One of the biggest security flaws in your network is one of the most unexpected

secure printingData breaches seem to make headlines every week. And as of late 2014, 43 percent of 567 U.S. executives surveyed said their companies experienced a data breach in the past year.

But what’s shocking is how unprepared U.S. companies are for these hacks: 80 percent of the executives said employee negligence was a root cause, and 27 percent of companies didn’t have a response plan in place.

Still, the threat of a hack has pushed network security to the top of the IT priorities list, and organizations are locking down servers and networks. But there are a number of less obvious targets that could still expose sensitive data. Printers are just one example of the ancillary devices that could leave your security strategy vulnerable. (more…)

3 ways organizations can use 3D printing today

3D printers3D printers have moved from industrial labs and hobbyists’ basements to the mainstream: Worldwide shipments of 3D printers are expected to reach more than 217,000 in 2015, and then double every year thereafter. Vendors continue to refine their products, making them smaller, less expensive, easier to use, and more accessible for businesses and consumers alike.

In case you’ve never seen one in action, 3D printers expand on the concept of a standard ink-jet printer by adding a third axis that enables both vertical and horizontal printing. This capability offers immediate appeal to hobbyists and designers, but amidst the hype for 3D-printed fashion accessories, 3D-printed cars, and 3D printers in space, many organizations are still struggling to determine what, if any, practical 3D printing applications exist for their business.

Look no further. Here are three tangible ways organizations can utilize 3D printers today: (more…)

The surprising state of the PC market in two charts

desktopReports of the PC’s death have been greatly exaggerated. Written off after a slow 2013, PCs fought back last year with sales growing 1 percent in the fourth quarter year over year. The 2015 Consumer Electronics Show (CES) offered further optimism, showcasing advances that could breathe new life into PCs, including new hybrid laptop/tablets, curved screens, and ultra-thin laptops with big boosts in battery life. Clearly, PCs aren’t down for the count just yet.

In fact, according to a new SHI poll, they’re far from it. We commissioned an online survey, conducted by Harris Poll in December, of U.S. IT professionals to peek into their 2015 plans for new hardware and devices. We asked what percentage of PCs they plan to replace this year and whether desktops, laptops, tablets, or Chromebooks would be the replacement. Their answers show that PCs might have a longer lease on life than many think.

Here’s what we learned: (more…)

Life in the fast lane: Maintaining Ethernet that drives your IT environment

EthernetThe need for speed is a central concern for data center operators. These admins juggle server virtualization, cloud computing, LAN/SAN convergence, and big data collection, all of which require higher speeds. Not to mention the system limitations, data hogs, bottlenecks, and outdated cables that all act as roadblocks to optimal IT performance.

To keep IT running smoothly, administrators must balance their current network infrastructure with the demands of data-heavy applications. That means most data centers will need faster Ethernet at some point. But how you speed up your network depends in large part on your current system and future needs. Consider the following guidelines to kick your Ethernet into high gear.

Need a speed upgrade? Here’s how to tell. (more…)

Strive for disaster prevention with a colocation data center

colocation data centerA lot of organizations chase down the idea that they need a disaster recovery center. The specter of flooding, earthquakes, malware, or even just power outages often spurs the thought.

But the truth is that for many companies, it’s an unnecessary step. Much of the time, disaster prevention is a better option, and one that’s also less expensive. The move to a disaster prevention site, or colocation, is also an option for organizations that need more servers or storage space and can’t afford to build new or expand their current infrastructure.

Colocation should involve a Tier 3 data center, which safeguards IT systems from man-made and natural disasters (minus administrator errors). But choosing a colocation site will hinge on a number of factors. From what to look for in the data center to different disaster prevention migration options to planning for contingencies, keep the following strategies in mind to ensure a successful move. (more…)

How the IBM-Lenovo deal affects you

IBM x86 serverLenovo’s recent acquisition of IBM’s x86 server business, completed on Oct. 1, makes it one of the largest suppliers of x86 servers in the world. As far back as January, when news of a deal first emerged, organizations of all sizes have been anticipating the change while also wondering what implications the deal would have on their IT purchasing.

