Which industries are going to be affected by big data?

The digital age has ushered in a level of information transfer that has never been seen before. A Cisco report predicted that in 2016 alone, the human race will generate more than a zettabyte of worldwide IP traffic. For those who don’t know much about data storage, a byte, as Tech Target describes it, can contain about a single letter of the alphabet. A zettabyte, on the other hand, is one sextillion or 10²¹ bytes. That’s a lot of letters zipping around the globe every year.

With all of this data creation, it’s not surprising that many within the field of IT are looking to analyze the massive piles of information out there to try to find patterns and trends. This is called big data analytics, and it’s become a hot topic in recent years. Until now, people hadn’t really dealt with data on the massive scale that the world is seeing now. As such, analytics experts hadn’t developed ways to sort through huge data dumps until recently.

As big data analytics becomes more popular, people are beginning to ask the question of which industries are going to be affected by this trend. While this is certainly an understandable inquiry, the real question is which industries aren’t going to be affected by big data. Just about every sector can benefit from analyzing massively produced data, and we’d like to take a look at some of the industries with the most potential.

“Those working outside IT can benefit from analytics.”

Insurance

Although a lot of people like to discuss the effects big data is going to have on the tech industry, those working outside IT can also benefit from analytics if they take the time to do so. Insurance is definitely one of these sectors, as agents within the field have to sort through a lot of information in order to assess risk.

Forbes contributor Bernard Marr brought up the interesting point of how big data analytics can help insurance companies set premiums for potential clients. He discussed how many insurance agencies install tracking devices in cars and use the information gained to analyze the driving behaviors of that specific client against the mass of data collected from other clients. Essentially, big data is helping to turn setting a premium into more of a concrete procedure rather than an educated guess.

Health care

As compliance standards such as HIPAA begin to accept more digital means of transmitting patient information, health care is increasingly seeing the benefits of big data analytics. Taking massive quantities of information and forming them into workable understandings of the current health landscape is going to be a critical part of the industry’s growth in the coming years.

One of the biggest areas with potential for big data analytics has to be the adoption of smartphones – and to a lesser extent wearables – into the general populace. About 68 percent of Americans currently own a smartphone, according to the Pew Research Center, which means a majority of U.S. residents are taking advantage of the ability to have a computer in their pocket.

These handy devices have a plethora of everyday uses, but one of the ways people are using them currently is to track their exercise and dieting habits. The number of apps that follow your activity levels are nearly innumerable, and all of them are gold mines when it comes to big data analytics.

Big data has serious implications within the health care industry. Doctors can seriously benefit from an analysis of health care data.

Imagine if doctors working on a cure for diabetes could see the dietary and exercising habits of the average diabetic. Years ago this would have meant intense research, followed by an even longer amount of time dissecting the results. Now, with modern technology and big data analytics, it is possible for diabetics to simply track their own activities via smartphones and upload that information straight to the doctor’s data storage method. Combining these specific studies with the millions of data points already created by diabetics using existing tracking applications like Glucose Buddy – an app that keeps a log of the food intake and activity levels of diabetics – could potentially allow for a breakthrough in the field.

Social networking

Although industries outside the tech field can obviously benefit from big data analytics, those within it are seeing endless possibilities for this unprecedented wealth of information. One of the most prominent areas would be social networking sites, which are known for their data storage habits when it comes to user information. Facebook is already using the comments and articles you like on the site to influence the ads you see, but many within the industry think these sites can go even further.

In fact, a recent study from Stanford showed that big data analytics has the potential to understand your personality better than your friends do. The study, which had a computer analyze what kinds of pictures and statuses a person liked on his Facebook page, attempted to find out how well a computer can get to know you personally. What they found was remarkable:

“Forget targeted ads.”

A computer, given only information from Facebook to match up against a personality inventory test of the participant, was able to guess personality patterns better than the participant’s friends and family. While this certainly has quite a lot of implications for sociology and psychology, this study shows the truly limitless power of big data analytics on social networking sites. Forget targeted ads; a properly calibrated machine is now able to comprehend the deepest workings of the human mind.

Although that may sound like something straight out of a dystopian novel, being able to fully understand the personality of an individual is immensely helpful in areas like criminology. Tens of thousands of felons could have their personalities tested in a much shorter time than one-on-one interviews, allowing for law enforcement officials to truly map out the mind of a criminal and discover preventative measures for the future.

The world is in the exploratory stages of big data analytics right now, and it’s really hard to know what’s going to happen next. That being said, it’s pretty obvious analyzing huge amounts of information could have serious benefits for multiple industries. Knowledge is always necessary for a society’s growth, and big data has the power to give people a level of understanding that has never been seen before.

ISG Technology: Who we are

We’ve spent a lot of time on this blog discussing what ISG’s services can do for you, as well as what kinds of specific problems we can fix. We’ve even done an opinion piece here and there about current trends within IT. What we haven’t done so far is explain what kind of a company we are on a more personal level.

As a modern company, it’s really important to us that you not only understand what we do, but who we are. In an effort to fully introduce ourselves to you, we’d like to explain the three guiding principles that drive our company’s innovation each and every day: people, technology and service.

