footprint. This drives down costs associated with real estate, power consumption, and cooling. And with AMD EPYC™ processors all in one feature, you get the same I/O, memory, and memory bandwidth to accomplish your goals—regardless of the number of cores you configure.

Meeting Company Sustainability Initiatives

More companies are adding green initiatives. Ken Bartels, AMD-focused Technical Sales Executive at Connection, has this to say: “When comparing integer performance for a recent large data center opportunity, we found that AMD Genoa (4th generation) over AMD Milan (3rd generation) has a 35% better performance per core in an example workload. AMD’s latest generation also provided a 22% improved performance per watt.” Using AMD’s TCO tool, we can calculate CO2 emissions you will reduce and kWh saved by making the move to advanced server solutions powered by AMD EPYC™. Let us help you attain those goals with the most efficient data center processors from AMD. You can learn more about how AMD helps meet sustainability goals on their blog.

Help Navigating Your Next Data Center Refresh Is Available

Whether it’s a single server or complete data center refresh, keeping data center costs down while delivering more value to your company is more critical to overall business success than ever before. Meeting more stringent green initiatives sets your company apart from competitors. AMD EPYC™ powered solutions from Connection can make those impacts to your TCO. Take a look at the newest case studies to see what EPYC is doing for customers like you. Get more information on AMD EPYC™ based data center solutions from Connection. Then reach out to your Account Manager and request an AMD TCO Analysis to get started.

]]>
Flying the Friendly Skies with Microsoft Copilot https://community.connection.com/flying-the-friendly-skies-with-microsoft-copilot/ Sep 19, 2023 John Ryan https://community.connection.com/author/john-ryan/ https://community.connection.com/wp-content/uploads/2023/09/2329277-Microsoft-Blog.jpg

When I hear the word “copilot,” I immediately think about airplanes and passenger jets, and how flying a plane safely requires both a pilot and a copilot. In commercial aviation, there is a distinct rank and order between these two roles, with the pilot being a licensed, experienced professional, acting as the final decision-maker while onboard. They are tasked with remaining calm under pressure, operating, and controlling their aircraft according to planned flight paths and during takeoffs and landings—while simultaneously monitoring the numerous systems present and required to keep an airplane safely in the sky. The copilot has similar roles and responsibilities, most importantly that they take their orders from the pilot. Copilots can also fly the plane if the pilot is unavailable, take the lead on radio communications, assist with flight planning and navigation, acquire weather briefings, monitor the plane’s instruments and systems, and keep the pilot aware of the status of these details. Essentially, the pilot and copilot are responsible for moving an airplane and its contents from one defined place to the next.

When it comes to Microsoft Copilot, I see a similar division of labor between the human individual who is in charge of what information goes into their Microsoft environment (aka, the Microsoft Graph—made up of data in your Microsoft Cloud Services such as Teams, Word, Excel, PowerPoint, Outlook, etc.) and what this individual tasks their copilot with via ChatGPT, the AI-powered Large Language Model chatbot and digital assistant. Taking this view helped me understand the meaning and power of Microsoft Copilot—and reduced my initial hesitation of using it!

You Will Always Be the Pilot

There is a certain creativity factor that we as human “pilots” bring to the forefront of what we do with our data that Microsoft Copilot will never have; this is the unmistakable difference between the human brain and AI. Microsoft Copilot does not make you smarter. You do not teach Copilot or make it smarter either—it does not learn from your data, your queries, or your inputs. Copilot does not make you more creative, but it can help you review and compile and format years and volumes of research into a more organized and easier to understand outline, or a rough draft. It does this by tapping into ChatGPT’s machine learning algorithms, which have been trained with data from the Internet.

Imagine the Possibilities of Working Together

Copilot is going to enable us to save so much time when searching for compelling, relevant information. But it is particularly important to note that getting the most from Copilot will require practice, particularly when wording requests. Copilot has no imagination, so you—the end user, the pilot—must use your creativity to get the most from Microsoft Copilot. Microsoft Copilot will access the data, your data, that has and always will contain the biases of the sources; however, the immeasurable benefits of harnessing the power of Microsoft Copilot within your organization will be worth your time and effort. Imagine being able to pull together and summarize hundreds of pages of text for your next research project, having help to create the first draft of your findings in a PowerPoint slide (even though you are terrible at PowerPoint), and then, translating it all into a language you have never spoken. The thought of that absolutely amazes me!

Outputs and creations like this clearly indicate how AI users will have an advantage over non-users, even though AI will always need guardrails in place to tease out biased or false information. The ability we have as the “pilots” to separate any false information from meaningful and actionable insights and put that into practice for the future good of humankind is truly a thing to behold. Stay tuned for more Copilot information from Connection.

]]>
Tackling Tech Challenges with Our TIDC https://community.connection.com/tackling-tech-challenges-with-our-tidc/ Sep 12, 2023 Steven Crowthers https://community.connection.com/author/steven-crowthers/ https://community.connection.com/wp-content/uploads/2023/09/2312822-TIDC-BLOG.jpg

Businesses today are experiencing a myriad of challenges as they attempt to configure, integrate, and deploy a high volume of new technologies. They are navigating complex integration processes, a lack of system standardization, resource constraints, legacy systems, cost overruns, and security concerns, among other obstacles. 

The escalating costs directly related to these challenges are significant. Poor integrations and lack of resources are costing businesses around $500,000 per year. For a more streamlined, scalable, and cost-effective configuration and integration process, organizations are in need of expert support.

Connection’s state-of-the-art Technology Integration and Distribution Center (TIDC) is well-positioned to provide that support. With an unwavering level of commitment to customer success, we design completely customized and tailored solutions to address these key challenges.

Our success can be attributed to two key principles: taking a customer-centric approach and embracing lean manufacturing principles and agile operations. Ultimately, these processes yield big business benefits for our customers, including streamlined processes, increased security, and accelerated growth, among others. Here’s how our unique approach helps to make that happen.

The TIDC Recipe for Success: A Customer-centric Approach and Agile Operations

The TIDC is widely recognized as a leading IT services and solutions provider, in large part due to our two-prong approach: leading with customer-centric and customer experience models and embracing lean manufacturing principles and agile operations.

Customer-centric and Customer Experience Models

At the TIDC, our foremost priority is the satisfaction and success of our clients. We have developed a customer-centric and customer experience model that lies at the heart of our operations. This model includes four main components:

  • Proactive support: Anticipating customer needs and resolving issues before they become problems, helping to enhance customer satisfaction and reduce potential negative impacts on the customer experience.
  • Continuous improvement: Regularly analyzing customer feedback, metrics, and data to identify areas for improvement and continually refine the customer experience.
  • Empowered employees: Creating a customer-centric culture starts from within the organization. Empowering employees to take ownership of customer interactions and providing them with the necessary training and tools to deliver exceptional service.
  • Consistency and reliability: Building trust with customers by consistently delivering on promises and ensuring a reliable experience across all interactions.

Each customer has unique business objectives, technology infrastructure, and operational requirements. By deeply understanding our clients’ needs, preferences, and pain points, we can tailor our offerings to exceed their expectations consistently. This delivers more value and ensures that customers get the most out of their investments.

For example, we recently worked with a client that was operating in a highly regulated industry, facing stringent data security requirements during their system integration. The TIDC implemented robust security measures and compliance protocols, ensuring that all data exchanges were secure and in line with industry regulations.

Another enterprise client of ours had a complex IT landscape, with multiple legacy systems and modern applications that needed to communicate seamlessly. The TIDC’s deep expertise in handling diverse technologies enabled a successful integration, improving overall operational efficiency.

Because of the TIDC’s customer-centric approach, we were able to deliver tailored services and solutions that aligned seamlessly with our client’s business goals and optimized their end-user experience.

Lean Manufacturing Principles and Agile Operations

The TIDC has also embraced Lean Manufacturing Principles, a systematic approach to optimize processes and eliminate waste, ultimately improving the efficiency and effectiveness of operations. Several principles underpin Lean Manufacturing, and some of the key ones are:

  • 5S Methodology: The 5S methodology consists of five Japanese terms: Seiri (Sort), Seiton (Set in Order), Seiso (Shine), Seiketsu (Standardize), and Shitsuke (Sustain). This principle aims to create a clean, organized, and standardized work environment, reducing wasted time and resources while enhancing safety and productivity.
  • Visualization Toolsets: Visual management tools are used to provide real-time information on key performance indicators (KPIs), progress, and issues. Visualizing data and processes helps teams identify bottlenecks, inefficiencies, and opportunities for improvement.
  • MDI (Managing for Daily Improvement): MDI involves conducting regular short meetings to discuss performance metrics and improvement initiatives. These daily huddles foster a culture of continuous improvement, enabling teams to address challenges promptly and make data-driven decisions. The process enables continuous enhancement of our workflows and ensures that we stay ahead of the curve.

We have gained remarkable benefits by integrating these principles into our operations, including:

  • Improved product quality: By reducing waste and streamlining processes, Lean Manufacturing helps maintain consistent product quality, ensuring customers receive reliable and defect-free products.
  • Faster delivery times: Lean principles optimize production and distribution processes, leading to faster turnaround times. Customers benefit from shorter lead times, receiving their orders promptly.

For example, we recently helped a client who had a tight deadline for integrating their new software with existing infrastructure. The TIDC’s quick deployment and efficient project management ensured a timely integration, preventing disruptions to their day-to-day operations.

  • Enhanced flexibility: Lean practices enable companies to respond quickly to changes in customer demand, allowing for greater flexibility in accommodating varying requirements.

For example, we recently worked with a client who required a scalable and cost-effective solution to integrate their e-commerce platform with their back-end inventory system. The TIDC’s scalable architecture enabled them to handle a growing customer base seamlessly, leading to increased sales and revenue.

  • Lower costs: By eliminating waste and inefficiencies, Lean Manufacturing reduces operating costs. This cost optimization can result in more competitive pricing for customers.
  • Increased customer satisfaction: Consistent product quality, faster delivery, and better responsiveness contribute to improved customer satisfaction and loyalty.
  • Customization: Lean principles can enable efficient customization of products and services, meeting individual customer needs effectively.

For example, a medium-sized enterprise that we recently worked with needed to integrate their CRM, ERP, and inventory management systems to optimize their operations. The TIDC’s expert team designed a custom integration solution that streamlined processes, resulting in a significant reduction in operational costs and improved customer satisfaction.

  • Sustainability: By reducing waste and resource consumption, Lean Manufacturing aligns with sustainability goals, appealing to environmentally-conscious customers.

Overall, the implementation of Lean Manufacturing principles benefits both companies and customers. It drives continuous improvement, streamlines processes, and ultimately delivers higher value products and services, ensuring a positive experience for customers.

Seamless and Affordable Technology Integrations Through  the TIDC

By leveraging a customer-centric experience model and Lean Manufacturing Principles, Connection has consistently driven success for our customers and allowed them to achieve better outcomes. Our approach not only has established the TIDC as a true differentiator in the IT services industry, but also enables us to exceed client expectations, deliver innovative solutions, and propel their business growth.

To discuss how the TIDC can bring value to your organization and support your IT services requirements, contact a Connection expert. We’ll help to streamline the configuration, deployment, and support of your IT today.

]]>
TechSperience Episode 120: How to Modernize... https://community.connection.com/techsperience-episode-120-how-to-modernize-your-data-center-and-save-big-with-amd/ Sep 09, 2023 Connection https://community.connection.com/author/connection/ https://community.connection.com/wp-content/uploads/2023/09/2339548-AMD-DataCenter-Podcast-BUZZ.jpg

Modernizing your data center is crucial to your organization's long-term success. In this podcast, we'll better define what data center modernization can look like for different organizations, talk through some of the ideas and promises from AMD, and offer up stories of where teams can succeed.

Host: James Hilliard

Guests: Kristin Hintlian – AMD Channel Sales Manager for Connection

Ken Bartels – Connection Technical Sales Executive for AMD

Show Notes:

[0:45] Modernization can mean a lot of different things to a lot of different people. What does a modern data center mean to customers?

[2:37] Are newer companies also looking to modernize due to how quickly the market is moving?

[4:40] What are some of the biggest and smallest data centers that you've been to, and how have they been able to modernize?

[7:00] What are the "people" challenges when modernizing data centers?

[11:40] Organizations are facing three big challenges surrounding data center modernization: needing better performance, reducing energy consumption, and reducing software licensing fees. How does AMD address these challenges?

[17:45] What cost savings in software licensing fees are customers seeing?

[19:35] Are there specific industries that are leading the modernization charge?

[21:50] What are some of the ways teams that have modernized with AMD have been able to push their healthcare organization forward?

[24:40] What are some examples in the manufacturing space where AMD has been able to help companies move forward?

[27:35] Walk us through some typical customer interactions in terms of how they can get an overall cost of ownership view of where they are at vs. adding new technologies.

[30:40] After the initial TCO analysis is completed, how can customers then get a good roadmap of how to get started based on their business goals?

[32:45] Reach out to your Connection account team for a TCO analysis to see what your data center modernization journey could look like.

]]>
Azure Virtual Desktop: Connection Managed... https://community.connection.com/azure-virtual-desktop-connection-managed-services/ Sep 06, 2023 Makayla Mota https://community.connection.com/author/makayla-mota/ https://community.connection.com/wp-content/uploads/2023/09/2314800-AVD-BLOG.jpg

How is your organization providing remote access to desktop environments?

Azure Virtual Desktop (AVD) is a Desktop as a Service (DaaS) solution provided by Microsoft as part of the Azure cloud-computing program. It allows organizations to create and manage virtualized desktop environments in the cloud, enabling them to deliver Windows desktops and applications to end users on various devices such as computers, tablets, and smartphones. With so many organizations continuing to embrace hybrid working environments, AVD is a useful way to provide remote work solutions like delivering legacy applications, consistency across desktop experiences, and secure access to confidential and sensitive data. 

Key features of AVD that enable you to create a scalable and flexible environment:

  • Create a full desktop virtualization environment in your Azure subscription without running any gateway servers.
  • Publish host pools as needed to accommodate diverse workloads.
  • Bring your own image for production workloads or test from the Azure Gallery.
  • Reduce costs with pooled, multi-session resources. 
  • Provide individual ownership through personal (persistent) desktops.
  • Manage costs by using auto-scale to automatically increase or decrease capacity based on time of day, specific days of the week, or as demand changes.

Ready to Get Started?

Connection is a Microsoft-certified Azure Expert Managed Service Provider, and we are here to help you design, implement, and manage your AVD environment. Our AVD Managed Service supports your organization through five core components:

  1. Managed Implementation: Whether you need management for a new environment or an existing infrastructure, your Connection Account Team will configure and administer every aspect of your AVD. 
  2. Cost and Performance Optimization: We will help to auto-scale resources to make your performance more efficient, while reducing compute and storage costs by adjusting resources to user demand.
  3. Security and Compliance: By enabling Azure Active Directory multi-factor authentication (MFA) and conditional access, Connection will ensure that your environment is safe. We also provide network security, anti-virus configuration, and operating system patch management.
  4. Image Creation and Management: We will assist you in the creation of desktop images from gallery, VM, or existing custom images and manage AVD image host pools, versioning, backup, and disaster recovery.
  5. Monitoring and Support: Take advantage of our proactive incident and problem management. Your AVD environment is backed by our 24 x 7 x 365 customer support team of engineers who are certified Azure Experts.

Azure Hybrid Benefit

As you consider migrating to Azure to support your organization’s remote workers through AVD, you may also want to take advantage of Azure Hybrid Benefit to offset costs if you qualify. If you have existing on-premises Windows Server or SQL Server licenses with active Software Assurance or Linux licenses, you can bring those licenses to Azure and create a more cost-effective way to maintain a flexible hybrid environment. By reusing your existing licenses with Azure Hybrid Benefit, you’re only paying for the additional infrastructure, whereas, with cloud services from other providers you would be required to pay for both the infrastructure and the server licenses. 

How Can You Qualify for Azure Hybrid Benefit through Connection? 

  • Achieve Cost Savings by applying your existing Windows Server, SQL Server licenses, and Linux subscriptions to Azure Hybrid Benefit. Customers can realize up to 76% in savings with Azure Hybrid Benefit for Linux.1
  • Modernize and Manage a Flexible Hybrid Environment by utilizing Azure services with your on-premises infrastructure. Connection can help you modernize and manage your infrastructure and test cloud specific services with Azure solutions.
  • Leverage adjacent Azure services and benefits with Azure Hybrid Benefit. Offers and updates are available to maximize cost savings and optimize your business applications.

Your Account Team at Connection can help you navigate your Azure needs, from migrations to benefits and the optimization of your environment.

1The 76% savings is based on one standard D2s v3 Azure VM with RHEL or SLES subscription in the East U.S. region running at a pay-as-you-go rate vs a reduced rate for a 3-year Reserved Instance. Based on Azure pricing as of October 2022. Prices subject to change. Actual savings may vary based on location, instance type, or usage.

]]>
Connection Cares in Action: Celebrating... https://community.connection.com/connection-cares-in-action-celebrating-achievements-in-corporate-social-responsibility/ Sep 05, 2023 Connection https://community.connection.com/author/connection/ https://community.connection.com/wp-content/uploads/2023/08/2306538-Connection-Cares-BLOG.jpg

At Connection, we believe that caring for our community is at the heart of everything we do. Our Connection Cares initiatives turn our commitment into action through impactful employee resource groups, dedicated specialty groups, programs, events and more. Let’s take a closer look at some of the incredible things each group has accomplished so far this year.

Diversity, Equity, and Inclusion: Fostering Unity

Employees took strides toward fostering a more inclusive workplace by launching two new Employee Resource Groups including the Rainbow Alliance to support our LGBTQ+ community and its allies and establishing an Empowered ERG for the advancement of women in all aspects of their lives and professional journeys. 

Our commitment to diversity and inclusion took center stage during Pride Month. The DEI group in collaboration with the Rainbow Alliance ERG invited our employees to show their pride by decorating their workspaces in vibrant Pride gear or sharing videos about what Pride means to them. The colorful transformation served as a powerful, visual celebration of unity, filling our workspaces with positivity and acceptance.

The Rainbow Alliance ERG also shared information on our internal social media network about members of the LGBTQIA+ community who have made contributions to tech and science, such as astronaut Sally Ride and computer science pioneer Alan Turing. They also collaborated with the Charitable Contributions Group to make a donation to the Trevor Project, a nonprofit organization that actively supports efforts to raise awareness and combat suicide among LGBTQIA+ youth, reinforcing our commitment to creating a safer, more welcoming environment for everyone.

Charitable Contributions: Making a Meaningful Impact

Our Charitable Contributions group worked to ensure every Connection employee had a chance to support causes that they find meaningful. By facilitating charitable donations and volunteering opportunities, we empowered our team to make a real difference in their communities. We also created a program that allows employees to suggest organizations for our group to support—to help us spread our contributions far and wide throughout our communities.

In the chill of winter, we focused our charitable contribution efforts on bringing warmth. At our annual Lenovo Winter Wonderland event, we hosted a coat drive to collect a total of 115 jackets. These jackets were cleaned and distributed to charitable organizations in the Burlington, VT area, ensuring that those in need were provided with essential warmth during the cold season.

At our annual kickoff event, we invited contributions to both the New Hampshire Food Bank and J.C. Mitchell Elementary, a school in South Florida nearby our West Palm Beach kickoff festivities. The combined effort resulted in an impressive 184 lbs. of donations for the food bank and 199 books—donated both in-person and through Scholastic Books online—for the school. We’re proud to contribute to the health and wellbeing of both communities!

As Connection is committed to supporting the education community, we also participated in a give-back program during the industry’s largest educational technology trade show. The program focused on providing personal hygiene items for students, empowering teachers to address the needs of students who face challenging circumstances. The initiative was met with enthusiasm and appreciation from educators and administrators nationwide. Teachers who visited our booth expressed deep gratitude for our commitment to addressing the practical needs of students, allowing them to focus on their education without worrying about essential hygiene products. Many educators shared their own experiences of witnessing the positive impact of such initiatives in their schools.

Sustainability: Nurturing a Greener Future

In April, our Sustainability group organized an initiative in honor of Earth Day. It was a call to action, not just for a single day, but for a future where our collective efforts make a lasting impact on the world we share. Leading up to Earth Day, our Sustainability group embarked on a mission to inspire and engage all employees to take meaningful steps toward environmental conservation. Each member of the Connection family was encouraged to embrace their role as caretakers of the Earth, championing sustainability in their daily lives. Employees were invited to capture their Earth Day actions through photos or videos, accompanied by descriptions of their eco-friendly activities.

Colleagues from all departments of our organization enthusiastically shared their efforts, and to make this initiative even more rewarding, all submissions were entered into a raffle to win gift cards to EarthHero, a platform that empowers individuals to shop sustainably for products that are gentle on our environment. This incentive not only celebrated Earth Day participants, but also amplified the message that sustainable choices can be both fulfilling and enjoyable.

Employee Recognition: Honoring Our Stars

In March 2023, our Employee Recognition group organized an unforgettable Employee Appreciation Day. With seamless collaboration and dedication, we shared the significance of this special day through messages from Connection Leadership and our internal channels. The highlight was a raffle, open to all Connection employees, symbolizing our heartfelt appreciation. While not an official holiday, Employee Appreciation Day resonates with our deep pride in cherishing and honoring the exceptional individuals that share our workplace. Those are just some of the great initiatives our teams have sponsored this year—and be sure to check in later to see what we get up to during the rest of the year!

]]>
AI Roadmaps Are Critical to Retail https://community.connection.com/ai-roadmaps-are-critical-to-retail/ Aug 31, 2023 Brian Gallagher https://community.connection.com/author/brian-gallagher/ https://community.connection.com/wp-content/uploads/2023/08/2301651-Retail-AI-Roadmap-Blog.jpg

Building a retail organizational AI Roadmap must be a top priority going into 2024. The next 12–18 months will be the most important months in the history of your retail brand. This is when you must decide when, where, and how you will apply AI to enable your business for the future.  Customers are expecting to see AI solutions now, and while that may not be completely practical, waiting two years will not be acceptable. 

Over the past decade, we have watched as brand after brand has disappeared after refusing to embrace technology as a means to transform their business. As recently as 2019, only 50% of retailers had a mobile engagement platform for customers. Learn from these lessons or risk being the one left trying to save a brand.

As a retailer, you must embrace the acceleration of AI and decide how technology can elevate your brand value. Retailers will not have 15–20 years to decide the role of AI; retailers will have just three–five years to implement AI solutions. Now is the time to begin the work. The most important thing you can do over the next 12 months is to develop a complete AI roadmap to understand how every facet of your brand will be affected.

The steps to developing a roadmap appear simple, but do not let that fool you—this project requires a deep commitment throughout the entire organization. This roadmap will transform your entire business, from marketing to stores to supply chain, and they all must happen in unison.

Develop Your AI Roadmap in 4 Steps

  1. Document Desired Business Outcomes: Outline the organization’s strategic goals, brand value, and brand differentiators. Consider this a two- to five-year roadmap. Prioritize the strategic goals, values, and differentiators into a single list. 
  2. Identify Partner(s) to Explore AI Opportunities Aligned with Desired Outcomes: Align AI solutions to business use cases, keeping in mind your priorities and ROI. Do not focus on what you know exists today—make it a wish list. Re-align the priority list based on your discovery discussion.
  3. Assess the Current State of the Organization: What are the existing AI applications? What are your building blocks—data governance, networking, edge computing, security? Search for institutional knowledge and partnerships.
  4. Develop and Publish a Time-bound Roadmap: Assign technology and LOB champions to each goal of the roadmap. Understand that the map will change, but fight the urge to follow trends unless they align with your priorities.

It is important to embrace AI as a journey, not a destination. As your business evolves, allowing customers and employees to experience new solutions, so will your roadmap. The question should always be, “Do these solutions align with our strategic goals and priorities?” Nobody can say what the world of AI will look like in five years, but you can control how your brand will leverage AI. Connection would love to be your partner in developing your roadmap and identifying solutions aligned with your business goals. Engage our Retail Practice or contact your Account Team today to get started!  

]]>
Connection’s Asset Discovery... https://community.connection.com/connections-asset-discovery-optimization-assessment-what-can-you-expect/ Aug 31, 2023 Lesley Thomas https://community.connection.com/author/leslie-thomas/ https://community.connection.com/wp-content/uploads/2023/08/2306471-ADO-Blog.jpg

The excitement that ensues as a Microsoft True-Up approaches is unparalleled—said no IT professional ever. It happens every year, yet it is sometimes dreaded as much as filling out your taxes. This is because, year after year, the mission is so similar. The sole purpose of your True-Up is to reconcile what has happened over the past year, make your best prediction of what will happen in the coming year, and do everything you can to avoid an audit.

For your organization, it might be a question of SQL licensing. Maybe you’re considering a move to Modern Work. Or perhaps you’ve completed a divestiture—or made an acquisition—and the records are a bit of a mess. Couple that with the complexities of Microsoft licensing rules and it can get overwhelming very easily. But what if I told you Connection offers an Asset Discovery and Optimization (ADO) Assessment aimed specifically at customers approaching their True-Up that offers full visibility into the assets deployed on your network? Interested? Of course, you are!

How It Works

We start the engagement by gaining full visibility into the assets deployed on your network. This includes servers, workstations, mobile devices, and the software used across their endpoints. Connection is partnered with Block64 to provide a low-impact, agentless discovery tool that is fast and easy to deploy. The entire configuration only takes 30 minutes.

Once deployed, your asset inventory is encrypted and securely transferred to a regionally located Tier 4 data center. It is then cleansed, categorized, matched, analyzed for advanced reporting—including installed software categorization, license assignment, hardware warranty matching, and end-of-support / end-of-life status—and cross-referenced with all known security vulnerabilities.*

You might need some of this, or even all of this, which is why the ADO engagement is broken down into three service levels:

Standard

  • Ensure your on-premises and hybrid cloud server environment is ready to meet evolving business demands. Get actionable insights into server capacity, utilization, and licensing to shrink your data center footprint, improve workload performance, and reduce costs.
  • Server Optimization Assessment: Connection will review your legacy Windows and SQL Server licensing for supportability, identify over- and under-utilized hardware, look for ways to reduce your server footprint, and look for savings opportunities using your Azure Hybrid Benefit and reserved instances.
  • Azure Virtual Desktop: An overview of existing virtual and physical client infrastructure that provides recommendations for optimization.
  • Modern Work; We can help you assess the unique requirements of your business and users to create a roadmap for workplace transformation that leverages the latest Office 365 productivity and collaboration technologies with a licensing solution that fits your budget.

Premium

  • Standard benefits plus Microsoft Software License Compliance
  • 90-Day license key for the use of Block 64 inventory tool
  • Normalization of all active licenses and subscriptions
  • Azure Hybrid Benefit licensing review
  • Consultant-led license compliance validation

Premium Plus
Premium benefits plus Effective License Position (ELP) to help you reconcile your license entitlements against the deployed estate.

At the end of the ADO engagement, your Connection Account Team delivers reporting and analytics to help you leverage what you have, orphan what you no longer need, and advise you on what you might find useful. This makes the Microsoft True-Up experience less like doing taxes and more of an eye-opening opportunity to propel your organization feet first into a year of innovation.

Ready to learn more? Reach out to your Connection Account Team today or watch our vlog

https://www.youtube.com/watch?v=MbSiZ1D9wGc

*From: Block 64 Discovery and Analytics Platform

]]>
Why Worry About Zero Trust? https://community.connection.com/why-worry-about-zero-trust/ Aug 29, 2023 Stephen Nardone https://community.connection.com/author/stephen-nardone/ https://community.connection.com/wp-content/uploads/2023/08/2289328-ZeroTrust-BLOG.jpg

By 2026, organizations prioritizing their security investments via a continuous threat exposure management program will suffer two-thirds fewer breaches.* Zero Trust is all about keeping threat and risk in check. As threats emerge, they give rise to potential risks, and if unaddressed, these risks can culminate in breaches or compromises. This progression is essentially inevitable.

The transition from a traditional brick-and-mortar organization to a remote work or hybrid environment has introduced significant threats and risks that have now become our new normal. Unfortunately, gaps in business continuity planning and the challenges associated with extending corporate cybersecurity protocols to untrusted networks have resulted in unchecked vulnerabilities.

Changing the way we do business, where employees connect from, what devices they use, how they access critical business systems, and how they behave in relation to social engineering all have significant impact on security risk management and the potential for compromise.

Various factors contribute to the evolving security landscape, such as changes in how we conduct business, the locations from which employees connect, the devices they utilize, their methods of accessing critical business systems, and even their susceptibility to social engineering tactics. All these aspects collectively wield substantial influence over security risk management and the potential for security breaches.

We find ourselves at a crucial juncture in the execution of cybersecurity programs. Organizations are now insisting on a comprehensive framework encompassing architecture, technology, processes, and policies that align with the principles of Zero Trust.

What Is Zero Trust?

Simply put, Zero Trust is a cybersecurity paradigm focused on resource protection and the premise that trust is never granted implicitly and must be continually evaluated. It establishes the policy that no identity, no system, and no process is allowed to connect to an organizational resource without passing the required policy checks for identification, authentication, and authorization.

The policy applies regardless of either the title or role of individuals, and regardless of physical or logical location (whether outside or inside of a perceived perimeter). Zero Trust is a marathon, not a sprint. It provides a set of guiding principles that can then be translated into architecture to meet an organization’s specific threat and risk needs.

How to Achieve Zero Trust

Organizations need to define and document what is required to understand and achieve a level of a Zero Trust Architecture and establish a timetable for implementation. Each step is essential to the process and must be accomplished for all business functional units (BFU) and organizations required to achieve a level of Zero Trust. Key stakeholders need to collaborate to establish a roadmap that includes evaluating existing technology, process, and policy to define a path forward including:

• Baseline the level of understanding of Zero Trust across all necessary BFUs
• Provide knowledge transfer to ensure all BFUs are at the same baseline
• Define the level of sponsorship and participation required by the BFUs to achieve Zero Trust objectives
• Identify and prioritize the business and security risks and their impact to achieve Zero Trust objectives
• Develop and present detailed findings to all BFUs and stakeholders

Organizations that invest in development of a Zero Trust Architecture will be better prepared to cost-effectively manage the never-ending cybersecurity threats that surface daily. Reach out to your Connection Account Team to learn more about Zero Trust Architecture and the solutions we provide.

]]>
Empowering K-12 Education: Embracing the... https://community.connection.com/empowering-k-12-education-embracing-the-synergy-of-printing-and-technology/ Aug 28, 2023 Casey Teel https://community.connection.com/author/casey-teel/ https://community.connection.com/wp-content/uploads/2023/08/2295159-Cannon-PSG-Education-BLOG.jpg

In the ever-evolving world of K–12 education, technology continues to shape classrooms into centers of creativity and engagement. Amidst this digital transformation, we shouldn’t overlook the significance of printing in the learning process. At Connection, we firmly acknowledge the importance of equipping educators with the appropriate tools to inspire their students, a principle we proudly share through our partnership with Canon U.S.A.

Why Printing Matters in K–12 Schools

The role of printing in the education sector remains crucial for effectively meeting the needs of students and teachers. In K–12 schools, printing is instrumental in supporting vital areas like extracurricular activities, fundraising, admissions, HR services, and alumni and community relations activities. According to a survey of the education industry by InfoTrends[1], between 15% and 30% of printed materials consist of support materials, such as diplomas, certificates, report cards, and newsletters. Furthermore, teachers heavily rely on accessible printing to produce teaching materials, with 65% to 90% of print jobs dedicated to teaching and educational support.

According to Bay View Analytics, approximately 61% of educators and 55% of students prefer print over digital when it comes to educational materials[2]. This preference for print underscores the continued importance of printing technologies in fostering engaging and effective learning experiences within K–12 schools.

Paper vs. Screen

While digital learning materials are likely here to stay, they do not negate the importance of paper-based educational materials. According to Acta Pediactrica, research indicates that the duration of book reading in children correlates with enhanced brain connectivity, whereas prolonged exposure to screen-based media is associated with decreased connectivity[3]. Ensuring the availability of paper-based educational materials is necessary to foster an equitable environment for all students.

Balancing print and digital solutions requires a careful evaluation of the school's printing devices. Schools can consider investing in smaller, more cost-efficient large format printers for necessary print assets. Canon imagePROGRAF TC-20 series printers offer an ideal solution with their cost-effectiveness and compact design, while maintaining the ability to print in multiple formats with vivid detail.

5 Cost-saving Tips to Navigate Printing in K–12 Schools

Balancing costs while maximizing the benefits of both digital and printed materials is a challenging, but necessary task. Take into account these suggestions for reducing printing expenses:

  1. Conduct a Printing Audit: An audit will help identify the current printing habits, including the volume of printing, types of documents printed, and the associated costs. By analyzing this data, the school can gain valuable insights into areas where printing can be reduced, optimized, or made more cost-effective. Just be sure to survey all stakeholders, including administration, faculty, parents, and students.
  2. Educate the School Community: Raising awareness among students, teachers, and staff about the importance of responsible printing can significantly impact overall printing behavior. Educating the school community on the environmental and financial implications of excessive printing can encourage more mindful printing practices. Implementing guidelines on when to print, using double-sided printing, and minimizing unnecessary printing can all contribute to reducing printing costs.
  3. Optimize Printer Settings: Adjusting printer settings can lead to substantial savings in both paper and ink or toner costs. Setting default printer settings to duplex printing (double-sided) and selecting draft quality for internal documents can significantly reduce paper and ink usage without compromising readability. Regularly checking and calibrating printers for optimal performance can further enhance efficiency and reduce waste.
  4. Consider Bulk Purchases: Exploring opportunities for bulk purchases of printing supplies can lead to cost savings. Strategic planning for these purchases can ensure that the school maintains a sufficient stock of supplies while keeping costs in check.
  5. Invest in Low-Cost or Energy-Efficient Printers (or both!): Upgrading to low-cost or energy-efficient printers can be a wise investment in the long run. Such printers often consume less energy during operation and may use cost-effective ink or toner cartridges. Additionally, considering multifunction printers that combine printing, scanning, and copying functionalities can further streamline workflows and reduce the need for multiple devices. The Canon imagePROGRAF TC-20 printers offer a blend of cost-effectiveness and energy efficiency, making them a great choice for schools aiming to optimize their printing infrastructure.

Canon imagePROGRAF TC-20 Series Large Format Printers

  • Print up to 24" wide on roll paper, 11" x 17" and 8.5" x 11" cut sheets, and more
  • Seamless connectivity with Wi-Fi / USB / Ethernet 
  • Compatible with most Windows, Mac, and Chromebook devices
  • Compact size for easy placement saving valuable space in the classroom or office

Canon imagePROGRAF TC-20 M with Enhanced Capabilities

  • Multi-function: Print, scan, copy, and scan to print with wireless connectivity
  • Enlarge copy (no computer needed): Make enlargements directly from the TC-20M and showcase students’ work on an 11" x 17" sheet or create a large poster for the entire classroom to see
  • USB flash Drive: Access saved files directly from the TC-20M, simplifying the printing process

The Bottom Line

In the dynamic world of K–12 education, the role of printing remains crucial amidst technology's reshaping of classrooms. Printed materials have a significant impact on student engagement, retention, and creativity, complementing digital resources. Striking a balance between paper and screens optimizes the learning experience. The Canon imagePROGRAF TC-20 printers offer an innovative and economical solution, redefining creativity with versatile formats and seamless connectivity. Embrace the synergy of printing and technology to empower the future of education. Visit the Canon Showcase to explore printing solutions for your school today.


[1] Source: In Search of Business Opportunities: Finding the Right Prospects, InfoTrends 2017

[2] Source: Bay View Analytics, Coming Back Together - Educational Resources in U.S. K-12 Education, 2022

[3] Source: Brain connectivity in children is increased by the time they spend reading books and decreased by the length of exposure to screen-based media, Acta Paediatr, 107: 685-693

]]>
Edge Computing Is the Way of the Future https://community.connection.com/edge-computing-is-the-way-of-the-future/ Aug 01, 2023 James Rust https://community.connection.com/author/james-rust/ https://community.connection.com/wp-content/uploads/2023/07/2266704-Manufacturing-Edge-Computing-BLOG-1.jpg

It’s estimated that a modern plant with 2,000 pieces of equipment can generate 2,200 terabytes of data a month. Processing such a high volume of data at a data center is not only costly, but time consuming. A far superior method of processing all that information is to do so at the edge, and edge computing has become the practice of smart factories everywhere. 

Get the Most Out of IIoT Sensors

IIoT (Industrial Internet of Things) sensors continuously track conditions such as vibration, humidity, heat, and location. Operations that heavily rely on these conditions in their process and have regulatory requirements, such as food and beverage manufacturing, can ensure products are made consistently and safely. In addition to environmental sensors, product location can be tracked in real-time, so forklifts and other forms of transport can function as efficiently as possible. Using these sensors in tandem with edge computing will enable manufacturers to make quick decisions in real-time. 

In my manufacturing days, one of the biggest challenges at each plant was keeping the machines up and running to meet production goals. Traditional preventative maintenance and newer predictive maintenance methods could help in this endeavor, but typically these efforts led to educated guesses. Factories equipped with IIoT sensors can monitor the condition of machines in real-time, and with edge computing this data can be processed to determine if and when the equipment is likely to fail. This results in better uptime, longer asset life, and optimized operating costs.

Take Full Advantage of AI with Edge Devices

With the widespread adoption of AI in real-world applications, processing data at the edge will become more necessary. One popular use case is the training of cameras to detect issues in quality and safety automatically. The data that the AI is looking at can be hours upon hours of camera footage from multiple devices and sending that amount of information to the data center would severely impact the costs and speed of the operation. By reviewing the data at the edge, manufacturers can efficiently take advantage of this new technology to ensure their factories run as smoothly as possible. This is all possible thanks to advances in computing, GPUs, and devices specially made to run in industrial environments.

A New Gateway: Edge Devices

In some cases, devices can’t connect to the IoT hub on their own, or it’s undesirable for security or architecture reasons. IoT edge devices are capable of connecting the IOT hub and other devices on the network, acting as a gateway. The edge device can then process incoming data and send only what’s needed further up the network, resulting in decreased bandwidth usage. Using an edge device this way also allows for traffic smoothing and isolation of downstream devices and can even store data in the event of an Internet outage, so it can send it forward when reconnected. This is a great way to reduce line stoppage due to a WAN failure.

Many of these newer edge devices also support 4G and 5G, allowing them to bypass the corporate network and connect directly to a cellular network. This creates a backup option in case of traditional network failure allowing devices to continue to communicate with cloud services and regional data centers. The result is a factory that is continuously connected and can run with total normalcy in a difficult situation.

Help Is Available for All Edge Computing Devices

As the factory of the future becomes the factory of the present, edge computing has proven to be a necessity for modern manufacturing. Picking the right devices for your unique operation can be challenging, but there’s no need to do so alone. Our Manufacturing Practice has reviewed countless use cases and can help you find the devices that are the best fit for your business. Engage our team today to get started. 

]]>
The Microsoft Inspire Recap Is Here https://community.connection.com/the-microsoft-inspire-recap-is-here/ Jul 27, 2023 Makayla Mota https://community.connection.com/author/makayla-mota/ https://community.connection.com/wp-content/uploads/2023/07/2278421-Rush-Microsoft-Inspire-2023-Recap-BLOG.jpg

“We are in the midst of a massive platform shift with the new generation of AI.” - Satya Nadella, Chairman and Chief Executive Officer at Microsoft

Whew! Showcasing the power of AI, Microsoft Inspire 2023 brought forth an array of exciting announcements and groundbreaking innovations leaving us feeling, well, inspired. With so much to cover, let’s dive right in!

