Quick cubicle hacks for a healthier, more productive you

They’re not physically demanding, but desk jobs take a toll on your health.

Sitting is the new smoking” is a common refrain of the ergonomic movement. Research shows that sitting all day has adverse health effects. Sitting for extended periods of time or completing repetitive tasks can lead to musculoskeletal disorders (MSDs), which account for approximately 33 percent of all worker injury and illness cases.

Having a more functional and ergonomic workstation isn’t just beneficial for your back, eyes, and circulation; it also improves your overall productivity. No one wants to dive into a challenging project when their eyes are strained and legs are asleep, right? Continue Reading…

Tags: , ,

Is your health care organization prepared for a cyber attack?

healthcare-itRansomware and cybercrime hacking have been two of the most common IT security threats in 2016, but many health care organizations aren’t ready to play defense: Only about 60 percent of surveyed organizations had the security capabilities in place to detect and remediate these attacks.

That’s problematic, of course, but is it surprising? After all, many health care organizations place more importance on HIPAA compliance than security, or they aren’t agile enough to protect themselves against the newest threat. Organizations tend to sink their energy into defending against the latest threat of the day, but lag on improving their entire security architecture. Continue Reading…

Tags: , , , , ,

Before buying a UPS, answer these 4 questions

uninterruptible-power-supplyWhen was your last time downtime incident? If you’re like the respondents in a recent IHS survey, you’ve seen five downtime events in the past month.

That adds up to millions of dollars in lost revenue and productivity – midsize companies reported one downtime event cost approximately $1 million — and possible equipment repairs or replacements. Lost or damaged data is an unquantifiable cost.

If you don’t already have a proper battery backup and power protection plan in place, it’s time to do so. An uninterruptible power supply (UPS) system that costs a few hundred dollars will pay for itself many times over if it gets your organization through even a single power failure. Continue Reading…

Tags: , , ,

Why SSDs are taking over in the data center

Intel SSDThe reports of hard disk drives’ (HDDs) death have not been greatly exaggerated. That’s because solid state drives (SSDs) continue their takeover in consumer devices and the data center.

Sure, HDDs and SSDs each have their own advantages, but the latter is the more modern technology that continues advancing. As prices drop, SSDs are proving their advantages to end users and IT managers.

But there’s another huge motivation for large organizations to pick SSDs over HDDs: complex data. I’ll explain. Continue Reading…

Tags: , , ,

Keeping IT equipment safe from power outages

CyberPower on uninterruptible power suppliesSummer is power season, as demand for electric power spikes. Air conditioning and other power demands strain utilities, making brownouts (temporary drops in voltage) and blackouts as common as mosquito bites. Not to mention severe weather events like thunderstorms, tornadoes, and hurricanes that can knock out electricity.

For many, these outages are mere inconveniences. But organizations risk losing sensitive data when a sudden power outage knocks computers and servers offline, especially if the power remains out for hours. A surge protector won’t save you from these outages, no matter the time of year.

The first line of defense against brownouts and blackouts is an uninterruptible power supply (UPS), which provides continuous power during an outage. But different organizations and different hardware will need different power protections. By understanding power requirements and the types of UPS that are available, you can give your organization the protection it deserves. Continue Reading…

Tags: , , ,

Next-gen mobile computing: Thinking beyond BYOD

HP on thinking beyond BYODThink about how new technologies have changed the way we consume music over the past 50 years. From vinyl to cassette tapes, from CDs to MP3s, and now to digital services like Spotify and Pandora, technological advancements can disrupt entire industries and significantly improve user experiences.

Similarly, the way we do business evolves in less than a generation. Not too long ago, IT managers were faced with the concept of BYOD and the increased complexity it carried due to the proliferation of mobile devices entering the business environment.

Today, commercial mobility involves much more. Employees expect a different style of computing to get work done and make their jobs easier. Every organization needs a mobile strategy that’s versatile enough to address the massive shift in where and how we work. To be truly productive, an organization’s strategy must rely on quality and durable devices, broad security controls, and policies that allow IT to easily manage devices.