“People come first.”

People

When it comes to business, even the business of technology and machines, people come first. When we’re considering initiating a business relationship with a company, the first thing we do is try to fully understand the people who work there.

The reason we do this is simple: We can’t figure out how to fix your problem if we don’t know anything about who you are and what you need from us.

For the average managed services provider, solving an issue starts with what the MSP can do to fix the problem, followed by how the company is specifically going to solve it and finally finishing with why that particular situation was a problem in the first place. While this gets the job done most of the time, we at ISG think these companies have it backwards.

We begin our problem analysis by first figuring out why this obstacle is in your way. Starting here works better because it allows us to fully understand all aspects of your particular situation, without coming in with any preconceived notions. After this, we begin to work on how we’re going to fix the problem, followed by a full and detailed investigation into what the actual problem is.

What this means is that you can rest assured ISG will solve the problem you’re actually having, and not the one you think you’re experiencing. While you may think you need simple malware removal – something ISG could easily provide for you – it may turn out that you actually need comprehensive firewall protection services. By figuring out why a situation is a problem for you first, we can diagnose the root cause of your dilemma and provide a solution based on your company’s specific needs.

Technology

Technology is evolving at a truly remarkable rate. The Pew Research Center found that in 2015, about 68 percent of American adults owned a smartphone. In 2011, that number was closer to 35 percent. In four short years, smartphone usage had almost doubled, showing how fully technology has been integrated into our everyday lives.

Technology is everywhere, and with around 84 percent of your American clients identifying as Internet users, being on the forefront of this revolution is absolutely vital to stay profitable. That being said, keeping up with the latest and greatest in technological innovation is extremely hard when you’re trying to run a business.

To anyone working outside of IT, something like server virtualization can sound like magic. Just wrapping your head around the concept of fitting multiple, virtual machines on a single server can be impossible if you don’t understand the finely tuned technology behind it.

Thankfully, our team of highly trained tech wizards can make this magically complex technology simple and easy to comprehend. With ISG, you can rest assured that you’re getting the technology your business needs, from experts who truly understand it.

ISG tech experts are extremely knowledgeable. Our tech wizards can help bring the magic of modern technology to your business.

Service

Although you obviously want a cursory understanding of the technology you’re investing in, we know that you want IT solutions to just work. You don’t want your business goals to be hampered by constantly having to figure out what’s going wrong with the services provided to you, and as such, ISG has always been focused on providing a quality service to all of our clients.

Whether it’s disaster recovery services, or even online backup of your mission-critical data, we value giving the businesses we work with the best product we can. Investing in ISG is investing in consistency, and nothing is more important to us than making sure your IT problems get solved as efficiently and as effectively as possible.

If you’d like to learn how ISG can help bring your business to the next level, make sure to check out the list of managed services we offer on our homepage.





Join the ISG Technology Team




BYOD in schools: Advantages and disadvantages

As highly advanced technology becomes more affordable, people are beginning to rely more on their own devices within the workplace. Using a smartphone or personal laptop for work purposes – a movement that’s been coined bring your own device – has been catching quite a lot of traction lately within the corporate world.

However, this trend isn’t just for businesses. Many people have suggested letting students utilize their own devices within the classroom as well. While this idea certainly has some good aspects to it, it also has some downsides. Here, we’d like to take some time here to discuss both so educators can have a fuller view of what a BYOD classroom would look like.

“The world is very quickly moving to a digital space.”

Advantages

Lower initial costs for schools
This is usually the first point of interest people like to focus on when discussing BYOD. The world is very quickly becoming ever more digital; as such, organizations need specific hardware in order to connect in an efficient and effective manner. This is just as true within schools as it is in the business world, as educators must make sure the next generation is prepared for the technologically advanced society that awaits them.

Gone are the days of classes in cursive, as they have given way to typing and coding courses. As such, many schools are struggling to stay current with the technology contained within their facility. With budgets being as tight as ever in most education environments, it makes a lot of sense to just let the kids bring their own devices.

The Pew Research Center stated that 58 percent of American teens had a tablet, while 73 percent of them personally owned a smartphone. These students could very easily bring their devices into the classroom, thereby increasing the number of usable machines while still keeping budgets low.

Students get to learn with familiar tech
A huge part of the educational process is connecting new knowledge with the old. It’s why students who are just learning how to write are asked to talk about their summer vacations and what they want for their birthday. It makes the process personal, and it is yet another big advantage to BYOD in schools.

When students use their own devices in school, they skip over that awkward part of class where they have to learn how to use the tech first before actually getting to the lesson. This not only wastes time, but it causes confusion that often is disruptive to the learning process. BYOD would allow teachers more time to discuss the actual lesson plan, while also increasing the receptiveness of the students.

BYOD promotes receptiveness in students. Students can learn more if they use their own devices.

Disadvantages

Disparaging to lower-income students
While BYOD is great for schools in more affluent areas, many regions of the country simply are not ready for it. Poorer students won’t have ready access to these devices, and forcing them to buy technology they can’t afford in the first place just to participate in the classroom simply isn’t an option.