1) Microsoft Copilot Pricing Announced

In case you missed it, Microsoft 365 Copilot is an AI Large Language Model (LLM) tool that can help you write, recap, and create content from within the Microsoft Office applications. Sort of like an ingrained ChatGPT inside of each Office app. Although we didn’t get an official release date, we now know that Copilot will be $30 per month, per user for Microsoft 365 E3, E5, Business Standard, and Business Premium customers when it does become generally available.

2) Microsoft Sales Copilot

Sales Copilot brings new capabilities to Microsoft Outlook, Teams, and Dynamics 365 Sales, helping sellers to increase productivity and personalize customer interaction. The following Sales Copilot capabilities are now available for preview:

  • AI-generated lead and opportunity summaries 
  • A customer meeting preparation summary view that includes auto-generated summaries of previous meetings, notes, highlights of issues and concerns
  • Tips and suggested answers during Teams meetings that are prompted by the customer’s mention of a competitor or brand
  • Customer email summary and follow-up, with contextual replies and actions based on Outlook emails and CRM data

3) Bing Chat Enterprise Announced

Bing Chat Enterprise is now available in preview and is included at no additional cost in Microsoft 365 E3, E5, Business Standard, and Business Premium. In the future, it will be available as a stand-alone offering for $5 per user, per month. Created in part to address enterprise concerns about privacy, with Bing Chat Enterprise, user and business data are protected and will not leak outside of the organization. Your chat data is not saved, Microsoft does not have access to it, and it will not be used to train the models. You can access Bing Chat Enterprise using your work account wherever Bing Chat is supported —Bing.com/chat and the Microsoft Edge sidebar.

4) Azure Migrate and Modernize 

Formerly known as AMMP, the new Azure Migrate and Modernize offers an expanded set of features, as well as support for additional workloads like high-performance computing (HPC), Oracle, Linux, SAP, and mainframe migrations. Microsoft announced the company’s intention to make a “substantial investment to increase the scale and availability” of Azure Migrate and Modernize.

5) New AI Abilities Across Microsoft 365

  • Copilot Expansion in Teams
    The new expansions of Copilot in Teams boosts productivity in several key ways. Copilot in Teams chat can summarize chat threads, organize key discussion points, and help you get caught up on conversations you missed. Copilot in Teams Phone means you can make and receive calls from your Teams app and get real-time summarization and highlights. Copilot can also draft notes for you during the call and capture key points such as names, dates, numbers, and tasks.
  • Microsoft Viva 
    The latest update includes the launch of Viva Glint, which provides insights on employee engagement through surveys and connected actions, and Viva Pulse, which enables managers and project leads to get confidential feedback on the flow of work in real-time.
  • Windows 365 Frontline 
    An easy and affordable way to provide the power of Cloud PCs to frontline, shift, and part-time workers, Windows 365 Frontline allows manufacturing customers to securely access their personalized Windows experience on any device.
  • Microsoft 365 Backup and Microsoft 365 Archive Announced
    Both coming to public preview later this year, M365 Backup will provide a recovery of your OneDrive, SharePoint, and Exchange data, while keeping it all within the M365 security boundary. M365 Archive gives you a cold data storage tier that enables you to keep inactive or aging data within SharePoint.
  • AI-Powered Process Mining in Power Automate
    Providing AI-powered insights that permit customers to optimize existing processes and evaluate efficiencies with low-code automation, Power Automate Process Mining offers two industry-standard capabilities, task mining and process mining. This innovation breaks down various barriers that might make it difficult for an organization to identify inefficiencies in their workflows and where they could use improvement. Process Mining includes functionality such as the Process Mining desktop app with advanced analytics and Power BI customization.

With so many exciting updates and opportunities, please reach out to your Connection Account Team for more information or with any questions. Read more about the Microsoft Inspire 2023 announcements on the official Microsoft blog.

]]>
TechSperience Episode 119: Retail Store... https://community.connection.com/techsperience-episode-119-retail-store-modernization/ Jul 25, 2023 Connection https://community.connection.com/author/connection/ https://community.connection.com/wp-content/uploads/2023/07/TechSperience-Ep-119.jpeg

Success in retail has become centered on the customer experience. Take the friction out of purchasing with VMware while using an infrastructure that’s already in place. Check out this TechSperience podcast to hear from the retail experts at VMware and Connection on how to connect employees with consumers and transform your locations into faster and more efficient stores.

Host: James Hilliard

Guests: Brian Gallagher, Retail Strategy Director at Connection

Ed Durbin, Senior Director, Global Retail at VMWare

Show Notes:

[0:22] What are the top ideas that retail leaders are discussing surrounding retail store modernization? The news is getting inundated with AI, so LoB leaders are wondering how to implement AI initiatives to change the way their business operates. IT leaders are wondering how they can make it actually happen. There are so many new devices and technologies and solutions, and there is a sense that there is a race to see who can make it happen quickest. How IT can actually make it happen is a big struggle today.

[1:45] Are LoB leaders more "foot on the gas" and IT leaders more "pumping of the break" when establishing store modernization initiatives? Yes, IT leaders have learned over the past 15 years with the influx of mobile devices, networks, and omnichannel shopping experiences – what it's like if you don't lay a solid infrastructure foundation and roadmap to how you're going to get somewhere. So they've learned those lessons and trying to avoid any similar challenges in the future. They also tend to speak a different language than LoB leaders. So at Connection, we try to get the two groups more comfortable with talking with one another.

[4:15] Are those focusing on the backend infrastructure early enough, or only after they've purchased new technologies? It's a little of both. A lot of CIOs have said not to walk in the door with a shiny new toy without the infrastructure to back it up. Other CIOs say there is so much overlap happening in their store right now because they needed that shiny new toy. But in order to buy it, they needed to buy their endpoints, etc. They want to be able to lighten the load, leverage new technologies, and do more with less. They want to get rid of the overlap and get prepared to handle any new incoming technologies.

[5:45] Do CIOs want their systems to be able to adopt any new technology? Over 99% of global retailers are already VMWare customers. Since they are already leveraging a lot of what VMWare offers, provide the foundation so that they can be transformational.

[8:10] After a successful pilot, how do you execute that to scale? It can be a challenge after a successful pilot to expand across 3,000 more stores because it gets costly. This is why partners can be so valuable. A roadmap can first get across the outcomes you are looking to accomplish, the foundation you need to get there, and then how you'll apply the new technology to achieve the outcomes you desire. Many partners focus on POC rather than rollout.

[11:00] Are there one or two common hurdles that always stop POCs from moving to the rollout stage, and what can be done to overcome them? Deployment, deployment, deployment. Even though one pilot may be successful, it can be difficult to gain buy-in from the CFO, etc. because of the cost and how they can afford it. ROI is becoming harder to calculate when it comes to employee satisfaction and reducing turnover. Retailers trying to deal with so many different operating systems is creating challenges for IT departments.

[16:30] What are some initial steps people can be taking to modernize stores? Power and compute at the edge will hopefully be plug and play soon. With so many brand locations, they are not all getting stable network connection. As we put more devices and applications in these store locations, we've got to quit relying on the network. Laying the foundation for edge right now will be critical for the future.

[22:00] What should retailers be focused on now? Reduction of operational costs and reducing redundancy in stores. Also, leveraging hyper-personalized marketing and digital signage, and other customer-facing technologies. We recommend sitting down and building out a roadmap with a partner to make sure you've got the right foundation in place.

To continue the conversation, visit www.connection.com/retail or connection.com/vmware for more information.

You can hear us on Apple Podcasts, Amazon MusicSpotifyGoogle Podcasts, or Podbean

]]>
Inside Look: Connection Sales Department https://community.connection.com/inside-look-connection-sales-department/ Jul 20, 2023 Connection https://community.connection.com/author/connection/ https://community.connection.com/wp-content/uploads/2022/06/1773728-InsideLook-Sales-BLOG.jpg

Interested in becoming a Connection employee? You’ve come to the right place. Follow our “Inside Look” series to learn what’s it like to work at different departments in our organization. You will learn about current open positions and hear from our department leaders what they look for in candidates during the interview process. This month, we would like to feature our Sales department.

What’s it like to work in Connection’s Sales department?

We offer a fast-paced environment for someone who is looking to reach their full potential. There’s also plenty of support available in the department—and the company—to help you succeed at providing your customers the best solutions. This environment really allows you to create relationships with customers that can last the span of your career at Connection.

What is the structure of the department?

First of all, we have three Sales organizations, Business Solutions, Public Sector Solutions, and Enterprise Solutions. Business Solutions works small- to medium-sized businesses, Public Sector services government and education, and our Enterprise Solutions team works with large businesses. In all three of our organizations, the Sales department is a full open-door policy. From the President of Sales to a new hire, we’re all in it together to support our customers. If you have a problem that needs to be fixed everyone will get in the weeds to help.

What are the relationships between Sales and other areas of the company?

We have great relationships with other departments. Connection is a true family mentality, with everyone working together to help our customers. There is a level of comfort and support that comes with each department, whether it’s Marketing, Product Management, IT, Finance, or Facilities.

Sales is hiring. What kinds of personalities mesh best within the company?

There is no perfect makeup to being a successful Account Manager. We’re looking for people who are motivated and driven to support a customer in any situation, with a willingness to collaborate with other peers to find the right solution. We’ve had so many people come from different paths—from construction, photography, retail, etc.—who’ve grown to be top tier Account Managers.

What are the most important qualities someone needs to succeed in your department?

We look for people who are self-motivated and driven. The technology knowledge can always be learned. We want you to want to succeed and grow.

What does it take to be successful in your department and at Connection?

Knowing who to turn to for answers to customer questions is a huge part of being successful in Sales. We’re effective most when we collaborate with others to make sure our solution to a customer’s problem is ironclad. And it takes a great quarterback in an Account Manager to lead the process, but also a great team around them to help finish the job.

If someone reading this was coming to interview tomorrow for a role in Sales, what interview tips would you give them? 

Be authentic. We want the person you are in the interview to be the person who shows up in the position. Do research on our organization and the role itself so you can have a constructive conversation about the opportunity. Be curious and inquisitive—be sure to ask questions of your own. It also helps to project confidence; it’s important that our customers can put their faith in our people. 

What can new hires expect from joining the Sales department?

They can expect a ton of training and a ton of support. Your tenure starts with a well-designed training and enablement curriculum that provides a sound foundation of knowledge to build from. Your sales leadership will support you along the way with coaching sessions for individualized development of your sales skills and business development in an effort to help you succeed. You’ll be part of a team where everyone will be rooting for your success.

Why Connection?

The amount of help and support you receive is unlike any other sales company. We are invested in our people’s success. Also, there is so much earning and growth potential here! 

We offer the opportunity to help others and grow to reach your full potential in the world of technology. Plus, we promise you’ll never be bored, because every day, there’s a new situation or challenge to solve. You get to run your own book of business on a collaborative team, and your decisions can help your customers grow exponentially.

If the insights you have gained about our exceptional sales department have ignited your interest and sparked a desire to be part of our team, we invite you to explore all our current open positions. Discover the perfect opportunity that aligns with your skills and aspirations. Take the next step and explore our open positions today.

]]>
Interconnectedness and Edge Computing for a... https://community.connection.com/interconnectedness-and-edge-computing-for-a-successful-industry-4-0-journey/ Jul 18, 2023 Fausto Dedeschi https://community.connection.com/author/fausto-dedeschi/ https://community.connection.com/wp-content/uploads/2023/07/2232878-LenovoNVIDIA-MFG-BLOG.png

Manufacturing organizations around the world are looking to implement Industrial Digitalization and unlock the benefits of interconnectedness and edge computing, enhancing collaboration, data utilization, and supply chain optimization between workstreams, systems, and stakeholders. Interconnectedness and edge computing also go hand in hand with Industry Digitalization—especially when implementing solutions from Lenovo and NVIDIA. This blog explores the key aspects of interconnectedness and edge computing and the value created when implementing Industry Digitalization solutions from Lenovo and NVIDIA.

Interconnectedness

Enhanced Collaboration and Agility

Interconnectedness between design and production promotes collaboration and agility in the manufacturing process—which are fundamental in Industrial Digitalization to adapt to dynamic customer preferences and rapidly evolving technology.

Real-time Data Exchange and Decision Making

By connecting design specifications, product simulations, and production plans, manufacturers can make informed decisions based on real-time data to help them optimize production processes, reduce errors, and improve overall quality and efficiency.

Faster Time-to-market

The ability to respond rapidly to market trends enables manufacturers to gain a competitive advantage. With Industrial Digitalization solutions, iterations and modifications can be implemented swiftly when design changes are seamlessly communicated to production teams, reducing the time required to translate design concepts into tangible products that can be taken to market.

Continuous Improvement and Optimization

Industrial Digitalization emphasizes continuous improvement and optimization. Interconnectedness facilitates the feedback loop between design and production workstreams.

Predictive Maintenance and Quality Control

By monitoring equipment performance and collecting real-time data, manufacturers can implement predictive maintenance practices, detect anomalies, and address quality issues proactively. This ensures higher product quality, reduces downtime, and improves overall equipment effectiveness.

Digital Twin Implementation
Interconnectedness is vital for implementing digital twin technology. Lenovo and NVIDIA offer digital twin solutions that empower organizations with the ability to create virtual replicas of physical assets or processes, enabling simulation, monitoring, and optimization. Interconnectedness between design and production workstreams facilitates the creation and synchronization of digital twins, allowing manufacturers to optimize production parameters, test scenarios, and identify potential bottlenecks before implementation.

Scalability and Flexibility

By integrating design and production workstreams, manufacturers can scale their operations seamlessly, adapt to changing production volumes, and implement flexible manufacturing systems. This allows manufacturers to respond to market fluctuations and customer demands more quickly and effectively.

Reduced Latency

Industrial Digitalization relies on real-time data processing and analysis to drive decision making and optimize operations. The edge brings computing resources closer to the data source, reducing the latency associated with sending data to a centralized cloud or data center for processing. By processing data locally at the edge, Lenovo and NVIDIA solutions can help organizations obtain insights faster, enabling timely actions and responses.

Enhanced Reliability

In Industrial Digitalization applications, reliability and uptime are critical. The edge provides a decentralized architecture resilient to network disruptions or failures. By distributing computing and data processing capabilities across edge devices, manufacturing operations can continue even if there are issues with connectivity to the cloud or data center. This ensures continuous operation and reduces the risk of downtime.

Bandwidth Optimization

Industrial Digitalization generates vast amounts of data from connected devices, sensors, and production systems. Transmitting all this data to a central location for processing can strain network bandwidth and increase costs. With edge computing, data can be processed and filtered locally at the edge, reducing the amount of data that needs to be transmitted to the cloud or data center. This optimizes network bandwidth and reduces associated costs.

Real-time Decision Making

Industrial Digitalization requires quick and informed decision making at various stages of the manufacturing process. The edge enables localized data analysis and decision making, allowing faster response times. Critical decisions can be made at the edge without waiting for data to be sent to a centralized location for processing. This facilitates real-time optimization of production processes, quality control, and predictive maintenance.

Privacy and Security

Industrial Digitalization involves the collection and analysis of sensitive data, including intellectual property, production data, and customer information. The edge provides an added layer of privacy and security by keeping sensitive data local and reducing the need to transmit it over external networks. This helps protect valuable data from potential breaches or unauthorized access.

Scalability and Flexibility

The edge offers scalability and flexibility in Industry Digitalization implementations. Edge computing infrastructure can be easily deployed and scaled across different manufacturing sites or production lines. This allows manufacturers to adapt to changing production needs, accommodate new devices or sensors, and scale computing resources as required.

Edge Analytics and AI

The edge enables localized data analytics and AI capabilities, allowing intelligent decision making at the edge devices. This is especially valuable in Industry Digitalization scenarios where immediate responses are needed, such as autonomous equipment adjustments or real-time anomaly detection. Manufacturers can achieve greater efficiency, predictive maintenance, and quality control by leveraging Lenovo and NVIDIA technology to implement edge analytics and AI.

Offline Capabilities

Network connectivity may be intermittent or unavailable in some manufacturing environments. The edge enables offline capabilities by processing data locally, ensuring uninterrupted operation even when connectivity is limited. This is particularly beneficial in remote or challenging environments where constant cloud or data center connectivity is not feasible.

Conclusion

Embracing interconnectedness helps manufacturing organizations unlock the benefits of Industrial Digitalization. By leveraging edge computing solutions from Lenovo and NVIDIA, manufacturers can optimize their operations, reduce latency, improve security, and make real-time data-driven decisions that increase efficiency, productivity, and competitiveness in the manufacturing landscape. Lenovo, NVIDIA, and Connection are partnered to help organizations accelerate their Industry Digitalization evolution. Engage Connection's Manufacturing Practice today to learn more.

]]>
Windows Server 2012 Will Reach End of... https://community.connection.com/windows-server-2012-will-reach-end-of-support-in-october-whats-your-next-move/ Jul 18, 2023 Makayla Mota https://community.connection.com/author/makayla-mota/ https://community.connection.com/wp-content/uploads/2023/07/2257171-Windows-Server-2012-End-Of-Life-BLOG.jpg

Windows Server 2012 reached the end of mainstream support in October 2018. Microsoft offered extended support for five years, allowing customers time to migrate to newer Windows Server versions that were still under support—and now we are about to reach the end of that extended date. As of October 10, 2023, support will no longer be available for all editions of Windows Server 2012 and Windows Server 2012 R2. This means these products will no longer receive security updates, bug fixes, technical support, or online technical content updates. Even though it’s still months away, it’s important you take the right steps now to prepare for this major change.  

So, what’s your next move? For starters, reach out to your Connection Account Team to begin looking at one of three options below. 

 
Migrate to Microsoft Azure and Receive Up to Three Years of Free Extended Security Updates 

Customers can migrate databases and applications to Azure and receive up to three years of free Extended Security Updates. Migrating your systems to the cloud unlocks multiple benefits: 

  • You never have to upgrade your systems again. Azure offers multiple additional resources to your environment, including security and data loss prevention.  
  • You don’t have to worry about End of Life or End of Support announcements forcing you to upgrade every few years. 
  • Connection’s Azure Migration Service provides seamless and straightforward support, making your migration as easy as possible.  

Remain On-premises by Upgrading to Windows Server 2022  

Windows Server 2022 provides the latest security, hybrid, and application modernization capabilities such as: 

  • Secured-core server providing advanced multi-layer protection against threats 
  • Built-in hybrid capabilities with Azure Arc and richer insights through Windows Admin Center 
  • Improve container application deployment with smaller image size for faster download and simplified authentication 

Purchase Extended Security Updates

Customers that can’t meet the deadline and have Software Assurance or subscription licenses under an enterprise agreement enrollment can purchase Extended Security Updates for Windows Server 2012 and 2012 R2 that will last three more years. Learn more about eligibility. 

We’re Here to Help!  

Connection’s Asset Discovery Optimization (ADO) Assessment breaks down your organization’s Microsoft estate to help you optimize your IT management strategy. Our ADO Assessment Offerings include: 

  • Software Asset Management to help you better understand your Microsoft licensing and if the way you have it deployed aligns. 
  • Cloud Optimization will provide a report with insights into your server to decrease your data footprint and cut costs. 
  • Azure Adoption Support aligns you with the best cloud options through cloud assessments and a server cloud workshop. 

Our ADO Specialists help you understand your options to determine the solution that works best for your organization, fully supporting you on your journey to the cloud. As an Azure Migration partner, we can help guide your eligibility for potential funding toward your migration. Contact us for assistance with migrations, solutions, or with any questions you have about this Microsoft update!

]]>
Employees Want Mac, but IT Only Supports... https://community.connection.com/employees-want-mac-but-it-only-supports-windows-now-what/ Jul 17, 2023 Paul Mounkes https://community.connection.com/author/paul-mounkes/ https://community.connection.com/wp-content/uploads/2023/07/2251148-VMware-Blog-BLOG.jpg

Mac is more popular in business now than ever before. While sales of PCs continue to grow at a single-digit pace yearly (all sales globally, notwithstanding the pandemic years), Mac sales took a major jump shortly after the introduction of Apple silicon—their M1 chip. And incredibly, based on surveys conducted in 2021, Mac enjoys a 23% share in the U.S. enterprise market. That’s a seismic level of share growth in just two years from 17% in 2019.1 This level of popularity in business was unthinkable just 10 years ago when IT departments still had a myriad of objections to the macOS platform.

Why Is This Happening?

  1. The performance of Apple’s new M1 and M2 chips—in terms of processing speed and battery life—has been a driving factor. 
  2. With full control over the production of their own processors, Apple was able to launch a MacBook Air that sells for just over $1,000—a price point previously unheard of in the Mac world and one that’s quite palatable for most IT departments. 
  3. The employee experience has become increasingly strategic in nature due to its direct impact on recruiting and retaining talent. Device choice is a big plus in the employee experience ledger.

Is Your Organization Behind the Curve?

Most companies have Mac devices floating around. They’re considered critical for certain roles—like graphic design and development. But a healthy percentage of organizations still have not embraced Mac as a legitimate alternative for general knowledge workers.

If your company falls into that category (let’s call it the “Mac-less” category) and you’re reading this article, you’re probably at least considering a change that will have a substantially positive impact on your organization’s employee experience. If you’re looking for some tips on how to make the transition as painless as possible, you’ve come to the right place. 

If you’re Mac-less, you’re probably not managing the few Mac devices your organization already has with device management software. This may or may not be a problem, depending on whether you’re currently using a Unified Endpoint Management (UEM) solution to manage your other (non-Mac) devices.

UEM is a device management system that’s capable of managing almost any platform and device type for any use case. If you have a UEM right now that does a good job of managing macOS, your shift to the “Mac as a choice” paradigm is going to be a matter of organizational change management for the most part. Depending on the skills your existing admins possess, you may need to do some hiring to get macOS expertise in-house—and get those people some training on how to operate your UEM’s macOS functionality. If your UEM solution vendor is a good one, they’ll have free online or fee-based live training—as well as professional services—all of which can help get your team up to speed. All things considered; this is going to be the most painless of all the possible situations the Mac-less might find themselves in.

If you’re using a UEM solution that does a poor job of managing Mac, or if your current device management system doesn’t manage macOS at all, the rest of this blog is for you. With many years of experience working with companies that have made this transition, we can make some suggestions—and tell you WHY we’re making them. 

One theme you’ll notice throughout this article is FLEXIBILITY. You need flexible tools to help future proof your org. With flexible tools, IT will be ready to handle new needs, requirements, or regulations as they present themselves. 

Multiple Device Management Tools? Not Ideal.

You’ll need device management software to manage all the platforms your employees use at any kind of scale. Most organizations that have embraced Mac (let’s call this the “Mac-Co” category) have at least four or five different operating systems to manage. This includes at least two desktop operating systems—possibly three if they have a significant number of Linux machines—and two mobile operating systems. Companies that utilize rugged devices and wearables for frontline workers may have up to nine different operating systems they need to manage.

This may seem like a daunting task, and a situation that can only be addressed using a handful of disparate device management systems. But in most cases, it’s best to consolidate as many of these platforms as possible using a single and effective device management solution. Notice the use of the word “effective.” Not all UEMs can manage all OSs effectively, so it’s a good idea to run proof-of-concept tests (POCs) to find out if these tools have the functionality you need. And you’ll want a UEM that supports devices whether they’re “bring your own device” (BYOD), corporate owned, or corporate owned/personally enabled (COPE). Even if you don’t enable all those use cases today, someday you might. This kind of flexibility, even if it seems like something you don’t currently need, helps you future proof your technology.

But why the need to consolidate, you ask? Why not field five different device management systems, or have one for each different OS?

A Team of Specialists? Not Ideal.

Let’s start with the training required to effectively operate multiple systems. While disparate device management solutions are used to accomplish by and large the same things, the way they operate can be quite different. Vendors and/or resellers will make various solution-specific training programs available when you sign up for them. As a result, you’d wind up with a team full of specialists: people who are solid on one system but not much good on any of the others. If one of them is sick for a day, things could get ugly. Or, far worse, if one of them leaves…well, you can clearly see that this is not the most effective form of team composition.

But if all your admins are using the same device management solution, then it’s much easier to have a team of generalists, each of whom can effectively work on any type of operating system.

Too Many Integrations

Here’s where flexibility becomes key. Let’s consider what happens when you want to expand your stack with solutions beyond device management. Example: Your company is growing, and you want to implement an advanced analytics tool that can create in-depth reports and dashboards that will make your job easier and make your team more proactive. A tool like that needs a great deal of data from your device management software. If you have four different device management systems, that’s four different integrations you’ll pay for and maintain. Because every time any one of your systems is updated, there’s a risk one or more of your integrations will need to be massaged—especially if any of them have been customized in any way. 

Now consider that there are tools you’ll want to look at beyond analytics. What about remote support solutions? Automation? Advanced mobile protection? Digital employee experience management? We’ll discuss the value of these things later in this article, but if you’re using multiple device management systems, every time you upgrade your IT management capability, you also upgrade your complexity at an exponential rate, making for a brittle bundle of technology.

Other Factors

There are many other factors to consider as well. It’s easier to create a true partner relationship—to get to know multiple people in the organization who can help you, and to have your voice heard—when you’re managing more devices with a single vendor. You can probably think of several more benefits as well, like having to go through the renewal process with just one vendor, and so on.

Automate.

As good as modern device management can be, the best solutions will allow you to automate the most tedious tasks with macOS and other platforms. Think about what your team of admins does every day. Which tasks take up the most time? In an advanced device management solution, an effective automation engine should be built in—and should be able to do a MYRIAD of things, including:

  • Automate your updates
  • Automate complex or group app deployments
  • Automate desired state management based on specified criteria or sensor values

These are just a few examples of the many things you should be able to do with your solution. But automation is not necessarily a panacea, because automation tools can be difficult to use. In many cases there are so many scripts involved, you almost have to be a programmer. So be careful when selecting a tool—you don’t want to force your team members to write pages of script in order to get any automation—at all—out of your tool. That’s a good way to ensure the tool is never used.

Of course, the engine must include the ability to import scripts. This allows experienced admins to develop the most highly advanced automated workflows. But it should also be equipped with a GUI that just about any admin can use to build out relatively complex automated workflows. A UI that allows users to drag and drop building blocks—like applications, sensors, and canned scripts—and add them to a canvas is a great way to get your entire staff involved in automation.

Look for Expansion Beyond Device Management.

As organizations grow, they invariably require IT solutions beyond device management. It would make great sense to purchase those solutions from your device management vendor if the vendor can provide these peripheral tools as well. But the fact is that most vendors tend to be very limited in the additional tools they offer beyond device management. Which is unfortunate because a device management vendor is the one software company able to create the tightest, most bulletproof possible integration between its device management software and its peripheral tools. 

Other than ensuring the most reliable integrations, there are two other reasons to go with a company that offers its own IT solutions beyond device management. 

  • First, that company knows its own device management system better than any third party ever will. It knows every single field of data that’s available. it knows how its customers use that data. It has studied what its customers want out of that data. Therefore, it knows best how to build an analytics tool, an employee experience management tool, or a remote support tool on top of that specific device management solution.
  • Secondly, and just as importantly, the device management vendor can tie all these systems together so they work hand in hand to make each other better. For instance, the employee experience solution can not only pull data from device management, but also from the advanced analytics tool—if you happen to have that as well. This type of cross-pollination just isn’t possible if you’re forced to rely on third parties to build out your full suite. And that means you just can’t get the same richness and depth of functionality out of third-party tools.

Closing

Managing macOS devices with the same device management platform you use to manage your other devices lets you streamline and simplify your management processes and software licenses. The flexibility of a true UEM with low/no-code orchestration furthers your team’s capabilities and potential. For more information on the topics we’ve addressed here, please see the links below. 

Resources

A guide to building an effective employee experience strategy – TechTarget

Resources from VMware

• Learn more about VMware Workspace ONE for macOS management

• Download the e-book to learn even more about Workspace ONE for macOS management

• Learn more about Freestyle Orchestrator, the built-in low-code/no-code automation engine in Workspace ONE

• Learn about VMware Digital Employee Experience Management, a solution that can help IT move from reactive to proactive

Source:
1 Secure Mac, 2023, The growth of Mac in the enterprise

]]>
How to Leverage a Staffing Partner to... https://community.connection.com/how-to-leverage-a-staffing-partner-to-navigate-your-it-hiring-needs-during-an-economic-slowdown/ Jul 11, 2023 Patrick Dja Konan https://community.connection.com/author/patrick-dja-konan/ https://community.connection.com/wp-content/uploads/2023/07/2248660-IT-Staffing-Blog.jpg

Our economy has seen significant challenges over the past several months. This is forcing many companies across the country to make challenging business decisions that often include company reorganization and reduction.

Although technology has always been a way for companies to scale their business, it has become more of a necessity for organizations across the world to effectively operate in the aftermath of the pandemic in 2020 and the rapid growth of automatization, digitalization, and virtualization.

One way to navigate through uncertainty is to leverage a staffing partner to help bring in IT talent for critical projects. The right staffing partner will strategically work with you and your company to help build the right IT workforce as business demands change. This partnership can be truly beneficial to your organization, especially during uncertain times, as it gives you the flexibility to hire the right skillsets for critical needs without the burden of a long-term commitment.

Here are some of the benefits of working with the right IT staffing company:

  • Minimize Risk: Working with a staffing company can help you hire qualified candidates, which decreases the risk of poor hires, and offers the benefit of converting a consultant to a full-time hire through a contract-to-hire scenario.
  • Flexibility: Ability to hire the right skillsets for specific projects and tasks on a short- or long-term, temporary basis. Typically, you can end the engagement anytime within a 24-hour notice if the business climate changes.
  • Cost-effective and Time-efficient: Save time and effort in the hiring process, but more importantly—help save your organization money on costs associated with hiring, onboarding, benefits, payroll, and administrative responsibilities.
  • National Network of Candidates: Access to a large network of proven IT talent that has been pre‑screened, interviewed, and evaluated along with an in‑depth background check allowing you to quickly fill a particular skill gap.  

Though some companies may rely heavily on staffing partners to help during hiring surges, many companies work with staffing companies as strategic hiring partners to help navigate during economic slowdowns. Connection offers various IT services to help organizations meet their IT requirements, including staff augmentation needs. Learn how our staffing programs can help your organization quickly hire qualified talent on either a temporary or full-time basis in a cost-effective manner—while also saving time and minimizing the risk of poor hires.

]]>
The Apple Experience: Empowering... https://community.connection.com/the-apple-experience-empowering-productivity-and-choice/ Jun 28, 2023 Chris Roux https://community.connection.com/author/chris-roux/ https://community.connection.com/wp-content/uploads/2023/06/2252422-Apple-Post-Event-BLOG.jpg

Apple believes in providing customers with products that not only inspire creativity but also enhance productivity. Mac, a cornerstone of Apple’s DNA, continues to revolutionize the way individuals and organizations work worldwide. With its exceptional features and user-friendly interface, Mac empowers users to challenge the status quo and shape the future of their businesses.

The story of Mac at work began with Apple’s iPhone, and their commitment to employee choice remains unwavering. They believe in giving employees the freedom to decide how they want to work. This fosters a sense of ownership and enhances overall productivity. It comes as no surprise that an increasing number of customers are choosing Mac for the first time.

In the modern workplace, technology plays a pivotal role in shaping our lives, work, and communication. Employees recognize the significance of aligning their work life with a device of their choosing. As a recent study by Jamf highlighted, nearly 9 out of 10 respondents would be willing to sacrifice a small portion of their salary for that choice.1 This demand for choice spans across various verticals, including enterprise, education, and the public sector.

Interestingly, this demand for choice is largely driven by the experiences of the new generation before they even enter the workforce. Another study by Jamf revealed that over half of U.S. college students entering the job market are already using Mac, bucking the trend of a Windows-centric workplace.2 These students perceive organizations that offer technology choice as more modern, with 70% of them indicating a higher likelihood of joining and staying with businesses that provide such freedom.2

Apps. Apps. Apps. Mac Does That.

Now, let's dive into the world of apps—the backbone of productivity. When discussing applications, compatibility is often a primary concern. Rest assured, Mac is equipped with a wide array of apps that cater to various work requirements and common tasks. From sending emails and messages to managing schedules and meetings, these pre-installed apps ensure a superior user experience. Additionally, many of these apps seamlessly integrate with Microsoft Exchange—and they coexist alongside Apple’s family of productivity apps.

Notably, employees can create engaging content without the need to purchase additional software. However, for those who rely on Microsoft 365—and its suite of applications such as Word, Excel, PowerPoint, Outlook, OneNote, and Teams—these apps now run better than ever on Mac. Each app works with Microsoft Office apps on other devices, providing a consistent and efficient experience across the board.

With Mac having transitioned to Apple silicon, particularly the remarkable M2 chip, Apple has unlocked a new capability: running iOS applications natively on your Mac. If you're already using a business, education, or institutional app on your iOS devices, chances are high that you can also run it on your Mac. This integration opens a world of possibilities, allowing you to access a vast suite of applications you know and love—all on the Mac platform.

Seamless Employee Experience.  Mac Does That.

Most employees are already familiar with using iPhone and iPad, making the transition to Mac a breeze. Apple's continuity features further amplify this seamless experience, enabling employees to work effortlessly across all their devices.

Features like Handoff enable automatic transfer of tasks from one Apple device to another. Whether you start drafting an email on your iPhone and finish it on your Mac—or begin writing a report on your Mac and continue on your iPad during a meeting—Apple's ecosystem ensures your work follows. Additionally, features like Universal Clipboard enable easy copying and pasting of content between devices, streamlining your workflow.

Furthermore, Mac Auto Unlock conveniently unlocks your Mac when you're wearing an Apple Watch, saving valuable time. With AirDrop, sharing files between your Mac, iPhone, and iPad is as simple as a few clicks, eliminating the hassle of convoluted file transfers.

And let's not forget about Sidecar. It enables you to use your iPad as an additional display for your Mac, providing that extra screen real estate when you're away from your desk. It requires no additional software and seamlessly integrates into your workflow.

The Apple and Connection Partnership: Uniting Excellence for Almost 40 Years

For nearly four decades, Apple and Connection have had a strong and enduring partnership. Together, we have been at the forefront of innovation, empowering individuals and organizations to harness the power of technology. With global authorized service for all major IT equipment manufacturers, we make creating or upgrading your Apple ecosystem a seamless and painless experience.

At the heart of our partnership is a team of highly skilled Apple solution engineers. These experts are not only authorized by Apple to provide exceptional service but also possess a deep understanding of everything there is to know about Apple. If you need support, maintenance, or assistance in deploying and managing Apple devices, our team is equipped to meet your needs.

But our partnership with Apple goes beyond service and support. We offer a comprehensive range of Apple and Connection professional services that are designed to streamline your experience. One of our flagship offerings is Apple Business or Apple School Manager enrollment, allowing you to effortlessly manage your organization's devices and apps. This powerful tool provides centralized control and oversight, making device deployment and management a breeze.

Moreover, as an authorized partner, we have the expertise to work with Apple's Volume Purchase Program, enabling you to efficiently procure apps and content for your organization. Our advanced deployment capabilities ensure that your Apple devices are configured and ready to use straight out of the box. And when it comes to cellular activations, we have you covered, ensuring seamless connectivity for your mobile devices.

We understand the importance of comprehensive support for your Apple devices, which is why we offer AppleCare Plus and AppleCare for Enterprise. These extended warranty programs provide peace of mind, protecting your investment and ensuring prompt assistance in case of any hardware or software issues. For educational institutions, we offer AppleCare for Schools, tailored to meet the unique needs of the education sector.

With our extensive expertise and partnership with Apple, we are committed to simplifying the integration of Apple devices into your organization. We provide end-to-end solutions, combining cutting-edge technology with personalized support, so you can focus on what matters most—driving your business forward.

Experience the power of the Apple and Connection partnership. Let us guide you on your journey to a seamlessly integrated Apple ecosystem, where productivity, efficiency, and innovation thrive. Contact us today to unlock the full potential of your Apple devices and elevate your organization to new heights.

Sources:
1 Jamf, 20221, Employee Choice and its Impact on the Future of Work
2 Jamf, 2019, The Influence of Student Device Choice on the Modern Workplace

]]>
Passing the Cape: Ensuring the Memory of an... https://community.connection.com/passing-the-cape-ensuring-the-memory-of-an-it-superhero-lives-on/ Jun 21, 2023 Connection https://community.connection.com/author/connection/ https://community.connection.com/wp-content/uploads/2023/06/2216271-ITSA-Cape-BLOG-1.jpg

Last year, Connection was proud to recognize Patrick McGee from St. Johns School District as the Best Team Leader and our Ultimate IT Superhero at our annual IT Superhero Awards. Among his prizes, we gifted him with an official IT Superhero cape. He had shared his plan to pass the cape along to spotlight his co-workers, and we loved it! What better way to recognize other IT superheroes?

Patrick then had to relay some bittersweet news: the Technology Support Specialist they’d chosen as the first recipient, Wayne Kizewski, passed away before they could honor him with the cape. “It was a hard time for our group, but to keep his spirit alive in our department, we named the award after him,” Patrick told us. Each month, the cape, along with a certificate of recognition, will travel to a new IT Superhero in the district and will be proudly displayed in the front office of their school.

“The Wayne Kizewski IT Superhero Award is in honor of Wayne to showcase just a few attributes of what an amazing person he was. Wayne was caring, personable, dedicated, funny and hard working. This award is to showcase our Technology Support Specialists who also share some of these attributes and go above and beyond to support our students and staff across the district.”

Thank you for sharing your group’s plan for honoring your colleague, Patrick, and we’re proud to play a little part in ensuring his memory lives on.

Do you know an IT Superhero? Nominate them for our 2023 IT Superhero Awards.

]]>
Mac Makes Sense. And Cents. https://community.connection.com/mac-makes-sense-and-cents/ Jun 14, 2023 Connection https://community.connection.com/author/connection/ https://community.connection.com/wp-content/uploads/2023/06/2214794-Apple-Mac-Overview-BLOG.jpg

The Mac business today is stronger than ever. Mac continues to lead the industry in customer satisfaction—as it has for over a decade. And more customers than ever are choosing Mac for the first time. Over 50% of today’s buyers are brand new to the platform.

The story of Mac at work started with iPhone and its users bringing their own devices into their work environment. Employee choice and device choice are aligned to that same principal—the employee deciding how they want to work and how they know what makes them the most productive as a result.

Each of us recognizes the huge role that technology plays in the modern workplace. It influences how we live, how we work, and how we communicate. Jamf recently commissioned a study that showed an overwhelming number of respondents felt that aligning their work life to a device of their choosing was of great importance. So much so that almost 9 out of 10 respondents would give up part of their salary to get that choice. This is especially important as we look at the labor market today, and the war for talent that is occurring across an enterprise, in education, and the public sector.

Now, much of that demand for choice is being driven by the new generation’s experience prior to graduation. In fact, a study recently found that 66% of college students coming into the workforce are using a Mac—which is really kind of counter to the Windows-centric workplace.

We’ve known for many years—and a recent study also found—that students see organizations that offer technology choice to their team as more modern than other organizations. And up to 67% of those respondents would be more likely to join and stay with a business that offered that choice.

Back in 2021, Apple commissioned Forrester to conduct an independent study* of the impact of Mac and enterprise. The study found that customers saw reduced overall device costs, improvements in security, and improvements in overall employee experience when they deployed an updated M1-powered Mac device. At the time, those organizations were able to leverage that sort of additional power and performance at a much lower price point. That really helped them expand their Mac user base to new teams. And this was most important to us because we had a lot of companies say, “Well, we already have Mac. They’re for our creatives and our developers. What’s the financial benefit of offering it to more users?” 

