On the Path to Certification

ISO 27001 Certification As a project manager, I enjoy being a fly on the wall, and sometimes an active participant, in discussions between our technical teams and clients around implementation of information security solutions in various domains – whether it’s communications security, information security policies, asset management, or others – we approach all types of […]

CrossRealms’ Partnership with Varonis

Leading Data Governance Software We hear from our customers about their need for more analysis, security, management and ownership insight around their data. For example, what’s the best way to detect insider and security threats? How can they shed light on their dark data as well as email and document management systems? Or how do […]

To Simplicity and Beyond – Cohesity from the trenches – Part 7

2017 is shaping up to be a defining year for Cohesity. So far, they have succeeded in presenting a complete solution for all Copy Data Management, whether it be for backups (local and remote), disaster recovery, archiving, cloud, and Business Continuity. A client recently asked me to make a power point about Cohesity and when […]

Business Continuity as a Service – How it’s Done – Part 3

To continue the momentum we’ve created from the first Business Continuity (BC) blog, I’d like to explore some of the main concepts that were briefly touched upon. This is my 23rd year working in the field, so my earliest experiences are literally old enough to drink legally. I can tell you without a doubt that […]

Pure Storage Reinventing the All-Flash Array Market

Pure Storage has created a seismic shift in the All Flash Array (AFA) market. They recently launched the new FlashArray//m line that improves upon their already proven,  staggeringly high-performing arrays and combines that with the benefits of a 10+ year ownership model. Their entry-level //m10 model (for organizations with 10-25TB flash requirements) can be upgraded and expanded […]

Cohesity From the Trenches – week 4 – Incredible Data Reduction Results

For this blog, I want to report on the status of migrating our myriad of storage hardware, backup software, and media servers at our data center to our new Cohesity unit. First of all, let me describe the current environment. At our data center, we have around 70+ TB of primary storage and around 200 […]

New Partnership Brings Together IT Services and Structured Cabling

CrossRealms Inc., a Chicago-based IT services firm, and Telmon Inc., a communications infrastructure firm based in Kalispell, Mont., have formed a unique partnership to provide clients with one-stop shopping and ensure the successful implementation of every CrossRealms IT project. IT solutions require solid communications infrastructure, but these distinct and increasingly complex disciplines require different expertise […]

A Quantum Internet for Better Cybersecurity

Los Alamos National Labs has revealed their development and use of a perfectly secure quantum internet.  The theories behind this technology could be used to provide secure connections on a much larger scale. Basic quantum mechanics tells us that the act of measuring a quantum object, such as a photon, inherently changes that object.  So, […]

Windows 2008 R2 Fails at 96% during ESXi 5 P2V conversion

[vc_row][vc_column][vc_column_text disable_pattern=”true” align=”left” margin_bottom=”0″]During a recent P2V conversion of a Windows 2008 R2 server, I came across some errors that left me unable to boot from the newly converted disk. In Converter, there is a reference to a missing boot.ini: If you search the web, you will eventually find that this is related to something […]

Spam Email, Explained

Situation: Your mother/friend/sister emails you and wants to know why you are sending her pornography or solicitations to send money so she can be saved from the foreign country in which she’s been stranded.  Most spam like this is not coming from your account. It’s usually coming from someone else that’s using your email address.  In order to understand the […]