There are four components of a smart mobile strategy that moves past BYOD. As you evaluate next-gen mobility solutions, keep these four insights in mind: Continue Reading…

Tags: , ,

What do you do when a virtual machine becomes a noisy neighbor?

Virtualized application performanceThe #1 pain point in the data center is poor performance. That’s what we found from our study of 1,000 data center professionals, who every day watch virtual machines (VM) conflict with databases, slow each other down, and eat up hours spent fine-tuning storage and tackling trouble tickets.

A huge contributor to this performance pain is what’s called “the noisy neighbor problem” — a VM consuming too many resources at the expense of others.

The problem stems from LUNs, the conventional storage groups made up of dozens or even hundreds of VMs. When one of them gets noisy, demanding more than its share of performance reserves, it slows down its neighbors and throws the entire LUN into chaos.

Because they’re built on that LUN architecture, most storage environments running VMs face this challenge. Stopping these rogue VMs is difficult because they’re nearly invisible to scrutiny and correction.

Here’s how you put the issue to rest and guarantee every VM’s performance: isolation. By eliminating the LUN and giving every VM its own neighborhood through VM-aware storage, you can more precisely control the resources apps can demand. Continue Reading…

Tags: , ,

Video and police body cameras: Answers to 6 common questions

NetApp on police body camerasThere are roughly 18,000 police agencies in the United States and they’re all trying to solve the same case: How to deal with the storage requirements of video taken with body cameras.

As adoption of police body cameras rises, small agencies (less than 100 officers) and large metropolitan and state-wide departments (more than 250 sworn officers) all struggle with uploading, categorizing, managing, and storing video evidence. From an on-the-street encounter to a drunk driver arrest, the video evidence taken with these body cameras is generating plenty of data.

This storage conundrum elicits many questions from police agencies nationwide. Here are six common questions we get from police chiefs about video storage and evidence collection, and how to solve the challenges of this new ocean of digital evidence. Continue Reading…

Tags: , , ,

How small businesses can ensure security in the cloud

Trend Micro SaaS vs. securityThe small and medium-sized business (SMB) landscape is defined by its competitiveness. These dog-eat-dog dynamics force business leaders to trim costs, improve worker productivity, and create new, sustainable business models. That’s why almost 90 percent of businesses want a cloud environment and adoption is expected to double in the next four years.

But many small business owners remain on the sidelines, wondering if moving some processes and applications to the cloud is worthwhile. And many of the businesses moving to software-as-a-service (SaaS) solutions are making the same mistake, regardless of the industry: failing to improve their cloud security. Though we’ve come a long way in terms of protecting the cloud, risks always exist.

For some, SaaS might not even be necessary, and you won’t have to worry about the risks. But if you use SaaS applications or are considering them, an additional security layer on top of the built-in controls of your SaaS solution is smart thinking. Continue Reading…

Tags: , , ,

Why it’s time for spring cleaning of your data preparation process

Datawatch clean your dataIBM estimates that 2.5 quintillion bytes of data are created each day. Of course, your organization produces just a small fraction of that total amount, but it’s the most important data for your business analysts.

Unfortunately, finding what’s important is a major time drain. Data analysts spend 80 percent of their time manually sorting through data to compile spreadsheets. They’re copying and pasting data from one document to another, and building micros and formulas to process complex numbers. Most of this brute force work is time-consuming, expensive, and inefficient; manually preparing, cleaning, and consolidating data from different sources is a near-impossible task, not to mention the potential for error or bias.

Clean, accessible data is no longer a “nice to have,” but a critical business asset that drives compliance in the health care field, for example. The more data an organization collects from disparate systems and applications, the more complicated it becomes to process into clean, easily digestible spreadsheets. All organizations face data challenges, but enterprise organizations in particular are dealing with terabytes of disparate data from a variety of sources, both internal and external. Continue Reading…

Tags: , ,