Now, in case you haven’t seen this before, here’s the summary of the cost savings that Forrester found. The study found that—despite an average purchase cost of around $1,500 dollars for a well-equipped Mac compared to $1,200 dollars for a PC—Mac actually costs $843 dollars less than a PC on a per-device basis when we considered hardware, software, support, and operation costs over those three years.

And the good news is the experts at Apple and Connection can work with you to build your own analysis based on the study with the type of organization you are, the size and number of employees, and things like that to get kind of your own milestone that we can help you reach with best practices and managing Mac the right way.

The Next Steps

Need help streamlining Mac deployment? Connection makes creating or upgrading an Apple ecosystem easy. We are an Apple Corporate Reseller with a partnership that goes all the way back to 1984. This means we are uniquely qualified to provide Apple solutions, product availability, and expertise that exceed your expectations. Get started today!

*Forrester, 2021, The Total Economic Impact™ Of Mac In Enterprise: M1 Update

]]>
Mac Makes IT Deployment Easy https://community.connection.com/mac-makes-it-deployment-easy/ Jun 13, 2023 Connection https://community.connection.com/author/connection/ https://community.connection.com/wp-content/uploads/2023/06/2214757-Apple-Mac-Deployment-BLOG.jpg

Over the last decade, many businesses have made their way to Mac. This really means a lot of the same workflows that you’re using for iOS are going to translate very well to Mac. So, if you’re currently doing zero-touch deployment on your iOS devices—or your iPad and Apple TV devices—it’s easy to integrate Mac into the same process.

To do this, there are three things that every organization is going to need. First, you need Apple Business Manager—or Apple School Manager for you public sector folks. Second, you need mobile device management. Third, an understanding of how to do endpoint security on the Mac. If you have these three things already—great! You can start deploying Mac tomorrow. Or maybe you’re already doing it today.

Apple Business Manager and Apple School Manager offer Web-based portals that allow IT admins to deploy Apple devices. And once you’ve enrolled devices that you purchase directly from Apple or Connection—or even your carrier—they will appear in this portal, allowing you to assign them to your MDM solution.

So, they get automatically set up. What’s cool about this is—if you have multiple device management solutions in your environment—you can do things like assign all your iOS devices to one and all your Mac devices to another. Now, sitting underneath all this is something called the Apple Push Notification Service.

99.999% of the time that zero-touch workflow doesn’t work is because somebody on the network team is specifically blocking or interfering with an Apple service. So, one of the tools that we have to help—and you get to determine if you have full access to the Apple services that you need—is a tool called the Mac Evaluation Utility. This is freely available from Apple.

Next up is device management. And I’m guessing a lot of you are probably using a solution today. Great. If it supports iOS, there’s a good chance you’re going to be able to manage your Mac devices on it as well. Something to keep in mind is that Apple provides a framework to all developers to create these solutions. The MDM solutions may differ in interface and market focus, but they all work from that same set of APIs.

So, when you’re looking at growing your Mac program, maybe you’re using a current solution and it is not quite working the way that you need it to. Or it might be requiring additional tools to provide sort of the full service that you need for management. Make sure the tool you’re selecting is using all these APIs and we recommend you kind of look at what your requirements are for management and evaluate your selection against them—versus “does this tool manage all of my devices?” If that makes sense. But again, if you’re already managing iOS, you can probably integrate Mas as a workflow as well.

Now, the last thing that we need is this concept of the Apple endpoint security framework. Now, if you haven’t heard of this, it’s probably good because it’s really designed to be invisible. But this debuted on Mac with macOS Catalina. And what it did is it created this user space replacement for all the low-level operating system monitoring that a lot of these antivirus or security solutions needed.

That was really only achieved by operating within the kernel space. Now, this is not a lesson on how UNIX works. In advanced environments security teams want to get more insight into what’s happening with process, execution, and mounting file systems like USB drives. What this means is the sort of concept of endpoint detection and response—as well as what some people are calling “agents” now—Mac ships with a lot of these security technologies, right out of the box.

So, I bring up all these concepts because it’s worth having a discussion with your information security teams to find out what they need to protect important data and really determine which of these solutions can be handled natively on Mac—without the need for another third party. Case in point: most people don’t even realize that Mac actually ships with antivirus and antimalware software called XProtect. It’s designed to be silent and not interfere with your experience. If you don’t know it’s there, there’s a reason for that.

The Next Steps

Need help streamlining Mac deployment? Connection makes creating or upgrading an Apple ecosystem easy. We are an Apple Corporate Reseller with a partnership that goes all the way back to 1984. This means we are uniquely qualified to provide Apple solutions, product availability, and expertise that exceed your expectations. Get started today!

]]>
What Makes ChromeOS Different? https://community.connection.com/what-makes-chromeos-different/ Jun 13, 2023 Joshua Ramsey https://community.connection.com/author/joshua-ramsey/ https://community.connection.com/wp-content/uploads/2023/06/2223178-ChromeOS-BLOG.jpg

Most of us are probably familiar with ChromeOS thanks to its establishment in the K–12 market during the early 2010s. In recent years, ChromeOS’s foray into the enterprise space has also started taking off.

One of the key differences between ChromeOS devices and other office computers—running Windows or macOS—is the way they handle software. Applications on a traditional device are stored locally on a hard drive. These applications can be resource intensive, requiring a significant amount of processing power and memory to run smoothly.

Google’s ChromeOS, on the other hand, is designed to work with Web-based applications that are accessed through the Chrome browser on Chromebooks, Chromebases, and Chromeboxes. These applications are hosted on remote servers, which means they don’t require a lot of processing power or memory to run. This makes ChromeOS devices more lightweight and portable than traditional office computers.

Storage Wars

Another key difference is the way ChromeOS handles data storage. ChromeOS devices typically have very little local storage, usually just enough for the operating system and a few basic applications. Instead, users are encouraged to store their data in the cloud—either through services like Google Drive or other cloud-based storage solutions.

This approach has several advantages. First, it means that users can access their data from any ChromeOS device with an Internet connection, making it easier to work on the go or collaborate with others. Second, it reduces the risk of data loss or corruption, as data is stored securely in the cloud and can be easily recovered in the event of a hardware failure.

Built-in, Automated Security

Finally, ChromeOS is designed to be more secure than the operating system found on traditional office computers. Because it is optimized for cloud-based computing, ChromeOS is less vulnerable to malware and other security threats that commonly attack PC and Mac devices. It’s worth taking note that ChromeOS has never experienced a reported ransomware attack to date. In addition, ChromeOS devices receive regular security updates from Google, ensuring that they remain protected against the latest threats.

In conclusion, ChromeOS is a lightweight, modern operating system that is designed to work primarily with Web-based applications. It is optimized for cloud-based computing and is designed to be more portable, secure, and easier to use than traditional office computers. While it may not be suitable for everyone, it is an excellent option for users who value mobility, security, and ease of use. 

]]>
ChatGPT, AI, and Machine Learning—Oh My! https://community.connection.com/chatgpt-ai-and-machine-learning-oh-my/ Jun 08, 2023 Casey Lindsay https://community.connection.com/author/casey-lindsay/ https://community.connection.com/wp-content/uploads/2023/06/2218109-ChatGPT-Blog-1.jpg

I often wonder to myself, at what point does AI, ChatGPT, Machine Learning—and frankly just trying to stay at the bleeding edge of the technological revolution—get to the point of diminishing returns? Don’t get me wrong, there is a LOT of good that is coming from things like AI and ChatGPT. But there are also things that keep me up at night—and we need to talk about that too. 

What Is ChatGPT?

First, let’s cover the basics on what exactly ChatGPT is. ChatGPT is an AI chatbot developed by OpenAI that was released in November 2022. Built on top of Open AI’s GPT-3.5 and GPT-4 families of large language models, it has been fine-tuned using both supervised and reinforcement learning techniques. It has been getting a lot of much-needed attention because it is one of the most significant tech launches since the original Apple iPhone in 2007. ChatGPT stands for “Chat Generative Pre-trained Transformer”. It is essentially a generative language processing tool driven by AI that allows you to have human-like conversations and interactions with a chatbot. It’s a tool that can answer questions and assist you with tasks like writing essays, composing emails, or even writing development code.

ChatGPT in Motion

Now that we’ve briefly covered what it is, let’s highlight some use cases where I believe ChatGPT carries some inherent benefits. In the classroom, I see ChatGPT reducing teacher workload and improving the student experience. ChatGPT is like having a research assistant at your fingertips. For example, as a teacher, you could prompt ChatGPT with the following: “Tell me 5 causes of the Great Depression. Also, summarize the important facts that an eighth grader should learn, including sources.” Think about how much of an increase in efficiency this teacher would have when it came to their lesson planning. You’d obviously always want to check the sources and validate this information, but, man, would this help streamline lesson prep for educators. 

What about from the students’ perspective? I fondly recall my college years, trudging to the library through rain and snow to write research papers—and maybe socialize a bit. I’d check out books, extensively research my topic, and make certain I was referencing all my sources. Those were the days of AOL and dial-up Internet—and there certainly wasn’t a chatBot you could interact with to help you write your paper. As much as I think it is valuable for kids of all ages to do the heavy lifting to earn their stripes, I also believe that it’s beneficial for them to learn and adopt these technologies and increase the efficiency of their time management while also enhancing their technology skillsets. When they hit the job market, it would be unfortunate to see opportunities pass them by because they were reluctant to learn the latest technologies. I liken ChatGPT to having a virtual tutor or study buddy to help students further contextualize concepts to gain a greater understanding in and outside of the classroom.

Now let’s change gears and have a closer look at the benefits of generative ChatGPT within healthcare and how it has the potential to revolutionize the entire healthcare industry. One obvious use case is virtual care symptom checking to help triage patients more efficiently and reduce the burden on healthcare providers. ChatGPT can even be trained to provide guidance on selfcare for minor conditions. For healthcare providers, ChatGPT can assist with administrative tasks like charting and documentation. This can help providers save time and improve the accuracy of patient records. ChatGPT also has the potential to transform the way medical research is conducted.

The Potential of Misuse

So, while I believe ChatGPT to be highly beneficial to us as a society, I think it’s just as important to talk about the scarier aspects of this application while it’s still in its infancy. First and foremost, I believe there always must be some measure of human intervention from a checks and balance standpoint. You can’t ask ChatGPT to write a medical chart for a patient without checking this detail for accuracy. Things could spiral out of control amazingly fast with inaccuracies in medical records. I also think an argument could be made that it promotes laziness, use the college research paper as a notable example. ChatGPT could literally provide you with all the details to write a college essay with very little labor on the student’s part. Is this considered cheating? Some might say it absolutely is. 

A Delicate Balance

Like all things in life, I think balance plays a key role in the use of ChatGPT. Balance between increasing efficiencies and accuracy—but not allowing the chatbot to completely take over. Balance in student life between actual learning and retention of a subject versus allowing ChatGPT to do all the work for you. Balance in healthcare from a time efficiency standpoint for the providers, but also ensuring that the generative responses are highly accurate within the medical records. I am intrigued by where we are evolving with technology and that is what has led me to author this blog. I hope some of these key points have inspired you to think about these ChatGPT use cases and perhaps areas in your life that saddling up with a chatbot by your side might bring value to you too.

Tune in to our vlog for an overview of ChatGPT, its use cases, and why human intervention will always be needed for AI technologies.

https://www.youtube.com/watch?v=YkXRbrtzWa0
]]>
Connection Announces the 2023 IT Superhero... https://community.connection.com/connection-announces-the-2023-it-superhero-awards/ May 31, 2023 Connection https://community.connection.com/author/connection/ https://community.connection.com/wp-content/uploads/2023/05/2213271-ITSA-2023-Blog.jpg

We are proud to announce that Connection will host the third annual IT Superhero Awards! The awards program recognizes IT professionals, nominated by their colleagues, for going above and beyond the call of duty to save the day for their team. We need your help to reward these IT Superheroes with an award and option to attend the Connection Technology Summit in Las Vegas, NV—winners will receive complimentary travel, hotel, and event admission. Submit your nomination today!

There are five award categories:

Best Team Leader (Leads to success, inspires others to greatness)

Best Rookie (A fresh IT pro who performs like a seasoned pro)

Best Catch (Made an amazing save, big or small, that averted disaster)

Best Superpower (Capable of performing astonishing feats, no matter the deadline)

Most Unshakeable (Always calm, patient, and focused in the face of IT chaos)

A grand-prize winner, chosen from the 5 category winners, will be named the Ultimate IT Superhero!

At the presentation of last year’s awards, Patrick McGee—who was named the 2022 Ultimate IT Superhero—said, “It’s an incredible honor to be nominated by my team for this award. I’m completely humbled. I think their response to the IT Superheroes Awards program speaks volumes about the culture of our team—always positive, supportive, and looking for ways to lift others up. They’re the true superheroes. Without their dedication and hard work, we wouldn’t get anything done!”

The IT Superhero Awards program is open to IT professionals from organizations of all sizes and industries, spanning startups to large enterprises across all vertical markets. Category winners will be announced at the first Connection Technology Summit in Orlando, FL on September 14, 2023 and the Ultimate IT Superhero will be announced at the second Summit in Las Vegas, NV on October 19, 2023. Read the full press release for complete details.

Nominations for the 2023 IT Superhero Awards are due August 18, 2023submit yours today!

]]>
Cloud Computing in Healthcare Is Having Its... https://community.connection.com/cloud-computing-in-healthcare-is-having-its-day-in-the-sun/ May 25, 2023 Jennifer Johnson https://community.connection.com/author/jennifer-johnson/ https://community.connection.com/wp-content/uploads/2023/05/2206699-CloudComputingHC-BLOG.jpg

I distinctly remember the first time I participated in a cloud computing demonstration back in 2010. Since then, cloud computing has come a long way, particularly within the healthcare vertical. In fact, it was cloud-to-edge technology that dominated our conversations in the Connection booth during HIMSS23. As healthcare organizations both large and small grapple with anemic budgets and an exhausted and skeletal IT staff, cloud computing can serve as a welcome reprieve to many of their common concerns. Cloud computing is, if you’ll indulge the pun, having its “day in the sun.”

The Cloud Can Help to Ease Common Concerns in Healthcare

The HIPAA Journal reports that, in March 2023, there were 63 health data breaches, exposing more than 6.3M individual healthcare records, an increase of almost 47% from February 2023. The cost of these breaches is nearly incalculable, and remediation efforts are made more difficult when compounded by pervasive staffing challenges across clinical, administrative, and technology personnel.

Healthcare IT Today editor John Lynn remarked in his HIMSS23 recap, “Biggest Themes from #HIMSS23,” the common concerns among the hospital C-suite weren’t surprising. He noted there aren’t enough clinicians to serve the needs of patients. And the doctors and nurses in front-line patient care are burned out and increasingly skeptical that IT can be part of the solution. Connection believes introducing cloud solutions, where they make sense, could prove the latter untrue.

This Kind of Pressure Can Also Bring Creative Solutions

Healthcare organizations are in year three of their end-point device lifecycle for laptops and desktops that were deployed during the pandemic. With no dedicated funding to plan replacement, these organizations are taking their fleet of X86-64-bit devices and repurposing those devices as thin clients. This isn’t a new, or especially groundbreaking idea, but healthcare organizations are embracing this cloud-forward approach.

Economic, staffing, and security benefits notwithstanding, healthcare clients share that cloud computing has caught up to the unique use cases commonly found in clinical environments: shared workstations, tap-and-go/single-sign-on, virtual care, billing and coding, patient registration kiosks, call centers, remote/hybrid work, and digital signage.

One simple implementation can have staggering effects, saving both time and lives. “The IGEL OS is highly secure and customizable, allowing us to quickly deploy for a variety of use cases,” said Jim Baeszler, Chief Information Officer of New Jersey-based care provider, Chelsea Senior Living. Mr. Baeszler continued, “We made the switch to IGEL to extend the useful life of existing hardware which has been even more valuable in the current environment of supply chain issues and rising new equipment prices.”

Connection’s Cloud Circle of Excellence is your partner-agnostic source for all cloud-enabled solutions. Visit our Cloud Services webpage or contact your Connection Account Team to discuss cloud computing options for your healthcare organization further.

]]>
Microsoft Surface Updates https://community.connection.com/microsoft-surface-updates/ May 23, 2023 Makayla Mota https://community.connection.com/author/makayla-mota/ https://community.connection.com/wp-content/uploads/2023/05/2193371-Blog-Microsoft-Surface-BLOG.jpg

Did you know that the Microsoft Surface is the first PC designed and distributed solely by Microsoft? The Surface was first announced at an event on June 18, 2012, and was the first major initiative by Microsoft to integrate its Windows operating system within its own hardware. The following years have brought continuous updates and new iterations of the Surface from the Pro to the Laptop and Hub to the Go—Surface is an ever-evolving device made to fit different types of users.

I remember receiving my Microsoft Surface 2 for work in 2015, and it was love at first sight. The sleek shiny screen and the red (!) detachable keyboard felt revolutionary for a work device. It was lightweight and perfect for my role as a Learning Consultant that often relied on New York City public transit to get to schools for Microsoft Education training sessions. Fast-forward several years and I have had Surface Pro 3s, a 4, and my current personal device is a Surface Pro 7. I am a tried-and-true loyal Surface fan at this point, so I jumped at the chance to sit down and talk with my colleague, Nico Adornetto, Partner Development Specialist, about the Surface team at Connection, Surface updates, customer offers, and upcoming partnerships.

As one of the largest partners represented at Connection, Microsoft Surface strives to bring the best hybrid solutions to light for technology customers across all segments. The Surface team at Connection is available to answer any general questions about devices, accessories, or warranty information. For all sales inquiries, deal registration, or quote development, individuals should reach out to our Business Development Specialist.

Surface Updates:

Let’s start with what everyone wants to hear! The updated Surfaces devices are slick, fast, and uniquely beautiful.

Surface Pro 9 is the ultimate device that provides tablet flexibility with laptop performance. Surface Pro 9 also has an extended battery life, high-speed 5G connectivity, an edge-to-edge 13-inch touchscreen, and built-in kickstand. With high quality audio and video capabilities, the Surface Pro 9 is ideal for hybrid workers, remote workers, and people on the go.

Surface Laptop 5 is a sleek and beautiful device with an extended battery life and a vibrant touchscreen powered by 12th Gen Intel® Core™ i5/i7 processors providing a remarkable laptop experience. With its lightning-fast Thunderbolt port—which connects to a 4K monitor, charges your laptop, and has the capacity for large data transfers—the Surface Laptop 5 is an ideal fit for a modern workplace.

Savings Opportunities:

Step 1: Fall in love with Surface devices by exploring the features, functionality, and accessibility options that differentiate these devices from its competitors.

Step 2: Find an opportunity to save money on Surface devices for your organization by connecting with our experts to understand your business needs.

Surface Signature Savings: Eligible customers can purchase select devices at up to 20% off—with no minimum or maximum purchase quantity. By investing in modern Microsoft devices, you’ve help ensure improved security and productivity for your employees. This offer is valid until June 30, 2023.

Surface + Savings: A limited time offer for qualified commercial customers to receive a rebate of up to $50 on select devices—or $120 on Hub—purchases when you bundle them with Microsoft 365, Azure, Dynamics 365, and Windows 365 products. This offer is good through June 30, 2023.

Surface Starter Kit: Eligible customers can purchase up to 50 devices at 20% off! Save on Surface Laptop 5, Surface Pro 9, Surface Laptop Go 2, and Surface Go 3 while empowering your employees and IT to become more agile, connected, productive, and secure. This offer is valid until June 30, 2023.

Upcoming Partnerships within Connection:

How is Connection working with other partners to create access for the remote and hybrid workforce?

Surface and Canon Partnership: Enables the ability to print canvases or posters on the go, providing print and scan solutions that hybrid workers can use no matter where they are. This partnership highlights extraordinary use cases for Connection’s print capabilities.

Surface and Logitech Partnership: Offers accessories and video capabilities that enhance the mobile experience through Microsoft Teams to provide extremely reliable video quality that remote and hybrid workers know they can rely on.

For more information about Surface opportunities, upcoming partnerships, or savings opportunities, please reach out to your Account Team. For more information on the Surface team, please check out the vlog on Connection’s YouTube channel.  

https://www.youtube.com/watch?v=oK-m96w8QzY

 

]]>
Ransomware Threatens Manufacturing Operations https://community.connection.com/ransomware-threatens-manufacturing-operations/ May 11, 2023 Ryan Spurr https://community.connection.com/author/ryan-spurr/ https://community.connection.com/wp-content/uploads/2023/05/2177221-Manufacturing-Blog-Ransomware-in-OT-BLOG.jpg

With manufacturing becoming the #1 most attacked industry for two years in a row, the threats are real—and something we all need to take seriously. The #1 result of cybersecurity incidents was extortion, accounting for 32% of all successful events within manufacturing. 

Regarding the types of cybersecurity events, ransomware makes up 23% of all incidents within manufacturing. More alarming is that 70% of all ransomware incidents in manufacturing impact the operational technology (OT) domain, not just traditional IT. This highlights just how critical the risk is and demonstrates how committed attackers are to exploiting manufacturers’ weaknesses not just in conventional IT, but a more concerning trend within operations or industrial environments.

So What? We Have a Firewall

There is a belief that if we implement a firewall between IT and OT, all our risks disappear. Today’s attacks are focused on disrupting operations—that means propagating east and west—infecting every vulnerable or connected OT/IoT/ICS asset on the operational networks. The attacker’s goal isn’t ERP or HRIS in this situation—it’s to take advantage of weak OT networks and security designs to spread ransomware to any factory equipment with the sole purpose of encrypting and preventing normal operations. The reality is that 50% of manufacturers still have poor security perimeters or no network segmentation, making the task of infecting more equipment in your factory a breeze. The demarcation between IT and OT alone will no longer cut it—manufacturers must adopt more complete approaches to network segmentation, micro-segmentation, traffic monitoring, device isolation, and real-time monitoring to ensure the spread of ransomware is limited.

It’s Fine! We Have Backups

Unlike IT-managed assets, most manufacturers lack the necessary remediation tools to minimize the risk of successful ransomware within OT environments. For example, only 19%  of manufacturers could recover from backup, leading to forced ransomware payment. Only 55% of the encrypted or destroyed data was recoverable for organizations that could recover. 

It’s essential to ensure that manufacturers have in place backup and disaster recovery policies and procedures, tools that support operational technology equipment, automation of the process to avoid reliance upon human behavior, and that the end-to-end disaster recovery process has been thoroughly tested. With all of this, you’ll be better equipped to ensure that when a successful ransomware event does occur, your organization is confident that recovery is possible. This type of comprehensive strategy will limit your risk of extortion—or worse, plant stoppage.

Don’t Worry! We Have Cybersecurity Insurance

It’s true. Cybersecurity insurance does help defer the costs born from a successful incident, and in today’s age the average cost per incident is $4.47 million in manufacturing. Financial impact aside, insurance won’t mitigate a frustrated and demoralized workforce, it won’t address missed deliverables and brand impact, and should the breach result in the exfiltration of intellectual property, secretive process knowledge, or partner data, it may be a hard-pressed event to recover from. 

Connection recently surveyed clients and found that cybersecurity was a challenging topic. Cybersecurity is evolving as the industry addresses requirements, risks, and the appropriate pricing to impose on manufacturers. Our survey revealed that many clients still do not have cybersecurity insurance. For those that do, 41% of manufacturers saw their premiums increasing, 25% struggled to comply with mandated security requirements, and an alarming 18% were dropped from policies due to lack of necessary security controls or frequency of incidents. Cybersecurity insurance is essential, but it comes with its own challenges and is unlikely to solve all your business risks.

Let’s Make It Happen

With threats rising in operational environments, cybersecurity insurance becoming harder to acquire, maintain, or afford, and successful extortion events impacting production, it’s time to ensure that your company has the right solutions to keep your business operational.

Our Manufacturing Practice regularly works with manufacturing organizations to help them meet security requirements while ensuring operational excellence, a great workplace, and applying the right fitting technology to enable better outcomes. We have a team of experts from trade, an evolving portfolio of manufacturing solutions, and capabilities to assist IT and OT teams by augmenting their existing skillsets with complimentary advisory services to help your business accelerate technology adoption where it matters most.If your business is interested in learning more about our OT security solutions, engage Connection’s Manufacturing Practice to learn more about this technology, available services, and the many use cases that may benefit your organization.

]]>
Hybrid Meetings and Microsoft Teams Rooms... https://community.connection.com/hybrid-meetings-and-microsoft-teams-rooms-solutions/ May 09, 2023 Krysten Harper https://community.connection.com/author/krysten-harper/ https://community.connection.com/wp-content/uploads/2023/05/2075079-Hybrid-Meeetings-and-Team-Rooms-BLOG.jpg

Have you ever attended a hybrid meeting? What was your experience like? For many of us, our experience with hybrid meetings has been subpar. When you attend hybrid meetings in person, you must be cognizant of speaking loudly enough for remote attendees to hear you. More than likely, you’re also trying to actively involve these same remote attendees. For those of us who regularly attend hybrid meetings as a remote member, however, there’s a good chance our experiences have been even more challenging. It can be hard to tell who is speaking, voices are mumbled, and if somebody is writing on a physical whiteboard, you can forget about being able to see it. There is also a certain amount of FOMO—Fear of Missing Out—that goes along with attending hybrid meetings remotely. 

The goal of Microsoft Teams Rooms is to change this narrative. Teams Rooms takes the Teams platform you already know and love and brings it to your in-person conference room. Standard conference rooms were designed for the people in the room, where Teams Rooms are designed for everybody in the meeting. This means that everybody has a seat at the table, no matter where they are sitting.  

Microsoft Teams Rooms Solutions

  • Teams Rooms Basic: Microsoft Teams Rooms Basic provides a core hybrid meeting experience to organizations that purchase a certified Microsoft Teams Rooms System at no additional cost. The Basic option includes scheduling, joining meetings, content sharing, and collaborative white boarding, as well as basic security and management capabilities right out-of-the-box.

  • Teams Rooms Pro: Teams Rooms Pro includes all the core features available in Teams Rooms Basic, plus enhanced in-room meeting experiences such as intelligent audio and video, multiscreen support, and a full set of device management capabilities. Teams Rooms Pro is the recommended license for enterprise customers and smaller organizations with larger room counts or more advanced needs.

  • Signature Teams Rooms: For the ultimate Teams Rooms experience, a Signature Teams Room is your answer. A Signature Teams Room is a comprehensive hybrid meeting solution, designed with next-generation room standards. This delivers an elevated hybrid meeting experience, making collaboration easier and interactions even more engaging and inclusive across your meeting spaces. Signature Teams Rooms are designed around two key goals:
    1. Everyone in the meeting feels included, represented and productive. 
    2. Connections feel natural and immersive.

What does this look like? In medium and large spaces, a curved table encircles the AV equipment stack and faces a large, 21:9 aspect ratio display to foster more immersive connections with remote participants. For smaller rooms, a gumdrop or guitar pick-shaped table helps to achieve that same degree of face-to-face engagement.

*Example of a medium-sized Signature Microsoft Teams Room
*Example of a small-sized Signature Microsoft Teams Room

Teams Rooms Solutions at Connection

If you are looking to improve your hybrid meetings experience, attending the Connection Hybrid Meetings and Rooms Workshop is your first step. This workshop is designed to showcase hybrid meetings through the art of the possible immersive experiences, use case design, and deep-dive planning. At the end of the workshop, you can expect actionable recommendations and next steps to deploy and adopt Microsoft Teams Rooms in your environment. Interested in learning more about this workshop? Contact your Account Team today!

Watch our vlog to learn more about Teams Rooms solutions!

https://www.youtube.com/watch?v=uAnUH9E29ek
]]>
Not Scared about OT Security? You Should Be! https://community.connection.com/not-scared-about-ot-security-you-should-be/ May 04, 2023 Ryan Spurr https://community.connection.com/author/ryan-spurr/ https://community.connection.com/wp-content/uploads/2023/05/2169881-ISG-Manufacturing-OT-Security-BLOG.png

OT Security Problem

IT has long battled cybersecurity incidents across various industries for years and implemented measures to combat threats in the traditional IT domain. But there has been a massive shift from traditionally targeted industries to manufacturing in the last couple of years. More specifically, targeting manufacturing operational technology (OT) environments where technology, security, connectivity, and endless vulnerabilities exist. Coupling legacy technical debt with the adoption of cutting-edge IIoT and IoT technologies; it’s no wonder this hasn’t happened sooner.

Manufacturing has become the world's #1 most attacked industry for two years in a row. The average cost per incident is $4.47 million, and the business outcomes have never been more tangible, or severe. Gone are the days of casual or low-impact incidents. Today’s attackers are praying on manufacturing OT environments because they understand two things. First, manufacturers have a low tolerance for downtime and the inability to manufacture and ship products to their clients. Second, many manufacturers have a wealth of intellectual property, deep process expertise, and other data worthy of exfiltration.

Because of this, the #1 business outcome is extortion (largely a result of ransomware), and the #2 business outcome is data theft. These two outcomes make up most of the business impact, with extortion resulting in 32% and data theft and 19% of all incident outcomes. Both situations represent massive risk, downtime, business expense, and potential supplier, client, and brand impact. If you’re still not persuaded by the data, then look at a recent Connection Survey of Manufacturers, where we polled OT and IT leaders on their perceptions of cybersecurity risk posed by OT systems and infrastructure. 77% of all leaders viewed the OT environment as a moderate to severe threat to their business. Our peers are very mindful of the situation manufacturers face as attacks ramp up in our industry.

This is no longer if but when. It’s not even when but how often. Regarding frequency, 69% of the manufacturing industry experiences OT incidents at least every two months. This is the new world manufacturers must live within. Attacks are both expected and likely to be more frequent as compared to prior years. Successful attacks with OT environments are also alarming. Defense is no longer the only criterion. Manufacturers must also consider how to detect, contain, and remediate a higher rate of successful attacks to ensure business continuity.This makes complete sense because not all manufacturers are taking the threats seriously when we look at manufacturing OT cybersecurity hygiene and readiness. For example, 80% of manufacturers lack the tools to discover assets, defend, prioritize, and remediate OT/ICS/IoT equipment. These are the basic capabilities all manufacturers should have in place today.

There Is Good News—Solutions Exist to Minimize OT Risks

When mitigating OT risks, many solutions exist and can be tailored to the unique nature of your business, equipment, regulatory compliance, and risk levels. Any manufacturer can and should implement the following recommendations to minimize top threat vectors, most prevalent attacks, and improve overall cybersecurity hygiene.

  1. Industrial Asset Discovery and Visibility: It’s tough to access operational risks when you don’t have visibility into the devices connected to OT networks—but that is precisely where most manufacturers find themselves. 80% of manufacturers had limited or no OT network and asset visibility in 2022. This leaves organizations blind to identifying the types of devices and the risks posed by a wide array of industrial, legacy, and new smart technologies, let alone craft a strategy for creating defense in layers. 

    Many solutions now exist that allow manufacturers to scan, detect, profile, and prioritize based on risk, and ultimately formulate an appropriate strategy for cybersecurity defense, monitoring, and response based on the unique nature of your technology landscape.
     
  2. OT Network Segmentation: Unfortunately, 50% of manufacturers still have poor security parameters or no network segmentation. Segmentation allows manufacturers to isolate heterogeneous devices, coalesce like devices based on the type and risk factors, and most importantly, minimize adjacent infection when cybersecurity attacks are successful. 

    Today’s network and security platforms provide new capabilities that make it easy to segment networks. I’m not talking about the long-utilized approach of a firewall between OT and IT—that no longer cuts it. Organizations must segment or microsegment devices everywhere while applying zero-trust policies to minimize risks. This is especially true within the operational environment where legacy or end-of-life devices may lack patching, or ICS/IoT technologies may have extensive vulnerabilities. 

    If you do nothing else—work with an expert team to assess your network, infrastructure, and policies—and segment your network to mitigate the most significant potential threat to successful attack propagation.
  3. OT Facility and Equipment Access Control:54% of manufacturers lack OT user management solutions, putting their business at risk for unauthorized access, no role restrictions, and worse yet, shared passwords known to all and vulnerable to internal or external threats. 

    For example, regarding authentication and stolen credentials, 20% of all cybersecurity incidents result from poor or non-existent user credential management within operational environments. If your company is looking to ahttps://community.connection.com/mitigating-manufacturing-security-risk-with-access-control/dhere to ISO27001, NIST, or CMMC, putting controls on all equipment within this environment is paramount as you try to address access control, auditing and logging, and integration with identity and access management systems.



    Fortunately, solutions exist today that go beyond traditional end-user access control. It’s possible to leverage secure cryptographic badges (for example) for facility and factory access, as well as access to workstations, virtual terminal sessions, shared devices and kiosks, and industrial control systems (ICS). This means that front-line workers can use a physical item they possess for all forms of access control, all with an intuitive and integrated solution that makes IT, security, and front-line workers happier.
  4. Extended Detection and Response (XDR): Endpoint protection solutions have long existed—most typically require software agents to be deployed on a device. Of course, in the OT environment, installing agents can become complicated due to the type and status of a device. For example, equipment may leverage an unsupported operating system, be end of life, lack patching for known vulnerabilities, or simply because the devices cannot bear the performance hit by invasive agents running on production equipment.

    While traditional endpoint protection solutions are still a part of a complete solution, extended detection and response introduce a layered approach to mitigating some of the typical inadequacies of the OT environment. These modern solutions offer a mix of hardware and software infrastructure, allowing for the monitoring of many types of devices, supporting deep packet inspection, and offering the ability to integrate with upstream monitoring platforms like SIEM. Some XDR solutions offer even deeper capabilities for OT/ICS/IoT equipment, such as virtual patching (this is detecting signatures or known threats without the use of software agents onboard) or behavioral analysis (this is the act of baselining normal device behavior—such as ports, target systems, memory registers, and commands—to identify when a potential attack is underway and deviates from usual activity). 
  5. OT Integration with Corporate-managed SIEM/SOC: Let’s assume you have adequate asset visibility, network segmentation, and protections at the OT level. Successful attacks will still occur despite all the defensive investments. We should then be asking ourselves a series of questions to understand if we have the necessary data to discern and act.
  • How quickly will your cybersecurity teams detect and be alerted?
  • How will they know how many devices or the extent of their tech estate is compromised?
  • How will they know what the event is and what corrective actions should be taken?
  • How quickly can the team remediate to return the business to normal operations?

This is the situation many manufacturers face. They have strong cybersecurity hygiene and integrated monitoring in the traditional IT-managed domain but lack insights from OT. In today’s complex world, manufacturers need a single pane of visibility of their entire enterprise.  

Many solutions make it easier to integrate network, firewall, end-point protection and XDR, and other appliances with corporate SIEM/SOC monitoring. This can be integrated with your own SIEM/SOC, or with a 3rd-party managed service that combines OT and IT into a single integrated view of your business, and the very best approach to shorten time to discovery, containment, and remediation.

Let’s Make It Happen

We understand that manufacturers operate within different subindustries, held to various industry standards and regulations, and that risk is unique to your business. Our Manufacturing Practice, Solution Architects, and Network and Security Services teams work with manufacturing organizations to help them minimize cybersecurity risks so you can focus on what you do best.

Our Manufacturing Practice has a team of experts from trade, an evolving portfolio of manufacturing solutions, and assists IT and OT teams by augmenting their existing skillsets with complimentary advisory services to help your business accelerate technology adoption where it matters most.If your business is interested in learning more about how we support our clients or the topics covered, engage Connection’s Manufacturing Practice to learn more about this technology, available services, and the many use cases that may benefit your organization.

]]>
Mitigating Manufacturing Security Risk with... https://community.connection.com/mitigating-manufacturing-security-risk-with-access-control/ Apr 25, 2023 Ryan Spurr https://community.connection.com/author/ryan-spurr/ https://community.connection.com/wp-content/uploads/2023/04/2143849-MFG-AccessControl-BLOG.png

We’ve all been there. The business has asked you to improve its security posture due to a recent cybersecurity incident—or perhaps you’re being asked to comply with controls from ISO27001, NIST 800-171, or CMMC. You’ve successfully rolled out modern authentication, cloud-based identity and access management, and multifactor to IT-managed assets. You’ve now made significant progress to 80% of all company computing assets. It’s then you realize you must solve the same challenges in factories full of production equipment, shared devices, kiosks, and an audience of managers and operators who grimace at the thought of change and slower login processes—and who also don’t like the idea of security getting in the way of business.

The OT Authentication Challenge

What worked in the traditional IT domain doesn’t always work in the factory. The equipment is different. There is a frighteningly sizeable heterogeneous domain of devices and machines, including industrial control systems (ICS) with programmable logic controllers (PLC). The list goes on and on. How will your business ever bring secure authentication to this environment?

I like to call this the “last mile.” It’s an ode to the challenge of bringing high-speed Internet to the far reaches of the residential world. It’s not just the equipment but also the kinds of job roles, shared equipment (where people interchangeably log in using credentials plastered to the monitor or keyboard for all to see), and—dare I say it—the reaction from asking factory employees to take an extra 60 seconds to log into a machine that never required a username and password before.

Managers will start barking about how it used to take them zero minutes, and now operators are spending minutes or hours a day logging into computers, adversely impacting factory productivity numbers. You will quickly find yourself in a business change debacle where the simplest of technical changes are drowned out by employees' frustrations, and the loudest voices always outlast yours.

The Reality

There are actually two truths in this situation. And the solution can be found by understanding each side’s perspective. The first truth is that it is essential to consider the way factories work. Productivity does matter, and adding burdensome login procedures is not always a good fit for frontline workers. The other truth is that we must also mitigate security risks. In the past, this security avoidance behavior might have been accepted. In today's world—where OT and IT systems are deeply interconnected and the threats against manufacturing have never been higher—security must be a shared risk with practical solutions implemented.

Unlike before, manufacturing was the #1 most attacked industry globally in 2021 and 2022.1 When Connection surveyed IT and OT leaders across manufacturing organizations, 27% cited poor credential management and 34% bypassed security controls due to a lack of awareness or workflow needs that fit their environmental requirements. This is alarming, but perhaps more frightening than leadership perception are the facts. Regarding actual security threat vectors, one of the top three vectors has consistently been the lack of end-user authentication or stolen credentials, accounting for 20% of all successful cybersecurity incidents. Worse are the business outcomes, with 61% of cybersecurity incidents targeting OT2, and the top two most successful business event outcomes include extortion and data theft.1

A Better Path

Imagine finding an access control solution you could consistently apply across OT equipment and de-risk 20% of likely security incidents in the most heavily targeted and at-risk technology domain. Imagine how this could help you close several standards or regulatory-based controls, including access control, least privilege, audit and logging, and integrated monitoring. Imagine doing this with something all employees already possessed, and it was simple and quick enough that there might be little or no reason to complain.  Such a solution might certainly help with business change adoption and get the business on a better and more secure path.

Well, there is a better way! By leveraging modern secure badges, it’s possible to improve security access for buildings and factories and help organizations deploy access control to a wide range of OT use cases.

Let’s take a look at some of the most compelling applications to shore up OT access control.

Simple End-user Authentication

One of the most significant value propositions of modern secure access badges is leveraging a physical badge—something you possess—to access any number of physical or technology domains. These devices can securely host multiple certificates allowing an organization to reuse a badge beyond traditional physical building access use cases and any number of electronic access control use cases.