How will this deal impact product support? How will the x86 acquisition affect the cost of these systems? How will procurement change?

For months, our customers have asked these questions and more about what this purchase means for them. Now that the ink on the contracts is dry, here’s how the Lenovo-IBM deal will impact organizations of all sizes.

It’s business as usual for you. The IBM and Lenovo sales programs will remain in place for now, and Lenovo will transition IBM’s x86 server segment into its core business over the next six months. The only change for current customers is what they call it. Moving forward, Lenovo will refer to the x86 server line as System X. Other than nomenclature, organizations will experience no differences when working with SHI for their x86 server needs.

The deal will streamline x86 procurement. Lenovo has more distribution channels for hardware than IBM, making it easier for companies to acquire new equipment. Organizations that need to expand their server capabilities can do so more quickly.

Organizations have more options. The x86 server is popular in large organizations, and by adding the x86 to its portfolio, Lenovo will emerge as a serious contender in the enterprise space, going head to head against HP, Cisco, and Dell. And Lenovo’s addition of the x86 server business also means customers will finally get the blade server options some have been clamoring for, without having to strike a separate deal with another manufacturer or abandon Lenovo completely for a vendor with a more comprehensive portfolio. Overall, Lenovo customers will have more options when purchasing server hardware.

Lenovo now offers pocket to cloud solutions. Lenovo is known for its PC business, but recent acquisitions have expanded its scope in the tech marketplace. Lenovo entered the smartphone business when it announced plans to acquire Motorola, a deal that should be finalized by the end of 2014, and the x86 acquisition adds enterprise-class server options, giving customers a single source option for their entire ecosystem.

Businesses big and small can now benefit. Traditionally, Lenovo’s portfolio served small and medium-sized businesses, while IBM focused on enterprise clients. Because Lenovo’s x86 server acquisition broadens its product line, companies of all sizes can partner with Lenovo to acquire complete hardware solutions.

Over the past six months, many customers told us they were hesitant about buying additional server capability because of uncertainties surrounding this acquisition. If you were holding back on purchasing new servers, there’s no reason to fear — with the bulk of changes coming to the supply and partnership channels, you won’t miss a beat over the next six months. For customers, the deal amounts to faster procurement channels and additional Lenovo hardware options to complete their IT ecosystems.

If you have any other questions about the Lenovo x86 acquisition, contact your SHI account team today.

Here’s the device your employees want the most

Multiple-Devices-With-Charts-And-GraphsSome 2.5 billion PCs, tablets, ultramobiles, and mobile phones will ship worldwide in 2014, Gartner projects. And as a result, the typical American worker has more device options today than ever before. Workers combine desktops, laptops, tablets, and smartphones to work more quickly, efficiently, and effectively. But what if employees could only choose one of the four? Which device would they want most?

SHI recently commissioned an online survey conducted by Harris Poll among more than 1,000 U.S. employees (aged 18+) to see what device today’s employees would choose if their employer offered to buy them only one for work: a desktop, laptop, tablet, or smartphone. The results revealed a surprising range of preferences, including unexpected distinctions by age, geographical region, and more. Here are the highlights: (more…)

4 key insights into an organization’s IT asset management

ITAMSHI hosted a two-day IT Asset Management (ITAM) Summit in New Jersey last week, attracting 102 IT and procurement executives from 77 companies, ranging in size from less than $500 million in revenue to more than $50 billion. Having joined SHI just six months ago after holding CFO roles at both public and private companies, it has been interesting to learn so much about the challenges organizations have keeping track of their hardware and software assets and what we can do to help them.

These challenges are a concern not only to IT and procurement heads, but to those who manage internal controls and seek to optimize return on investment as well, such as CFOs, risk managers, and internal audit heads. When you consider how difficult it can be to control cloud and SaaS-based app usage and company data, the situation gets even worse. It’s no wonder that most of these leaders are losing sleep over ITAM issues.

