A man in a suit is using a laptop with data on it.

As a professional you are in education because you have a vocation. You have the commitment and drive to succeed, and keeping your school successful requires all of your attention. However, you didn't go into education to be an expert in emerging technologies. Managing technology can be a real distraction and pull energies away from running your school. In addition,...

Read More
woman using her tablet

As Microsoft stops supporting Windows 7 from January 2020, what choices do you have as a Windows 7 user? While Windows 7 will work after January 2020– it won’t just “shut down”–as a business, you cannot afford to use the older version because it makes you vulnerable to security threats. That leaves you with only 2 options. Option 1: Purchase extended...

Read More
Coins piling upwards

We talked in an earlier blog about how not benefiting from economies of scale can hurt a small school’s abilities to take full advantage of technology. In addition to the cloud, another resource to get around these problems is the the outsourcing of certain tasks, including strategic technology planning to optimize the use of new technology. As background, the term economies...

Read More
Man network troubleshooting

Unless you are a Silicon Valley unicorn, smaller institutions, especially newer ones, usually face serious limitations to accessing the funds to finance significant capex investments. This can be a particular problem with the IT hardware necessary for the growth of the school as well as for backup and redundancy. Today we’re talking about two areas where hardware requirements create problems and...

Read More
Windows Logo

Microsoft has officially announced the “End of Life” date for Windows 7. It will come January 14, 2020. Windows 7 was introduced in 2009 and is one of the most popular versions of Windows. It is estimated that around 40% of Windows OS is 7. So, if you are one of the Windows 7 users, read this blog to understand...

Read More
Network Hacking

Investing in firewalls, anti-malware and data encryption software Firewalls and anti-malware tools can help you by keeping unwanted actors out of your IT network. These tools work by restricting access to only pre authorized users and these are primarily defensive measures. Data encryption software, on the other hand, is more proactive and works to code your data and store it in...

Read More
A cartoon graphic of a masked thief character with a red scarf breaking a lock on an SD-WAN system screen, implying cybercrime.

SD WAN - What’s up with that? So what is this SD-WAN that you have been hearing about? SD-WAN, the acronym for Software Defined Wide Area Network is a new take on the traditional Wide Area Network (WAN). A standard WAN’s goal was to connect users at a branch to a main campus or central office. A WAN is fundamentally hardware-based,...

Read More