Why not use traditional access control credentials and passwords? Well, most industrial workers don’t sit at a desk or perform traditional tasks compared to knowledge workers who spend their whole day on a computer. It’s rare that a knowledge worker’s computer times out because they are constantly using their computers. On the other hand, frontline workers may sit, stand, or move from station to station. They typically need to log in and out of devices dozens or hundreds of times throughout their shift. 

Reusing your security badge to access traditional computers within the plant (IT- or OT-managed) simplifies the process for access control, and it creates a foundation for access across the OT technical estate.

For example, consider an assembler who uses a computer to view digital work instructions. The assembler is busy assembling products and may not actively interact with keyboards or mice during this time. Each time a terminal times out, it requires the worker to log in, and unlocking the session takes time and diverts them from their core responsibilities. This might sound trivial to IT, but it impacts these individuals, their productivity, and their workflow.

Even if traditional terminals utilize the latest standard devices and operating systems, consider how employees actually work and tailor the authentication process to improve their work outcomes and security posture.

Authentication for Shared Devices and Kiosks

Another widespread use case is that of shared devices. These can exist in various flavors, support process equipment, test stands, kiosks, and other factory equipment multiple individuals interact with during a typical shift.

In this scenario, the use case is a bit more complicated because the machine often utilizes a shared administrative account as it runs uninterrupted 24/7. Because of this, the shared device credentials may be known to all employees and openly visible on keyboards or monitors. It doesn’t allow workers to be validated for active employment, least privilege, nor audit which employees accessed the equipment and when.

Combining shared device software and secure badges makes it easy for OT employees and security to have the best of both worlds. Administrative accounts run in the background. By leveraging secure badges, multiple employees can access the shared device while ensuring multiple security controls are met and help you align with your corporate security goals.

Authentication for ICS and PLCs

And then, there are industrial control systems. These devices are the farthest away from the IT domain expertise you can find. That said, more and more of these platforms are being connected to networks, integrated with Industrial IoT platforms for data and automation, and may be at more risk than any other endpoint in the corporation.

These devices are also fit for purpose and tend to lack the additional capacity for security software or access control tools with integration to identity and access management (IAM).  This means anyone with physical access to a HMI or PLC may have access to industrial equipment. And forget about getting any logging or auditing—it just doesn’t exist.

Now imagine how the same security badge could be integrated with the PLC and provide a level of access control that verified employee status, ICS permissions, access level (think standard operator vs. supervisory or administrative) and provide logging and auditing where compliance is required.

Let’s Make It Happen

We understand that manufacturers have a diverse range of equipment and roles in their factories, and it’s essential to meet both cybersecurity best practices while ensuring a highly productive environment. This calls for solutions that meet the needs of IT, security, and operations.

Our Manufacturing Practice regularly works with manufacturing organizations to help them meet security requirements while ensuring operational excellence, a great workplace, and applying the right fitting technology to enable better outcomes.

Our Manufacturing Practice has a team of experts from trade, an evolving portfolio of manufacturing solutions, and assists IT and OT teams by augmenting their existing skillsets with complimentary advisory services to help your business accelerate technology adoption where it matters most.

If your business is interested in learning more about our OT security solutions, engage Connection’s Manufacturing Practice to learn more about this technology, available services, and the many use cases that may benefit your organization.

1. IBM, 2023, IBM Security X-Force Threat Intelligence Index 2023
2. IBM, 2023, IBM Security X-Force Threat Intelligence Index 2022
]]>
How to Minimize the Risk of Ransomware with... https://community.connection.com/how-to-minimize-the-risk-of-ransomware-with-immutable-storage-and-backups/ Apr 13, 2023 Kelly Kempf https://community.connection.com/author/kelly-kempf/ https://community.connection.com/wp-content/uploads/2023/04/2137108-HC-Immutable-Backup-BLOG.jpg

Data is the most powerful currency in the digital world, with the total cost of a data breach averaging $4.35M (per event).1 Even more alarming, the healthcare industry had the highest data breach cost of any industry at $10.10M (per event).1 That’s more than twice the global average. The impact for businesses is significant and will continue to grow.37% of all businesses were hit by ransomware in 2021, and it cost the world $20 billion. This number is expected to rise to $265 billion by 2031.2

Healthcare data is uniquely targeted and under constant threat from cybercriminals who seek to exploit weaknesses in systems and networks. Healthcare providers are tasked with implementing multiple layers of protection. As noted in our October 2022 Cybersecurity Awareness Podcast, healthcare providers must protect data from the inside out—including front line protection such as implementing security tools/protocols and keeping all assets and systems up to date, as well as a second line of defense, including testing the internal/external environment and taking regular, protected backups. Most healthcare providers have these mechanisms in place today, but how these security protocols are configured—and ultimately interact—plays an important role in securing healthcare data.

What’s So Special about Immutable Storage?

One critical component of protecting patient data from unauthorized access and tampering is immutable storage. Once referred to WORM-based storage (write once, read many), this time-locked, immutable object storage ensures data cannot be altered or deleted once it has been stored. This is achieved by using specialized hardware and software that write data in a way that makes it unchangeable, therefore protecting healthcare data from accidental or intentional tampering. Though back-up-to-cloud is most common, some users may look to traditional storage mechanisms, including hard drives, SSD, and—in rarest instances—tape.3

While traditional backup systems overwrite older data with new data, which can result in the loss of critical patient information, immutable storage can be used to create secure, accessible backups, an important component of cybersecurity and compliance. Even when following the 3-2-1-1-0 golden rule for backups, a virus can still infect each location, therefore destroying the integrity of the data and negating the ability to restore. By contrast, immutable backups retain every version of data that has ever been written, ensuring that even if data is corrupted or deleted, there is always a backup that can be used to restore the lost data. A solution that performs regular, unchangeable backups ensures that any lost data can be quickly and easily restored, minimizing the risk of harm to patients. Additional considerations for backup strategy planning are keeping up with the rate of data creation, retention policy review and configuration, encryption of data in transit and at rest, and isolating backup location.   

Ensure Your Disaster Recovery Measures Are Comprehensive

Healthcare providers must consider the importance of securing patient data, implement appropriate recovery measures, and regularly test their recovery strategy. Immutable storage and backups are critical components—ensuring a copy of the data remains fixed, is always recoverable, and is verifiably secure. Including immutable storage and backups as part of the healthcare security fabric helps meet the unique needs of healthcare providers, delivering both security and peace of mind that they need to operate effectively and safely—and ultimately providing patients with the confidence that their information is protected by their healthcare providers. If you want to learn more about how Connection can help you build a strong, resilient security fabric that includes immutable storage and backups, contact an Account Manager today or visit us online for more information.

1 Cost of a Data Breach 2022 – IBM.  https://www.ibm.com/reports/data-breach?utm_content=SRCWW&p1=Search&p4=43700072379268622&p5=p&gclid=CjwKCAiAxvGfBhB-EiwAMPakqgOo-coSIXQNyxXaF3Modx1qk9tdXXJmX3pHyr45D86Jqn8UKII9YhoCt2IQAvD_BwE&gclsrc=aw.ds

https://www.datacore.com/blog/how-to-protect-backups-from-ransomware/

3 https://www.techtarget.com/searchdatabackup/tip/Use-immutable-backups-to-prevent-data-loss-boost-compliance

]]>
Connection and Texas City Independent School... https://community.connection.com/connection-and-texas-city-independent-school-district-a-success-story/ Apr 06, 2023 Makayla Mota https://community.connection.com/author/makayla-mota/ https://community.connection.com/wp-content/uploads/2023/03/2133756-Texas-City-ISD.jpg

Gina Covington is bright, warm, and an absolute force. Having been the CTO for Texas City Independent School District (ISD) for about a year and a half—bringing over 25 years of education experience to the role—Gina has made huge strides within the district. Texas City is about 50 miles southeast of Houston, and the ISD supports 8,000 students across 13 schools. Since Gina took the role, Texas City ISD has made Microsoft 365 and Windows devices the gold standard across the district. In Gina’s words, the decision to go with Microsoft all started with a question:

“What do our students need to know about technology to be prepared to make valuable contributions when they leave our schools?”

Preparing Students for the Workforce

The decision to go with Microsoft came from sourcing information from teachers and industry leaders, as well as thinking about the real skill sets students will need when they enter the workforce. In Gina’s experience, “If you don't use Microsoft products, you are not prepared for the workforce.”

Using Microsoft tools, students in the Texas City ISD are taught how to professionally write business emails and letters and build presentations. Teachers fully utilize their Microsoft 365 suite through Teams, PowerPoint, Word, Excel, and OneNote in their daily lessons, showing students how to be successful in the real world. The powerful sense of collaboration between teachers at the schools and the district team is evident when speaking to Gina. The goal for everyone is to drive student outcomes—whether that is a teacher using Microsoft Translator to easily help ESL students adapt or applying for assistive technology with the instructional technology team to ensure a student’s success—and working together to provide all students with the same opportunities is key. Microsoft Education and Microsoft 365 have provided Texas City ISD with a variety of tools and devices they can leverage to fulfill the common goal of student success.

Right-fit Devices for Students

Upon returning to the campuses after the height of the pandemic, Gina saw a real need in providing an easy-to-use device for the younger students. This is where Jerry Cournoyer, Executive Account Manager at Connection, comes in.

“My predecessor had ordered premium laptops, and that was great for everybody during COVID. But once we were face-to-face again, I realized 3- and 4-year-olds don’t need all of that. They need something different,” said Gina. “So, I reached out to Jerry and several different partners, asking for a simpler device. And, really, no one else has a device like the Surface Go. Jerry was on it immediately. The beauty of working with Connection is that they understand our vision. And what we see as critical for our students is that they move into the real world outside of a K–12 environment.”

“Anytime I need anything, I just say, ‘Hey Jerry, I’m thinking about this. What’s going on?’ I really rely on Jerry to look at what’s out there and he’ll feed me stuff. I’ve got multiple providers that want to do what Connection does for us, but the level of service we get—and the follow up—it’s just...” Gina smiles and shakes her head.

Bobby Mills, the Manager of Network Services at ISD for 17 years—and a parent within the district— agrees, “Yeah, I do the same thing. And not just with Microsoft! Anytime I need a new piece of software, I email or call Jerry first. I always go to Connection because I know they can get it for me, and I don’t have to jump through hoops trying to find it with someone else. I use a lot of network tools and I always just email Jerry. He takes care of me!”

Procurement and Deployment Made Easy

Bobby has been an integral part of the development of ISD’s infrastructure. He currently manages the district’s 10,000 devices using Autopilot and Intune.

“I love Intune,” Bobby states. “I love the management features and the administrative templates. It makes my job easier and more efficient. From a management standpoint, I love that even if someone takes a device home, I can still manage the security of the device.” 

Bobby has worked with Jerry throughout the entire process of going 1:1, as well as utilizing Intune and Autopilot Azure services—and even bringing in a licensing specialist to help when needed.

“And that’s the other thing,” Gina says. “It isn’t just about purchasing. Jerry has resources that he provides for us when we need it. We’ll ask a question, and he is quick to loop someone in. We built four buildings in the last year, and we have 10 facilities that are going to be built. We’ll be relying heavily on Jerry to help support us as we start purchasing for those new facilities.”

Because of the generous size of the district and its multiple campuses, Jerry also works directly with administrators, school secretaries, and Assistant Principals to help them with the hardware they need, often providing a high- and low-end option, along with the information required to make the best decision.

“He adds so much value for not only me and Bobby, but also to the entire district. Those people who are out there, boots on the ground, really doing the work,” Gina says. “The key for us is the end user. We are the end user for Connection in the same way students and staff are end users for us. We know that Connection values their end users. Jerry typically communicates to me before I have a chance to communicate back to him on something. He lets me know when things are set to expire—which has been huge in my transition to this role because there was not a lot of documentation for me. Before we didn’t know things were going to expire until they had expired, and Jerry has filled that need for us.”

The feeling is clearly mutual. “I’m more than thankful to be working with Gina and Bobby,” Jerry says. “Anything I can do for them; they know they are the best and most important people to my business. I am thankful that I get the chance to work with them. And I’m happy to do it.” What more could you ask for in customer service?

Reach out to your Connection Account team to learn more about Microsoft Education services and solutions we can provide.

]]>
A New Advantage for Your Warehouse: How... https://community.connection.com/a-new-advantage-for-your-warehouse-how-visual-picking-improves-accuracy-and-efficiency/ Mar 30, 2023 Ryan Spurr https://community.connection.com/author/ryan-spurr/ https://community.connection.com/wp-content/uploads/2023/03/2125871-MFR-Warehouse-Visual-Picking-BLOG.jpg

The rise of e-commerce and the increasing demand for fast and efficient delivery have pressured warehouse operations to keep pace. Seeking productivity and differentiation, visual picking solutions have emerged as game changers in the logistics and supply chain industry. Warehouse operations are also not immune from workforce shortages and high turnover challenges. This means that leaders must adapt and transform, all while mitigating a shortage of skilled workers to keep business operational and clients happy.

How Does Visual Picking Work?

In traditional manual picking operations, workers are tasked with physically locating and retrieving items from the shelves to fulfill customer orders. This process can be time-consuming and error-prone, leading to delayed deliveries and increased labor costs. Visual picking solutions address these challenges by automating the picking process, improving accuracy and efficiency, and reducing the need for manual labor.

Visual picking solutions use cameras and augmented reality mobility devices to identify and locate items in the warehouse. The system can be integrated with existing warehouse management systems (WMS) or enterprise resource planning (ERP), and customized to work with different product types and warehouse configurations.

When a customer order is received, the visual picking solution uses image recognition technology to identify the items required. The system then guides the worker to the exact location of the items, reducing the time and effort required to search for them physically. This process is repeated for each item in the order, allowing the worker to quickly and efficiently retrieve all the items and prepare them for shipment. Some solutions even guide palletization or the most optimal way to load a pallet to ensure a stable, weight-based pallet process to ensure goods don’t tip or crush under the weight or in transit.

Benefits of Visual Picking

  1. Increased Accuracy: Visual picking solutions can accurately identify and locate items, reducing the risk of errors and increasing the accuracy of the picking process.
  2. Increased Efficiency: By automating the picking process, visual picking solutions can significantly increase the speed and efficiency of the picking process, reducing the time it takes to complete orders and increasing overall productivity.
  3. Increased Flexibility: Visual picking solutions can be easily adapted to different warehouse configurations and product types, providing greater flexibility for companies as their needs change.
  4. Enhanced Customer Satisfaction: By increasing the accuracy and speed of the picking process, visual picking solutions can help companies meet customer demands more effectively and support customer demand and growth, leading to increased customer satisfaction.
  5. Shortened Training and Time to Productivity: With high workforce turnover, visual picking solutions help by automating the picking process, turning new hires into productive pickers in hours vs. days.

Visual picking is a game changer for warehouse and logistics operations. Visual picking solutions can transform the way warehouses operate by automating the picking process and improving accuracy, efficiency, and safety. Companies adopting this technology will have a competitive edge and be better equipped to meet the demands of the modern e-commerce landscape.

Get Started with Help from the Experts

We understand that manufacturers are at different points in their smart manufacturing initiatives. Our Manufacturing Practice regularly works with manufacturing organizations to help them grow and improve their business by applying enabling technologies, including within warehouse operations.

Our Manufacturing Practice has a team of experts, an evolving portfolio of manufacturing solutions, and capabilities to assist IT and OT teams by augmenting their existing skillsets with complimentary advisory services to help your business accelerate technology adoption where it matters most. Be sure to engage Connection’s Manufacturing Practice to learn more about this technology, available services, and the many use cases that may benefit your organization.

]]>
Connection Professional Development:... https://community.connection.com/connection-professional-development-microsoft-in-education/ Mar 22, 2023 Makayla Mota https://community.connection.com/author/makayla-mota/ https://community.connection.com/wp-content/uploads/2023/03/2107421-Blog-Microsoft-Professional-Dev-BLOG.jpg

Prior to my role at Connection, I was a Microsoft Learning Consultant and spent six years training educators and administrators on Microsoft tools all over New York City and New Jersey. It was fun and hard, and exhilarating. Coming from an Educational Publishing background, it was a great step into the technological side of education, and I loved it. When I took my role as a Microsoft Partner Marketing Specialist at Connection, I was thrilled to see one of my former Learning Consultant colleagues, Nicole Caldwell, in a role at Connection as a Professional Development Specialist. 

Nicole and I only worked together for a brief time, (she covered my training and accounts while I was on parental leave!), but she was so warm and kind—and it was great to see a familiar face when I came onboard. Through Nicole, I met her equally amazing colleague Cindy Daniels, also a Professional Development Specialist, and had the opportunity to learn more about what they—and Connection’s Professional Development Team—do in education. 

Microsoft Global Trainer Partner Program

Connection is a member of the Microsoft Global Trainer Partner Program, and our Professional Development Specialists are Microsoft Innovative Educator (MIE) Certified to deliver training for educators on Microsoft’s behalf for Connection. Highly skilled and curious, both Nicole and Cindy have had years of experience in and out of the classroom and understand the world of the educator. They speak the language and know how to approach educators and education in general from an insider's standpoint. That unique point of view allows them to build the trust needed to go into a school or to lead sessions at EdTech conferences and show the multitude of ways Microsoft in Education tools can improve communication and collaboration among staff, students, and the greater school community to such a positive reception. Teaching teachers can be extraordinarily difficult. Having that educator connection as a starting point can make a world of difference. 

Get the Most Out of Microsoft 365 and More

Supporting both K–12 and Higher Ed, the Professional Development Specialists at Connection are strategic in working with schools and districts to create customized plans for systemic digital transformation with Microsoft 365. Their main goal is to engage with educators and leaders to provide learning opportunities that align with Microsoft Educator programs and are authentic experiences. Nicole and Cindy both provide in-person (either at schools or alternatively at a nearby Microsoft facility) and virtual training, or a combination of both. The beauty of the partnership Connection’s Professional Development Specialists provide is their ability to assess your top needs and meet you where you are—whether that is leveraging modern technology and apps or a complete MIE Academy—and then deliver standard or customized trainings based on those needs.

I have worked with both Cindy and Nicole on Connection customer success stories and have heard firsthand how much of an asset they have become within the institutions they work with. From Cindy’s MIE training academies with the UNC Teaching Fellows to Nicole’s partnership encouraging the tinkering mentality with the David C. Anchin Center for the Advancement of Teaching, they have made a concentrated effort to connect with both veteran teachers as well as teaching students to provide Microsoft solutions in the classroom. They are natural teachers—patient, charismatic, engaging, knowledgeable, and innovative in their approach—making them ideal partners to drive growth and increase the effectiveness of teaching and learning using Microsoft 365.

Watch our vlog to learn more about Microsoft professional development for educators!

https://www.youtube.com/watch?v=6YVQzTPG0XM&t=4s

Learn how Connection can help you leverage Microsoft technology and apps through courses led by our MIE Certified Professional Development Specialists. Please reach out to your Account Team or see a complete list of course offerings here

]]>
Retail 2023 – A Year of Smart Technology https://community.connection.com/retail-2023-a-year-of-smart-technology/ Mar 08, 2023 Brian Gallagher https://community.connection.com/author/brian-gallagher/ https://community.connection.com/wp-content/uploads/2023/03/2096323-ISG-Retail-2023-Technology-Trends-BLOG.jpg

The technology needs in retail for 2023 might be the clearest we have ever experienced. Over the past five years, retailers of all sizes have had opportunities to achieve detailed insights into their customers’ experiences and engagement with their brand, as well as how to use that engagement to drive profit. As a retailer, your understanding of customer behavior through multiple omnichannel touchpoints has helped identify the path to growth. 2023 needs to be a year of focus on those technologies required to embrace the customer’s desired experience.

The cool thing about 2023 technologies in retail is that almost everything you do for a customer will have a positive impact on your employees. Staffing and employee satisfaction are a struggle for every retailer. This will not change in 2023 unless you allow technology to augment your workforce. Unlike years past, your employees are openly embracing technology. The employee count will never be what it once was, but the quality can be better than ever.

What are the technologies that enhance both customer experience and employee productivity? Let’s explore three key areas that will make a big impact in the coming year.

Smart Store Technologies

You’re likely already familiar with smart home technologies—everything from security cameras and thermostats to kitchen appliances—and maybe you even have a few of these smart devices to help make your home life more convenient. These same technologies are available to elevate your business—from IoT devices to AI and edge computing. By implementing smart store technologies, you can not only truly “wow” your customers, but also improve the productivity of your team members. Cameras powered by AI can help display targeted marketing based on who is currently in the store. A device can not only scan for empty shelves and create a pick list—it can also suggest alternatives for those items that are no longer available. The possibilities for smart store technologies are limitless—and they’re critical to improving the in-store experience for both customers and employees.  

POS and Payment Solutions

Consumers expect to have multiple payment options, including tap and mobile pay, yet the majority of POS systems currently in use are not capable of accepting mobile payments or tap to pay.

Retail-Connection-POS

While the two likely reasons are cost and POS system age, retailers should not be shortsighted. Any POS or payment device more than five years old is considered a dinosaur. The omnichannel integration that your customers desire cannot function in legacy systems.

Many younger customers don’t even carry a credit card and are hesitant to insert it into a card reader because of security concerns. Even if your current POS and payment systems still function, investing in updated models that offer secure payment options will bring you and your customers added convenience and peace of mind.

Digital Signage and Marketing

Customers want a very personalized experience, and that includes the digital displays they encounter in your store. Today’s marketing teams are focused on dynamic engagement with customers. You can create a solution consisting of smart technologies, content management systems, and displays to deliver personalized, targeted messaging to each type of shopper you might find in your store. When your customer feels that you’re speaking directly to them—that kind of engagement can deliver amazing results.

Where Do You Start?

There’s no time like the present to begin building your retail transformation blueprint. Matching your solutions to your organization’s unique challenges is the key to optimizing resources and transforming experiences for customers and employees alike. You do not have time or resources to waste. I recommend taking a partner such as Connection that can bridge the gap between your business, ISV providers, and technology partners. Engage our Retail Practice today to get started!

Listen to our retail podcast featuring NVIDIA and Lenovo

This episode of TechSperience explores how AI solutions – a combination of data management, connectivity, edge computing devices, and software – can create powerful results for retailers.
]]>
Technology Solutions that Will Transform... https://community.connection.com/technology-solutions-that-will-transform-heart-care/ Mar 07, 2023 Jennifer Johnson https://community.connection.com/author/jennifer-johnson/ https://community.connection.com/wp-content/uploads/2023/03/2083178-March-Healthcare-BLOG.jpg

According to the Centers for Disease Control, heart disease is the leading cause of death in the United States, attributing to more than 877,500 deaths annually. The National Heart, Lung, and Blood Institute reports that more than 18.2 million American adults have coronary heart disease, making it the most common type of heart disease in the United States. Heart disease and stroke have a staggering economic impact, costing $216M per year and $147M in lost productivity on the job. 

Patients are advised to maintain a healthy weight, incorporate more fruits, vegetables, and lean proteins into their diet, manage stress, and begin a smoking cessation program to take steps toward a heart healthy lifestyle. Doctors, healthcare professionals, and insurers are increasingly leaning on technology as an ally for improving the health of their patients.

Digital Innovation in Patient Healthcare

Driven in part by technology democratization—as more than 85% of U.S. adults own a smartphone—combined with the increase in remote work and the high adoption of IoT devices in the home (including ambient technology like Alexa and wearables that track basic and advanced biometrics), leveraging technology to support a healthy lifestyle has become easier than ever.

Connection has built a broad offering of remote patient monitoring solutions and population health tools that give healthcare providers, insurers, and patients access to technology that they can be used to track their health habits. Weekly and sometimes daily tracking of steps taken, floors climbed, weight, blood pressure, and glucose levels can help patients take a more active role in managing their chronic health conditions using medical-grade devices that can connect to their smartphone. Integration back to the patient’s electronic health records empower the clinician to adjust treatment and care needs in near real-time.

The promise of “Doc-in-a-Box” technology has been available to some extent for years, particularly with large retailers. Today, the devices themselves are more cost-effective, the reimbursements through CMS and private insurers are more favorable, and the technology has evolved such that a large swath of patients with varying chronic conditions can be managed using a single dashboard. When combined with population health applications or an applied AI algorithm, technology and empathy can improve clinical decision-making and patient outcomes.

Connection’s healthcare IT experts are here to help you find, customize, and implement the right technology to achieve your organization’s goals. Visit us online or contact your Account Manager to learn more. 

Connection Healthcare IT
]]>
Kickstart Your Cloud Journey with the AVS... https://community.connection.com/kickstart-your-cloud-journey-with-the-avs-pilot-program/ Mar 02, 2023 Makayla Mota https://community.connection.com/author/makayla-mota/ https://community.connection.com/wp-content/uploads/2023/02/2075690-AVS-Pilot-Program.jpg

Are you curious about Azure VMware Solution (AVS)? Do you still have questions about what exactly it entails? In a previous post, we went over the basics and benefits of AVS. The simplest way to think of it is as a solution supported by Microsoft that constructs a fast track to the cloud by migrating or extending existing VMware workloads from on-premises environments to Azure. This cloud modernization solution comes with the added benefit of reduced cost, effort, and risk of retooling operations.

The Connection AVS Pilot Program is an opportunity to work with our cloud migration experts to form a strategic cloud approach that will enable your organization to expedite innovation, improve efficiency, and develop a competitive advantage. Within the pilot program, you can expect a comprehensive and strategic recommendation from our team that fits your management and optimization goals, allowing your organization to gain familiarity with this technology while piloting a few select workloads.

A Connection Cloud Expert will work with you to offer their guidance as they walk through your current infrastructure and workloads, providing a detailed analysis of your resources, consisting of:

  • Azure Readiness Summary
  • Recommendations for appropriate Azure VM configurations
  • Deploy pilot environment for select workloads
  • Estimated monthly cost for hosting your Azure environment

Together we will develop a custom and strategic migration plan, unique to your business needs, that meets the technical and operational requirements for improved business outcomes.

So, what’s in it for you? Here are some use cases of what your organization can gain from your participation in our AVS Pilot Program:

On-premises Data Center Footprint Reduction

Shift any vSphere-based workloads to Azure in a non-disruptive, automated, and scalable manner without changing the underlying vSphere hypervisor. Reduce the risk of rearchitecting and eliminate future hardware refresh headaches and capacity limitations.

Data Center Expansion Based on Demand

Seamlessly expand or augment data center capacity—and adjust your costs—on demand, via self-service provisioning. Reduce your up-front investment, accelerate speed of provisioning, and reduce complexity with the same architecture and policies across both your on-premises infrastructure and the cloud.

Disaster Recovery and Business Continuity

By using a VMware Stack deployed in Azure, you are automatically setting up an on-demand disaster recovery site for an on-premises data center. VMware Site Recovery Manager (SRM) brings proven DR capabilities to AVS. SRM for AVS offers an intuitive and simplified experience for installation and lifecycle management of SRM, directly through the Azure portal.

Application Modernization

With AVS, you can keep managing your migrated environments with the same VMware tools you already know, while you are modernizing your applications with Azure-native management, security, and services. It’s a simple and flexible way to take on modernization at your leisure.  Azure VMware Solution provides a hyperconverged architecture designed to run your most demanding VMware workloads:

  • Run Oracle, Microsoft SQL server, middleware systems, and high-performance no-SQL databases.
  • Unify DevOps across VMware and Azure.
  • Optimize VMware administration for Azure services and solutions that can be applied across all your workloads.
  • Access public cloud services without having to expand your data center or rearchitect your applications.
  • Centralize identities, access control policies, logging, and monitoring for VMware applications on Azure.

Cloud Desktop Virtualization

The most common mode of operation for virtual desktops is now hybrid, where enterprises host desktop workloads on both on-premises infrastructure and public clouds. VMware Horizon on Azure VMware Solution lets you combine on-premises and Azure-hosted virtual desktops and apps into a uniform pool with fully consistent user and management experiences.

Watch our vlog to learn more about the Connection AVS Pilot Program!

https://www.youtube.com/watch?v=1RPrX-1M7rI&t=61s

What have you got to lose? Contact your Connection Account team to learn more about the Azure VMware Solution Pilot Program—and let’s kickstart your journey to the cloud.

]]>
Modern Warehouse Operations: Transformation... https://community.connection.com/modern-warehouse-operations-transformation-is-here/ Mar 02, 2023 Ryan Spurr https://community.connection.com/author/ryan-spurr/ https://community.connection.com/wp-content/uploads/2023/02/2085160-Manufacturing-Modern-Warehouse-BLOG.jpg

Today’s warehouses play a vital role in the overall efficiency of factories and the supply chain. Technology advancements have enabled warehouses to operate more efficiently and effectively, from automating tasks to improving the accuracy of inventory management, technology has had a profound impact on warehouse operations.

It’s also important to point out that the same macro headwinds affecting research, engineering, and the factories also impact the warehouse. Workforce shortages, high turnover, and a lack of skilled warehouse associates are fueling investments that manufacturers might have otherwise ignored in years past. The cost of not automating, not augmenting the workforce, and not scaling up productivity is greater than the cost of warehouse technology investment.

Where are manufacturers investing in warehouse operations? The following are some of the most common investments we’re seeing and supporting with our clients:

1. Automated Material Handling Systems (AMHS)—Automated Material Handling Systems use robots, conveyors, and automated storage and retrieval systems to handle materials in a warehouse efficiently. This technology has dramatically improved inventory management’s speed and accuracy, and reduced the need for manual labor.

2. Warehouse Management Systems (WMS)—Warehouse Management Systems are software solutions that help manage and optimize warehouse storage, retrieval, and inventory distribution. This technology provides real-time data on inventory levels, order status, and shipping schedules, enabling warehouse managers to make informed decisions. WMS software also runs atop of the modern hardware devices used by the put and pick, receiving, and shipping processes to improve how work gets done correctly every time. These platforms also integrate with ERP, 3PL, and transportation and logistics companies to drive a more efficient supply chain.

3. Radio Frequency Identification (RFID)—Radio Frequency Identification is a wireless technology used to track the movement of inventory in a warehouse. RFID tags are attached to products, and RFID readers are used to track their movement in real time. This technology has greatly improved inventory management accuracy and reduced the time required to locate products in a warehouse. The technology can also streamline and automate many transactions, allowing warehouse associates to focus on more value-added activities.

4. Warehouse Robotics—Warehouse robotics includes a range of technologies, including pick-and-place robots, mobile robots, autonomous guided vehicles (AGVs), and autonomous mobile robots (AMRs). These technologies automate tasks such as order picking, packing, and transporting goods, freeing up human workers to focus on more complex tasks. Warehouse robotics has greatly increased warehouses’ efficiency and productivity and reduced the risk of injury to workers.

5. Network Infrastructure—I would be remiss by ignoring the underlying infrastructure. We hear it all the time from our manufacturing clients. They implement new technologies, whether that is mobile scanners, forklift mobility, tablets, or AMRs at scale, but fail to include robust wireless, directional antennas, or modern technologies like private cellular.

Traditional networking done right ensures all endpoints have a strong signal and no dead spots, which are critical to ensure positive end-user adoption and productivity. Private cellular is another great technology. It allows your organization to deliver strong 5G signals anywhere in the warehouse, eliminates access point hopping, and provides constant access for high mobility and high bandwidth applications. Most warehouse devices natively support 5G, and when it comes to the high mobility use cases, including forklifts and AMRs. 

Forklifts Deserve Love Too

In manufacturing, we often speak to the most advanced technologies surrounding smart manufacturing or Industry 4.0, like artificial intelligence and robotics. Not every business is ready to adopt the latest technologies in the marketplace. Investing in forklift software, mounted tablets, and modern warehouse scanners can significantly increase productivity and support growth.

Like any other business process, opportunities to simplify and increase forklift productivity will help mitigate workforce challenges or help your business scale to match growth in demand. Whether your business is performing paper-based picking, or looking to upgrade that old end-of-life forklift technology, modern forklift solutions have advanced and can provide more capabilities to improve productivity and ergonomics, support a wide range of tasks, and even contribute to improved safety.

For example, some solutions detect possible collisions, prevent mobile device usage while in motion, and even reduce fatigue or repetitive injury through product design.

Let’s Make It Happen

We understand that manufacturers are at different points in their smart warehouse operations. Our Manufacturing Practice regularly works with manufacturing organizations to help them grow and improve their business by applying enabling technologies to maximize warehouse resources, and support business objectives.

Our Manufacturing Practice has a team of experts from trade and an evolving portfolio of manufacturing solutions. It assists IT and OT teams by augmenting their existing skillsets with complimentary advisory services to help your business accelerate technology adoption where it matters most. If your business is interested in learning more about how we support modern warehouse operations, engage Connection’s Manufacturing Practice to discover more about this technology, available services, and the many use cases that may benefit your organization.


Ryan-Spurr-Ask-the-Experts-LinkedIn-Live

Don’t miss our upcoming LinkedIn Live event covering a number of security topics related to the manufacturing industry. Submit your questions now!

]]>
How to Foster Equitable Learning Experiences... https://community.connection.com/how-to-foster-equitable-learning-experiences-with-modern-technology/ Mar 01, 2023 Ashley Lofaro https://community.connection.com/author/ashley-lofaro/ https://community.connection.com/wp-content/uploads/2023/02/2004671-Microsoft-EDU-BLOG-1.jpg

All students deserve access to an equitable education—including best-in-class learning solutions and technologies—regardless of their ability, income, language, location, or identity. They need access to learning materials as well as the means to create and collaborate with other students and teachers, securely and at scale. 

At the same time, teachers need to create an engaging learning environment—in the classroom, online, or hybrid— that meets the needs of students of all abilities and learning preferences. Administrators must provide secure, reliable access to devices, apps, and information while overseeing limited technology budgets and maintaining equity for all learners, regardless of socioeconomic status.

 According to a recent Gallup survey, approximately 65% of teachers surveyed say they use digital learning tools to teach every day.

And in today’s post-pandemic environment, equity is especially significant. The National Education Association found that an estimated 25% of 5- to 17-year-old students didn’t have what they needed for online learning.

To help educators unlock the full potential of every student, Microsoft reimagined Windows, offering powerful tools to learn, collaborate, and create in a secure and trusted environment. Windows Education was designed to bring even more features to support the inclusive and equitable approach to education.

Inclusively Designed

Accessibility features support inclusion for students with diverse abilities and learning styles. Each student should have the resources and support they need to reach their full potential.

2.5 million students in the US alone have learning disabilities, such as dyslexia

52% of U.S. teachers have non-native English speakers in their classrooms

Source: National Education Association

Windows 11 offers built-in tools that help create a non-stigmatizing learning environment for students of all abilities and learning styles. ​For example, students can use a digital pen to write and draw. They can also access files and apps using their voice or gestures. For visually impaired students, the Immersive Reader feature can support students who are learning to read or for those that need extra help. Teachers can leverage real-time closed captions to help students with hearing impairments or to maintain quiet in the classroom. 

All Windows 11 devices come with high-definition cameras and includes smart features to filter out noise and distractions. For students with vision loss or color-blindness, there is a new offering called Color Filters which has six built-in options to enhance visibility.

Secure and Scalable

Approximately 13% of educational institutions have reported ransomware attacks—the most of any sector. By using a multi-layered approach—from the device to the cloud­—Windows 11 devices help educational institutions protect student privacy and avoid phishing scams, cyberthreats, and other malicious activity, at school and online. 

Windows 11 offers powerful, always-on security that’s instantly available such as Windows Defender Antivirus, delivering built-in threat protection that helps detect and block malware, and Windows Defender SmartScreen to help protect students from unsafe web content and downloads.​

IT leaders can optimize today’s learning environment and keep devices running smoothly all year long with zero-touch deployment and management. Windows 11 comes with:  

  • Windows Autopilot: Low-touch deployment and management via the cloud
  • Azure Active Directory (subscription sold separately): Enable single sign-on to minimize disruption and manage identities and access
  • Intune for Education: Simplify management and deployment while optimizing device performance all year long

A Partnership to Support Teachers and School Districts

Without the right technology partner, implementing a new solution takes time, IT resources, and several rounds of trial and error that can disrupt educators’ ability to teach. Together, Connection and Microsoft provide education-first technology solutions to schools. In addition to equipping educators and students with the appropriate devices and software, Connection also offers:

Configuration and Deployment Solutions: Connection’s Technology Integration and Deployment Center can deliver a district-wide deployment of devices configured to each school’s needs for out-of-the-box readiness. Connection can tackle provisioning, imaging, kitting, and asset tagging prior to deployment to help alleviate the work on IT teams. 

Professional Development and Training: Connection is a certified Microsoft Global Training Partner. Our in-house trainers are former teachers that can work with school districts to deliver resources and instruction to educators on the best way to utilize their Microsoft products to create a personalized learning environment.

Cybersecurity Assessments and Advisory: Connection offers advisory services to help optimize school system cybersecurity. Experts can assess the school’s environment, identify risks, and provide strategies to remedy unsafe areas. We also can help districts maintain a secure environment through managed services, 24/7 monitoring, and incident response. 

Cloud Journey Support: As a Microsoft Azure Expert MSP, our cloud experts can guide you through workload migrations and constructing customized cloud solutions. Connection will work to ensure your Azure environment is working the way you need it to—at a cost that won’t break your budget.

To learn more about Windows 11, contact your Connection Account Manager or visit the Microsoft Education page for additional resources on equitable learning.

]]>
TechSperience Episode 118: Optimize IT... https://community.connection.com/techsperience-episode-118-optimize-it-support-and-manageability-in-todays-remote-environment/ Feb 21, 2023 Connection https://community.connection.com/author/connection/ https://community.connection.com/wp-content/uploads/2023/02/2060228-Intel-TIDC-Podcast-BLOG.jpg

It’s time to rethink your IT strategy and support for remote employees. Learn how to simplify device manageability including provisioning, deployment, and security in this podcast featuring experts from Intel and Connection.

Host: James Hilliard

Guests:

  • Rhett Livengood, Director of Digital Business Enabling, Intel
  • Mark Wulfhorst, Director of Technical Services and Solutions, Technology Integration and Distribution Center, Connection

You can hear us on Apple Podcasts, Amazon MusicSpotifyGoogle Podcasts, or Podbean

Show Notes:

[1:28] What has been the major change in IT support needs since the pandemic? Many remote employees became their own IT support. Just as we Google answers to general questions in our daily lives, we’ve found that users also searched online to get their IT questions answered. The team at Intel recognized this trend, and we’ve been working to develop ways to make it easier on the end user and the IT teams that support them.

[3:18] What should IT teams consider? One of the most common asks are related to managing devices out in the field. It’s about having the right tools such as an endpoint manager and means to provide out-of-band support. Those conversations also transition into permissions and device hardening to address security concerns. We went from deploying devices to offices to now shipping to hundreds of individual homes. This can tie up a lot of time and resources for organizations that don’t have a vendor or partner that can do this on their behalf.

[7:00] Security is critical. What should IT teams consider as potential solutions to minimize threats? Employee training is essential. The biggest risk is someone clicking on a link they shouldn’t have and installing malware accidently. If you have cloud-based apps, it’s important to understand the nuances related to cloud. If you don’t have expertise, make sure to work with a provider or partner that can help guide you. There are other proactive ways to minimize security risks such as having devices hardened, scanned, and processed according to your group’s policies. Connection can offer these services through our Technology Integration and Deployment Center before sending devices to an employee.

[12:32] How have Intel and Connection partnered together to help solve for remote device management? Intel vPro® features Intel® Active Management Technology (Intel® AMT) built into the system. Intel AMT streamlines device management so IT staff can remotely assess, monitor, repair, and update PCs quickly and efficiently, reducing downtime for IT and employees. Connection can activate Intel AMT features in devices prior to deployment to make provisioning and manageability easier.