While lower-income areas absolutely need technology-based learning within the classroom, doing so with a BYOD policy won’t work. Schools that work in these kinds of regions need to be aware of the financial situation of its student body and should therefore avoid implementing BYOD.

Can students be trusted with cybersecurity?
Poverty might be one of the most obvious of detractors from a BYOD policy, but the most poignant reason this trend might not work for your school is that teens are not exactly the most reliable in terms of policing their online habits. It’s not their fault, rather some teens simply don’t know how to avoid certain scams while using the Internet.

“16 million mobile devices suffered a malware attack in 2014.”

That being said, security is something to consider when thinking about a BYOD policy for your school. Motive Security Labs discovered that around 16 million mobile devices suffered a malware attack in 2014. Hackers are working constantly to access information stored on mobile tech, and allowing your students to use these devices for classwork could open your school up to a host of cyberattacks

Basically, school administrators need to come up with a system for making sure students don’t invite cybercriminals into their network. This could be the banning of certain high-risk websites, or even only allowing devices within the school to connect to a specific number of safe sites. Either way, it would be a mistake to allow students to govern themselves within a BYOD policy.

The verdict

When it comes to BYOD in schools, it really all depends on the facility itself and the people working within it. Enacting this kind of policy in a school is a lot easier said than done. There are a lot of variables to consider, and missing one tiny detail could result in a massive cyberattack that could cause a lot of damage to your facility’s reputation. That being said, there are also a lot of benefits to letting kids use their own devices. The monetary advantages are obvious, and teens are a lot more receptive to a lesson if they’re allowed to complete it using their own tech.

At the end of the day, it all just depends on what kind of school you run. If you have the time to police online activity and have a student body with a lot of personal devices, BYOD can do quite a lot for your school. If not, this trend might not be right for you and your students. BYOD is a fantastic move in the right direction for many corporate institutions, but implementing it within the educational space is going to take some time.

If you do plan on enacting a BYOD policy, you’re going to need some help. The cybersecurity aspect of this trend especially calls for professional experience, as your school’s private data is incredibly sensitive. Thankfully, ISG Technology can help you work out the kinks of a new BYOD policy. With years of experience helping people integrate BYOD into the workplace, ISG Technology can help bring your classrooms into the 21st century.

The ins and outs of mobile tech: What does it mean for you?

If you ask tech-industry experts what they think has been the most disruptive technology of the last couple of years, you’ll get a few different answers. Some will say cloud computing, and others will say virtual infrastructure. Quite a few, however, will simply say one word: mobile. Smartphones, tablets, smartwatches and the Internet of Things are all examples of mobile technologies that have changed the way enterprises, medium-sized companies and small outfits alike operate within the business world. Recent numbers from The Pew Research Center indicated that 68 percent of American adults own a smartphone, and that statistic is only going to increase as 2016 progresses. It seems that everything we do is now tied up in mobile or has a mobile component – including everything in the business world.

Why is mobile so important to the way we do business now? Let’s take a look at how this disruptive technology has had such an irreversible influence on how companies approach their IT infrastructure:

1. Business and consumer tools

Computing on the go has never been more important for our fast-paced society. Research is being done every day exploring the efficacy of these kinds of tools for consumers and companies alike. For instance, according to a new study from research firm Sequence, consumers are using their devices to make wish lists and spend time with family this holiday season. If given the chance, the study found, one-third of them would use the time saved by mobile shopping to stay in bed longer.

This is a fun example of how mobile tech has changed the way we look at things, but enterprises and SMBs are also benefiting more from devices like laptops and smartphones. Business can be conducted on the fly thanks to these kinds of devices – leading to an increase in productivity and improved outcomes throughout the business world. Bring-your-own-device policies are helping companies save money in overhead and operational expenses while at the same time giving employees the means to be more productive and more efficient.

Myriad kinds of mobile devices can be used to impact office productivity.Myriad kinds of mobile devices can be used to impact office productivity.

2. Security

As mobile devices have evolved to meet the growing needs of enterprises in every industry, so too has the technological landscape developed in order to accommodate their increasing use. BYOD is even one of the driving forces behind the endpoint security market, according to a recent report published by MarketsandMarkets. The endpoint security market is projected to be worth $17.4 billion by 2020, growing at a compound annual rate of 8.4 percent over the next five years.

This market is growing proportionately with the number of malware samples discovered every day by security teams around the world. Motive Security Labs found that 16 million mobile devices were targeted by malware in 2014. To negate these kinds of threats, it’s crucial for companies to make – and stick to – a BYOD security strategy.

This strengthening of the security space is a clear indication that the need to mitigate risks has been compounded by the introduction of mobile technologies into the workplace. When unknown employee devices are connected to the network, it can sometimes cause headaches for the IT department in the form of shadow IT. Networks sometimes aren’t prepared for the intrusion of different kinds of tech, which means there may be hidden vulnerabilities waiting to be exploited.

