Home LookingPoint Blog

Blog

Marshall Hill

Recent Posts

Many organizations are rolling out Microsoft Teams for their employee’s main collaboration client software. MS Teams is easy to use and offers many business features for individuals and groups to collaborate. Microsoft is also replacing the Skype for Business application with the Microsoft Teams client, which has accelerated company’s migration to MS Teams. However, one area that can be a bit...

Continue reading

All major server manufactures have a built-in baseboard management controller (BMC) for remote server management. These are great tools for onboarding a server and maintaining the server throughout its lifetime. Most of my day to day experience has been using the Cisco IMC, Dell iDRAC, HPE iLO, and IBM IPMI. Some of the server vendors require an additional license to unlock the full features of...

Continue reading

The conference room video solutions have greatly improved and are simpler to implement, use, and support than ever before. I see two major drivers for this trend. First is the move to cloud for endpoint registration and video bridging in the cloud. This move to cloud has lowered the entry point for many customers to enable video in the conference room. The second driver is the decreasing cost for...

Continue reading

There are many video solutions in the industry. When deciding on a solution it’s important to understand the primary needs for a Collaboration Conference Room. This includes whether the room will be used purely for video and content sharing or if it’s more of a multi-purpose room with movable tables. Conference rooms where everyone sits around a table are quite different than a classroom style...

Continue reading

Cisco HyperFlex Solution

Continue reading

Cisco Advanced Malware Protection for Endpoint Security

Continue reading

What is Two-Factor Authentication?

At its core, two-factor authentication is all about checking credentials. Are you who you say you are? Traditionally, a user name and password are used to log into a secure system. Two-factor authentication provides an additional layer of security, in the form of something you physically have, to be able to log into the system. This can be a physical token in...

Continue reading

We’ve been hearing a lot about NVMe Solid State Drives (SSD) and we’re just starting to see it introduced by many of the of server and storage vendors. NVMe which stands for Non-Volatile Memory express is a logical device interface specification for accessing non-volatile storage media attached via a PCI Express (PCIe) bus. You can think of NVMe as being the successor of SATA SSD. NVMe is a...

Continue reading

The two primary storage architectures in many companies today are a Storage Area Network (SAN) or a Network Attached Storage (NAS) solution. Traditionally a SAN provides Block storage while a NAS provides File level storage. It’s also worth noting that internal server storage is making a comeback with the advent of software-defined storage (SDS). I’ll save the software-defined storage (SDS),...

Continue reading

Many companies have invested in VMware infrastructure software and have a lot of knowledge in supporting on-premise virtual servers. The VMware vCenter Server is extremely popular for managing virtual machines and providing automation for distributing resources evenly across a cluster of servers. There is a comfort in having direct vendor support from VMware for ensuring a stable production...

Continue reading
1
  • There are no suggestions because the search field is empty.

Latest Tweets