[16:50] What are some additional features of vPro that can support hybrid and remote users? From 2020 to 2022, usage of Intel AMT increased three times due to COVID and remote work. Intel has worked closely with many of our partners like Microsoft and CrowdStrike to elevate security features. Intel has also enhanced battery life, developed fast-charging capabilities, and worked on wireless enhancements with Wi-Fi 6 and 6E. vPro can also optimize your bandwidth to prioritize video calls rather than your kids’ gaming connection. We’re also looking into syncing across devices such as smartphones to further enhance users’ experience.

Contact an Account Manager if you’d like to learn more about Connection’s custom configuration and deployment solutions. You can also visit connection.com/intel to learn more about Intel AMT features for streamlined device manageability.

https://vimeo.com/772066253
]]>
Demystifying Microsoft 365 Defender https://community.connection.com/demystifying-microsoft-365-defender/ Feb 21, 2023 Krysten Harper https://community.connection.com/author/krysten-harper/ https://community.connection.com/wp-content/uploads/2023/02/2057730-Microsoft-365-Defender-BLOG.jpg

Via my email, I recently won an all-expenses paid vacation to Hawaii and received a generous scholarship offer to continue my education. I was contacted by Mackenzie Scott, three different Powerball winners, and Interpol—all of whom offered me a substantial amount of money in exchange for completing a very small task. Sounds too good to be true? Alas, as the adage says, “If it’s too good to be true...it’s probably spam.”

Spam is nothing new, but what is new and continues to increase in severity is the number of risks businesses today are facing. Keeping assets out of the hands of malicious actors was much more straightforward when you could place a perimeter around a physical corporate network. Nowadays, though, with Wi-Fi, remote working, and cloud services, assets are no longer in the physical network. Microsoft Security looks to address these risks and protect assets wherever they are by empowering companies to do more with less.

Which solution is right for your business? Let’s look at four short, real-life scenarios and the Microsoft 365 Defender solutions that can protect your company against a similar fate. 

The Curious Coworker

After a recent promotion, your coworker moves into a new corner office and finds a USB drive in one of the desk drawers. Unsure of what is on it, she plugs it into her laptop, only to find that it contains a virus.

Had your company utilized Microsoft Defender for Endpoint, this situation could have been avoided. Defender for Endpoint is designed to help enterprise networks prevent, investigate, and respond to advanced threats on their endpoints. It secures end-user devices, such as laptops or tablets, by providing protection from ransomware, malware, phishing, and other threats.

 

Microsoft Defender for Endpoint

The Tantalizing Turkey

It’s November 15, and you receive an email telling you your company is giving you a free turkey for Thanksgiving! You haven’t heard anybody mention this initiative, but there is a company logo at the top of the email, and you really want this turkey. After clicking on the link to schedule your pickup time, you realize there is, in fact, no free turkey. You’ve just fallen for a phishing attack.

If this sounds like something that could happen at your organization, Microsoft Defender for Office 365 is the solution for you. 

Microsoft Defender for Office 365

Defender for Office 365 is a cloud-based email filtering service that protects your business from threats—such as phishing or malware attacks—to email and collaboration tools. In addition to threat protection, it also provides investigation and remediation capabilities to help teams more efficiently identify and respond to threats. 

The Million Dollar Mistake 

You are looking for a way to better track customer referrals and come across a new app that looks to be just what you need. You enter all your customer information and are thrilled with the results! A few months later, the legal department calls you into their office to let you know the company has received a $2 million fine for breach of a customer’s personal information. 

How could this have been prevented? By utilizing Defender for Cloud Apps! Defender for Cloud Apps allows you to identify the cloud apps, IaaS, and PaaS services used by your organization. It also allows you to investigate usage patterns and assess the risk levels of more than 31,000 SaaS apps against more than 80 risks, enabling you to manage the apps to ensure proper security and compliance and prevent costly breaches. 

Microsoft Defender for Cloud

The Ill-fated Information 

A maintenance employee at a local elementary school uses their supervisor’s computer to gain access to classified information on the students and teachers. He downloads the information to an Excel spreadsheet and emails it to himself. 

In this scenario, Defender for Identity could have prevented this from happening by blocking the employee’s attempt to access the computer. Defender for Identity is cloud-based security that utilizes the customer’s on-premises Active Directory to identify, detect, and investigate internal threats, ultimately protecting your organization against malicious insider actions. 

Microsoft 365 Defender vs. Microsoft Defender for Identity

Every company needs modern IT security, but not every company has a trusted resource to help them protect their business. Connection offers Microsoft solutions for every step of your journey—from procurement, to consultation, to professional services, and ultimately to managed services. 

With an integrated Microsoft 365 Defender solution from Connection, your company can detect, prevent, investigate, and respond to threats and attacks across endpoints, identities, email, and applications. Reach out to your Account Team today to learn how embracing a do more with less approach to security can help you protect your business and optimize security costs in 2023.

Checkout our vlog to learn more about how Microsoft 365 Defender can help protect your users from cyber threats!

]]>
Upgrading to Microsoft Teams Premium https://community.connection.com/upgrading-to-microsoft-teams-premium/ Feb 14, 2023 Paden Livingston https://community.connection.com/author/paden-livingston/ https://community.connection.com/wp-content/uploads/2023/02/2055821-Microsoft-Teams-Upgrade-BLOG.jpg

When dropping my partner off at work, I noticed she was using Microsoft Teams on her phone to chat with coworkers while we were in the Dunkin’ parking lot. It illustrated a point that Teams is vital to most organizations in today’s business framework. The ability to collaborate with anyone in your organization at the click of a button streamlines efficiency in organizational communication. 

And guess what? Now there will be a Teams Premium edition! This upgrade offers a more holistic approach to Teams that has legitimate benefits for customers. Let's look deeper into add-on licenses.

Why Upgrade to a Teams Premium License?

Like their change to Teams Room Pro recently, Microsoft is enhancing their Teams features to an all-inclusive single payment option, Teams Premium. The base Teams license will still be included in most Microsoft and Office 365 subscriptions, but now customers can purchase Teams Premium as an add-on. Here are some of the enhanced features in Teams Premium:

  • More personalized and intelligent meetings and webinars
  • Enhanced protection for meetings
  • Advanced management and reporting capabilities for IT
  • Advanced Virtual Appointments

Teams Premium will include more features in the areas of Meetings, Webinars, Meeting Protection, Meeting Reporting, and Virtual Appointments. You can see tables that break down the differences on Microsoft Learn.

Microsoft Teams

What’s the Catch?

There will be some features that will be moved from the Base Teams license to the Teams Premium license exclusively. The below information outlines which features will be permanently migrating to Teams Premium and the grace period current Teams users have for each feature:

  • Live translated captions: Available to all Teams subscribers for a 60-day grace period after Teams Premium general availability.
  • Timeline markers in Teams meeting recordings for when a user left or joined meetings: Available to all Teams subscribers for a 60-day grace period after Teams Premium general availability.
  • Custom organization of Together mode scenes: Available to all Teams subscribers for a 30-day grace period after Teams Premium general availability.
  • Virtual Appointments—SMS notifications: Available to all Teams subscribers for a 30-day grace period after Teams Premium general availability.
  • Virtual Appointments—Organizational analytics in the Teams admin center: Available to all Teams subscribers for a 30-day grace period after Teams Premium general availability.
  • Virtual Appointments—Scheduled queue view: Available to all Teams subscribers for a 30-day grace period after Teams Premium general availability.

After the Grace Period ends on a feature, it will no longer be available in the Base Teams license and the Teams Premium license will need to be purchased. 

Why Pay Extra for Teams Premium?

Along with the enhanced and migrated features, Teams Premium offers organizations the opportunity to further their effective communication through a new avenue. This path will see end users experience a more personalized way to communicate. They will have more control, and the IT department will have new control features as well. 

Microsoft realizes how important Teams is to an organization. It allows employees to talk from anywhere they have Internet access, even in a Dunkin’ parking lot on their way to work. That is why they are enhancing the product and making it even more essential. This product may be a game changer, and it is better to be ahead of this change than play catch-up. Teams Premium will be available for purchase in February 2023. Please get in touch with your Connection Account Team for more information.

]]>
TechSperience Episode 117: Optimize... https://community.connection.com/techsperience-episode-117-optimize-manufacturing-operations-with-asset-tracking-technologies/ Feb 09, 2023 Connection https://community.connection.com/author/connection/ https://community.connection.com/wp-content/uploads/2023/02/2051282-Zebra-Asset-Tracking-BLOG.jpg

The aftereffects of COVID-19 have brought new challenges requiring new ways of thinking. Most manufacturers leverage asset tracking technologies to minimize loss, but real-time location or asset tracking can identify operational efficiencies throughout the entire supply chain lifecycle. Asset tracking gives you the data needed to make informed decisions and uncover opportunities for process improvements. Experts from Zebra and Connection share example use cases in manufacturing and describe how you can gain new insights to lower costs, maximize resources, and stay competitive.

Host: James Hilliard

Guests: 

Terry Price, Senior Sales Engineer at Zebra Technologies

Ryan Spurr, Director of Manufacturing Strategy at Connection

You can hear us on Apple PodcastsAmazon MusicSpotifyGoogle Podcasts, or Podbean

Show Notes:

[1:40] What are some creative use cases? Asset tracking can be used in so many ways to discover inefficiencies. It can be used to improve workplace safety, enhance employee productivity, identify manufacturing process improvements, and discover ways to get goods to customers faster.

[7:50] Employees are the most critical asset in the manufacturing space. How can location or asset tracking technologies keep them safe? The integration of asset tracking technologies can help identify process gaps or improvements. Let’s say an operator accesses a terminal, but for safety purposes, you want to make sure that specific operator is authorized to access that terminal. Or perhaps an employee needs to have the appropriate certification to be able to access a certain area in the warehouse. By using asset tracking, you can understand what additional safety training is needed or if processes need to change. And if there is a safety incident, asset tracking can help make sure employees have vacated a zone or building. 

[15:58] How can asset tracking help minimize other risks? Some industries have strict compliance with the materials or products used in their processes. For instance, if an adhesive used is expired or has a recall, asset tracking can help identify whether it is being used in production so that teams can adjust immediately. 

[25:30] What is your advice for those interested in asset or location tracking technologies? Start with practical applications that can deliver an immediate ROI. For most, that’s minimizing loss or wasteful practices or ensuring you’re meeting compliance requirements and passing audits. But the sky is the limit. There are so many ways asset tracking can bring value. The data can bring insight and even identify process gaps. 

[28:17] What are some new asset tracking features from Zebra? Zebra recently launched MotionWorks™ which is an asset management connector to ServiceNow. Manufacturers can turn data from tracking tags or sensor networks into real-time insights through a comprehensive dashboard with powerful reporting capabilities.

[32:30] What should manufacturers look for when it comes to asset tracking technologies? You want to think about whether RFID (Radio Frequency Identification) or RTLS (Real Time Location Systems) solutions will be the best fit for your organization. Integration with your existing technologies is also critical; OEMs and partners that have integration expertise would be ideal. In manufacturing, you also want to look for ruggedness. Employees are essential so picking an OEM that offers ergonomic and purposeful design can further enhance productivity and reduce fatigue. 

[35:15] What do you want the audience to take away from the podcast? Real-time location solutions have evolved. If you can’t measure or monitor your assets as they move through your warehouse, you can’t optimally manage your business. There are so many use cases. It’s best to start on opportunities that have an immediate ROI. Then use that to expand to other initiatives such as workflow processes, inventory usage, supply chain processes, and even IT Service Management (ITSM). Another thing to consider is that your first use case may not recoup the full upfront investment. The investment should be seen as a long-term goal. For more information about asset tracking solutions, visit connection.com/zebra or reach out to your Connection Account Manager.

]]>
Celebrating Black Inventors in Modern Technology https://community.connection.com/celebrating-black-inventors-in-modern-technology/ Feb 01, 2023 Connection https://community.connection.com/author/connection/ https://community.connection.com/wp-content/uploads/2023/01/2044722-Black-History-Month-BLOG.jpg

February is Black History Month. Connection is honored to take a moment to reflect on where we’ve been as a nation and where we are today. As a company, our core values are respect, excellence, teamwork, integrity, and corporate citizenship. Together, we strive to be a socially responsible company that supports diversity, equity, and inclusion in our communities.

This year, we are featuring Black inventors who created technologies that changed the world for the better and set the stage for future innovations—some of which we use every day and provide to our customers!

Dr. Shirley Ann Jackson 

Dr. Shirley Jackson’s groundbreaking scientific research in physics led to the inventions of the portable fax, touch-tone telephone, solar cells, fiber optic cables, caller ID, and call waiting. She was the first Black woman to receive a PhD from the Massachusetts Institute of Technology (MIT). She later served as the co-chair of President Barack Obama’s Intelligence Advisory Board and was awarded the National Medal of Science in 2016. She became the president of Rensselaer Polytechnic Institute, the oldest technological research university in the United States. Hear Dr. Jackson's story:

Dr. James Edward West

More than 90% of the microphones today, including those in phones, cameras, and hearing aids, use technology co-invented by Dr. West. In the late 1950s and 1960s, Dr. West developed what is now known as a foil electret microphone, an invention that enabled the transfer of sound to electrical signal. This became one of his 200 patents. After a long career as an acoustical scientist, West became an educator and has been inducted into the National Inventors Hall of Fame. Hear Dr. West’s story:

Otis Boykin 

Otis Boykin attended the Illinois Institute of Technology but had to withdraw because he couldn’t afford tuition. That setback didn’t stop him from inventing a resistor that was used in computers, television, and radios—and eventually holding 26 patents for related technology. Boykin’s patented wire resistor became highly sought after by the U.S. military and IBM, and a version of his resistor was also used in the invention of the pacemaker that has helped to extend the lives of thousands of individuals. Read more about Mr. Boykin’s story.

Dr. Marian Croak

Could you imagine not having Zoom, Teams, or Skype? Videoconferencing and other Internet-based audio/video and text communication applications wouldn’t be around if not for voice over IP (VoIP) technology. VoIP was invented by Dr. Marian Croak. Dr. Croak holds over 125 patents in VoIP technology and managed more than 2,000 engineers and computer scientists responsible for AT&T’s enterprise and consumer wireline and mobility services. She is currently serving as Google’s Vice President of Engineering. Hear Dr. Croak’s story:

Marie Van Brittan Brown

Marie Van Brittan Brown was a nurse who wanted to feel safer at home after working odd hours at the hospital. She developed a home security system using peepholes, cameras, and a radio-controlled wireless system. The system relayed images to a monitor and enabled the person watching the monitor to communicate with the person being filmed via two-way microphones. A remote control also allowed Marie to lock or unlock the door at a distance and featured a panic button that would call the police. This paved the way for modern closed-circuit television and home security as we know it. Hear Ms. Van Brittan Brown’s story:

Jesse Russell

Cell phones would not be possible without the research of Jesse Russell. He discovered a way to digitize speech to reduce bandwidth in the 1980s, which played a critical role in cell phone communications. Russell holds numerous patents in broadband wireless networks, including 4G, and was inducted into the U.S. National Academy of Engineering for his work. Hear Mr. Russell’s story.

Dr. Gladys West

GPS technology helps us navigate, track weather patterns, and plays a critical role in military operations. Working for the Navy, Dr. West was involved in astronomical studies, and in the 1970s and 1980s, she programmed early computers to better model the actual shape of the earth using data from satellites. This work laid the foundation for modern GPS featuring accurate models of the earth’s surface. Dr. West was inducted into the U.S. Air Force Hall of Fame in 2018. Hear Dr. West’s story:


In February—and throughout the year—there are many more opportunities to support one another. We encourage you to support Black-owned businesses, donate to charities that support equality, participate in DEI committees, and learn more about Black history

]]>
Moving Patient Care from the Hospital to... https://community.connection.com/moving-patient-care-from-the-hospital-to-retail-sites-and-the-home/ Jan 26, 2023 Dr Keith Nelson https://community.connection.com/author/dr-keith-nelson/ https://community.connection.com/wp-content/uploads/2023/01/2021232-Blog-Healthcare.jpg

Attention Shoppers: Physical Exams in Aisle 7 . . .

There is a monumental transformation in the delivery of healthcare services occurring in the U.S. – moving non-critical patient care from traditional settings like hospitals and some physician offices to local retail sites and the home.  Recent examples of this evolution include Walmart’s built-from-scratch clinic initiative (Walmart Health) and a number of multibillion dollar healthcare provider acquisitions by large pharmacy organizations and insurers.

The primary drivers of this trend are lowering systemic costs and fostering patient convenience. And it seems like everyone’s joined the party – patients expect it, payers (including CMS) want it, and corporate disrupters are enthusiastically providing it.  The ultimate goal of these new corporate providers is similar – improve profitability through vertical integration, increased traffic and cross pollination with the core business offering(s) – but the approach of each varies.  Let’s look at some examples:

The aforementioned Walmart Health is a series of walk-in clinics attached to their retail stores that provide primary care, optometry and dental services with transparent pricing.  Although they built this model organically, they are receptive to acquisitions as is evidenced by their purchase of MeMD, a virtual care provider.

In contrast, other organizations are relying more upon the acquisition model. Here are some recent developments:

  • Amazon acquired PillPack (direct-to-consumer pharmacy) and One Medical (primary care)
  • Walgreens (pharmacy) acquired CareCentrix (home care) and VillageMD (primary care), which in turn bought Summit Medical/CityMD (primary and specialty care).
  • CVS acquired Signify Health (primary care) which adds to its home-grown Minute Clinic operation.

And then there’s the payers . . .

  • Optum (a subsidiary of UnitedHealth Group that offers pharmacy, healthcare technology and physician services) acquired Atrius Health and the Kelsey Seybold Clinic (both primary and specialty care) among many others including LHC Group (in-home and hospice care) and Refresh (mental health).
  • Humana acquired Kindred (home care)

Note the common game plan – build a core of primary care services which in turn drive hospital admissions, prescriptions, supplies, testing and, most importantly, the lucrative delivery of specialty care. Of course, it couldn’t hurt to have ownership in each of these categories as well as complementary extensions like dialysis, wound care, hospice, behavioral health and visiting nurse services, all of which are on the corporate radar.

This vertical integration enables, among other things, a significant ability to control costs, which is critical in our inexorable evolution toward a value-based, risk-sharing health system. And the most impactful way to lower costs is to effectively manage patients with chronic diseases like diabetes, hypertension, obesity, heart disease and cancer, which affect 50% of the population and consume more than 85% of healthcare expenditures. One way to do this is to have a continuous real-time view of each patient’s health status as they go through their daily lives which can be accomplished with the use of remote patient monitoring technology (wireless glucometers, blood pressure cuffs, weight scales, etc.) combined with regular intervention. This is particularly useful in managing the ballooning baby boomer long term care population (pardon the alliteration). Another interesting use of technology is the evolving trend to leverage a patient’s genomic data to facilitate personalized, and often preventive, medicine (note the acquisition of Lemonaid, an online telemedicine and pharmacy services platform, by 23andMe, a consumer genetics company).

To be clear, many of the providers whose organization has been acquired continue to see patients in their established locations, but the shift in ownership to a large corporation is usually accompanied by a commensurate change in service and/or charge structure (e.g. elevated prices, surprise facility fee, increased testing, etc.) as profit concerns take on more importance.

One more thing . . .
An additional noteworthy development related to patient care site redirection is the recent emergence of the hospital (not retail) - driven hospital-at-home phenomenon which enables some patients who need acute-level care to receive the care in their homes, rather than in a hospital. The payment to the hospital is the same as if the patient had been admitted, and the program expands the amount of available patient beds, and ostensibly reduces overall costs, improves outcomes, and enhances the patient experience.

Finally, it is important to bring attention to the concerns around privacy when it comes to corporations having access to patient data. HIPAA regulations prohibit the sharing of any protected health information (PHI) without the patient’s consent, but that doesn’t necessarily mean that the information can’t be used for internal marketing purposes “in order to better serve the patient.”  It’s indeed a slippery slope when you think about the fact that Visa and Mastercard know every doctor you’ve seen and their specialties (assuming you charged your copay or medical bill). So, it’s a brave new world. Similar to social media, I guess we’ll have to measure the benefits against both the known and unknown consequences.  In the interim, it seems we get the chance to shop and hopefully not drop.

]]>
What’s Next: Manufacturing Technology... https://community.connection.com/whats-next-manufacturing-technology-trends-in-2023/ Jan 24, 2023 Ryan Spurr https://community.connection.com/author/ryan-spurr/ https://community.connection.com/wp-content/uploads/2023/01/2034074-Manufacturing-2023-Blog.jpg

I recently read a book from McKinsey, The Titanium Economy, where the authors describe the value of the manufacturing trade on our economy and how thousands of lesser-known entities are constantly innovating, creating stakeholder value that rivals the largest tech firms in terms of performance and profitability. It struck a chord with me, as our Manufacturing Practice meets with and visits clients regularly, and our teams have observed precisely the same thing.

Many manufacturing companies have state-of-the-art facilities, a culture of continuous improvement and transformation, and are quietly innovating every day to make their organizations smarter, faster, and better—right here in America.

These companies are often contrary to public opinion—that of dingy old-world manufacturing—but are clean, modern, and buzzing with technology to bring competitive advantage. U.S. manufacturing is advanced and creates products the macro economy depends on for our future well-being—from health-related products, transportation, electronics, and even the future of sustainability and energy.

This transformation may be less flashy than most high-tech firms, but at the core is a constant goal to improve productivity, resilience, quality, and safety—contributing to organizations capable of producing the best products in the world. Every day, U.S. manufacturers are making it happen.

How can we help U.S. manufacturing do more? How can we help them adopt new and proven technologies that enable their innovation and business goals?

The industry's ability to invest in practical improvements to its value chain, including how people, processes, and tools work has made U.S. manufacturing so resilient. Unlike their flashy Silicon Valley peers, manufacturing’s quiet and relentless focus on continuous improvement initiatives delivers results that make the business more competitive, more profitable, and capable of scale. It’s the practical and incremental approach that creates sustained growth and value for the business, stakeholders, employees, and their communities.

With this in mind, this year’s 2023 manufacturing trends are focused on the practical investments we see our manufacturing clients making to improve their businesses, unshackle their employees, and create more resilient and innovative organizations.

Trend #1: Security

Nothing is more disruptive to the advancement and morale of an organization than the impact of cybersecurity events. Manufacturing has become the target of attackers creating havoc in IT and Operational Technology (OT), making it the #1 attacked industry. Perhaps more concerning, 61% of incidents against manufacturing are conducted against OT environments. Because of this rising threat to operations, manufacturing leaders rate financial and/or downtime resulting from cybersecurity events as their top concerns in the Connection Annual Manufacturing Security Survey, December 2022.

Perhaps more concerning is the impact to organizational risk and a manufacturer’s ability to obtain and retain cybersecurity insurance. In the same Connection Annual Manufacturing Security Survey, 65% of manufacturers have experienced challenges with cybersecurity insurance such as increasing premiums and difficulty meeting insurance compliance requirements. In fact, 18% of respondents said they were dropped by their insurance policies. In 2021, the average cost to remediate a cybersecurity event in the manufacturing industry was $4.7 million, and without access to cybersecurity insurance, manufacturers will be stuck with the impact and bill.

With cybersecurity risks so apparent, especially in OT environments, we see a trend of investment into policies and technologies to help minimize cybersecurity incidents. These include enhancing access control to simplify and support the way industrials work, employee training, native industrial security monitoring at the network and appliance level, zero trust infrastructure, and integration of OT monitoring with Corporate IT SIEM and SOC to provide the ability to mitigate some of the most common breach attack vectors and reduce the breach lifecycle to minimize impact, downtime, and overall cost of a successful cybersecurity attack.

Trend #2: Rethinking Industrial Workforce and Edge Devices

80% of industrial workers don’t sit at a desk. Think about that as you plan that next factory, warehouse, or maintenance workforce upgrade, or if you’re deploying work instructions, on-the-job training, or workflow solutions in any of these environments. Today’s industrial workers want to use end-point devices that match their work style, environment, provide access to the latest digital tools, and optimize how they make it happen.

Those manufacturers we work with that invest in modern industrial workforce solutions see significant productivity, knowledge capture, and improved compliance through the use of the right-fitting solutions. Each manufacturing company and industry are unique, but this can include the adoption of tablets, wearables, augmented reality, touchscreens, and products designed to support how workers work. In addition to the people and process, many of these devices also need to comply with industry standards, regulations, and the rigors of harsh environments.

Unfortunately, 89% of buying decisions related to this workforce are still made from the top down. Keep this in mind. Investing in your people and providing them with the right tools will help make workers more productive, support talent acquisition and retention, and set the groundwork for multiple phases of digital innovation.

Trend #3: Automate Non-Value-Added Tasks with IoT Sensors and Automation Platforms

In today’s modern factories and warehouses, optimizing the workforce you have is critical. This means eliminating the need for mundane and non-value-added tasks like collecting measurements about the environment, screens, meters, or other data points that could easily be automated by sensors or automated data collection. Furthermore, as the industry faces labor shortages and turnover, existing processes can break down, impacting compliance or an organization’s ability to collect the data to inform the overall value stream.

In these situations, manufacturers are implementing industrial IoT sensors and IoT software platforms that make it easy to connect, integrate, and automate with sensors, programmable logic controllers, building management equipment, or disparate systems. Businesses that successfully go on this journey are more connected, able to produce better insight, integrate with suppliers, improve customer experience, and create a more resilient business.

Trend #4: Leveraging Cloud to Go Fast and Innovate

Cloud is an area that gets a lot of attention these days. Are we talking about Co-Location, IaaS, PaaS, SaaS, or all of it? The short answer is that it depends on what your business seeks to accomplish.

Many of our manufacturing clients move to the cloud to transition everyday low-business value capabilities to shed on-premises tech estate, limit the drain on their overworked IT resources, or deliver more unified infrastructure. This is widespread for security and federated identity management, databases, or everyday productivity tools we now have come to depend upon, like Microsoft Office 365.

Other manufacturers are looking to radically transform business processes, speed access to the latest features, APIs, and security, or perhaps unleash their research, design, and engineers with access to cutting-edge platforms that allow them to integrate factories, automate, implement Artificial Intelligence and Machine Learning, or create entirely new revenue streams with smart, connected products to enhance customer experience with new services.

It’s essential to understand your business goals, where you seek to innovate, and then tailor the strategy to include the proper infrastructure and cloud offerings to match. When done properly, hybrid cloud is quickly enabling organizations to shed tech estate, accelerate innovation, and focus on their business’s core to support their growth, productivity, and profitability goals.

Trend #5: AI and Machine Vision

Before, during, and after the pandemic, manufacturers have struggled to attract and retain a skilled workforce that keeps pace with the growth. This leaves manufacturing leaders with a choice. How do they staff their growing business? How do they retain and invest in the employees who remain? And what do we do with the monotonous tasks that humans are least good at (or perhaps most error-prone with fatigue and complacency)?

This is where AI and Machine Vision solutions fit best. Machine Vision solutions have been used in manufacturing for a long time—it’s not new. Just look to automated optical inspection machines seen in many industries. These high-cost, high-complexity, and niche solutions do one and only one thing well. Ask those solutions to detect adjacent quality issues, deviations from multiple process points, or workplace safety events, and you will quickly find no transferable solution. Or is there?

The answer is yes. Machine Vision platforms, cameras, and cloud solutions have come a long way. Today, it’s conceivable to identify a top-impacting quality or safety challenge with clear cost impacts, and within one month, have a viable Machine Vision model in production. That same investment in infrastructure can then be used in phase 2, 3, and 4, allowing you to solve one problem and move on to another, creating compounding business value over time, implementing automated corrective actions not dependent upon people, and allowing your vital people resources to work on higher value and more creative problems to help the business grow.

AI and Machine Vision are no longer a dream—they are a reality—and used by manufacturers today to solve a wide range of everyday challenges. Those organizations that invest, conduct pilots with partners, and incrementally deploy Machine Vision use cases will see cost savings, be able to scale, and create differentiation to outcompete in the marketplace.

Let’s Make It Happen

We understand that manufacturers are at different points in their smart manufacturing initiatives. Our Manufacturing Practice regularly works with manufacturing organizations to help them grow and improve their business through the application of enabling technologies.

Our Manufacturing Practice has a team of experts from trade, an evolving portfolio of manufacturing solutions, and expertise to assist IT and OT teams by augmenting their existing skillsets with complementary advisory services to help your business accelerate technology adoption where it matters most. If your business is interested in learning more about how we support our clients or the topics covered, engage Connection’s Manufacturing Practice to learn more about this technology, available services, and the many use cases that may benefit your organization.

]]>
8 Digital Transformation Resolutions You... https://community.connection.com/8-digital-transformation-resolutions-you-need-to-make-in-2023/ Jan 24, 2023 Connection https://community.connection.com/author/connection/ https://community.connection.com/wp-content/uploads/2023/01/2031274-Blog-Intel-Digital-Transformation.jpg

A new year brings new technology resolutions. While it goes by many names, like upgrading infrastructure or improving operations, digital transformation remains a high priority. Following are eight resolutions—and the trends behind them—to help guide your digital transformation initiatives in 2023.

Digital Transformation Definition

Digital transformation is not simply infrastructure changes; instead, digital transformation applies the tools of technology to enhance or build new business processes, culture, and customer experiences. It’s about revisiting business strategies to ensure competitive advantage and capacity for delivering maximum value to customers using current and emerging technology.

Additionally, digital transformation is about reducing energy consumption and carbon emissions for sustainability. In technology, sustainability is about more efficient operational resources. Data centers and server farms account for 1 to 1.5 percent of all energy consumption globally.1

Digital transformation also addresses the need to build what Gartner calls a “digital immune system.”2 A strong digital immune system addresses potential—and increasing—cybersecurity threats, site reliability engineering (SRE), and autoremediation, among other things.

The “Why” of Digital Transformation

In any modern organization, digital transformation is imperative. Evolving from traditional to modern environments requires that organizations adapt to meet dynamic market trends, emerging tools and techniques, and customer needs.

Customer satisfaction ultimately defines the success of business outcomes. Accordingly, successful companies value their users and their users’ experience with their brand. People have many choices today and, so, tend to choose companies that respect their wants and needs. Digital transformation ensures companies remain connected to—and well serve—their audiences.

In a new work-anywhere world, digital transformation also encompasses internal interactions, such as employee communication and collaboration. Regardless of business model or company size, artificial intelligence (AI) is increasing efficient communications, workflows, and deliverables. Technology helps align team members for productivity and reduce their potential for human error. The bottom line is that any business relies on its people; by facilitating productivity, collaboration, and connection between workers anywhere in the world, organizations and their customers benefit.

To further confirm why digital transformation matters, recent statistics show that:

  • 89 percent of enterprises are planning to adopt or have already adopted a digital business strategy3
  • 70 percent of organizations have a digital transformation strategy or are working on one3
  • The implementation of digital technologies can help accelerate progress toward enterprise goals such as financial returns, workforce diversity, and environmental targets by 22 percent3

Essentially, digital transformation ensures your organization remains relevant in a business environment where others are adopting such initiatives.

8 Digital Transformation Resolutions for 2023

1: Create a plan to deal with the datafication of everything.

Datafication, the process of transforming human tasks into data-driven software applications and devices, is changing daily life. In this time where personal data is currency, smartphones, smart homes, and smart offices are powered by AI that is fueled by data to produce even more data. Effectively and efficiently capturing, monitoring, using, and protecting data in today’s economy is a ubiquitous core demand for every organization.

2: Support hybrid workers in a more flexible and streamlined way.

Workers now have a flexible working style in terms of full- or part-time hours, geographic location, and environment. This hybrid work culture is a product of digital transformation at a global level because of the pandemic. Transformation efforts are now beyond no-code and low-code technologies to replace manual work with automation; today’s focus is about tackling peak productivity and ensuring workers are connected to their organizations and team members. That means employees need the right hardware, with the right apps, with data security to maintain their responsibilities to optimize the connection between technology and their performance.

Many CIOs have taken steps toward app modernization and public cloud migration. Using cloud solutions supports data-intensive workloads, like AI solutions for data analysis and edge computing, as well as universal app access for remote workers.

3: Explore how AI, machine learning, advanced analytics, and telemetry can make your business smarter.

AI is making our world smarter, smoother, and hassle free. Having the capability to run AI is a key part of today’s systems architecture. AI can automate routine tasks, leaving higher-thinking decisions to employees. Elevating analytics to advanced forms of data insight supports data-driven business decisions. This informs customer experience, workflow process, and product development and marketing. Using predictive modeling, AI can contribute to business intelligence (BI) that makes it easier to explore new and informed approaches and strategies. Competitive advantage goes to organizations that can access and understand large data sets, such as information from the intelligent edge and unstructured forms of data.

Telemetry is a term for technologies that collect information as measurements or statistics, which is then shared with remote IT systems for troubleshooting problems and informing data center operations. Incorporating telemetry data, AI, machine learning, and big data analytics capabilities gives organizations insights that can support intelligent decisions.

4: Improve compute power and efficiency using sustainability practices.

Nearly every device and appliance are now computerized, with the associated infrastructure continuously evolving. In terms of networks, the seemingly new 5G is quickly spawning an even newer era of 6G, with more power in our hands through devices. Additionally, with increasingly complex and data-intensive workloads, it becomes important to be as efficient as possible for performance, budget, and the environment—in terms of sustainability. Intel® Xeon® Scalable processors, including accelerator technologies, can help make the most of the architecture you have now to meet these goals today and as you expand in the future.

5: Explore extended reality.

Extended reality (XR) comprises technologies that simulate reality, including virtual reality (VR), augmented reality (AR), and mixed reality (MR). This significant technology trend shows that customers are looking for a break from real-world boundaries. The technology to create a reality without tangible presence is highly desirable for media developers, product designers, medical specialists, retail experts, and modeling professionals. It’s not just for gamers anymore.

6: Get a robust assessment and testing plan for zero trust cybersecurity.

People today are familiar with—and trust—digital technologies, believing that technology can reliably create a safe, secure digital world. This digital trust is leading to more innovation as companies feel confident in inventing and innovating without jeopardizing public sentiment.

At the same time, more technologies increase potential attack surfaces and risk exposure. An emerging strategy for organizations focusing on cybersecurity is zero trust, which means taking a proactive and pervasive approach to system security. Essentially, default operations are set to trust no one, whether inside or outside the network; verification is required for all access to network resources. Working toward a zero trust environment means regularly assessing, testing, and upgrading your cybersecurity up and down the stack.

7: Optimize your cloud infrastructure.

Cloud computing is a former trend gone mainstream, with more businesses migrating to cloud solutions. The emerging trend within cloud computing is edge computing. Edge computing processes data closer to where it is generated—at “the edge”— to reduce latency and increase access to data for insights. This also makes access to applications and software more efficient for remote staff. Ensuring your cloud instances are provisioned correctly supports bottom-line budgeting and optimized performance.

8: Improve performance for networks and edge computing resources.

As the quantity of data organizations capture increases, some circumstances have surfaced for latency in cloud computing, specifically in getting information from applications in the cloud and in getting data to a data center for processing. As a result, edge computing has emerged to process data closer to where it’s generated—at the edge. One use for edge computing is to process time-sensitive data to a centralized location from remote locations that have limited, inconsistent, or even no connectivity.

The pace of business has accelerated dramatically, and it demands more from your organization’s IT infrastructure. Maintaining legacy data centers unfit for the task can monopolize your IT team’s bandwidth, leaving them unable to support strategic goals. This is why 85 percent of organizations are pursuing a data center modernization strategy. Connection’s Data Center Transformation specialists have spent decades focused on understanding the data center needs of organizations.


1. George Kamiya, “Data Centres and Data Transmission Networks,” IEA, September 2022, https://www.iea.org/reports/data-centres-and-data-transmission-networks.

2. Lori Perri, “What Is a Digital Immune System and Why Does It Matter?,” Gartner, October 25, 2022, https://www.gartner.com/en/articles/what-is-a-digital-immune-system-and-why-does-it-matter.

3. “72 Vital Digital Transformation Statistics: 2022 Spending, Adoption, Analysis & Data,” Finances Online, November 7, 2022, https://financesonline.com/digital-transformation-statistics/.

Intel® technologies may require enabled hardware, software, or service activation.

No product or component can be absolutely secure.

Your costs and results may vary. © Intel Corporation. Intel, the Intel logo, and other Intel marks are trademarks of Intel Corporation or its subsidiaries. Other names and brands may be claimed as the property of others.

]]>
Connection Cares: We Make It Happen for Our... https://community.connection.com/connection-cares-we-make-it-happen-for-our-communities/ Jan 19, 2023 Connection https://community.connection.com/author/connection/ https://community.connection.com/wp-content/uploads/2023/01/2036371-ConnectionCaresMIH-BLOG.jpg

CNXN Live 2023 was an amazing event that brought together Connection employees, partners, and clients from across the nation. The annual company kickoff event was hosted in West Palm Beach, FL and Manchester, NH, as well as virtually for remote employees.

Connection Cares made it easy for CNXN Live attendees to give back to their communities, organizing several activities as part of the event. The theme for the event was “Make It Happen,” and we certainly did with the generous help of the participants and organizations!

Connection Cares partnered with the J. C. Mitchell Elementary School in Boca Raton, FL on a book drive. Attendees were able to bring in new or gently used books to the event or donate by ordering a new book through Scholastic’s online portal. The donation drive collected 199 books, which will be placed in a school vending machine. Students will have the opportunity to choose a book each semester as a reward for good behavior. After they've finished reading their book, students can either keep it for their home library or donate it back to the school.

Employees and partners also came together to donate non-perishable food items to the New Hampshire Food Bank in-person and virtually. The food drive was a great success! The generous donations from attendees will help many local families. Many thanks to the participants for the incredible support. You can learn more about our Connection Cares initiatives online or contact us at connectioncares@connection.com

]]>
Custom IT Configurations for Remote... https://community.connection.com/custom-it-configurations-for-remote-manageability/ Jan 04, 2023 Connection https://community.connection.com/author/connection/ https://community.connection.com/wp-content/uploads/2022/12/2015389-Intel-AMT-TIDC-Blog-BLOG.jpg

You need turnkey technology that just works out of the box. It needs to integrate into your existing infrastructure, workflows, and processes. Connection delivers custom integration services on your schedule through its Technology Integration and Distribution Center (TIDC), a world-class configuration and distribution facility. 

The state-of-the-art integration lab covers more than 50,000 square feet, with over 2,000 live connections and 50 GB fiber-optic lines. Over the course of a year, the TIDC’s ISO 9001:2015–certified configuration lab delivers more than 550,000 custom configurations. Equipped with the latest technologies and powered by industry-leading methodologies, the TIDC completes even the largest custom configuration orders to exact specifications.

Technicians maintain extensive certifications and authorizations from all major manufacturers, with more than 90 percent of the team holding one or more CompTIA certifications. The team is current on industry developments and on advances in partner technologies and best practices. 

Custom Integrations that Simplify Your Technology Lifecycle

This combination of high tech with high touch means you can easily optimize your end-user experience with custom configuration services, convenient deployment options, and advanced inventory planning and rollout management.

https://vimeo.com/383306378

Connection’s configuration, inventory, and asset management services include:

Provisioning and imagingVPN-based provisioningDeployment hosting
Mobile provisioningConcierge configuration services for Google and Microsoft (Autopilot and ZTE)Jamf services
Location-in-a-BoxAsset tagging and data captureKitting/reverse kit solutions
Laser engravingInventory planning and rolloutInstructions document/printing insertion service

A significant IT configuration service that many enterprises are now taking advantage of is remote management.