“Improvements in terms of productivity, efficiency and expense-cutting are well worth the risks.”

3. The good parts about shadow IT

However risky it may be to allow mobile tech on your network, the benefits can outweigh the disadvantages if you play your cards right. Shadow IT has gotten a bad rap (understandably) in recent years, but improvements in terms of productivity, efficiency and expense-cutting are well worth the risks. In addition, according to CMS Wire contributor Joanna Schloss, shadow IT can lead to the adoption of new technologies that work hand-in-hand with mobile tech. This in turn helps companies see better return on investment from these tools.

Navigating the ever-changing mobile tech landscape can seem daunting when you undertake this task by yourself. Partnering with a managed services provider like ISG Technology gives you access to trained professionals who know what they’re talking about when it comes to new devices and how to best use them to your advantage. We can also help you determine the best course of action in terms of increasing your security protocols and taking charge of your computing infrastructure.

Contact the experts at ISG Technology today for more information!

3 things the boardroom needs to know about disaster recovery

Keeping a business running takes a lot of hard work and effort from the boardroom. A modern company of any size has quite a lot going on, and executives are constantly busy with tasks that keep the money flowing. This generally means delegating work that isn’t of an immediate concern to other departments. A lot of the time, creating and developing a disaster recovery plan falls into the category of work that gets pushed to the IT department.

While your IT employees certainly know more than the boardroom about the operations of your technological equipment and data systems, that doesn’t mean you should avoid taking an active role in disaster recovery. A solid plan in the event of a catastrophe is vital to any company’s continued success, and as such there are a few things every executive needs to know about disaster recovery.

“Disaster is coming to your business.”

1. Data loss and downtime are an eventuality

When discussing disaster recovery in the boardroom, it’s important to realize that it isn’t a conversation about if you’ll need a plan, but when you’ll need to implement one. Talking about an event that disrupts your company’s ability to conduct business is uncomfortable to say the least, but pushing this discussion to the side as a mere possibility is unproductive and seriously dangerous. Whether you want to think about it or not, disaster is coming to your business. The question is whether or not you’re ready for it.

The 2014 EMC Global Data Protection Index supports the eventuality of downtime in the modern workplace. This survey of 3,300 IT decision-makers, which was conducted for EMC by Vanson Bourne, found that 64 percent of respondents had encountered a data loss event in the previous year. This alarmingly high number simply goes to show how important a serious discussion is about creating a disaster recovery solution. Bad things can happen anywhere at any time to anyone, and acting like you’re above these kinds of events will only make your company fall harder.

2. Outside forces are the least of your worries

When you think about the word “disaster,” what’s the first thing that pops into your head? Maybe it’s a tornado ripping through your company’s headquarters, or maybe it’s more subtle like flood waters seeping into your basement and destroying your electrical equipment. Well, when it comes to disasters that result in data loss, these events can’t hold a candle to what your employees can do.

Tornados aren't the only disaster you have to worry about. The worst disasters are a lot more discreet than a tornado.

According to the 2015 Data Health Check study conducted by Databarracks, the leading cause of data loss is human error. The report found that 24 percent of all data loss events studied had roots in people making some kind of mistake. Of course, this doesn’t mean you should stop trusting your staff. Your employees are the backbone of your business, working day in and day out to make the company successful.

That being said, no one’s perfect. People make mistakes, and sometimes these missteps end up costing the company big time. Your employees are in constant contact with company data, which means they are the biggest risk factor when it comes to data loss. This is why it’s absolutely vital for the boardroom to take an active role in disaster recovery implementation. While each worker is a vital cog in the machine in your company, they’re also a liability, and this risk needs to be mitigated with a solid disaster recovery solution.

“Your staff simply doesn’t know enough about disaster recovery.”

3. It’s cheaper to outsource

With the number of resources offered by the Internet, a lot of people are opting to work on something themselves rather than hire someone to do it. While this is fine when it comes to a new porch or changing your oil, developing a disaster recovery plan in-house simply isn’t a good idea. To begin, your staff simply doesn’t know enough about disaster recovery to implement an effective plan. Your IT employees obviously know more about your data systems than anyone else, but creating a plan that mitigates risk in the event of a data loss event may not be in their wheelhouse.

While this should be enough to convince you to outsource a disaster recovery solution, recent data from Computer Economics has found that doing so is actually cheaper than creating a plan in-house. The IT Outsourcing Statistics 2015/2016 found that 92 percent of IT organizations surveyed found that they spent the same amount of money or less outsourcing their disaster recovery plan than when they created one on-site.

This means that by creating a disaster recovery plan with your own employees, not only are you getting a less effective solution, but you’re also paying as much or more than if you’d gone to a disaster recovery expert. Obviously, your IT department is going to play a vital role in the creation of a plan in the event of a disaster. However, your company would be better served if these employees spent their time working on internal IT goals rather than developing the plan all by themselves.

