Archive of posts from 2019

Expedient Enterprise Cloud vs. On-Prem VMware

Expedient Enterprise Cloud vs. On-Prem VMware

Mike Garuccio
Read Time 9 min Read

The Business Case for Turnkey Infrastructure as a Service Just about everyone in IT has used VMware’s vSphere to build and/or operate an on-premise or colocated cluster at some point or another. vSphere enables you to take a group of hosts, form them into a cluster, and run virtual machines on top. vCenter server provides some great features like...

Cloud Migration Strategies - How to Choose the Right One

Cloud Migration Strategies - How to Choose the Right One

Mike Garuccio
Read Time 6 min Read

Choosing the Right Cloud Migration Strategy There are several different ways to migrate workloads to the cloud. As with everything in life, each approach has its own pros and cons, and works best in certain scenarios. The strategies described below are based on my experience in migrating client workloads to the Expedient Enterprise Cloud (EEC), which is a...

Lessons Learned from Central Ohio IT Leaders.org - The Importance of Community Involvement

Lessons Learned from Central Ohio IT Leaders.org - The Importance of Community Involvement

Steve Gruetter
Read Time 4 min Read

The Importance of Community Involvement With a great deal of help, I put together an IT leadership development program – Central Ohio IT Leaders.org – in 2017 for aspiring CIOs in Central Ohio.  The following message is my effort to share what I’ve learned from the tremendous CIO guest speakers that have presented as part of the program. Central Ohio...

Point-in-Time Recovery Using Zerto Journal History

Point-in-Time Recovery Using Zerto Journal History

AJ Kuftic
Read Time 2 min Read

User Error/accidental deletion, system corruption, hardware failure, ransomware infection, malicious employees… your business faces internal and external security threats every day. Having the right IT tools in place and the knowledge to leverage them effectively is critical to your ability to mitigate these threats effectively and ensure continuous business operations and data protection. For example, point-in-time recovery (PITR) –...

Are you incentivizing the wrong IT behaviors?

Are you incentivizing the wrong IT behaviors?

Doug Theis
Read Time 5 min Read

Most of the C-Suite professionals I meet with these days have moved away from the old “IT as a cost center” talk and more towards “IT as a business enabler” thinking. But C-Suite and IT leaders’ actions don’t always match up with words. From my perspective, here are the most common forms of incentivizing the wrong IT behaviors that...

Lessons Learned from Central Ohio IT Leaders.org - Three Pillars to Communicate Your Vision

Lessons Learned from Central Ohio IT Leaders.org - Three Pillars to Communicate Your Vision

Steve Gruetter
Read Time 4 min Read

Three Pillars to Communication Your Vision With a great deal of help, I put together an IT leadership development program – Central Ohio IT Leaders.org – in 2017 for aspiring CIOs in Central Ohio.  The following message is my effort to share what I’ve learned from the tremendous CIO guest speakers that have presented as part of the program. Central...

Collaboration Key to Dell Technologies' Cloud Future

Collaboration Key to Dell Technologies' Cloud Future

Jonathan Rosenson
Read Time 5 min Read

I attended Dell Technologies / World 2019 this past week. Held in Las Vegas, the show hosted its largest list of attendees yet. I’m told that nearly 15,000 people attended the conference to learn about the combined innovations at the family of companies that includes DellEMC, VMware, RSA, Pivotal, Secureworks, Virtustream, and Boomi. Expedient is a DellEMC Platinum Partner...