Why IT Staff Need Remote Management 

Today’s employees are increasingly mobile in both geographic location and working environment. And yet, IT teams need to be able to support those employees and their compute devices no matter where the device is located, including outside the corporate firewall and in the cloud. In today’s chaotic economic environment, it is not feasible in time or fuel costs to deploy an IT technician to be on-site, or even to ship devices to and from the IT team. Potentially more significant is the residual carbon footprint generated from such actions.

Beyond troubleshooting passwords and systems access, other IT challenges can include a nonresponsive operating system (OS); critical firmware, software, or security updates; or system patches for remote devices. For business continuity, IT staff need flexibility to schedule such updates outside of productive business hours. It’s just as important to have an efficient, integrated solution as well as a centralized view of organizational devices, including hardware components and technical documentation.

Meet Intel® Active Management Technology (Intel® AMT)

Intel vPro® Enterprise1 for Windows OS gives PCs the power business requires to help improve productivity through enhanced performance and strengthen data security, as well as give greater fleet management control. Research suggests a potential benefit of Intel vPro® is that employees work more effectively with less downtime. Because of the benefits of quicker IT response times, easier issue resolution, and other productivity improvements, employees can save up to two hours per month when using Intel vPro platform-based devices.2

Intel vPro features the modern manageability tools of Intel Active Management Technology (Intel AMT)3 built into the system. The modern manageability tools that come with Intel vPro Enterprise provide remote access to intelligent devices, such as smart vending machines, remote/digital billboards, or software hubs in conference rooms.

Within Intel vPro, Intel AMT enables IT teams to remotely power devices or multiple systems across every worksite, powered on or off, as well as troubleshoot endpoints with keyboard, video, mouse (KVM) functions. IT staff can set wake-up times and schedule updates to ensure maintenance happens as well as conserve resource consumption when devices are unattended or not in use.

Intel AMT streamlines device administration. Intel AMT is, essentially, a direct-connect to the end user and their device. With Intel AMT, you can connect remotely to a PC even when it is off or the OS2 is down. Intel AMT is the only commercial remote remediation solution to return a PC to a known good state, no matter where employees are working. And it’s the only commercial solution for remote out-of-band manageability over Wi-Fi.2

Hardware-based Intel AMT provides persistent out-of-band connectivity that operates independently of the OS, allowing fixes to a wider range of system issues. Repair corrupted drivers, application software, or the OS on nonresponsive systems that won’t run or boot.

Intel AMT also gives tools to help onboard and problem-shoot new users as well as customized software and applications. The TIDC can get a device user-ready, packaged, and shipped quickly to meet organizational IT goals. Altogether, Intel AMT is the built-in solution that empowers comprehensive remote manageability for IT organizations to help keep business running smoothly. And the TIDC is the only authorized provider that can configure and activate Intel AMT on devices ready for deployment. Learn more about TIDC or contact the team to explore custom configuration services for your next deployment.

Download this short paper to learn more about Intel® Active Management Technology


[Footnotes]
1. All versions of the Intel vPro® platform require an eligible Intel® Core™ processor, a supported operating system, Intel® LAN and/or WLAN silicon, firmware enhancements, and other hardware and software necessary to deliver the manageability use cases, security features, system performance, and stability that define the platform. See intel.com/performance-vpro for details.
2. Forrester, “The Total Economic Impact™ Of The Intel vPro® Platform,” January 2021, https://www.intel.com/content/www/us/en/business/enterprise-computers/resources/vpro-platform-tei-case-study-2021.html.
3. Requires activation and a system with a corporate network connection, an Intel® AMT-enabled chipset, network hardware, and software. For notebooks, Intel® AMT may be unavailable or limited over a host OS-based VPN when connecting wirelessly, on battery power, sleeping, hibernating, or powered off. Results dependent upon hardware, setup, and configuration. For more information, visit intel.com/technology/vpro/index.html.
Intel® technologies may require enabled hardware, software, or service activation.
No product or component can be absolutely secure.
Your costs and results may vary.
© Intel Corporation. Intel, the Intel logo, and other Intel marks are trademarks of Intel Corporation or its subsidiaries. Other names and brands may be claimed as the property of others.

]]>
TechSperience Episode 116: How Artificial... https://community.connection.com/techsperience-episode-116-how-artificial-intelligence-is-changing-everything-in-retail/ Dec 21, 2022 Connection https://community.connection.com/author/connection/ https://community.connection.com/wp-content/uploads/2022/12/1806235-Lenovo-NVIDIA-PowerOf2-Twitter-SOCIAL2.jpg

Retailers can reduce shrinkage, diminish stockout, and enhance experiences for customers and employees with artificial Intelligence (AI). But that is just scratching the surface. AI-enabled intelligent stores can optimize so much more like managing staffing resources, reaching sustainability goals, and even predicting customers’ needs.

This podcast explores how AI solutions – a combination of data management, connectivity, edge computing devices, and software – can create powerful results. Experts from NVIDIA, Lenovo, and Connection cover real-world examples of how retailers are getting their return on investment and what strategies have been successful to reaching strong business outcomes.   

Host: James Hilliard

Guests:

  • Cynthia Countouris, Director of Product Marketing & Enablement for Retail, NVIDIA
  • Matthew Bertucci, Retail Solutions Manager, Lenovo
  • Brian Gallagher, Retail Strategy Director, Connection

You can hear us on Apple Podcasts, Amazon MusicSpotifyGoogle Podcasts, or Podbean

Show Notes:

[0:58] Are retail employees worried about AI replacing them or is it seen as a helpful tool? Anything new is typically seen as a potential threat. AI can enhance productivity and let employees focus on meaningful activities such as helping customers rather than checking inventory in the aisles. Retailers can alleviate these fears by demonstrating how AI can help reduce redundant tasks and enhance employees’ productivity.  Showcasing how AI can be leveraged in flagship stores and providing videos and documentation can alleviate concerns while demonstrating the value it can bring.

[7:25] How can technologies enhance productivity? Camera vision or computer vision can help drive action by sending alerts or display information on digital signage. Integrating AI into these technologies can further automate and optimize the employee experience. For instance, AI can help advance the process of restocking inventory on shelves rather than having employees physically roam the aisles. Another example is streamlining the checkout process by displaying the estimated wait time for each line so customers can gauge which line to wait in. This also eliminates the need for an employee to moderate the lines or running the risk of one employee being inundated and another that isn’t.

[10:20] How can retailers make sure they can process data in real-time? First step is to understand the goals and what information is essential. Stockout doesn’t have to be in real-time, but loss prevention does. Retailers need to make sure they have the right edge compute power, technologies, and partners to develop the solution. Factors include volume of data points, analytics, and AI technologies as well as the size of the store and anticipated growth.

[12:25] What can retailers do to justify investments in AI? Kroger’s approach is a great example. NVIDIA and Lenovo worked with Kroger on their first foray into AI. To capture a quick return on investment, we focused on loss prevention and developed a proof of concept. It’s quicker to justify or recoup the investment by focusing on loss prevention. The concept was a success. From there, we used AI in other ways.

[13:40] Can you share more about how AI can help in loss prevention? Kroger found that a large portion of loss prevention was not intentional. For instance, customers accidently not scanning something at self-checkout. Having an AI-generated reminder on the screen is a much more comfortable experience rather than having an associate confront a customer.

[16:17] What about loss prevention as an internal issue? How can AI help here? It comes down to the approach. For instance, quick serve restaurants can set business rules on serving sizes. This can be reiterated through training. There are also opportunities for gamification by encouraging positive behaviors. Internal loss can be attributed to sustainability and making sure organizations are maximizing their resources and meeting goals by measuring waste and energy consumption. Internal loss could be related to spoiled products too. Kroger is exploring computer vision to monitor freshness of their products, for instance, automating when produce should be spritzed with water.

[21:30] How can AI help drive sales and promotion? AI lets businesses think in a non-linear fashion. And connecting AI with data analytics and camera vision enables customization at the store-level rather than a mass assumption of what will sell, when, and where.

[26:00] How can AI help with staffing plans? AI can be powerful by tracking or predicting needs based on upcoming events, weather changes, season, or time of day. It can also forecast products. AI can help connect customers to employees by alerting associates when someone is looking for something.

[29:43] Are most retailers’ infrastructure ready for AI? Infrastructure upgrades is typically needed. AI requires a substantial amount of internet connectivity. Retailers also need to have the capability to secure and protect all the edge points. This is where partners can come together to help provide the roadmap to implementing AI.

[31:57] Are there AI use cases that other retailers could turn to for ideas? Early adopters of AI include mass merchants, quick serve restaurants, and grocery stores. Many of them started small by identifying opportunities that have a clear ROI and an easy way to measure outcomes. Once there’s proof, use this experience as a steppingstone to think about AI in a broader way.

[36:50] What are some real-world savings retailers are seeing with AI? Shrinkage is a $100 billion problem for retailers. Addressing even a 30% decrease would result in huge savings. Mid-market retailers can likely see a return on investment on hardware costs within three months. It’s a clear win. Stockout is a 4% loss for retailers which can be recouped with AI.

Visit Connection’s booth at NRF 2023 or learn more about AI at www.connection.com/Smartstore.

]]>
Deliver Technologies to Improve End-user... https://community.connection.com/deliver-technologies-to-improve-end-user-satisfaction/ Dec 15, 2022 Sreeraj Vasukuttan https://community.connection.com/author/sreeraj-vasukuttan/ https://community.connection.com/wp-content/uploads/2022/12/1976279-YWW-eBook-BLOG.jpg

“My laptop did not arrive in time. My Outlook was not configured correctly. The company phone did not sync with Teams and Office 365. My laptop sometimes gets kicked off the Wi-Fi network. I wish I had an extra monitor—a 14-inch laptop screen is too limiting. I didn’t receive a Bluetooth headset, so I used my personal headset that I purchased from Amazon. Having these challenges my first week made me question my longevity at the organization.”

This was feedback from a friend of mine when I asked how her onboarding process went at her new job. Stories like these are now commonplace among new employees in the post-pandemic era. Many IT teams are struggling with the procurement, deployment, and support needs of their transitioning workforce.

While companies put a lot of time and resources into hiring top talent, there is a need for more alignment between Human Resources and IT departments to provide new employees with a welcoming experience. After all, retaining talent is as important as winning them.

In a recent Forrester survey, over 42% of decision-makers agree that employee retention is a critical priority driving the need for improving Digital Employee Experience (DEX). IT procurement, deployment, and support functions in your organization all play a significant role in shaping end-user satisfaction. Here are a few factors to consider as you prepare IT department plans for 2023.

User Needs Vary Based on Work Location

The idea that remote employees and offices may need different equipment is a no-brainer. But do you know how different their equipment needs are?  A home office would need unique configurations for each employee based on their setup needs and preferences. For example, some of your employees may need noise-canceling work headsets, while some may have access to a quiet workspace where a standard headset is appropriate. Similarly, some employees may prefer to work with a single monitor while others may need a dual monitor setup to be productive. The equipment needs of a hybrid employee may be even more complex as they require technologies to address both the office and home workspaces.

User Needs Vary Based on Role Types and Specializations

It’s vital for IT to understand various job functions to provide optimal technologies. And within those functions, there are specializations that ladder up to differences in equipment needs. If you’re in an industry organization—such as manufacturing or healthcare—you may be more familiar with supporting your specialist professionals. However, the hardware, software, and support needed for each could vary based on their specific function. For example, data analysts may require an additional screen to be effective in their role, but the form factor of that extra monitor may vary depending on the nuanced differences between their specialized roles.

User Needs Go Beyond the Functional

Your users also have needs or wants that extend beyond functionality. Employees expect their work equipment to fulfill them emotionally, just as we expect our personal devices and gadgets to fulfill our aesthetic and other needs. The higher-order value goes further than aesthetics. I would argue that devices, accessories, and operating systems that are designed with user experience in mind can provide a certain level of therapeutic value in an otherwise intense work environment. Similarly, security and privacy software can help reduce anxiety. When you create your procurement plan for devices, accessories, and software, make sure you consider the emotional value factor as well.

Inclusivity Is Key

When you choose devices, accessories, software, and services, it’s also important to understand your workforce through an inclusivity lens. Are you considering that some of your employees may be differently abled or may have a disability that calls for a unique work setup? Manufacturers are becoming increasingly aware of these factors, and there are types of equipment that have higher accessibility ratings. Inclusivity can be seen in broader ways too. For example, a remote hire could be in an area without strong broadband connections. Providing a device that supports LTE could help this employee tremendously.

Check out our eBook for more tips on how to plan for IT procurement and deployment for your organization.

Simplify IT Procurement and Deployment eBook
]]>
Clarifying Microsoft Lifecycle Policies as... https://community.connection.com/clarifying-microsoft-lifecycle-policies-as-we-approach-2023-end-of-support-dates/ Dec 15, 2022 Makayla Mota https://community.connection.com/author/makayla-mota/ https://community.connection.com/wp-content/uploads/2022/12/1991896-Msf-LifecyclePolicies-BLOG.jpg

You may have seen that several Microsoft products are ending support in 2023, but what does that really mean? And what do you need to do to support your organization? First, let’s determine what “end of support” means. When Microsoft moves a product to end of support, or retires the service, it will no longer be updated with both security and non-security updates. Customers will be urged to migrate to the latest version of the product or service. Most Microsoft products and services follow a Fixed or Modern Lifecycle Policy. Let’s break down and demystify the differences between a Fixed and Modern Lifecycle Policy.

Fixed Lifecyle Policy

A Fixed Lifecycle Policy applies to a product that is either commercial or consumer and available through retail purchase and/or volume licensing. A Fixed Lifecycle Policy is just that—the lifecyle of the product has a fixed or defined support and services lifecycle from the time of launch. This entails a minimum of five years of Mainstream Support and an additional period (for some products) of Extended Support.
So, what are the differences between Mainstream and Extended Support? I am glad you asked. Mainstream Support is the first phase of support and includes incident support, security update support, and the ability to request non-security updates. Extended Support follows Mainstream Support and includes paid support and free security updates.

Another thing you may notice for products on a Fixed Lifecycle Policy is that the customer may be asked to deploy the latest Service Pack or update. A Service Pack is when Microsoft releases a combination of fixes and updates for recognized issues available in a single installation. Microsoft provides 12 or 24 months of support for the previous Service Pack when a new Service Pack is released, but when a Service Pack ends, no new security updates or other non-security updates will be available for that Service Pack. Customers are encouraged to stay on a fully supported Service Pack.

Modern Lifecycle Policy

A product or service under the Modern Lifecyle Policy will be serviced and supported continuously. The product or service will remain in support if the customer stays current per service and system requirements, customers are licensed to use the product or service, and Microsoft currently offers support for the product or service. Under this policy, the products and services are more likely to have change notifications, and Microsoft will alert customers a minimum of 30 days in advance if they need to take action.

Microsoft also has more information about product and services lifecycles.

What Are Some of the Products that Will Be Affected in 2023?

Windows 7

Windows 7 will reach its third year of Extended Security Support on January 10, 2023. What does this mean? Well, if you are still using Windows 7, you will need to upgrade. Microsoft recommends migrating to Windows 11 to avoid needing service or support that is no longer available. If your current device is not able to run Windows 11, Microsoft recommends upgrading your device or migrating to Windows 10 (while also keeping in mind that Windows 10 will reach end of support on October 14, 2025).

Windows 8.1

Windows 8.1 will end support on January 10, 2023, and Extended Security Updates (ESU) will not be available. Microsoft 365 apps will no longer be supported on Windows 8.1, as it will no longer meet the requirements. Microsoft recommends that customers update devices to a more current operating system like Windows 11 or Windows 10. If your devices do not meet the requirements to run a more current version of Windows, Microsoft advises replacing the devices with those that support Windows 11.

Microsoft Office 2013

I previously wrote about the April 11, 2023, end of support date for Office 2013. If you are still running Office 2013, you will need to upgrade. Your Connection Account Team can help you to determine the best upgrade option for your organization:

  • Microsoft 365 Apps: The subscription version of Office that comes with many Microsoft 365 enterprise and business plans
  • Office LTSC 2021: Sold as a one-time purchase, through a volume license agreement and available for one computer per license
  • Office 2021: Available through traditional volume licensing programs with Software Assurance

SQL Server 2008

On July 11, 2023, Microsoft SQL Server 2008 will reach the end of its Extended Security Update. Customers are advised to migrate their digital estate to Azure SQL. Azure SQL can be serverless with no VM and uses the same engine as SQL on-premises. It expands from tables to Graph, JSON, and XML, making the transition smooth and seamless.

Now is the time to put a plan in place for your products that are approaching end of support. Still have questions or want to create a timeline? Reach out to your Connection Account Team for more information.

]]>
TechSperience Episode 115: Next-Gen Endpoint... https://community.connection.com/techsperience-episode-115-next-gen-endpoint-security-for-healthcare/ Dec 14, 2022 Connection https://community.connection.com/author/connection/ https://community.connection.com/wp-content/uploads/2021/07/1385075-Healthcare-Landscape-Post-Pandemic-BLOG.jpg

The healthcare industry is seeing tremendous change. With the pandemic, staffing shortages, and a backlog of patients needing care, now is the time to reset and question traditional approaches. Add in the pressure of data protection and compliance, supporting remote working environments, and providing telehealth services – finding the right technologies and endpoint security solutions is essential to the future of healthcare.

In this podcast, the experts at IGEL discuss how the next-gen edge OS for cloud workspaces is advancing user productivity, patient care, and security while simplifying endpoint management for healthcare enterprises everywhere.

Host: James Hilliard

Guests:

  • Chris Feeney, Sr. Presales Engineer, Channel & Team Lead at IGEL
  • Carl Gersh, VP of Marketing – North America at IGEL

You can hear us on Apple Podcasts, Amazon MusicSpotify, Google Podcasts, or Podbean

Show Notes:

[2:45] How has the pandemic impacted the healthcare industry? Innovation in healthcare started in 2008/2009 when the HITECH Act gave the industry incentives to move to electronic medical records. The popularity of going to the cloud spiked in 2020 as collaboration tools, remote work, and the need to upgrade machines rose significantly due to the pandemic.  

[6:34] Many healthcare teams struggle with deciding on the best approach for data storage: on-premise, cloud, or hybrid. What is your advice? We often speak to this as “inside the wall” where IT teams have more control over the data and access. Then there’s “outside the wall” which may open you up to more risks and vulnerabilities. But let’s remove the concept of the wall entirely. Security should be in place no matter where the users are or where the data is. This is the mindset we should all have in today’s digital environment.

[10:05] It took a global pandemic for many of us to shift to the cloud. What’s next? The technologies and capabilities have been around. The lack of awareness and getting executive approvals are the reasons why adoption has been slow moving across many industries. Cloud solutions have been around for 20 years. For healthcare, streamlining identity authentication and management, enhancing the user experience so clinicians can access the data and apps quickly, and improving patient care are major focus areas.

[14:20] We’re at a point in time where there’s a need for a great reset. What should teams consider as we go into the new year? In 2023, teams should question whether a fat or thick client OS is even needed for endpoint management. Instead, consider how to manage and scale your environments while being mindful of user experience. Some organizations may have or want to do both; thick clients for power users and thin clients for standard users, but you should also question whether this modality is necessary. For instance, consider Netflix. You don’t need a Netflix “box”, instead Netflix is seen as a service, and you can pick any device to use it. Think about your OS in the same way.

[18:30] So for those users that still want a workstation, what do you suggest as the right solution? Thin clients may be easier to manage but it won’t be enough for power users. With the rise of cloud computing, IGEL is focused on the “fit client” OS. In other words, we focus on delivering the right fit based on users’ needs.

[24:08] What are the benefits of IGEL OS? It’s no surprise that IT teams are always trying to do more with less or not enough. Many customers need to repurpose devices, extend the lives of those devices, and reduce e-waste. IGEL OS offers reliable performance that’s flexible and secure. We work with many vendors and partners like Citrix, Microsoft Azure, VMware, AWS and 120+ others to deliver a seamless experience.

[28:08] Describe the user experience when IGEL OS is first deployed. Once your device is on, the user is in their virtual session. The experience is seamless and doesn’t entail waiting and logging into various systems. If teams need to switch cloud service providers, IT can change that from the administrative side. The interface to the user will be the same. They would never know of the change.

[31:50] What are some nuances that IGEL OS has considered for the healthcare industry? IGEL works closely with Imprivata to deliver an integrated healthcare solution. Identity authentication is critical in the healthcare space so IGEL OS is activated when a clinician comes in and uses their badge for tap-and-go access. There are no passwords to slowdown clinicians, but the data is still secure.This user experience allows healthcare professionals to be more efficient so they can focus on patient care.

Contact your Account Manager at Connection or visit connection.com/IGEL where you can sign-up for a free trial.

Simplifying Instant App Access for Healthcare Users

Simplifying Instant App Access for Healthcare Users

For healthcare IT organizations, offering clinicians instant, but secure access to key clinical apps and patient medical records is not an option—it’s a requirement that cannot be compromised. Read More

]]>
Microsoft and Citrix: A Dynamic Duo for Your... https://community.connection.com/microsoft-and-citrix-a-dynamic-duo-for-your-hybrid-work-environment/ Dec 14, 2022 Makayla Mota https://community.connection.com/author/makayla-mota/ https://community.connection.com/wp-content/uploads/2022/12/1993921-Citrix-and-Microsoft-BLOG.jpg

As we go into 2023, hybrid work is no longer the new normal, it is simply the normal. IT departments at organizations around the world have continued to come up with innovative ways to provide workers with access to everything they need to do their jobs from anywhere, and the demand for migrating to the cloud has never been more prevalent. 

Azure Cloud Migration

The Microsoft Azure portal—connected to Citrix digital workspaces—is the ideal solution for cloud migration and is a more seamless experience than you think! By working with you to understand your business goals and cloud readiness, Connection offers end-to-end Azure migration to bring all your business apps and data into one secure, unified cloud workspace. Connection cloud experts will configure your new Azure environment with monitoring, backups, and disaster recovery—allowing your investment to meet and exceed your remote workforce and IT goals. Want to test drive the latest innovation designed by Microsoft and Citrix? Our experts are prepared to strategize, plan, and deploy a proof-of-concept environment for you to explore Citrix virtual workloads in Azure. 

Azure Virtual Desktop (AVD) enables you to deploy modern and legacy Citrix desktop app experiences from within the Microsoft Azure portal, making it the perfectly unified solution for supporting the hybrid workforce. By consolidating legacy sites into one, single point of entry, users can work uninterrupted with secure access to any desktop and application—from devices in any location. AVD supplies best-in-class integrations and optimizations for productivity apps your employees use every day.

The benefits of migrating to Azure Virtual Desktop, include the ability to:

  • Migrate existing Windows apps to gain cloud scale, security, and agility
  • Access any apps from any device, from virtually anywhere
  • Reduce the complexity to run traditional SaaS (Software as a Service) infrastructure

Microsoft and Citrix: An Ideal Partnership

Industry leaders, Microsoft and Citrix have spent decades creating innovative solutions to empower organizations—but the past few years have been vastly different. Producing ways to drive efficiency and enable collaboration as the very thought of work completely changed has been a time of creative thinking, innovation, and partnership. Running Citrix Virtual Apps and Desktop Service with Azure workloads allows organizations to create scalable and modern workspaces that go far beyond standard remote work environments. 

When deployed together, Citrix and Microsoft accelerate your ability to sustain hybrid workers everywhere, driving a work environment that is compliant, secure, and fully optimized for better performance. AVD allows your IT team to support the demands of remote workers and encourage collaboration with a truly seamless and uninterrupted user experience. Whether you are seeking improved collaboration tools for employees or simplifying virtual desktop delivery, AVD on Azure is a cost-efficient way to improve on your current investment and prepare your organization with optimal business outcomes.

The future of work is here, but are you prepared? Microsoft and Citrix continue to creatively drive innovation, enabling organizations across the globe to accelerate their cloud journey.

Connection offers cloud managed services along with AVD to ensure you are fully supported as you transition your data and workloads to the cloud. To learn more, reach out to your Account Team today.

]]>
Simplifying Instant App Access for... https://community.connection.com/simplifying-instant-app-access-for-healthcare-users/ Dec 09, 2022 Dan O'Farrell https://community.connection.com/author/danofarrell/ https://community.connection.com/wp-content/uploads/2022/12/1967127-TechSperience-Podcast-IGEL-BSG-Healthcare-Solutions-Blog.jpg

No industry is more dependent on rapid, decisive action than healthcare. From initial patient check-in to after-care outpatient treatment, delays or wasted time in any form can create severe impacts on patient outcomes and their ongoing health. For healthcare IT organizations, offering clinicians instant, but secure access to key clinical apps and patient medical records is not an option—it’s a requirement that cannot be compromised.

Importance of Instant App Access

Whether in a local neighborhood urgent care center or across a large regional network of hospitals, healthcare IT must offer clinicians, physicians, and nurses the ability to access the needed tools and information quickly and easily to do their jobs as effectively as possible. Administrative and operations staff must also be as efficient as possible to minimize patient wait times and, more recently, have secure access to the systems from home. In addition, all healthcare facilities must maintain compliance with patient confidentiality and data storage and retention requirements such as HIPAA, GDPR, and PCI to name just a few. This compliance includes protecting data and healthcare employees from security threats such as ransomware.

Provide Better Patient Care

The IGEL operating system runs on clinical endpoint devices in thousands of hospitals and healthcare facilities around the world. Fast, lean, and secure, IGEL OS enables existing and future endpoint devices to operate at peak performance and can be found in healthcare environments running any of the popular electronic health records (EHR) apps including Cerner, Epic, Allscripts, and MEDITECH.

Strong integration with IGEL Ready technology partner Imprivata (at the OS level) helps ensure instant access to patient data from any compatible x86-64 device, including computers on wheels (CoWs) and locally accessed stationary devices, like at nursing stations. Clinicians can roam between devices and immediately access where they left off, or multiple clinicians can share a single device. In all cases, the access to needed apps and patient info is seamless and secure with a single smartcard “tap” or mouse click, with HIPAA and GDPR information confidentiality compliance maintained at all times.

Ready for smarter endpoint security and optimization? Contact Connection today to receive a 30-day free trial.


IGEL Healthcare OS Solution Case Study

Case Study

Healthcare service providers operating across different regions benefit
from leveraging the secure VDI solution provided by VMware Horizon 7 and IGEL Workspace Edition. Read the Use Case.

]]>
Take Advantage of Built-in Silicon to... https://community.connection.com/take-advantage-of-built-in-silicon-to-protect-your-data-center-operations/ Dec 08, 2022 Connection https://community.connection.com/author/connection/ https://community.connection.com/wp-content/uploads/2022/11/1971231-Blog-Intel-Data-Center-Security.jpg

Data center security has never been more important. The damage caused by security breaches with lost data, reparation fee payouts, privacy noncompliance penalties, and confidentiality leakages can critically harm a business. Protecting your data center—meaning the servers, their operations, their storage, and the data and applications hosted within them—requires a multilayered approach for comprehensive system integrity. Not only do you need policies, procedures, and processes to defend against cyberattacks, but you also need built-in technologies at the silicon level.

Data Is Your Business’s Lifeblood

Data is the lifeblood of business today. It fuels innovation, insights, and intelligence and is present at every layer of operations, from firmware to BIOS to applications. Availability of data at the speed of need is essential to organizational success; accelerating data movement supports rapid decision-making based on appropriate and timely business intelligence.

However, business intelligence is only as good as the data it references. It is vital to ensure data remains clean, uncorrupted, and accessible and that all systems remain capable. Hardware-based security features built into the silicon level deliver systemic protection.

This is where Intel® processors come into play. They have the most built-in accelerators of any processor currently available. As a result, they deliver the capabilities to support your data center infrastructure and the most-demanding applications—from cloud and in-memory analytics to high performance computing (HPC) and artificial intelligence (AI). The Intel® Xeon® Scalable platform is highly versatile and provides a foundation for data center agility and scalability with expansive capabilities and convergence across compute, storage, memory, network, and security.

Faster, Easier, and More Secure Operations

While known for high performance and accelerated compute, Intel Xeon processors also deliver breakthrough cryptographic performance thanks to algorithmic and software innovations. Security technologies built into Intel Xeon Scalable processors make data available for analysis even if it’s sensitive, confidential, or regulated.

Intel Xeon Scalable processors offer built-in Intel® Software Guard Extensions (Intel® SGX), which supports confidential computing for data in use by enabling enclaves of protected data. With a dual-socket Intel Xeon Scalable processor-based server, up to 1 TB of data can be processed inside Intel SGX enclaves. This creates opportunities for analytics and applications requiring large data sets. When the training or processing is complete, any private information can be deleted or re-encrypted before leaving the enclave.

3rd Gen Intel Xeon Scalable processors

In the future, Intel SGX will be joined by Intel® Trust Domain Extensions (Intel® TDX), a new tool that offers confidentiality at the virtual machine (VM) level. Within an Intel TDX confidential VM, the guest OS and all the VM applications are isolated from the cloud host, hypervisor, and other VMs on the platform. With Intel TDX, the trust boundary will be larger than the application-level isolation of Intel SGX, while confidential VMs will be easier to deploy and manage at scale than application enclaves. The combination of Intel SGX and Intel TDX as the Intel® portfolio of confidential computing technologies will enable businesses to choose their optimal security level to meet both business needs and regulatory requirements.

Federated Learning with Protected Data

When training neural networks, sharing data between entities can greatly increase accuracy and speed of training processes. Sharing confidential data between trusted multiparty compute models for such use cases as federated learning is possible with Intel Xeon Scalable processors. Employing Intel Xeon Scalable processors with Intel SGX enclaves allows multiple parties to pool sensitive data and share the benefits of a common analysis without exposing their private data to the other parties. And remote attestation allows the owner of the data to verify that their enclave is genuine, up to date, and running only the software they expect.

Intel® security technologies are helping businesses take advantage of the flexibility and scalability of the cloud while reducing the risk of exposing sensitive data. This combination of technologies—Intel Xeon processors and Intel SGX—also enables compliance with privacy regulations and data availability and supports isolating sensitive data from your cloud providers’ software, administrators, and other tenants.

Futureproof Built-in Security

Another significant benefit of Intel Xeon processors is that they can work with your existing data center infrastructure. Intel Xeon processors are also futureproofed. You’ll be able to upgrade to future Intel® technology releases, such as Sapphire Rapids, easily and seamlessly. By using Intel Xeon Scalable processors, you enable your data center operations to run in a trusted environment for more reliable, scalable, workload-optimized performance.


Episode 112: Hybrid Cloud Strategies for the Modern Data Center

For more on protecting the modern data center, listen to the latest Intel and Connection podcast to explore best practices of a hybrid cloud strategy.

Intel® technologies may require enabled hardware, software, or service activation.
No product or component can be absolutely secure.
Your costs and results may vary. © Intel Corporation. Intel, the Intel logo, and other Intel marks are trademarks of Intel Corporation or its subsidiaries. Other names and brands may be claimed as the property of others.

]]>
TechSperience Episode 114: Prevent Data Loss... https://community.connection.com/techsperience-episode-114-prevent-data-loss-with-uninterruptible-power-supply-ups-solutions/ Dec 06, 2022 Connection https://community.connection.com/author/connection/ https://community.connection.com/wp-content/uploads/2022/12/1978971-Veritiv-Blog.jpg

We often take power for granted. But when there’s a power failure, a planned outage, or a natural disaster, we’re reminded that power is such a necessity. In today’s digital world, data loss and downtime for IT can lead to long-term financial and reputational damage for organizations. The risks are even greater for healthcare and critical infrastructure industries. Listen in on our latest podcast to hear how simple it is to prevent data loss and power failure before it’s too late.

Host: James Hilliard

Guests:

  • Hillary Watkins, Product Marketing Specialist for Single Phase UPS at Vertiv
  • Joe Doherty, Power and Cooling Business Development Specialist at Connection

You can also hear this podcast on Apple Podcasts, Amazon MusicSpotify, and Google Podcasts.

Show Notes:

[3:26] Do most organizations have the appropriate power backup in place? Many offices and facilities have backup generators, but there’s typically a delay from the moment the power interruption or outage occurs and the generator kicking in. Data can be lost during this time—in addition to impairing business operations. Having a UPS in place can mitigate this risk.

[5:00] How has the remote and hybrid working environment of today impacted the approach to power and battery backups? Many IT professionals are now working from home where it isn’t possible to physically hear the maintenance beeps and alarms. Remote IT teams are now reliant on setting up systems to be able to receive remote notifications, but many are not set up that way. Instead, IT and facility teams are trying to keep up with the alarms rather than being proactive on the maintenance and replacement schedules.

[6:23] How can teams plan for business continuity? Preventative measures are key. Gartner has reported that the cost of downtime is estimated at $5,600 per minute. Many of us are too busy tackling the next problem, but teams should plan for the worst-case scenario instead of constantly chasing it. The cost of a UPS or battery backup is minimal compared to what could be lost in an event where power is disrupted by a hurricane, power outage, or even vibration from nearby construction.

[12:54] Some teams may be thinking whether investing in UPSs makes sense. What is your perspective? The key question is: “Do you want to save dollars or do you want to save your data?” Downtime can lead to major losses. There are a wide variety of UPSs available. There are units that feature lithium-ion batteries—which deliver 8-10 years of performance instead of the average 3-5 years—leading to a lower total cost of ownership. 

[17:00] Who should be involved when it comes to business continuity planning? Facility planning staff should be involved in the discussions as they are typically responsible for the overall infrastructure and disaster recovery plans. IT is responsible for protecting data and managing the servers and networks. From the budgeting and ROI perspective, finance plays a vital role in the final decision-making process.

[20:00] What about remote employees and their backup needs? We’ve all experienced power outages at home. A UPS is certainly a best practice, but it requires finding the right fit based on user needs and effective communications. You certainly don’t want people plugging in heaters and extraneous devices that will overload their UPS. You’re also relying on employees to notify IT or facility teams of issues and having them replace units. Regular communications about appropriate and proactive maintenance practices are necessary. 

[24:13] What is the value Vertiv can bring? Vertiv is a newer name in the industry, but it really is the make-up of the former Liebert and Emerson power product lines that have been around since the 1960s. These power and cooling products are performance leaders in the industry. 

To learn more, please reach out to a Connection Account Manager, or visit connection.com/vertiv.

https://vimeo.com/712081404
]]>
TechSperience Episode 113: The Technology... https://community.connection.com/techsperience-episode-113-the-technology-link-enhancing-user-experience/ Nov 29, 2022 Connection https://community.connection.com/author/connection/ https://community.connection.com/wp-content/uploads/2022/11/1962437-Techsperience-Podcast-Ep113-Blog.jpg

In a recent Forrester report, 77% of full-time employees said PC devices play a critical factor in their ability to do their work. In today’s climate of hybrid and remote environments, how do you determine what technologies users need and what’s at risk if user experience isn’t prioritized? Listen to this podcast to hear why developing persona-based solutions is critical to user productivity, onboarding, and overall happiness.

Host: James Hilliard

Guests:

  • Rhett Livengood, Director of Digital Business Enabling at Intel
  • Tim Burns, Vice President of Product Management and Workplace Transformation at Connection

You can also hear this podcast on Apple Podcasts, Amazon MusicSpotify, and Google Podcasts.

Show Notes:

[2:55] Walk through how the pandemic impacted user technologies. Where are we now? The first phase of the pandemic was about making sure equipment made it out to users as organizations turned to remote environments. Now that users have devices, the concern has shifted to whether users have the right devices, are they secure, and how can their user experience be improved.

[4:00] How has security changed? Pre-pandemic, many of us relied on software-based security applications. Teams kept adding more and more of these applications, which eventually slowed down machines, especially consumer-grade machines. Intel has focused on developing hardware-based security so that users can have machines that can keep up with their productivity needs.

[6:00] What did we learn post-pandemic? There is an emphasis on making sure users can be their best digital selves. Users are relying on collaboration platforms to meet, coordinate, and accomplish their tasks. The onboarding experience is also critical. Looking at how quickly a user can get up and running with the appropriate tools plays an important role in productivity and the overall user experience.

[11:11] How has the remote or hybrid environment impacted IT deployment? The world has become distributed—employees, students, clinicians, and even IT teams. There’s also a need to have out-of-the-box or turnkey solutions ready to go. Many organizations are looking for a partner that can customize devices, applications, and accessories in addition to deploying the equipment to users. 

[13:14] Some organizations don’t see the value in customizing devices and are purchasing consumer-grade machines. What’s the potential downfall with this approach? Each user has different needs so there shouldn’t be a generalization. Providing a checklist or a survey to understand your personas’ requirements can help you determine the appropriate bundle of solutions. Enterprise-grade PCs, such as those that feature Intel® vPro™, can prioritize your Wi-Fi so that your Zoom or Teams meeting takes precedence over your child’s online gaming connection.

[17:45] What’s at stake if user experience isn’t prioritized? There are many studies that illustrate how technology plays a critical factor across the overall user experience: onboarding, productivity, retention, and happiness. Understanding personas, or the different types of users you support, is critical. We have researched how different users work or study and created bundles of hardware, software, and services that would optimize productivity and user experience. These persona-based bundles range from a middle school student to a graphic designer or a road warrior. 

[24:28] Many users find themselves going out to purchase an accessory or device at a store. Are there pitfalls with this? User experience is not just IT’s responsibility. It’s also the responsibility of each user too. Buying disparate hardware, accessories, and software will limit IT’s ability to help troubleshoot or support users. 

[27:00] What is next in technology as it relates to user experience? Collaboration 2.0 will give users higher quality audio and video features such as panning, eye tracking, and zooming. Connectivity will continue to advance as 5G will be built-in as a backup to 6G Wi-Fi networks. In the next few years, 7G will give us an opportunity to streamline computing across various devices, including autonomous vehicles. Artificial intelligence will transform productivity as the technology learns how to perform repeated tasks users perform.


Explore Your Wherever Workspace to learn more about persona-based bundles or visit the Intel showcase to discover their latest technologies.

]]>
Hyperscale Cloud Management... https://community.connection.com/hyperscale-cloud-management-services-support-for-your-it-superhero-team/ Nov 17, 2022 jonathan cantella https://community.connection.com/author/jonathan-cantella/ https://community.connection.com/wp-content/uploads/2022/11/1933039-Hyperscale-Cloud-Blog.jpg

We have all watched superhero movies or a show, with the hero saving the day from whatever threat or outward obstacle they may face. Whether it’s Batman saving Gotham City from another sinister plan of Joker’s or the Avengers saving the world from the likes of Thanos or Galactus. Behind each of our favorite superheroes is almost always a team supporting them. A vital part of the Batman mythos, Alfred Pennyworth has been called Batman’s Batman. Hyperscale Cloud Managed Service providers like Connection, can fill any technology and management gaps so you can focus on what really matters—supporting your users and growing your business. 

Managed Services for the Pillars of Your IT environment

Whether your organization recently began to shift more of your operations to the cloud or you’re actively engaged, growing, and looking for optimization, Connection has you covered. With current services offered for Azure, Azure Virtual Desktop (AVD), Microsoft 365 (M365), Backup as a Service (BaaS) and more, our experts are ready to help your IT superhero team navigate through any cloud-based workload concerns you may have.  