Executives have a lot on their plates when it comes to keeping a company operational. That being said, the boardroom needs to take a more active role in promoting a solid disaster recovery plan for their business. Companies without a solid plan are a ticking time bomb, and if your enterprise doesn’t have a disaster recovery solution, now is the time to act. Thankfully, ISG Technology is here to help. Take a look at our Disaster Recovery and Business Continuity page and see why ISG Technology is a leader in disaster recovery solution development.

Involve IT in strategic planning

When it comes to ensuring business continuity and keeping all parts working properly, it’s crucial for communications between departments to be easy and effective. You especially want interactions between executives and IT administrators to be productive. In those conversations, if there is any kind of disconnect with either party, bottom lines could suffer.

How does the proper implementation of IT impact corporate objectives? Having the right technology solution in place can make a difference in the long run across the board, but decision-makers sometimes don’t consult their IT departments before investing in something new. According to InformationWeek contributor Andrew Froehlich, this may be due in part to the fact that new technologies are constantly coming out, sometimes so quickly that tech staff can’t keep up.

Shadow IT is creating cybersecurity vulnerabilities for enterprises.Shadow IT is creating cybersecurity vulnerabilities for enterprises.

Shadow IT is compounding this issue even further. With the continued implementation of bring-your-own-device policies, extraneous technologies make their way into companies’ networks. Employees are carrying their own smartphones and tablets into the workplace and downloading different – and perhaps unapproved – applications to use with their jobs. This creates cybersecurity and compliance issues due to the entrance of unknown actors on the network.

For instance, one study on the information systems of health care organizations from 2014 found that the average provider has 928 cloud services running on its systems – only 10 percent of which are known to their IT departments. In addition, only 7 percent of the total cloud are compliant with industry-specific standards. These kinds of statistics illustrate why it’s crucial for the IT department to be involved in the decision-making process of any company. To ensure compliance and maintain security, technology teams and executives need to be on the same page.

What’s the solution?

“Communication between IT staff and the executive board needs to be efficient.”

Different departments need to work together to elicit the best outcome for a business – meaning that to achieve the best bottom line, communication between IT staff and the executive board needs to be efficient. Computer Weekly contributor Marc Cercere noted that the agendas of both the business technology and IT departments are equally as important to focus on and improve.

For instance, due to the increase in shadow IT and the continuing focus on cybersecurity across every industry, the IT department should be consulted about any change to the business’s technology strategy. Instead of implementing tech “solutions” that may or may not solve a company’s problems, getting the go-ahead from the IT department allows every portion of the company to work in unison toward the same goal.

In today’s business climate, technology should align with corporate objectives. You want IT to work in your favor. If relationships within your business between executives and the IT department aren’t up to par, costly disconnect can occur and business processes can be hampered.

You want to make sure you’re keeping the IT department looped into the discussion about new tools and strategies, and that can be made simpler when partnering with a managed service provider. Get in touch with the managed services professionals at ISG Technology today to see how our expertise can contribute to your specific objectives.

Enterprise cloud computing vs. virtualization: When should you invest?

As companies grow, their technology needs expand with them. Decision-makers have their work cut out when it’s time to choose new IT solutions, and where and how to store your data is one of the biggest considerations an IT executive must make.

Consolidating servers using virtualization technology and migrating data and applications to the cloud are both options for companies to take advantage of as they increase their computing power and need to improve functionality. But, how do you know which option is the correct one for your specific business needs?

Managing your own virtualized infrastructure

Server virtualization has been touted for its usefulness in consolidating IT environments and making computing portfolios easier to manage. According to a study published by TechNavio in October 2014, the market for server virtualization and related services was projected to grow at a compound annual rate of around 28.1 percent over the forecast period from 2014 to 2018, indicating a clear demand for these kinds of capabilities.

When should you consider server virtualization? In the data center environment, consolidating servers into fewer pieces of physical equipment elicits a number of benefits. TechRepublic named reduced hardware cost, fewer hot spots and streamlined data backups as top advantages of deploying virtual machines in the data center. When you’re managing your own VMs, you also have the distinct benefit of not being locked in to a specific vendor, which is one potential issue with the cloud.

Virtualizing your IT infrastructure can be an important way to consolidate servers and cut costs.Virtualizing your IT infrastructure can be an important way to consolidate servers and cut costs.

When should you outsource to the cloud?

TechTarget noted that enterprise cloud computing can help companies lower operational expenses and further enhance collaboration with business partners. Indeed, Verizon’s recent 2016 State of the Market: Enterprise Cloud report found that 88 percent of IT executives surveyed said the cloud improves responsiveness to business needs, and 65 percent of respondents said it gives a boost to operations in general.

“The cloud improves responsiveness to business needs.”

Cloud storage services negate the need for you to operate your own server room to house all of your company’s data. By outsourcing this function to a cloud provider, it potentially frees up your IT team for other important tasks and can thus enhance the level of productivity in your tech department.

No matter which computing solution you choose, you should consult IT professionals before deploying your environments. Contact the cloud and virtualization experts at ISG Technology for more information about how we can pair you with the correct cloud solution for your specific business needs.