To get a sense of the attending organizations’ approach to ITAM, we asked our audience to respond to a series of statements about asset management, risk, software audits, the cloud, and control over IT. Here are just a few of the things we learned: (more…)

Network design for the overworked administrator

network designSystem administrators have a full plate. Maintenance, monitoring, and management of their organization’s IT infrastructure keep them busy, leaving few opportunities to complete a thorough network design. A poorly designed or unorganized network, however, often requires more attention, and can be costlier down the road, making it worth the time investment up front.

If you have an opportunity to address the key requirements of your network infrastructure and organization as a whole, administration becomes easier in the long run. Here are three major steps for approaching network design to put you on the right path.

Gather initial network requirements

  1. Know your network. How many users connect to your network — 100 or 10,000? Do you have enough bandwidth to support those users? What kind of traffic profile are you looking at? Understanding the traffic on your network will help you make decisions down the road in terms of capacity and what protocols need to be addressed.
  2. Understand your organization’s expectations. What are the requirements for overall uptime for the network? Does your organization need three nines? Five nines? It doesn’t have to be exact, but you want to have an idea of what your business expects so you can design a network to support that. If your organization doesn’t require anything beyond two nines, putting in secondary power supplies would be foolish. At the same time, if your organization requires five nines, then not having the second power supply is just as foolish.
  3. Determine the budget available and how that fits your requirements. The right products for your network depend heavily on budget. The perfect network switch might be too expensive for some organizations, but they still need to choose the right switch family or product line. The switch might need to support certain features, like dual power supplies and layer 3 or light layer 3 protocols. It might need to do some kind of inter-VLAN routing, and should provide a command-line and web-based interface. If these requirements are missed initially, it’s almost impossible to get them later on after the purchase.


How to find the perfect network switch

network switchThe perfect network switch is elusive. Organizations want a cost-effective option, as well as one that supports the majority of protocols, from RFCs to IEEE 802.1 standards. But the perfect switch must also be smart, simple to implement and maintain, and primed to adapt to new technology, all of which are more difficult to find. It must also be capable of providing an overall data center network topology that solves the organization’s need.

Here are five aspects of the perfect network switch that avoid the common challenges that network administrators typically deal with when implementing and maintaining network switches.

  1. Uses a command-line interface you’re used to. Most admins don’t want to relearn another command-line interface. The perfect switch offers an interface that’s similar enough to what you’re using and doesn’t require you to relearn anything. A gentle learning curve is an important requirement.
  2. Has a flexible product portfolio. Work with vendors that offer not one solution, but many different types of solutions. Organizations have different requirements based on what they’re trying to do with their network — cloud switches are different from data center switches and workgroup or office switches, and each type of switch has different needs. By working with a vendor that offers a variety of switches within a product group — from 1GB to 100GB — organizations can more easily support current and future requirements.
  3. Supports future technologies. You must identify new ways to connect switches to take advantage of all the connections they can support. For example, Spanning Tree Protocol (STP) has been widely adopted across most data centers by networking engineers, but there’s also a new one called TRILL that provides advantages with a greater number of links across all the switches, creating a fabric. And then there’s software-defined networking (SDN) — a topic suitable for a complete book. By supporting future technologies, the switch prepares for future requirements and enhancements to the overall network.
  4. Commits its configuration across the entire environment. When adding another switch to a network, the perfect switch should be able to download the current configuration for the network and apply only the parts that the switch needs for its own use within the topology. This includes VLANs, default settings, route tables, and other applicable networking settings. In a sense, the perfect switch eliminates the need to update every switch in the network. The network fabric does this work for the administrator instead.
  5. Integrates with and understands the hypervisor’s view of the network. There should be integration between the switch and the virtual hosts and virtual machines (VMs). When a VM moves among the various hosts, it can bring its VLAN or have its VLAN ready for it to use. The perfect switch is smart enough to do that for the administrator. This eliminates the time an administrator has to spend configuring all of the VLANs necessary on every switch or supporting changes.