All of our base offerings provide 24x7 support, proactive infrastructure monitoring/alerting, proactive security with compliance monitoring, and general management of your cloud environment. With these tasks taken care of, your organization can avoid: 

  • Rise of operational risk: Any strategy you choose must work on your existing cloud operations. If there are gaps in your strategy, they could lead to operational risks in your current processes and halt the functioning of revenue-generating models, such as sales and supply chain. 
  • Rise of security risks: Applications running on public cloud are more vulnerable to cloud security risks. Considering this fact, it is important to have the right security strategy in place. 
  • Decrease in service value: Lacking the right service support can make your shift to cloud more expensive and may often take more time than expected, resulting in additional costs. 

Some of our services also include on-demand service hours to help you expand your cloud environment based on your technical requirements. These hours refresh each month and connect you with a specific team of experts. Are you looking to spin up a new environment in Azure? Our team of certified Azure Experts is ready to put that time in for you. By simply contacting your assigned Customer Success Manager and explaining your goal, our team is ready and able to map out a strategy we can execute on to make it happen.   

Reduce Your Threat Levels with the Right Tools

At the end of the day, no matter the service you choose, your cloud environment is still yours, and our experts are here to be an extension of your team. We strive to make your day-to-day easier—just think of us as a few new gadgets in your superhero utility belt. 

For more details about the Hyperscale Cloud Managed Services we offer, don’t hesitate to reach out to your Account Manager or contact us here for more information.


Stay Ahead of the Curve
Get the latest industry insights, product updates, and related content from Connection, one of Microsoft’s top partners in the industry. Sign-up to receive the Connection Technology Insights: Microsoft Edition newsletter.

]]>
Protect PC Fleets with Hardware-Enabled... https://community.connection.com/protect-pc-fleets-with-hardware-enabled-security-out-of-the-box/ Nov 15, 2022 Connection https://community.connection.com/author/connection/ https://community.connection.com/wp-content/uploads/2022/11/1948563-Intel-Protect-PC-Fleets-Security-Blog.jpg

Devices must remain secure, regardless of where they are being used in today’s work-from-anywhere business model. Software-based security alone is not enough to defend data and IT infrastructure against increasingly sophisticated threats. Hackers can bypass software-based security to exploit vulnerabilities at a lower layer, meaning at the firmware, BIOS, OS, or hypervisor level. This rapid evolution of the cyber threat landscape requires organizations to use a multilayered approach to strengthen the systems security chain, including both hardware- and software-based technologies, starting from the root with platform silicon.

Three Levels of Systems Protection

Humans are the weakest link when it comes to PC security. Phishing, weak passwords, and human error are significant vulnerabilities when it comes to cybersecurity. Adopting procedures and training that educate employees on security best practices is a recommended PC security strategy. At the same time, organizations can rely on hardware-level security to help protect their PCs with confidence.

A comprehensive cybersecurity strategy considers three levels of protection:

  1. Foundational security below the OS level helps verify trustworthiness of devices and data from boot-up through operations.
  2. Workload and data protection protects data through accelerated encryption and trusted execution for hardware-isolated data protection.
  3. Advanced threat protections help augment endpoint security solutions to identify threats that use sophisticated evasion techniques.

Combined, these three levels ensure systemic protection for PCs and their data.

Survey Results Indicate Security Strategy Investments Are a Priority

PCs are the third-highest source for breaches, according to a Verizon investigative report1. And according to a report by Forrester2, businesses understand the importance of cybersecurity but struggle to implement hardware-based solutions: 80 percent of ITDMs believe that managing the complexity of hardware-based security is a challenge.

Security strategy is now a mandate for organizations. Ponemon Institute independently conducted a survey of 1,406 individuals in the United States, Europe, the Middle East, Africa, and Latin America who influence decision-making around security technology investments for their organizations. Key findings from the study, sponsored by Intel, include:

  • 53 percent of respondents say their organizations refreshed their security strategy because of the pandemic.3
  • Of the 36 percent of organizations using hardware-assisted security solutions, 85 percent say hardware- and/or firmware-based security is a high or very high priority in their organization.3

Silicon-level Security Protects Up the Stack

Each layer of the stack is only as good as the one below it. Investing in sophisticated security technologies at every layer, from firmware to BIOS to data, means better protection up the stack for IT operations. Protecting your PCs depends on the next-lowest layer of protection. By using hardware-based security features built into the silicon level, you can secure data and maintain device integrity based on a trusted foundation.

At the firmware layer, malware can gain highly privileged access to the system and is difficult to detect using software. Intel® Device Protection Technology, also known as Intel® Boot Guard, and Intel® Platform Firmware Resilience (Intel® PFR) can help verify trusted startup, block interference, and recover to a known state if compromised.

At the BIOS, OS, and hypervisor layer, Intel® Trusted Execution Technology (Intel® TXT) helps attest that these operations have not been compromised.

Virtualization uses software to create an abstraction layer over computer hardware that allows the hardware elements of a single computer—such as processors, memory, storage, and more—to be divided into multiple virtual computers, commonly called virtual machines (VMs). This enables a more modern architecture to run business applications and provides for additional hardware-security-enforced isolation capabilities. You can help protect user access credentials, workspaces, applications, and data in hardened enclaves as well without impacting the user experience. You can:

  • Run virtual machines for security-based isolation with application compatibility across different operating systems running on the same PC with the many capabilities featured in Intel® Hardware Shield.
  • Use Windows Defender Credential Guard and Application Guard with Intel virtualization capabilities to help protect against OS kernel‒level malware and browser-based attacks.
  • Complement virtualization with hardware-based encryption to help protect data at every layer.

Intel works with major endpoint security software ISVs, including ESET, Microsoft Defender, and CrowdStrike so that Intel vPro® advanced threat protection is built into their solutions with little configuration required. For example, CrowdStrike used the Intel® TDT Accelerated Memory Scanning capabilities to detect fileless attacks to memory that are now being used as an entry point in 72 percent of all attacks4. The 7x5 boost in performance delivers a broader scanning capability that uncovers early indicators of attack before an attack payload can execute.

For recovery from successful attacks, Intel vPro manageability solutions enable a more reliable firmware update and recovery feature so that ITDMs are willing to patch systems more frequently in the field.

For advanced threat protections, bolster antivirus software to catch threats using techniques that are extremely difficult for security software alone to uncover. Intel® Control-Flow Enforcement Technology (Intel® CET) on 11th Gen systems forward is designed to help defend against return-oriented programming (ROP) attacks to system memory. Intel® Threat Detection Technology (Intel® TDT) defends against ransomware and malicious crypto mining with minimal impact on performance.

A PC powered by Intel vPro® Enterprise for Windows includes the unique capabilities of Intel Hardware Shield built in to deliver one of the highest levels of hardware, software, and data protection right out of the box. This technology has three groups of security technologies: below-the-OS security, application and data protections, and advanced threat protections. It will launch in a trusted state, lock down memory in the BIOS when software is running, and help prevent planted malware from compromising the OS.

Altogether, Intel® hardware-enabled security boosts protection and enables the ecosystem to better defend against modern cybersecurity threats and improve software resilience.

Start with a Root of Trust to Build a Chain of Trust

Security is only as strong as the layer below it. By starting with a root of trust based in the silicon—like Intel delivers—security architects can help create a trusted foundation for computing. Strengthening security features at each layer can make the entire system more secure, which creates a chain of trust through all layers of the IT stack. This helps minimize the impact to system performance, while enabling secure and efficient compute. Investing in security technologies is critical in working toward an operational zero trust strategy for today and tomorrow.

Connection Cybersecurity Services help manage fleets directly using these built-in security and manageability features for detection and response for customers.

For more on PC security, listen to this podcast with Rhett Livengood, Director of Digital Business Enabling at Intel.

1. Gabriel Bassett, C. David Hylender, Philippe Langlois, Alex Pinto, Suzanne Widup, “2022 Data Breach Investigations Report”, Verizon, 2022, https://www.verizon.com/business/resources/T4e0/reports/dbir/2022-data-breach-investigations-report-dbir.pdf.

2. The Forrester Research, Inc., “The Total Economic Impact™ Of Intel AI Report”, June 2021, https://www.intel.com/content/www/us/en/artificial-intelligence/documents/total-economic-impact-of-intel-ai-report.html.

3. Ponemon Institute LLC, sponsored by Intel, “Security Innovation: Secure Systems Start with Foundational Hardware”, April 2022, https://download.intel.com/newsroom/2022/corporate/secure-systems-hardware-study.pdf.

4. CrowdStrike, “2022 Global Threat Report”, 2022, https://go.crowdstrike.com/rs/281-OBQ-266/images/Report2022GTR.pdf.

5.  Jenny Mankin, “CrowdStrike Falcon Enhances Fileless Attack Detection with Intel Accelerated Memory Scanning Feature”, March 3, 2022, https://www.crowdstrike.com/blog/falcon-enhances-fileless-attack-detection-with-accelerated-memory-scanning/

Intel® technologies may require enabled hardware, software, or service activation.

No product or component can be absolutely secure.

Your costs and results may vary.

© Intel Corporation. Intel, the Intel logo, and other Intel marks are trademarks of Intel Corporation or its subsidiaries. Other names and brands may be claimed as the property of others.

]]>
Inside Look: Get to Know Sam Harrington and... https://community.connection.com/inside-look-get-to-know-sam-harrington-and-jo-massie/ Nov 15, 2022 Connection https://community.connection.com/author/connection/ https://community.connection.com/wp-content/uploads/2022/11/1950990-InsideLook-GetToKnow-BLOG.jpg

Connection started out 40 years ago with two employees and a phone line. Today, we’re a Fortune 1000 IT solutions partner. Meet the incredible people that help calm the confusion of IT and guide the connection between people and technology. Check out our Inside Look series to discover how we solve IT and what it’s like to work in different departments within our organization.

Sam Harrington, Partner Marketing Manager, HP

Description of role: I develop integrated marketing plans for HP that span across all our sales segments at Connection.

Length of time at Connection: 7 years

How has your career grown since starting at the company?

My career growth has been great at Connection. I started as an entry-level marketing coordinator, and now I oversee all of HP’s marketing efforts. Hard work certainly pays off here. I have been at Connection for seven years and have been promoted four times. I have learned so much about website development, digital marketing, and partner relations throughout my time and continue to learn new skills every day.

What do you find most fulfilling about your role at Connection?

The people and the relationships I have gained. I work with amazing colleagues, and some of them have become true friends of mine.

What projects excite you right now?

The project that excites me the most right now is revamping HP landing pages on the Connection website. The plan is to make the customer journey clean and organized, while keeping content relevant and easily digestible for the customer. The refresh will enhance our digital marketing efforts too.

What advice do you have for someone that is interested in a career in technology?

Go for it! Try it out. Having a career in technology is never a bad idea, in my opinion. Technology is the foundation for how people get stuff done. It’s not going anywhere. For example, COVID negatively affected a lot of industries, but not the tech industry. If anything, customers started buying more technology. A lack of demand will never be an issue.

What makes Connection an employer of choice?

Managers are flexible when it comes to your work schedule. They understand that you have doctor’s appointments and family commitments. Connection offers great benefits and a generous PTO program including floating holidays.

Jo Massie, Senior Process Analyst, Customer Experience

Description of role: I’m responsible for analyzing, evaluating, and proposing business process improvements to elevate our customers’ experience.

Length of time at Connection: 29 years

How has your career grown since starting at the company?

I started at Connection as a picker-and-packer in the Shipping department. I worked my way across various departments such as Returns and Inventory Control. I was then promoted as a lead within Corporate Services and ultimately served as supervisor of the department. Now, I’m part of our Customer Experience team within our Technology Integration and Distribution Center.

What do you find most fulfilling about your role at Connection?

The most fulfilling thing is to be able to provide my experience and knowledge to help my colleagues achieve their customer service and professional goals.

How would you describe the company culture?

Connection was built on being a family. We have grown so much over the years, but we still have a close-knit feel. The company also invests in helping you enhance your skills and giving you the tools you need to grow. I feel that Connection really cares about my well-being and the well-being of my family.

What advice do you have for someone that is interested in a career in technology?

This isn’t directly tied to a career in technology, but the best advice I would give is that it’s really what you bring to the table that will help you the most in your professional career. From taking initiative to learning new skills—it’s what you make out of your opportunities that will help you grow at Connection.


Celebrating 40 Years of Innovation

Discover what unites our team and makes Connection a one-of-a-kind workplace. If you’re looking for a career where you’ll be surrounded by people who love to dream big, dig deep, and support each other, you’ll find your place at Connection. See our open positions at www.connection.com/careers

]]>
Microsoft Ignite 2022 Recap: What’s New? https://community.connection.com/microsoft-ignite-2022-recap-whats-new/ Nov 10, 2022 Makayla Mota https://community.connection.com/author/makayla-mota/ https://community.connection.com/wp-content/uploads/2022/11/1950375-Microsoft-Ignite2022-Recap-BLOG.jpg

Microsoft Ignite 2022 did not disappoint! With a real focus on catering to hybrid work environments for ever-changing work models, here are some of the top announcements from the conference that we are excited about.

Microsoft Teams

  1. Mesh Avatars in Microsoft Teams
    Oh my gosh, have you seen this? Mesh Avatars in Microsoft Teams allow you to set up a customized animated version of yourself to display when your camera is off. Once you have installed the Avatars App from the Teams App store you can design up to three avatars with hundreds of unique customization options. You can opt to use your avatar during meetings by selecting the Effects and Avatars menu before joining and choose from several gestures and reactions during the meeting. Mesh Avatars are now in private preview and I, for one, cannot wait to get my hands on them!


    Microsoft Tech Community
  2. Microsoft Teams Premium
    Microsoft Teams Premium is an add-on that was designed to make everything more personalized, secure, and intelligent. It’s going into preview in December and then general availability in February 2023, and here are the highlighted features:
    • Meeting guides managed by IT for a more personalized experience during meetings—be that a call with a client, prospecting call, brainstorming session, or others
    • Custom logos and backgrounds during Teams meetings and for the lobby, as well as setting custom scenes for Together mode
    • Teams meetings’ recaps
    • Automatically generated and assigned AI-generated tasks after meetings
    • Meeting recordings have highlights important moments in the meeting
    • Real-time translations for 40 spoken languages
    • Advanced meeting protection
    • Advanced webinars
  3. New Teams Meeting Features
    Microsoft Teams meetings are a workplace staple at this point, and Microsoft keeps adding features to improve the experience. Here are the new features announced at Ignite that I am most excited about:
    • Cameo is now generally available. It is a PowerPoint experience that allows you to seamlessly integrate your camera feed into a PowerPoint live presentation and customize how you appear on slides.
    • Collaborate with your team on an Excel spreadsheet in real-time through a meeting window through Excel Live.
    • Meeting organizers can now assign seats to meeting participants in the Together mode view and select Together mode for everyone.


      Presenting with Cameo
  4. New Collaborative Apps for Teams
    How often do you check the Teams App Store? I am guilty of checking it daily to see what new apps I can find! Here are some of the newest collaborative apps that were announced at Ignite:
    • 3M—Their Post-It® app allows users to digitize handwritten notes. With your phone or laptop camera, you can translate handwritten or drawn Post-It® notes onto your digital whiteboard.
    • iHeartRadio—This app allows users to listen to music while working and share radio stations with team members. It is the first music app in Teams!
    • There are also lots of other exciting new apps to explore by Microsoft partners, such as Workday, Zendesk, ServiceNow, Zoho, and others.


      Post-It app

Microsoft 365

  1. Outlook update with tools in place for hybrid work
    Hybrid working is here to stay, and new features are coming to Outlook to help employees stay connected:
    • Working hours and location is a feature that allows users to plan their work week so their colleagues can better plan meetings and communications.
    • Meeting recap makes it possible to find the information about a meeting and access the recording from the calendar event.
    • Outlook and Teams are adding the ability to schedule a message to be sent at a later time and date to both accommodate employees in different time zones and to respect their off-hours and vacations.
    • Outlook is adding message reactions so employees can react to and acknowledge emails the same way they can react to messages on Teams!
    • Editor using Context IQ enables you to better navigate through your emails. By using @ mentions you can now surface relevant people and files based on the context typed in an email. Context IQ is a set of capabilities that connects people with the information they require. It works in the background to connect content across different Microsoft 365 products.
  2. New Features in Microsoft Project and Planner
    To help balance team workloads and track project goals, several exciting new features are coming to Project for the web and Microsoft Planner. Here’s some of what we can expect:
    • Seamless integration of Planner and Project to Viva Goals to allow for better visibility of the team’s work and progress in each project.
    • Users will be able to see all their tasks in the Assigned to Me list (includes Tasks in Teams, Planner and To-Do).
    • Users will be able to plan, prioritize and schedule the backlog of tasks into time-boxed blocks of Sprints in Project.
    • There’s a new People view in Project that gives managers better understanding of workload distribution and allows for easy task reassignment.
  3. Video content in Microsoft 365
    Video has quickly become an invaluable way to keep remote and hybrid teams connected, and Microsoft Stream, built on SharePoint, makes videos as easy to work with and share as documents. New features include:
    • Improved Stream and webcam recording
    • Background blur, inking text, and effects are now generally available
    • Capability to access Teams meeting recordings now available in the Stream mobile app
    • New meeting recording playback capabilities including personalized timeline markers, auto generated chapters, and intelligent search


      Microsoft Stream

Security

  1. New capabilities for Microsoft Defender for Cloud
    Microsoft introduced new capabilities for Microsoft Defender in Cloud that help to support hybrid and multi-cloud environments—enabling organizations to strengthen their cloud security posture, extend threat protection across workloads, and integrate DevOps security. New capabilities include:
    • Microsoft Defender for DevOps: A new solution that will provide visibility across multiple DevOps environments to centrally manage DevOps security, strengthen cloud resource configurations in code, and help prioritize remediation of critical issues in code across multi-pipeline and multi-cloud environments.
    • Microsoft Defender Cloud Security Posture Management (CSPM): Now available in preview, this solution will build on existing capabilities to deliver integrated insights across cloud resources, including DevOps, runtime infrastructure, and external attack surfaces, and will provide contextual risk-based information to security teams.
    • Microsoft cloud security benchmark: This built-in benchmark maps best practices across clouds and industry frameworks, enabling security teams to drive multi-cloud security compliance. Now generally available with Microsoft Defender for Cloud.
    • Expanded workload protection capabilities: Microsoft Defender for Servers will support agentless scanning, in addition to an agent-based approach to virtual machines (VMs) in Azure and AWS. Defender for Servers P2 will provide Microsoft Defender Vulnerability Management premium capabilities. Microsoft Defender for Containers will expand multi-cloud threat protection with agentless scanning in AWS Elastic Container Registry. These updates are in preview.

Be sure to check out the Microsoft Ignite Book of News for more information and a comprehensive list of all announcements from Ignite 2022. As always, your Connection resources are here to help. Reach out to your Account Team to learn more.

]]>
How to Manage Global IT Procurement with... https://community.connection.com/how-to-manage-global-it-procurement-with-todays-foreign-exchange-rates/ Nov 10, 2022 Jessica Cerone https://community.connection.com/author/jessica-cerone/ https://community.connection.com/wp-content/uploads/2022/11/1946505-GlobalServe-Foreign-Exchange-Rates-BLOG.jpg

The current fluctuation in exchange rates has significantly impacted the tech industry. With the global chip shortage and supply chain challenges being consistent themes since the start of the pandemic, the current foreign exchange headwinds are adding yet another layer of complexity. The strong value of the dollar surged to its highest level in 20 years, resulting in the decline of billions of expected earnings for U.S. companies, including several large OEMs. 

The fluctuation of local currency is extremely volatile. There is no longer a back-and-forth swing anymore. Instead, it’s continuing to spiral and decline in many countries. U.S. companies with offices abroad should account for the unique economic challenges that are impacting IT procurement processes and pricing. For instance, the war in Ukraine has disrupted global energy and food markets, leading to a ripple effect impacting Europe and the Middle East.

As a result of the war, currency fluctuation is extremely volatile in the Commonwealth of Independent States (CIS) region as a result:

Procurement Exchange Rate Commonwealth of Independent States Region - Global IT Procurement
Data as of October 2022

Global Economic Impact

The power of the U.S. dollar continues to grow stronger. This may sound like great news, but for many countries, especially underdeveloped nations, the strength of the dollar is wreaking havoc on economies. The costs of imported food, pharmaceuticals, and fuel—typically priced in USD—have been skyrocketing, adding further stress to already struggling economies. 

According to Bloomberg Economics, the Egyptian pound needs to decrease in value by 23% to alleviate the country’s currency crises. Economists report that in 2021, $100 worth of oil used was valued at 1,572 Egyptian pounds. Due to the fluctuations in currency valuations, the same $100 worth of oil is approximately 1,950 Egyptian pounds today. Egypt is currently using an “unofficial” exchange rate called the Black Market exchange rate. There can be a 5, 10, or even 15% difference between the two on any given day. The Black Market rate changes daily, which makes it extremely difficult to lock in a rate as we have been able to do in the past. Unfortunately, there is a shortage of USD in Egypt, forcing the country to use the alternative exchange rate. This makes it tricky for customers to plan and budget accordingly.  Resellers and distributors are asking for upfront payments in lieu of standard net terms. And in the near future, distributors and manufacturers are planning to raise prices of bid and non-bid items due to the volatile foreign exchange rate. 

Bloomberg Foreign Exchange Rate - Global IT Procurement

Strategies to Minimize Currency Fluctuation Risks 

In today’s volatile market, organizations with overseas operations are seeing IT costs rise significantly between the quoting process and the transaction. So, what can companies do to minimize these risks?  

  • Plan in USD to minimize currency fluctuation risk
  • Work with your partners to build in a variance buffer to allow for fluctuation changes 
  • Minimize the time in between the transaction and the quoting, invoicing, or purchase order
  • Look at statistics and use hedge rates to plan for potential cost changes
  • Anticipate paying upfront to secure products and lock in the exchange rate

Overall, it takes proper planning and flexibility during these challenging times. Stockholding* or warehousing, pre-ordering products, and securing allocation are ways to lock in rates while alleviating lead time constraints. It’s also important to be open to local in-stock inventory and to understand local unofficial exchange rates may need to be applied vs. country bank exchange rates, as there are fluctuation variations between the two.

Despite these challenges, don’t stall on your IT purchases. It may seem wise to delay procurement of IT equipment and services until currency fluctuations stabilize, but there is no way to predict the future. 

The Path Forward for Global IT Procurement

Despite these challenges, don’t stall on your IT purchases. It may seem wise to delay procurement of IT equipment and services until currency fluctuations stabilize, but there is no way to predict the future. Not investing in the necessary technologies to run your business can open you up to cybersecurity risks, lead to operational inefficiencies, result in dissatisfied clients and employees, and cause reputational damage—all leading to even greater financial loss. 

With inflation and transportation costs rising, delaying purchases beyond their date of requirement might actually result in more expensive purchases. Minimizing the time in between quotation to transaction can only benefit you. Lead times are also still significantly impacted post-pandemic and have not gone back to how they were pre-pandemic.

The war between Russia and Ukraine has impacted currency volatility as we have discussed. We do not foresee positive change progression in both lead times and currency volatility until the latter part of 2023. Currently, the best thing is to be adaptable and plan in advance.

Understanding and tracking economic conditions is a big undertaking. And with already limited IT and procurement resources, looking to a partner that specializes in this area can greatly benefit your company. To learn more, please visit our global procurement solution.

Listen to this podcast for more tips on how to navigate global IT supply chain challenges.

*Stockholding services may be offered in certain cases.

]]>
Reduce Downtime and Increase Effectiveness... https://community.connection.com/reduce-downtime-and-increase-effectiveness-with-maintenance-management-software/ Nov 08, 2022 James Rust https://community.connection.com/author/james-rust/ https://community.connection.com/wp-content/uploads/2022/11/1946092-ISG-Manufacturing-MaintMGT-BLOG.jpg

The last maintenance department I worked with had several issues thanks to the challenges of the past few years. Due to increased demand, keeping machines up and running was more vital than ever, but machine failure rates were at an all-time high, coupled with increased mean time to repair (MTTR). This led to missed production targets, increased labor costs, and a lower on-time delivery rate.

High turnover meant that operator errors causing machine breakdowns had gone up. The experienced maintenance personnel who could quickly fix previously seen errors had left, taking their knowledge with them. When maintenance is dealing with limited manpower, a lack of experience with specific machines, and is being pulled in all directions by various stakeholders, how can they effectively prioritize their work?

CMMS Software Can Help

A recent survey showed that, in 2021, 27% of businesses run their maintenance departments on spreadsheets. While this can work to track what has been completed, work assigned this way must often be done manually. More complex features like automated parts usage tracking and optimized stock levels are nonexistent with this approach.

Luckily, computerized maintenance management system (CMMS) software has come a long way. Centralized software that is readily accessible to both maintenance and other employees can make breakdown notifications easy. One CMMS customer saw a staggering decrease in downtime from 26% to 4% after implementation. This was accomplished not only by prioritizing work but recording the work that was done in such a way that any new maintenance employee could easily follow the notes and make repairs.

Custom reports and KPIs can be created so the metrics and work most important to your specific operation can be easily tracked. Once live, a modern CMMS can seamlessly integrate with machine sensors so that any anomalies will be reported to maintenance before machine breakdowns occur. This results in clear direction for maintenance staff, a happier workforce, and more time available to complete preventative and predictive maintenance to stop issues before they start.

Empower Your Employees and See Results Fast

Implementing a modern CMMS system can give a quick ROI for businesses and even impact areas other than maintenance. If you’re considering upgrading your existing system or implementing a new one, engage our Manufacturing Practice. We can review your business needs and recommend a CMMS that is right for you.

]]>
Announcing the 2022 IT Superhero Award Winners https://community.connection.com/announcing-the-2022-it-superhero-award-winners/ Nov 07, 2022 Connection https://community.connection.com/author/connection/ https://community.connection.com/wp-content/uploads/2022/10/1931554-ITSuperhero-Winners-BLOG.jpg

Earlier this year, we asked for your nominations for our second annual IT Superhero Awards contest—and you did not disappoint! We received hundreds of stories of skilled, dedicated IT pros who go above and beyond at organizations across the country. And now we’re excited to announce the winners!

We teamed up with TechCrunch again to present the IT Superhero Awards at TechCrunch Disrupt 22 on October 20. Our panel of judges had a tough time narrowing down the nominations, but we can now share the 2022 IT Superheroes:

  • Best Team Leader—Patrick McGee, Director of Technology Support Services, St. Johns County School District
  • Best Rookie—Ben Esquivel, Director of Information Technology, Imperial Unified School District
  • Best Catch—John Fisher, System Administrator, Visiting Nurse Association of Northern New Jersey
  • Most Unshakeable—Lisa Michel, Customer Service Support Manager, Information Technology, Rochester Electronics
  • Best Superpower—Chase Zieman, Chief Data Science Officer, Cart.com

Watch the video of the announcement.

https://vimeo.com/764620537

Patrick McGee was also awarded the grand prize of Ultimate IT Superhero for his achievements. Congratulations and well done!

Watch Jamal Khan, Chief Growth and Innovation Officer at Connection, present the Ultimate IT Superhero award to Patrick McGee.

https://youtu.be/jGhn-GBnuzU

This year, we also partnered with our Connection Cares team to honor the winners by making donations in their names to one of three charities working to help underserved communities gain technology skills: Year Up, NPower, and Girls Who Code. Each winner got to direct $1,000 to their charity of choice—and our Ultimate IT Superhero got to give away $2,000. Coincidentally, all winners chose Girls Who Code, which will receive $6,000.

We want to send a huge thank you to all the other IT superheroes out there—and we encourage you to think of someone to nominate for next year! In the meantime, you can visit www.connection.com/ITawards to learn more about the winners’ heroic efforts, as well as the IT Superhero Awards contest.

]]>
The Link Between Technology and Great... https://community.connection.com/the-link-between-technology-and-great-employee-experience/ Oct 25, 2022 Connection https://community.connection.com/author/connection/ https://community.connection.com/wp-content/uploads/2022/10/1916220-Intel-BLOG-Feature-Image.jpg

When employee technology doesn’t work, neither does your business. Imagine trying to call into a video meeting and being unable to multitask with a document or having an unstable connection, while your email won’t load properly, and your computer fan sounds like a jet turbine. These kinds of technology malfunctions or inadequate compute power can create frustration and an inability to work productively—or at all! And the people waiting for your input are left in limbo as you try to sort it out. While an extreme example, this kind of scenario can be routine for today’s employees. And it forms their employee experience, meaning their overall perceptions and day-to-day attitude about working with your organization.

Technology is the essential tool employees now use in their daily work, especially given the increase in remote work opportunities. As such, it affects employee motivation, long-term retention, and their willingness to engage fully in their work. If the employee experience is not positive, you could lose the benefit of their talent, knowledge, and expertise. In fact, Intel survey results show that 42 percent of the younger generation will quit their job if they feel unsatisfied with technology.1

The importance of the PC in employee experience is that it is a portal through which employees experience their work every day. Their device is their tool for attending meetings, getting work done, and using applications for productivity, collaboration, and reporting. According to a recent Forrester report, 77 percent of full-time employees surveyed view PC devices as a critical factor in their engagement and ability to succeed in what they are being asked to do in their work.2 Employees need to be satisfied with the collaboration technologies they use, have easy access to the information and tools to do their job, and be satisfied with the overall technology portfolio on the devices they use in their work.2

Survey respondents agree that PC devices are critical for increasing customer satisfaction (69 percent), revenue growth (62 percent), and employee retention (55 percent).2 That means investing in a well-powered, reliable, functional PC is an investment in your employee(s). By purchasing appropriate PC devices to meet employee needs, IT decision makers support—and can even drive—employee satisfaction. Satisfied employees create quality work, which, in turn, means greater customer satisfaction for a stronger bottom line. When you reframe investments in technology as simultaneous investments in employee experience, the link between technology and business outcomes becomes evident.

The Disconnect between Requirements and What Employees Need

Interestingly, 62 percent of surveyed employee respondents agreed that PC devices are critical for revenue growth, but only 33 percent of respondents said they were extremely satisfied with their company-provided device.2 Half of respondents even said they thought their computer was insufficient or out of date.2 This demonstrates that IT decision makers and employees have a disconnect when it comes to the requirements that employees actually need with their device. IT leaders usually focus on manageability, security, and stability. And while these can impact employee experience, there are many more PC purchase considerations that can improve a business’s overall employee experience.

Remote work also brings new challenges for IT staff employees. When employees move from working in an office environment to working remotely, they have different experiences based on different conditions. And IT often struggles with a level of visibility into how and where tech or user experience problems may be happening. For example, it can be hard to know if a problem is related to the application or related to wireless connectivity. IT staff need greater visibility for device management wherever the employee and their device are located to be effective in their work.

The Benefits of Investing in Technology for Employee Experience

Eighty-eight percent of IT decision makers recognize that investments in employee experience are critical to build resilience.2 As a result of investing in technology for employee satisfaction, nearly 60 percent of IT decision makers have seen a more than 10 percent improvement in their employee experience scores.2 Even more, IT leaders are reporting a fivefold return on their employee experience investments. That means that, for every $1 USD spent on employee experience investments, companies are seeing $5 USD back in increased employee productivity, organizational agility, and customer satisfaction.2

When you’re considering technology investments to benefit employees, the quality of the PC and how good the fit is for the way employees work matter. The experience with consumer-grade laptops for work is not as good as enterprise-grade devices because enterprise-grade equipment is typically more durable and more resilient, offers valuable features like fingerprint authentication for log in, and accommodates emerging technologies, such as Intel® Connectivity Performance Suite (ICPS) Wi-Fi 6E. 

Investing in modern devices means taking advantage of the latest capabilities offered by manufacturers, like faster, more reliable connectivity or longer battery life to enable remote work. A key consideration for device type is form factor, meaning laptops, 2-in-1s, or desktop workhorses. In all cases, you want to right-size the processor for compute power because the more powerful and updated your processor, the faster your computer can complete its tasks. Again, it is also important the IT team be able to empower remote and hybrid employees efficiently and effectively to support their experience with your organization.

Technology Solutions that Meet Today’s Employee Expectations

Other qualities that employees are looking for on their devices include rapid start up, lasting real-world battery life, collaborative productivity apps, reliable wireless accessories, a sleek and stylish form factor, and dynamic displays and visuals. To help IT decision makers more easily purchase standout business devices that align with today’s employee expectations, the Connection team can introduce you to Intel® Evo™ laptops.

Intel Evo laptops are designed from the ground up with employees on the go in mind, so they have the features today’s employees want from their PCs. User needs drive the innovation encompassed by Intel Evo devices, including remarkable responsiveness, an immersive visual experience, instant wake, and long-lasting battery life.

To help the IT team support remote workers with visibility into their devices, the Intel vPro® platform addresses enterprise concerns around performance, security, and PC fleet stability and manageability. The platform offers technologies such as Intel® Active Management Technology (Intel® AMT) and Intel® Endpoint Management Assistant (Intel® EMA), which enable IT staff to remotely assess, monitor, repair, and update PCs quickly and efficiently, reducing downtime for IT and employees. These capabilities streamline IT processes, allowing IT staff to quickly fix any device issues employees may face when working remotely, which also improves the overall employee experience.

How to Begin Improving Employee Experience with Technology

Supporting the wellbeing and productivity of your employees by making smart technology investments attracts top talent and drives positive outcomes. When these investments are made with proper planning and execution, you can significantly reduce costs by shortening the purchasing and deployment processes, which enables employees to have more time and focus on mission-critical projects that grow the business. Connection’s team can help guide organizations in their purchasing decisions. We offer persona-based bundles that help you procure and deploy the hardware, software, and services your teams need to be successful. 

1. Intel Mobile Go-Getter Attitudes Study Q2 ’19. Base: US+PRC: Mobile Go-Getters: n=549.

2. “Invest in Employee Experience (EX), Drive Your Bottom Line Growth: Empower Your Employees With The Right Technology,” a Forrester Consulting thought leadership paper commissioned by Lenovo and Intel, October 2020, https://www.intel.com/content/dam/www/public/us/en/documents/white-papers/lenovo-ex-whitepaper.pdf.

Intel® technologies may require enabled hardware, software, or service activation.

No product or component can be absolutely secure.

Your costs and results may vary.© Intel Corporation. Intel, the Intel logo, and other Intel marks are trademarks of Intel Corporation or its subsidiaries. Other names and brands may be claimed as the property of others.

]]>
TechSperience Episode 112: Hybrid Cloud... https://community.connection.com/hybrid-cloud-strategies-for-the-modern-data-center-podcast/ Oct 20, 2022 Connection https://community.connection.com/author/connection/ https://community.connection.com/wp-content/uploads/2020/10/1153303-Azure-Safety-Blog-BLOG.jpg

Research by IDC show that 90% of enterprises around the world are relying on a mix of on-premises, or dedicated, private clouds, as well as public clouds, and legacy platforms to meet their infrastructure needs. Data center cloud solutions need to change as business needs fluctuate. This episode covers the best practices of a hybrid cloud strategy featuring experts from Intel and Connection.

Host: James Hilliard
Guests:
• Vijay Bandari, Cloud Solution Architect at Intel
• Steve Fowler, Cloud Solution Architect at Intel
• Kiran Agrahara, Cloud Solution Architect at Intel
• Kevin Slate, Senior Director of Cloud Services and at Connection

Show Notes:

[1:07] Where are we on the hybrid cloud journey? Now is the time to plan for “deliberate” cloud. Many enterprises fell into cloud to support remote working, but it’s a great time revisit hybrid and multi-cloud to understand scalability, workloads, and how to create a bridge between public and private.

[4:20] What’s the difference between hybrid cloud and multi-cloud? Essentially, it’s a matter of where the data lives. Understanding your needs and data compliances that you are trying to achieve will shed light on which approach is best.

[6:30] Are there enterprises that won’t need to leverage cloud at all? The future of compute does involve cloud but it’s a long-term marathon and requires a strategy. Compliance and data governance are critical in driving the cloud strategy. Companies that aren’t looking at cloud are typically dealing with a skilling issue. Even if you don’t have the expertise to handle it, that shouldn’t make you avoid adopting the cloud. You need to ensure you have the right infrastructure to fit your business model.

[11:18] How should I reset the cloud strategy? Your cloud journey starts at analyzing your inventory, being aware of your assets and requirements, and understanding where your data should go.

[14:37] What should teams consider when looking at their data? Understand the data silos you have and the data governance and compliance requirements your business needs to meet. Also revisit why you are on-prem/off-prem in the first place.

[19:45] Is the cloud secure? What should be considered to minimize risks? Security is misunderstood when it comes to hybrid cloud. Not every CSP is compliant across all verticals. There is a shared responsibility as the hybrid cloud is an extension of your own enterprise. Cloud is not less secure than on-premise. It just requires different strategies and approaches. Hyperscalers are generally more secure, but there are nuances for all organizations. And understanding those is crucial to minimizing security risks.

[24:48] How do I future-proof my hybrid cloud? Cloud is a fluid solution so its innately easy to future-proof. Be agnostic and open to different architectures. Build a control plane to leverage evolving cloud feature sets while having manageability.

[30:17] What are additional considerations we should be planning for? From the leadership point of view, pick a primary strategic provider to reduce integration and operational complexities. Tier your providers by level of support and capabilities as an internal guide. Have a cloud workload placement policy in place so that new applications are placed with the appropriate provider and avoid splitting applications across different providers when possible.

[33:26] How can you set your hybrid cloud strategy up for success? Know your workload placement and applications. Costs should not be a key driver in a hybrid cloud strategy. Anticipate moving from one cloud to another as your applications may scale.

[36:26] There are tools and expertise available out there to guide you through the process. Look for a partner that not only understands your industry, but one that will also take the time to learn your business, review your data affinities, and work with you on short-term and long-term strategies.

For more, check out the Intel Data Center Modernization blog.

You can hear us on Apple Podcasts, Amazon MusicSpotify, or Podbean. Follow Connection on TwitterFacebookInstagramYouTube, and LinkedIn.

]]>
Infection Control: Back to the Future https://community.connection.com/infection-control-back-to-the-future/ Oct 18, 2022 Dr Keith Nelson https://community.connection.com/author/dr-keith-nelson/ https://community.connection.com/wp-content/uploads/2022/10/1887702-Blog-Infection-Control.jpg

Remember when Purell was worth its weight in gold?  I think it’s safe to say that the COVID-19 pandemic has made the average person acutely aware of the importance of infection control. But this issue has always been a top priority in the healthcare provider world. Healthcare associated infections (HAI), particularly in hospitals, represent an enormous financial burden on the nation’s healthcare system on the order of $35-$45 billion per year.  Accordingly, healthcare providers continue to look for more effective ways to combat the spread of infectious agents (bacteria, viruses, fungus, parasites) in their facilities. 

And why are healthcare facilities ground zero for infections?  Because they are the environment where sick and immunocompromised people routinely congregate, which makes them a metaphorical petri dish for infection spread and germ mutation. It is not uncommon for a patient to check into a hospital with a specific medical condition and then end up accidentally contracting an infection which seriously complicates their stay.  Further, the increased potential for mutation of debilitating microorganisms in hospitals can easily lead to the development of treatment-resistant disease strains like MRSA, VRE and CRE.

Creating a Safer Environment

When designing an infection control program, it is important to take a detailed and comprehensive ground-up approach, starting with evaluating human behavior and then expanding the sphere of focus to the physical environment. Listed below are a few considerations.