Virtualization: The time is now

Keeping up with the latest and greatest of technological advancements can be really hard to do, especially when you’re running a business. There are simply too many other things to worry about before upgrading, particularly if the old infrastructure is still getting the job done.

That being said, relying on older technology because it hasn’t broken down yet is an extremely inefficient way to run a business. This is especially true when talking about server virtualization. There are so many benefits to upgrading to a virtualized environment that we took some time to write up a list of why you should consider virtualization right now:

1. Reduce your ecological footprint

Everybody working in technology can attest to how much energy is consumed by IT systems every year. Time writer Bryan Walsh stated that in 2013, the “information-communications-technologies ecosystem” took up about 10 percent of the entire world’s electricity generation. He even went on to state that the world uses 50 percent more energy to move data around than it does keeping planes in the sky.

More energy is used to move data then to keep planes airborne. Entirely too much energy is used within IT and virtualization can help.

This massive amount of energy used simply for upkeep of physical systems shows the massive ecological impact server virtualization offers the world. Server virtualization takes multiple physical machines and brings them to the digital space, storing them all on a single piece of hardware.

This means we can get the processing power of multiple servers while only using valuable resources to power one of them. From purely an environmental standpoint, server virtualization just makes sense.

2. Reduce your costs

While you are most likely more than happy to reduce your company’s intake of natural resources, you’re probably more concerned about what server virtualization can bring to your company in a more financial space. This is yet another area where virtualized machines dominate their physical counterparts.

Having some sort of virtualized environment is going to seriously cut your company’s electric bill. Server virtualization is where you’ll see the majority of these benefits. A lot of server processing power goes unused when the machine is only running a single environment. By combining multiple servers on a shared physical platform, less overall energy is used. This accounts for a huge amount of savings.

Server virtualization can also bring about some great savings in terms of hardware costs. When you virtualize assets, the machines running your operations may be owned and operated by a managed service provider at its specific data center. These facilities are state-of-the-art, which means you’ll be able to benefit from the best hardware money can buy without actually purchasing it yourself.

Finally, but perhaps most importantly, virtualization can substantially cut the costs and complexity of a disaster recovery solution. The time it takes to recover after a disastrous event is severely reduced when operating in a virtualized environment. This has a lot to do with the fact that you won’t have to rebuild servers or applications after a disaster with server virtualization. The shorter recovery time will allow you to meet RTO/RPO goals at a fraction of the cost of a physical server.

“IT workers are generally spread pretty thin in the modern workplace.”

3. You get to focus on internal IT goals

For your IT department, this is going to be an absolutely life-changing benefit if and when you decide to embrace virtualization. IT workers are generally spread pretty thin in the modern workplace. Conducting business in this age means having the technology and systems to do so, and making sure those systems are running is a huge time sink.

A survey conducted by Forrester Research of IT professionals from more than 3,700 companies found that the IT department is constantly putting out fires, with an average of 72 percent of the budget being used for “keep-the-lights-on” functions. By utilizing server virtualization, you can push many of these problems off onto your MSP. While your virtualization provider works out the problems your server is having, your IT department can get back to focusing on internal IT goals. You get the experience of an MSP’s employees in terms of hardware maintenance and repair while also utilizing your own workers to build your business. It’s the purest definition of a win-win scenario.

If you’d like to see what else server virtualization can do for you, or if you’d like to learn more about this amazing technology, make sure to check out ISG Technology’s virtualization page.

ISG Technology's parent company Twin Valley deploys gigabit speed

A new article published by Broadband Communities Magazine recently shed some light on the hard work of ISG Technology’s parent company, Twin Valley. This telecommunications provider is unique, not only because of its constant need for innovation in servicing the community, but also because it’s been a family-owned establishment since 1947 and has grown to service 6,000 clients over 2,400 square miles.

Although finding a good old-fashioned family business in today’s corporate world is newsworthy enough, this isn’t the focus of Masha Zager’s article. Rather, Zager took a look at the amazing gigabit service that Twin Valley is providing to more than 2,000 businesses and residential homes in Clay Center.

Twin Valley: Always one step ahead

Considering the family business had the foresight to invest in data center and cloud storage services in ISG Technology in 2011, it’s clear Twin Valley has always seen the value of keeping one eye on the horizon. After reviewing the needs of their many clients, Twin Valley administrators decided that a gigabit Internet service was a good direction to head in. This service, which Twin Valley has named Pulse Internet, would provide speeds that were unheard of in the region.

Twin Valley has always wanted to be a leader of technological innovation.Twin Valley has always wanted to be a leader of technological innovation.

Other companies may have had trouble setting up such a feat, but Twin Valley has consistently seen the value of looking ahead. The fiber infrastructure that the business had implemented in 2008 was future-proof, meaning it could leverage this toward its gigabit service.

Clients couldn’t be happier

Zager’s article also focused in on the client side of this equation. Many times, when a company implements a new and innovative service, clients need a little time to adjust. Clay Center residents obviously didn’t need this time, as those provided with Pulse seemed overjoyed by it.

