Unison Technology... Linking "heart" with technology
Unison Technology is dedicated to serving small and medium sized businesses in Southwest Ohio who want to make a positive difference for their customers and community, but too often find their technology investment is working against them and not for them. The technology is even becoming a hindrance that impedes the creativity, care and quality of the products and services their heart longs to provide to their customers and clients.
Unison brings extensive technical expertise and experience to work with businesses and organizations to create or restore a level of order. At Unison, we fully believe technology should be subservient to the greater good that is the heartbeat of each business and organization. We further believe each entity is unique and thus our approach is always one of careful listening and a partnership approach. We embrace the beauty that comes from understanding the vision and passion of each business and organization, thus bringing technology along side that vision with the same passion.
Unison Technology is all about people and building solid customer relationships. We would welcome an opportunity to help you realize your company's full potential using today’s technology solutions. Please contact us today to schedule a free consultation.
Is this for you?
Virtualization is a hot topic these days. As I have been implementing Microsoft server solutions for close to two decades, I was excited to try out their implementation of virtualization when it was first available. I was surprised to find how easy it was to implement. What I have found in the process and in the evolution of the Microsoft product is that there are many considerations, precautions and best practices to follow. As always, I am impressed by the Microsoft community of users that share their expertise and experience "in the trenches" to provide relevant guidelines to successful implementations. If planned thoroughly, the HyperV role, especially in Windows Server 2012 R2, is solid and performs well in production environments.
Supporting a HyperV environment is easier to manage than ever before. Many of the initial manual tasks required to ensure availability and recoverability are now more easily implemented with built in tools and third party applications which include, imaging, monitoring, failover and rollout. While the overall cost of hardware is not necessarily decreasing, the quality of hardware is and this allows the ability to decrease the number of physical servers, which drives down overall environmental costs.
I believe in this technology for use in differing sized businesses from small to large. Combining standards with the diversity to apply in very unique ways, makes virtualization a good fit for many.
2015 Security Predictions - Have They Held True So Far?
As 2014 came to a close, industry experts weighed in with their predictions for 2015. A number of these predictions focused on mobile devices in the enterprise, wearables and bring your own device (BYOD) policies. Nearly three months into 2015, how are these predictions holding up?
Say goodbye to EMM and MDM
Gartner’s Top 10 Strategic Technology Trends for 2015 claims that, “As mobile devices continue to proliferate, Gartner predicts an increased emphasis on serving the needs of the mobile user in diverse contexts and environments, as opposed to focusing on devices alone.”
While mobile security remains at the top of every CISO’s priority list this year, enterprises have quickly begun to realize that mobile device management (MDM) and enterprise mobility management (EMM) are not enough to keep data safe. Moreover, they do not provide much return on investment. With mobile security now a board-level discussion, the latter is increasingly important.
According to a recent Forrester blog by Tyler Shields, “It took just a few years for core MDM functionality to commoditize to a $0 price tag.” In my opinion, if you’re paying more than $0 for your MDM, you’re paying too much. Instead, follow Gartner’s best of breed technology recommendations. More organizations are doubling-down on application-level security -- adopting a data-centric approach, rather than a device-centric one -- to achieve better insight, visibility and security of their data.