Behavioral Issues

  • Diligent Hand Washing (hand sanitizer dispensers should be abundant and strategically located throughout the facility)
    Some hand washing guidelines to consider:
    • For Providers: Upon entry to the facility.  Before and after interacting with each patient.  Before and after performing any invasive procedure. Before and after touching medical equipment.
    • For Patients, Visitors and Support Staff: Upon entry to the facility and patient-occupied areas
  • Wearing of Masks where appropriate (must cover the nose and be changed regularly)
  • Discarding Shoe Covers when exiting higher risk areas
  • Changing Scrubs before leaving the hospital and after being exposed to highly infected environments
  • Conscientious Waste Handling and Disposal (OSHA)
  • Prohibiting Employees from Working When They’re Sick

Physical Environment Issues

Hardware/Equipment

  • Anything that is shared (computers, tablets, telephones, scanners, communication devices, pens, printers, copy machines, cafeteria tables, etc.)
  • Personal electronic devices (especially those carried on and off premises)

Surfaces and Floors

  • Entire Rooms
  • Room Contents
  • Air
  • Countertops, Chairs/Tables, Thermostats, Door Handles, Hanging Fixtures, Equipment

Where to Start

There is an endless array of products and operational approaches for controlling the spread of pathogens in a healthcare (or any other) environment.  Designing an effective program is dependent upon several factors including the organization’s culture and workflows, available budget, and the ability to train staff and monitor human activity. Beyond establishing proper behavioral procedures, protocols and oversight, it is essential to explore the supportive role of advanced technology solutions. Below are a few examples.

Selecting the Right Hardware

Wherever possible, it is prudent to select hardware that is designed for infection control.  Examples include products with an antimicrobial housing (keyboards, mice, bar code scanners, monitors, etc.), or wipe-down capability that protects the device from abrasive disinfectant solutions. For touch screens, an electronic “time-out” function would protect data from being inadvertently altered during the cleaning process.

UV and Autonomous Robot Disinfecting

Ultraviolet light is an effective sterilizer and there are various products that leverage this technology for infection control.  Among these are boxes that simultaneously disinfect multiple smartphones and tablets, lamps that sterilize surfaces and keyboards, and powerful UV towers that can sterilize entire rooms.  For rooms that are constantly occupied, there are UV devices that mount near the ceiling and project horizontally above people’s heads in order to sterilize the circulating air (as opposed to surfaces), and alternative devices that project a lower frequency UV wave that is harmless to humans. In all cases, line-of-sight applies where the surface of the target must be exposed to the light source in order to be disinfected.

Another solution is the use of inexpensive, fully autonomous robots that strategically and consistently spray the room and its contents with disinfectant, an option that is particularly compelling in situations where staffing is constrained.

Handwashing Oversight

In order to ensure that staff are diligently following handwashing protocols, technology sensors are available that strategically alert/remind the provider, as well as record, analyze and report handwashing compliance on an individual level.

Overhang from COVID-19

Other infection control measures that can be employed, perhaps on a seasonal basis, are those that became ubiquitous during the COVID pandemic, including temperature checks and contact tracing.

Education

Finally, bringing things full-circle, the most important component of infection control is changing human behavior. The best way to achieve this is to advance persistent and mandatory education in addition to giving continuous performance feedback. Thanks to the pandemic, we have now been awakened to the previously underappreciated war against the unrelenting evolutionary army of microbes and the serious consequences at stake. Hopefully, we’ll use the knowledge we’ve so painfully gained to proactively seize the high ground and reduce or prevent future threats to our well being.

]]>
Cybersecurity Awareness Podcast: Spotlight... https://community.connection.com/cybersecurity-awareness-podcast-spotlight-on-higher-education/ Oct 17, 2022 Connection https://community.connection.com/author/connection/ https://community.connection.com/wp-content/uploads/2022/10/pexels-keira-burton-6147398-scaled.jpg

Colleges and universities are prime targets for cyber attackers. From the large volumes of PII to medical and research data; higher education institutions are a gold mine for bad actors. The pandemic also added new attack vectors as institutions turned to remote and hybrid learning environments. CISOs, CTOs, and IT teams within higher education have a very challenging task when it comes to cybersecurity and data protection. With open networks, diverse user types, and limited resources, what can colleges and universities do to enhance protection? Listen to this podcast for tips on how to develop a cybersecurity risk management plan for your institution.

Host: James Hilliard

Guests:

  • Bobby Sears, Senior Vertical Alliances Manager, Higher Education at Connection
  • Steve Nardone, Senior Director of Security and Network Solutions at Connection
  • Tim Allen, Director of Operations and Technology at Connection

Show Notes:

[1:25] Universities and colleges are seeing an increasing number of cyberattacks due to their data-rich networks. There is recognition among the industry that data governance policies are needed to protect PII. Now is the time to reset plans to mitigate cyber risks.

[7:13] Approximately 74% of ransomware attacks launched in higher education are successful. Access to networks need to remain open to support learning environments, but institutions struggle with limiting access and identifying bad actors. Many institutions are paying out ransoms but not getting all their data back in return. Data backup systems and processes can be put into place but that is a reactive solution.

[10:42] Private universities typically have stronger cybersecurity programs in place whereas some universities must make some tough decisions when it comes to budgeting. The good news is that any improvement is better than not doing anything at all and there are ways to prioritize the areas of greatest risks.

[15:03] Managed capabilities can help stop attacks before they happen. There needs to be constant monitoring of the network to look for suspicious activity. Universities and colleges should also implement network segmentation to make sure the most critical data is protected with stricter access controls.

[17:56] Because institutions are being attacked regularly, implementing a Zero Trust approach can greatly benefit. Conduct third-party penetration testing to find vulnerable points of access.

[22:42] There aren’t enough cybersecurity experts in the industry. Leverage students enrolled in cybersecurity programs to help nurture their professional development. Have them conduct pen testing.

[24:00] Set a risk baseline and develop a roadmap for the future. Include your networks, business continuity and disaster recovery plans, edge security, and identity access control. This will also help you prioritize your risks and limited resources.

[29:00] Cyber risk management is top of mind for many colleges and universities. There’s lots of opportunities to strengthen your cybersecurity program. Connection can support you wherever you are on your journey, including conducting a Security Landscape Optimization assessment to get your team started.

Visit our Cybersecurity Awareness Month webpage for more resources. You can also hear us on Apple Podcasts, Amazon MusicSpotify, or Podbean.

]]>
Embrace Proactive Security with Modern... https://community.connection.com/embrace-proactive-security-with-modern-authentication-and-zero-trust-initiatives/ Oct 13, 2022 Krysten Harper https://community.connection.com/author/krysten-harper/ https://community.connection.com/wp-content/uploads/2022/10/1913621-Embrace-Proactive-Security-BLOG.jpg

In an effort to protect data and accounts from the increasing number of attacks leveraging basic authentication protocols, effective October 1, 2022, Microsoft will begin disabling basic authentication access for Exchange Online. Since the initial announcement back in 2019, millions of Exchange Online users have proactively transitioned to modern authentication.

What does this mean and why does this matter?

Basic Authentication

Basic authentication (also referred to as legacy authentication) is a widely used, industry-standard framework used to validate a request to reach a server. An example of basic authentication is logging into an app or website with only a username and password. Since usernames and passwords are sent across the network in an unencrypted form, applications and websites are able to store your credentials within their settings, which means if their site is compromised, your credentials are compromised. Another disadvantage of basic authentication is that it is not integrated with multi-factor authentication (MFA), which provides an additional layer of protection against compromised usernames and passwords. While username-and-password-based authentication is widely used, it is significantly less secure than other methods. A recent Microsoft study found that 99% of password spray attacks leverage the presence of basic authentication.

Modern Authentication

Modern authentication (also known as OAuth 2.0 token-based authentication) is an umbrella term used to describe a variety of different authentication and authorization methods. Most importantly, though, is the fact that modern authentication doesn’t pass Microsoft 365 account credentials to apps or websites. Instead, they only process a browser token issued by a trusted authentication provider such as Azure AD. When the user securely authenticates to the authentication provider, gets their token, and provides it to the website or application, they gain access because the application also trusts the same authentication provider, and thus trusts the token. Unlike basic authorization, modern authorization does enable the use of multi-factor authentication (MFA), adding yet another layer of security. Modern authentication methods can include security tokens, certificates, fingerprints, iris scans, or smartphones.

The Shift Toward Zero Trust

Zero trust is a “trust no one, verify everything” security strategy with three core principles: verify explicitly, use least privileged access, and assume breach. Every access is fully authenticated, authorized, and encrypted before being granted. As a user, this means you will only see and be able to access the applications that are relevant to you. Think of it like being given a temporary guest pass when visiting an office building. You check in at the front desk, verify your identity, and state who you are there to see. The receptionist issues you a guest pass that will only open the doors that need to be opened in order to get you where you need to go. If you try to access an unauthorized area, either intentionally or by accident, your pass will not open the door. To avoid the possibility of guest passes falling into the wrong hands, the pass is returned to the front desk and deactivated at the end of your visit. By disabling basic authentication in Exchange Online in favor of modern authentication, Microsoft continues to push towards a future built on zero-trust initiatives.

Why Does This Matter?

As cybercriminals continue to evolve and become more advanced in their attacks, Microsoft is dedicated to raising awareness of the importance of transitioning away from basic authentication methods. A recent analysis by Microsoft showed that customers who have disabled basic authentication experienced 67% fewer compromises than those who haven’t. With 84% of companies experiencing an identity-related breach in 2022, safeguarding identities is something that should be at the top of every organization’s priority list.

This shift to modern authentication requires that every app, program, or service connected to Microsoft 365 authenticates itself. If actions are not taken, all applications using basic authentication to access Exchange Online will stop working. If you are ready to improve your tenants’ protection and begin disabling and blocking basic authentication, you can do this with conditional access. As always, your Connection resources are here to help. Reach out to your Account Manager or Account Executive to learn more.

]]>
Cybersecurity Awareness Podcast: Spotlight... https://community.connection.com/cybersecurity-awareness-podcast-spotlight-on-k-12-education/ Oct 12, 2022 Connection https://community.connection.com/author/connection/ https://community.connection.com/wp-content/uploads/2022/10/5621947-k-12-cybersecurity-awareness-podcast-blog-scaled.jpg

K-12 is a highly targeted sector when it comes to cyberthreats. In a recent report by CoSN, cybersecurity is a top priority among CTOs. Remote and hybrid environments have drastically increased the volume of devices to support the needs of educators and students. And each device is a potential point of entry for bad actors. There’s also a lot of PII available on these networks, making school districts a prime target for data breaches and ransomware. Listen to this podcast to learn what school districts can do to enhance cybersecurity measures.

Host: James Hilliard

Guests:

  • Pam Aulakh, Vertical Alliances Manager, K-12 at Connection
  • Steve Nardone, Senior Director of Security and Network Solutions at Connection
  • Tim Allen, Director of Operations and Technology at Connection

Show Notes:

[2:55] While there were large volumes of devices that were added to school and home networks, the number of IT staff didn’t increase. Often, districts have a single IT resource.

[4:30] A ransomware attack can disable access, causing students to lose hours of education they need. Many districts struggle with having the processes and training in place to minimize the likelihood of staff clicking on phishing emails, but it’s the key to frontline protection.

[7:56] Are apps the reason why districts are seeing large volumes of ransomware attacks? Apps certainly add another layer of complexity to cybersecurity. If they were developed without the right security in place, bad actors can certainly use them to gain access to network data. Districts use anywhere from two to 700 apps. But teachers are also using apps outside of what is being provided.

[12:22] There are multiple platforms that can be leveraged: open source vs. Software as a Service. Either approach can be effective if there are appropriate security measures in place. Patching and maintaining those apps can be a big undertaking. Schools have a large, diverse set of audiences. Security is not at the forefront among students so sharing logins easily lead to compromised credentials.

[16:50] Cross departmental collaboration is important. Procurement, IT, and Legal should work together to vet apps and software thoroughly and have protocols in place to not allow unapproved applications on the network.

[18:13] Districts are required to secure student data: Children's Internet Protection Act (CIPA), Children’s Online Privacy Protection Act (COPPA), and meeting E-rate funding requirements. But there is a lot more that should be done to keep data safe. These regulations and protocols also don’t capture emerging technologies so it is critical districts develop these standards.

[21:07] The concept of Zero-Trust should be explored to help understand the full threat landscape. It’s a holistic, mindset approach. Conduct a gap analysis to help prioritize your vulnerability points.

[25:00] What are some resources that districts can leverage today? CISA and CoSN have many resources and reports available for K-12. Leverage surrounding school districts to collect best practices and strategies. Use these resources to develop an ongoing cybersecurity awareness and training program for staff and teachers.

[32:15] What can parents do? Start teaching your kids best practices when browsing online. Teach them about how much is safe to share on social media and how to spot cyberbullying and what to do if they witness it. Have them keep software updated on their devices. Explain why it is important to be skeptical about sources of information and phishing emails that seem too good to be true. Partner with your school district for student resources.

Visit our Cybersecurity Awareness Month webpage for more resources. You can also hear us on Apple Podcasts, Amazon MusicSpotify, or Podbean.

]]>
Industrialize Your AI for Maximum Return on... https://community.connection.com/industrialize-your-ai-for-maximum-return-on-investment/ Oct 11, 2022 Connection https://community.connection.com/author/connection/ https://community.connection.com/wp-content/uploads/2022/10/1913409-Intel-AI-BLOG.jpg

Artificial intelligence (AI) is transforming businesses through automated, scalable problem-solving. However, it can be a complex process to move AI models from proven concept to production-grade deployment. And the AI models only begin to add value to an organization once they are deployed and in production. So how do you maximize your return on investment (ROI) when it comes to AI in your organization?

While organizations today are committed to furthering their AI initiatives to meet business targets, many organizations get stuck in the process. The reasons range from manual or customized time-intensive development processes to too-lean experimentation to unsupportive enterprise data infrastructure to nonexistent strategies for production scale to lack of collaboration between product teams, data scientists, and operations staff. A recent study noted that 18 percent of surveyed business decision makers said it takes more than three months to deploy a new AI model into production, which is when it can deliver value back to the organization.1 Even more, only 47 percent of AI projects make it out of experimentation to be operationalized into production.2

Introducing MLOps

A similar dilemma faced software development 20 years ago. The solution then was to standardize and automate application development, deployment, and management to enable IT teams to more easily release and manage software delivery and quality with efficiency. In other words, DevOps was born, marrying development with operations.

Likewise, today’s opportunity with AI has introduced machine learning operations, or MLOps, to industrialize AI model experimentation, development, and deployment at scale. MLOps can help unlock the business value of AI sooner by fast-tracking and orchestrating AI innovation, workflows, and production at scale. MLOps also supports AI production by monitoring quality, managing regulatory requirements, and ensuring continuous improvement processes are in place.

Infrastructure Is the Foundation for AI and MLOps

While MLOps can help industrialize your AI for production to maximize your ROI, there are best practices to get the most from MLOps. Operations, in this case, means considering potential issues in your technology and critical infrastructure to ensure smooth, secure operations.

The technical foundation for AI has two parts. The first is the technology that can gather and synthesize data from across the organization, from workstation to edge to cloud. The second is the technology that allows the value of that data analysis to be unlocked by business users for insights in near-real time.

Red flags to look for in your technology ecosystem include:

  • Latency in processing, which could indicate a need for additional compute power
  • Insufficient memory and data storage capabilities, which may be resolved by one or more cloud technologies
  • Cybersecurity gaps, which can be improved with hardware-based solutions

There are powerful tools from software vendors and the open source community available today—including from cnvrg.io, C3.ai, Databricks, and SAS—that offer such open source tools as Kubeflow, Metaflow, Kedro, and MLflow. These tools have low-code options in their data workflow that help ease AI adoption and increase speed to production. For example, cnvrg.io from Intel can help operationalize AI faster while ensuring the right infrastructure is in place.

Whatever your industry and current journey with AI knowledge and projects, you can maximize your ROI by working with an MLOps approach to industrialize your AI initiatives and ensure your technology infrastructure has the optimal foundation to generate value as quickly as possible.

The experts at Connection can offer solutions to simplify your AI technology lifecycle seamlessly and affordably. Connect with our industry experts, or read more about AI trends and solutions.

1. “2020 state of enterprise machine learning,” Algorithmia, 2019, https://info.algorithmia.com/hubfs/2019/Whitepapers/The-State-of-Enterprise-ML-2020/Algorithmia_2020_State_of_Enterprise_ML.pdf.

2. Jessica Davis, “Getting Machine Learning into Production: MLOps,” InformationWeek, June 26, 2019, https://www.informationweek.com/ai-or-machine-learning/getting-machine-learning-into-production-mlops.

Intel® technologies may require enabled hardware, software, or service activation.

No product or component can be absolutely secure.

Your costs and results may vary.

© Intel Corporation. Intel, the Intel logo, and other Intel marks are trademarks of Intel Corporation or its subsidiaries. Other names and brands may be claimed as the property of others.

]]>
Cybersecurity Awareness Podcast: Spotlight... https://community.connection.com/cybersecurity-awareness-podcast-spotlight-on-manufacturing/ Oct 10, 2022 Connection https://community.connection.com/author/connection/ https://community.connection.com/wp-content/uploads/2019/10/980455-If-You-Connect-You-Must-Protect-BLOG.png

The pandemic, smart manufacturing initiatives, and Industry 4.0 trends have shifted manufacturing into digital transformation. As such, the industry is now experiencing a dramatic uptick in ransomware attacks. The majority of these attacks target operational technology (OT) systems by gaining access through compromised home networks and the devices of remote workers. Manufacturing organizations have highly complex infrastructure and environments. Having an accurate picture of security vulnerabilities is a challenge in itself. Listen to this podcast to explore how manufacturing organizations can mitigate their cybersecurity risks and find a more secure path forward.

Host: James Hilliard

Guests:

  • Ryan Spurr, Director of Manufacturing Strategy at Connection
  • Steve Nardone, Senior Director of Security and Network Solutions at Connection
  • Tim Allen, Director of Operations and Technology at Connection


[1:18] Manufacturing is the highest targeted industry when it comes to ransomware attacks. Manufacturing is seen as an attractive industry for malicious actors as it plays a critical role in supply-chain and hosts a range of intellectual property such as R&D, unique processes, and proprietary equipment.

[2:50] Legacy technologies and devices are major vulnerability points. Many manufacturing organizations have been around for decades. Over time, factory expansions and upgrades happen. But with this long-term growth, a lifecycle strategy needs to be in place to help manage risks effectively. If the average lifespan is three to five years for most devices, there should be processes in place to proactively manage these assets.

[5:55] In manufacturing, the main type of cyberattack is related to operational technology (OT). Because workers are accessing data remotely, many ransomware attacks are taking advantage of compromised home networks and devices. There has been a 2,204% increase in reconnaissance against OT in 2021, according to IBM’s X-Force Threat Intelligence Index Report.

[8:02] The biggest hurdle for manufacturing organizations is working across different teams and departments to understand the full scope of their infrastructure. This is a requirement to develop the optimal cybersecurity risk strategy.

[10:00] Legacy equipment is often the easiest point of entry for a cyberattack. Securing or segmenting the networks for these assets should be a priority.

[10:56] People and culture are essential to cybersecurity. Everyone plays an important role. Each department leader should partner with IT and security.

[14:46] The industry is seeing a rapid speed of change. The pandemic, workforce shortage, and supply chain impacts have dramatically shifted the adoption of digital technologies to support hybrid/remote work environments.

[19:00] There are three main elements to a cybersecurity program. First is getting full visibility of your infrastructure. Next is developing ways to protect or defend your network. And lastly, have a means to continuously monitor for potential threats.

[20:29] If you are unsure where your risks are, be sure to prioritize systems that can’t be patched or updated by segmenting the network onto different domains. Conduct penetration testing, both internal and external. This should be done by a third-party expert to get the full scale of your vulnerabilities. Utilizing an assessment, such as a Security Landscape Optimization, may also be helpful to help prioritize your risks.

[26:00] Based on recent data, the manufacturing industry is highly targeted by cybercriminals. As such, cyber insurance companies are now scrutinizing coverage and are requiring organizations to provide proof of a mature cybersecurity approach. It’s a matter of when and how often when it comes to cyberthreats in the manufacturing space.

Visit our Cybersecurity Awareness Month webpage for more resources. You can also hear us on Apple Podcasts, Amazon MusicSpotify, or Podbean.

]]>
Warehouse Operations: It’s Time to Level Up https://community.connection.com/warehouse-operations-its-time-to-level-up/ Oct 06, 2022 Ryan Spurr https://community.connection.com/author/ryan-spurr/ https://community.connection.com/wp-content/uploads/2022/10/1913195-Manufacturing-Warehouse-BLOG.jpg

Every manufacturer deals with workforce shortages, turnover, training, and the constant need to improve productivity. And it’s not just a focus in the factory. While the challenges are different, warehouse teams strive to retain workers, ramp up new hires, and drive productivity to keep up with worker shortages and increased demand. 

Where do you turn when your warehouse is understaffed? How do you keep up with customer demand and growth objectives? How do you eke out a bit more productivity from the existing warehouse team? 

There has to be a better way forward… and there is. What if I said you could speed up warehouse employee training from days to 25 minutes or improve picking accuracy to 99%? Would that be enough reason to change the process and invest in new warehouse technology? 

Ditch the Paper—and Go Digital

If you’re using a paper picking process—stop! The truth is that many organizations still do this, and it amazes me when I see it. Manual picking processes are fraught with inefficiencies, human error, and non-value-added transactions in the warehouse or back office. Simply moving away from paper picking to leverage digital transactions in your existing ERP or WMS will improve productivity, inventory accuracy, and the timeliness of the data you, sales, and your clients depend upon when fulfilling orders. You might not be ready for the latest and greatest—and that’s fine—but it’s time to take that next maturity step to create a digital warehouse.

We Need Something Better: Upgrade Your Old Tech

While most organizations have moved on from paper-based warehouse operations, many are still utilizing a decades-old technology: scanners. Although improvements have been made in this area, using scanners means you’re still relying on less efficient processes and additional human actions. Due to the size of screens and the way most warehouses pick, teams continue to utilize pick sheets, pen and paper, and a manual process for picking and stacking. 

While this approach improves traditional paper picking, it doesn’t address the human element of picking. People are still not hands-free and continue to depend on pick sheets and institutional knowledge collected over time. 

There is also the general goal of productivity and scale. For example, if your business grows, how do you scale with your workforce? Can you make your existing workforce more productive? How do you deal with new hires? Can you take a new hire and make them productive on the same day? 

The technology must address business systems, ergonomics, actual employee usage, and the challenges of a dynamic labor market.

What Technology Upgrades Are Available?

Believe it or not, there are many options to trade up to. Each depends on your culture, workforce, and your business’s unique operations. These solutions can bring value and—in some cases—compound to bring significant productivity improvements when used together.

Forklifts 
Forklifts are core to many warehouse operations and one of our more popular topic of customer conversations. How can you modernize forklift operations? Well, it’s pretty straightforward, but the answer largely depends on how your employees operate. Do they sit in the saddle all day? Do they get off the forklift to pick and place items on a pallet? Do you expect your employees also to take training or collaborate when not actively driving? Do you scan license plates at long distances? Understanding how you operate today and how you would like to operate in the future contributes much to which technology is recommended for forklift operations.

In reality, most manufacturers are replacing legacy forklift solutions with rugged tablets, wireless scanners, and in some cases, using a single smart scanner that provides versatility in saddle or out. Whichever device best fits your use cases, these devices also act as a platform for other job functions, including collaboration, feedback or continuous improvement, access to human resources, and training. 

Voice Picking
 
Voice picking utilizes a headset with a microphone and earpiece. This allows warehouse employees to interact via voice with the business systems and pick lists. The system verbally instructs employees on what to pick next, and the employee confirms pick completions verbally before proceeding to the following items. Reducing reliance on institutional knowledge and delivering a hands-free solution, voice-picking solutions can lower turnover by 15-30%, reduce new hire training by up to 50%, and even reduce safety incidents by 5-20%.

Visual Picking
Similar to voice picking, visual picking systems leverage augmented reality headsets to visually display picking instructions, quantities, and even visual queues for where picked items should be stacked or placed (this all depends on how you place picked items). One of the positive aspects of visual picking is its ability to convey multiple pieces of information simultaneously. This makes it both intuitive for new hires, improves productivity, and can reduce picking defects by ensuring products are placed in the appropriate locations. Together, these benefits can achieve a 10-35% increase in picking performance, improving the bottom line.

Automated Shipping Verification and Notification
In addition to picking and staging, another form of automation includes advanced supply chain notifications (ASNs) or order verification. This is not new and has been in use for years. It’s based on the concept of tagging finished goods with passive RFID labels. As these goods are staged on pallets and associated with customer orders, it facilitates a variety of automation steps. 

First, as a pallet passes through a check point or dock doors, it automatically compares the products against the order to ensure order accuracy. Second, all transactions that employees might typically do (inventory movements, customer order completion, back office financial transactions, etc.) can be triggered and automated. This can be a robust improvement for the shipping department and finance, which can automate invoicing processes. 

It’s also important to point out that some manufacturers may be mandated to implement such systems through contract terms with large retailers like Walmart or Amazon. In addition to compliance, these platforms can bring additional benefits, such as minimizing chargebacks. 

Automated Mobile Robots (AMRs)
The robot platforms will not pick for you but will augment your workforce in several positive ways. AMRs can improve safety, minimize routine physical activities, address workforce shortages, and transport finished goods within the warehouse or line side stock into the factory. 

AMRs also come in many shapes and sizes, a versatile solution for any organization looking to integrate mobile robots into their existing operations, whether your teams use bins, containers, pallet jacks, racks, trolleys, or totes.

Companies that have implemented AMRs in their warehouse operations have seen up to 15% reduced overtime spending, 100% improvement in picker productivity, and reduced headcount and operational supply spending by 50%.

Unburden Your Warehouse

In manufacturing, many headwinds affect the workforce, productivity, and the ability to support business growth. Warehousing has a significant role to play in the company’s performance, and with so many new and proven technologies, many paths toward improvement. With many opportunities, warehouse operations is a great place to consider investing in how employees get work done.Connection believes there is always a better way to equip your warehouse workforce and drive continuous process improvement. If you’re interested in learning more, engage with a partner who will take the time to understand your business objectives and assist in selecting the right warehouse technologies to fit your unique business situation.

]]>
Cybersecurity Awareness Podcast: Spotlight... https://community.connection.com/cybersecurity-awareness-podcast-spotlight-on-healthcare/ Oct 03, 2022 Connection https://community.connection.com/author/connection/ https://community.connection.com/wp-content/uploads/2021/08/1440978-Blog-Managed-Security-as-a-Service-BLOG.jpg

The value of patient medical information makes healthcare entities prime targets for cybercriminals. According to IBM’s 2022 Cost of a Data Breach Report, the average cost of a healthcare data breach is $10.1 million, the highest across all industries. With many healthcare providers expanding beyond the four walls into remote and virtual care, now is the time evolve your organization’s cybersecurity posture. Hear from our cybersecurity and healthcare experts on what practices will help you better protect your patients’ data and healthcare practice.

Host: James Hilliard

Guests:

  • Dr. Keith Nelson, Director of Healthcare Strategy at Connection
  • Steve Nardone, Senior Director of Security and Network Solutions at Connection
  • Tim Allen, Director of Operations and Technology at Connection

Show Notes:

[1:00] Malicious actors are continuing to grow in skill and sophistication, but the good news is that we are also getting smarter when it comes to understanding phishing and social engineering.

[2:37] Technology is getting better when it comes to data protection, but the integration of technologies can be challenging. Improvements are needed to ensure security gaps are minimized between various technologies.

[5:10] Providers have been financially strained due to the pandemic. As such, cybersecurity has not been on the investment priority list. Ransomware or other data breach attacks can lead to harmful impacts – from financial, reputational, and operational as well as from the compliance perspective (HIPAA). The new world of virtual care and monitoring is adding another layer of complexity. Cloud security is also in the forefront as more institutions are moving to cloud environments.

[8:12] Prioritizing strategies to mitigate these cybersecurity threats can be challenging. In healthcare, people’s lives are at risk. Adopting a Zero-Trust framework is key. Nothing should be trusted. Focus on ways to protect data while minimizing the attack surfaces.

[12:52] Affecting behavioral change is always a challenge. Training or awareness programs and cybersecurity practices should not be a hindrance. Strategies need to be efficient and non-invasive so practitioners can focus on patient care.

[15:52] Design strategies around business operations rather than practices. Systems need to be more comprehensive to effectively offer protection. Often, this entails managed services and monitoring rather than relying on staff.

[19:40] There are some basic strategies that can go a long way to data protection such as instilling the need for complex passwords, having multi-factor authentication, and encouraging employees to verify emails and attachments.

[21:41] Updating software is one of the biggest gaps from the IT perspective. Systems get outdated and need to be patched regularly and systematically. Real-time monitoring and early detection of anomalies is a must.

[26:00] What can healthcare teams do to enhance cybersecurity immediately?

  1. Continual employee awareness and training
  2. Test your environment, internally and externally
  3. Implement regular patching updates and isolate systems that are not easy to patch
  4. Have an incident response plan in place to minimize the impact

Visit our Cybersecurity Awareness Month webpage for more resources. You can also hear us on Apple Podcasts, Amazon MusicSpotify, or Podbean.

]]>
The Cybersecurity Roadmap to a Safer Future https://community.connection.com/the-cybersecurity-roadmap-to-a-safer-future/ Oct 03, 2022 Stephen Nardone https://community.connection.com/author/stephen-nardone/ https://community.connection.com/wp-content/uploads/2022/09/1911712-SLO-CybersecurityAwareness-BLOG.jpg

Organizations all over the globe are challenged with combating the massive increase in cyberattacks head on. Whether it be nation- or state-sponsored cybercrime or just your general nuisance hacker, the challenge is daunting. If you have services connected to the Internet, you are at high-risk of compromise. You most likely have heard, “It is not a matter of IF, and it is not even a matter of WHEN. You may have already been breached, and you just don’t know it yet.” In fact, 83% of organizations have had more than one data breach and 17% of the breaches that happened in 2021 were not first-time occurrences.1

Prioritizing Your Cybersecurity Risks

With the new Executive Order on improving the nation’s cybersecurity and the focus on zero trust across government and commercial industries, many organizations need assistance with determining their level of risks and creating a prioritized roadmap to mitigate those risks. After all, organizations spend millions of dollars on cybersecurity and risk protection. But is that spend making them more secure?

To build an effective risk governance program, you need to understand and document your current risks. In other words, you need to know what you don’t know about your overall security ecosystem and the inherent risks it contains. But how can you start the process and identify priorities with limited resources?

Start the Journey with a Security Landscape Optimization Tool

A Security Landscape Optimization (SLO) assessment is a way to get everything you need in a simplified document that scores and prioritizes your ecosystem risk. The cybersecurity professionals at Connection work with your security and IT teams to determine where you have technology, process, or policy risks. This is compiled into a highly visual heat map style tool, representing a baseline security risk overview of your ecosystem across four main categories:

  1. Endpoint/End-user Security
  2. Network and Data Security
  3. Operational Security
  4. Governance Risk and Compliance (GRC) and Procedures
Baseline Security Snapshot

The team then takes the results, analyzes it for criticality and priority, and prepares a comprehensive report. This includes step-by-step risk mitigation planning along with recommendations on technology, processes, and policies that should be implemented. This is accomplished in a rapid three- to four-week cycle. The SLO also provides guidance and strategy to address cybersecurity insurance requirements as well as the fundamental architecture components required for zero trust. It fits well with other planning such as ISO 27001 or NIST 800-53 security management.

Cybersecurity Awareness Month

Cybersecurity Awareness Month continues to build momentum and impact with the goal of providing everyone with the information they need to stay safer and more secure. We hope you take a moment to reset and re-evaluate your cybersecurity strategies to best prepare for what may come.

If you are struggling to find the path to an organized and effective cybersecurity program, explore the Security Landscape Optimization tool or reach out to the team at Connection. You can also visit our Cybersecurity Awareness Month webpage to discover more resources, blogs, and podcasts.

cybersecurity-awareness-2022
1 Ponemon Institute and IBM Security, 2022, Cost of a Data Breach Report.
]]>
Adopting a Zero Trust Cybersecurity Model https://community.connection.com/adopting-a-zero-trust-cybersecurity-model/ Oct 03, 2022 Stephen Nardone https://community.connection.com/author/stephen-nardone/ https://community.connection.com/wp-content/uploads/2022/09/1911998-ZeroTrust-Cybersecurity-BLOG.jpg

The recent shifts from in-person to online or hybrid environments has forced organizations to reexamine their cybersecurity practices and protocols. Keeping information and data safe has been more challenging as teams navigate vulnerabilities in our new digital world.

83% of organizations have had
more than one data breach.

Source: Ponemon Institute and IBM Security, 2022, Cost of a Data Breach Report.

Zero Trust and Zero Trust Architecture are concepts that have been around in the information technology and security industry for many years now. It is becoming more prevalent in conversations across all industries, especially in the government sector. It is also becoming a topic of conversation for small-to-mid-market corporations as well. Cyber insurance companies, standards and certifications organizations, the recent Executive Order, and managed services companies all point to the fact that Zero Trust is the critical measure of effective cybersecurity protection, detection, and reaction.

What Is Zero Trust?

Let’s start with the definition of zero. The numerical symbol “0” means the absence of all size or quantity. So, in essence, Zero Trust is the approach of having no trust and the need to continuously verify. In addition to investing in security protection technology, you must believe the “bad guy” is already on the inside of your environment, potentially sitting dormant until the right opportunity emerges.

Let’s be clear, Zero Trust does not prevent breaches. But it does provide a framework for ensuring—when fully implemented—a reduction of the impact of a breach. This is done by identifying the breach and shutting it down quickly. Zero Trust requires the implementation and management of:

  • Security framework with guiding principles
  • Workflow, system design, and operations
  • Defined policies, information security practices, and resiliency practices
  • Technology working in concert with process and people
  • Continuous monitoring, detection, and mitigation

Three Key Elements: People, Process, and Technology

You will note that humans, technology, policy, and process are all key components of Zero Trust. Not just physical devices and software. You cannot buy Zero Trust out of a box, and you cannot just implement any level of technology alone and achieve it. The key criteria to achieve Zero Trust is continuous detection and mitigation against attack, whether from the outside or inside. People, process, and technology need to be in lockstep! This applies whether users are on internal and approved networks, whether the user is an approved employee, whether the user’s asset was configured and issued by the corporate Information Technology team, and—of course—whether the user is connecting from outside of the approved network or not.  

In addition, all sessions between users and resources must be uniquely identified and authorized. This means an employee, or a process, or a service session connecting to a corporate resource in the environment or the cloud, must successfully pass the discrete function of authentication and authorization. This authorization must also be monitored continuously for changes in behavior, or subsequent connection requests.

59% of organizations have not deployed a
Zero Trust security architecture.

Source: Ponemon Institute and IBM Security, 2022, Cost of a Data Breach Report.

Start Your Zero Trust Journey

As you can see, Zero Trust is not simple to achieve. It will take a well-defined plan, selecting the right technology, and developing the right processes. It will require a phased implementation to ensure the necessary people, process, and technology are all working in concert guarantee continuous detection and mitigation is achieved. And it won’t happen overnight. Zero Trust is a long-term roadmap to cybersecurity.

As a first step, having a Security Landscape Optimization assessment completed will give you a snapshot of your entire ecosystem along with risk scores. This "roadmap" will help you focus your resources on the areas where attention is most needed. Connection has a team of architects, consultants, and engineers to help you achieve the next level of security. Visit our Cybersecurity Awareness Month webpage to discover more resources.

cybersecurity-awareness-2022
]]>
Safety First: How Samsung’s Inertia Mobile... https://community.connection.com/safety-first-how-samsungs-inertia-mobile-solution-reduces-distracted-driving-on-forklifts/ Sep 30, 2022 Taylor Mallory Holland https://community.connection.com/author/taylor-holland/ https://community.connection.com/wp-content/uploads/2022/09/1898321-Samsung-Mobility-BLOG-Feature-Image-1.jpg

As warehouses increasingly equip forklifts and other industrial vehicles with mounted rugged tablets, they’re experiencing a wide range of benefits—from streamlined paperless workflows to wayfinding to real-time inventory. But distracted driving can be just as dangerous on a warehouse floor as it is on the road.

There are currently about 855,900 forklifts in operation in the U.S. Roughly 11 percent of them are involved in an accident each year—resulting in 34,900 serious injuries and 85 fatalities. If forklift drivers are suddenly distracted by tablet screens, those numbers could start to rise.

That’s why Samsung SDS developed Inertia, a new mobile solution that helps industrial truck operators use tablets to work more efficiently and effectively, without dangerous distractions.

Why Tablets Are Trending in Manufacturing
Over the last couple years, businesses have struggled to meet demand amid significant talent shortages and supply chain disruptions. Forward-thinking manufacturers have continued to modernize warehouses and factory floors—including their forklifts, tuggers, stackers, hi-los, and other vehicles.

Mounting tablets on forklifts helps drivers move seamlessly from one task to another. With the right software integrations, drivers can view tasks, find the most efficient route to wherever they need to go and scan pallets—without getting off the forklift. Rather than leafing through printed order lists (which quickly become outdated) or answering frequent walkie-talkie calls with new pickup requests, drivers get all the information they need in real time and from one device. 

The Inertia solution makes sure these tablets are used safely, only when vehicles are not in motion.

How Inertia Works
Inertia is a simple and highly impactful solution designed for mounted Samsung devices in manufacturing environments. When a vehicle is in motion, the device locks down and the screen goes blank until the driver comes to a complete stop.

It features different configuration levels that can be customized for different vehicles and different types of surfaces, so sensors on the device can distinguish between vibrations and actual movement. When drivers need information, they pull over, and the tablet is immediately available to them. As soon as they start moving, the tablet goes to sleep.

3 Benefits of Inertia

1. Fewer Accidents
Inertia is a relatively new solution, but it has already been implemented by several large manufacturing facilities, including a leading global automobile manufacturer. Before deploying Inertia, this business had two or three distracted driving-related incidents per month. Now, these accidents are nonexistent.

2. Lower Costs
As of January 2022, the U.S. Occupational Safety and Health Administration (OSHA) fines businesses up to $14,502 per safety violation, and up to $145,027 for repeated violations. Industrial vehicle accidents cost even more, especially when you factor in equipment repairs and workers’ compensation. In 2020, forklifts alone caused 7,290 nonfatal injuries requiring multiple days away from work, with an average 17 missed days per person injured.

3. Easy to Deploy
Similar tools often require external cameras and additional sensors, whereas Inertia is self-contained and requires no third-party peripherals. Using it is as simple as installing software on Samsung tablets. The solution can be deployed quickly across fleets of industrial vehicles.

Deploy at Scale and Protect Your Investment

For large or multilocation manufacturers, even a simple solution can be time consuming to deploy if someone from IT has to manually install, configure, and update each device. Samsung Knox Suite lets businesses remotely manage and configure devices and software, pushing updates to individual devices, groups of devices, or entire fleets all at once.

To help manufacturers deploy safe mobile solutions quickly and at scale, Samsung offers a bundle that includes Inertia, Knox Suite, and Galaxy Tab Active3. Durable enough to meet MIL-STD-810H military standards for rugged devices, Galaxy Tab Active3 is well suited to manufacturing environments, and it can be fixed on forklift mounts. Enhanced touch capability allows the tablet to be used with gloves or in wet weather. And the S Pen—IP68 rated for dust, dirt, and water resistance—helps replace paper and clipboards.

Mobilizing industrial vehicle operations is a key step in modernizing manufacturing, but digital transformation should never come at a safety risk. Inertia is a simple, low-cost solution that manufacturers can deploy quickly to help create a safer workplace. To learn more about Samsung’s manufacturing solutions, engage Connection’s Manufacturing Practice today. 

]]>