However, there’s something to be said about providing these managed services to smaller, tight-knit communities. Providing technological services like Pulse allows smaller communities to show their worth in the marketplace.Lori Huber, director of the Clay County Economic Development Group, noted that Pulse Internet is a “game changer” in terms of its Internet speeds. She also remarked that such innovation was going to push “economic growth opportunities,” which is something a community of any size can get behind.

Even President Obama agrees with this statement. While visiting Cedar Falls, Iowa, to view the city’s fiber-fed gigabit infrastructure, Obama stated: “You don’t have to be the biggest community to do really big things; you just have to have some vision, and you have to work together.”

Twin Valley’s perceptiveness towards technological innovation in the area of gigabit Internet obviously shows vision, but Scott Leitzel, vice president of operations and a board member on the Economic Development Group for Clay Center, also wanted to stress the company’s commitment toward working with the community.

“We’re privileged to empower our clients to do whatever they want to do – whether that’s to connect all their devices or run businesses out of their homes – all at an affordable rate,” he said.




Join the ISG Technology Team




Improved Service Delivery with NetApp, Cisco, and VMW

Client Profile

Meritrust Credit Union was founded 75 years ago to offer Stearman Aircraft Company employees and their family members an option to participate in a financial cooperative. Today the organization provides personal and business banking services to thousands of members across Kansas. Headquartered in Wichita, Kansas, Meritrust has 14 branches and a staff of 220 employees, plus more than 4,000 shared branches nationwide.

 

The Challenge

Building more flexibility into its IT infrastructure

As a credit union, Meritrust offers its members benefits that include competitive interest rates on deposits, lower interest rates on loans, and a broad array of member services. To deliver superior banking services that meet consumer and business consumer needs and foster member loyalty, the organization depends on an advanced  IT infrastructure. Having experienced significant growth in recent years, Meritrust demands a highly flexible IT environment that offers superior performance to deliver its applications to internal and external clients, adapt to changing market demands, and expand its services to remain competitive.

 

“Meeting the changing needs of our client is paramount to maintaining the level of member service that Meritrust is known for and [to] succeeding in a volatile industry,” says Cliff Shoff, director of Information Technology at Meritrust Credit Union. “We’ve listened to what our members want and are investing resources in areas such as extending our online banking and mobile banking services and Web-based offerings overall.”

 

In addition to providing the infrastructure to support expanded services, the IT department is focused on driving new efficiencies through an aggressive virtualization strategy. To continue on its growth path and keep delivering exceptional services to its members, Meritrust decided it was time to update an aging IT infrastructure. The previous infrastructure featured 30 standalone servers and a complex server-attached storage environment that was cumbersome to manage and costly to expand when needed to accommodate growth. Additional challenges included inconsistent performance in the storage systems supporting its business-critical Oracle Database 10g environment.

 

“Overall, FlexPod allows us to focus our efforts on the user experience rather than worrying about the back end, now that we have validated, integrated technologies.”

Cliff Shoff Director of Information Technology, Meritrust Credit Union

Meritrust engaged ISG Technology, an IT solutions provider and participant in the NetApp Partner Program for Resellers, to assist with identifying a best-in-class solution that would meet all of the company’s IT and business objectives. To accommodate growth, support its virtualization initiative, and enhance storage performance, Meritrust selected FlexPod from NetApp and Cisco with VMware technology. “The FlexPod data center solution made perfect sense for Meritrust,” says Randall Aronis, account manager at ISG Technology. “The components work together seamlessly by design, which simplifies management and offers a highly scalable growth path for Meritrust.”

 

The Solution

Supporting 14 branches from a single, integrated solution Meritrust worked with ISG Technology to deploy a NetApp® FAS3240HA storage system in its primary data center. NetApp storage is a component of the company’s FlexPod data center solution, a predesigned configuration comprised of a Cisco® Unified Computing System™ (UCS™) B200 M2 Blade Server, Cisco UCS Manager 1.4(1j), Cisco Nexus® 5000 switches, and NetApp FAS storage. The integrated FlexPod solution, with the addition of VMware vSphere and vCenter™ technologies, supports the credit union’s 14 Kansas banking locations and its account, investment, insurance, and other services.
Meritrust delivers its Oracle Database 10g environment—which is core to business operations—on the FlexPod solution. The IT team leverages NetApp multiprotocol support, particularly NFS connectivity, to maintain tight integration with the Oracle environment. The NetApp Data ONTAP® 8.0 system operating in 7-Mode is at the core of the flexible unified architecture that addresses Meritrust’s multiprotocol needs in a common platform. Meritrust IT uses data management software including OnCommand™ System Manager, Operations Manager, Protection Manager, and Provisioning Manager to control, automate, and analyze the storage infrastructure.
The company optimizes performance of its storage using the NetApp Virtual Storage Tier with intelligent caching from NetApp Flash Cache, which prioritizes critical workloads for fast response. “Performance in our Oracle environment was a key driver in selecting the FlexPod solution,” says Shoff. “Whether supporting Meritrust employees or our businesses and consumer clients around Kansas, FlexPod and the NetApp Virtual Storage Tier deliver the superior 24/7 system performance we need.”
The FlexPod data center solution supports the company’s Microsoft Windows® 2003 and 2008 servers, Linux® servers, Microsoft Exchange Server 2010, and Microsoft Windows MultiPoint server, which provides the interface between its debit card processor and Oracle Database 10g. FlexPod also supports the organization’s Citrix XenApp on-demand application delivery system. The FlexPod solution delivers the company’s virtualized infrastructure, running simultaneous mission-critical virtualized workloads including Microsoft SharePoint® and Microsoft SQL Server®.

Business Benefits Reaching 80% Virtualization
The FlexPod data center solution is helping Meritrust reach its ultimate goal of a 100% virtualized data center. To date, the IT team has virtualized approximately 80% of the company’s application environments, with 70 virtual servers deployed so far. The team has already eliminated 27 physical servers, with more to come. Virtualization and consolidation are reducing the data center footprint while decreasing related costs. “Prior to deploying the FlexPod solution, we eliminated 4 of 10 storage racks by the time we reached 50% virtualization,” says Shoff. “With virtualization from FlexPod, we’ve eliminated another 5 racks, which reduces storage costs by 40% and our power and cooling costs by 25%.”

 

ISG Technology notes the importance of technology innovation to Meritrust. “Meritrust was an early adopter of the FlexPod data center solution,” says Aronis. “As a preconfigured, integrated virtualization solution, FlexPod enabled Meritrust to see immediate returns in storage efficiency and performance, as well as management simplicity. And with the inherent flexibility in the solution, Meritrust can better provide the robust services that every consumer and prospect is looking to the credit union to deliver. The FlexPod data center solution from NetApp and Cisco with VMware technology allows Meritrust to deliver the right data to the right person at the right time in the right way. That’s the ultimate in flexibility.”
Improved performance, enhanced user experience

The NetApp Virtual Storage Tier with Flash Cache on the company’s FAS3240HA storage systems offers significant performance improvements over the previous storage infrastructure, particularly in the Oracle Database environment. The IT team runs Oracle Database batch processes nightly, which used to take 16 hours to complete. After deploying the FlexPod data center solution, the processing window decreased to 12 hours. Once the team installed Flash Cache, Oracle Database batch processing time dropped to 9 hours, eliminating the impact on weekday operations.
Other performance improvements include application delivery in the Citrix XenApp environment. “We deliver applications as a service to users across our company using Citrix XenApp,” says Shoff. “With the performance gains offered by NetApp, Citrix XenApp login activities that used to take up to 45 seconds now take less than 20 seconds. When you take into account 220 credit union employees accessing applications all day long, those saved seconds translate pretty quickly into improved productivity, not to mention an enhanced user experience.”
A simplified, transformed data center

Within the IT department, moving from infrastructure silos to the preconfigured, unified infrastructure provided by the FlexPod solution has improved the IT management experience for staff members. In the former server-attached storage environment, the IT team managed the complex storage environment from as many as five consoles. Today the team centrally manages computing, networking, storage, and infrastructure software. In addition, the open design management framework integrates with Meritrust’s existing third-party infrastructure management solutions for investment protection and management ease.
The team depends on NetApp OnCommand management software to provision, monitor, manage, and optimize the storage environment. The staff leverages NetApp Data ONTAP 8.0 to configure storage to deliver maximum efficiency and performance while saving on administration time. Featuring 64-bit aggregates, Meritrust IT can store entire databases on a single aggregate while simplifying database management. “NetApp Data ONTAP 8.0 7-Mode makes it much easier for us to resize and move volumes within aggregates, which previously required extensive IT time and resulted in wasted storage space,” says Shoff.
The team achieves additional storage efficiencies using NetApp deduplication, which has reduced storage requirements by 40%. Whether performing deduplication or other storage management activities, the team is benefiting from a noticeably more streamlined approach to storage management with NetApp storage and the FlexPod data center solution. Data center efficiencies result in more budget and staff resources for innovative projects that help Meritrust compete in a complex industry.

 

“The FlexPod solution is much easier to manage, and infrastructure changes take far less time.”

Cliff Shoff Director of Information Technology, Meritrust Credit Union

 

“Scaling up is also a breeze compared with our former storage environment, where we had to power down the system and work through a lengthy deployment process. With FlexPod, we simply add a shelf, plug in a few cables, create an aggregate, load it with volumes, and we’re good to go.” Easy provisioning enables the IT team to more readily respond to the needs of the business units it serves.

 

Adds Shoff, “We can deploy servers in minutes versus hours and quickly allocate storage space whenever needed to accommodate growing pools of data and deliver new applications and services. Overall, FlexPod allows us to focus our efforts on the user experience rather than worrying about the back end, now that we have validated, integrated technologies from NetApp, VMware, and Cisco providing the foundation for our credit union operations.”

 

“The FlexPod data center solution from  NetApp and Cisco with VMware technology
allows Meritrust to deliver the right data to the right person at the right time in the right
way. That’s the ultimate in flexibility.” – Randall Aronis, Account Manager, ISG Technology, Inc.