header-blog.jpg

Blog

Let Us Tell Your IT Department’s Fortune

Posted on Aug 9, 2018 7:20:00 AM

You might not believe that Tarot cards, crystal balls, or tea leaves will give you a glimpse into the coming months or years, but we’re here to tell you what the future holds for your IT department. It’s not based on magic or spiritual beliefs or mystical communication. We base our predictions on the hundreds of organizations (and even more IT specialists) we’ve worked with over the last...

read more »

The IT Relevancy Diet

Posted on Jul 25, 2018 7:20:00 AM

According to The Washington Post, 4.5 million Americans diet annually. If you’re one of those health seekers, you’ve experienced the trials that accompany a major lifestyle change. More than likely you’re familiar with changing something about your diet at some point in your life. Have you ever thought about going on an IT relevancy diet? You might be wondering how you would even know that...

read more »

Is Michael Scott Preventing You from IT Relevancy?

Posted on Jul 18, 2018 7:20:00 AM

“You miss 100% of the shots you don’t take. – Wayne Gretzky” – Michael Scott

You might be asking what Michael Scott has to do with IT relevancy. There’s a clear tie between the “Michael Scotts” of the world and IT’s failings to contribute to organizational objectives on a real level, but to draw a clear comparison, we have to take a slight detour and explain what IT relevancy is and how it’s...

read more »

A Difficult Conversation About Campus Safety

Posted on Jul 11, 2018 7:20:00 AM

We’ve mentioned this before, but it bears repeating: If the definition of insanity is doing the same thing over and over again and expecting different results, the definition of futility is knowing the definition of insanity and doing nothing about it. We want to apply that concept to a serious topic that’s weighing on a lot of minds today: campus safety. 

For the sake of being open, this is...

read more »

The Curious Case of Interactive Whiteboards: What Can We Learn?

Posted on Jul 5, 2018 7:20:00 AM
read more »

We’re Taking Back the Word “Solutions”

Posted on Jun 27, 2018 7:20:00 AM

What does the phrase “technology solution” mean to you? For many vendors, it has become a blanket term for any technology that’s been sold and installed, but let’s think a minute about the actual meaning of the word.

read more »

The Vital Pillars Every IT Solution Needs

Posted on Jun 13, 2018 7:20:00 AM

In a recent article, we discussed the three major types of vendors that exist in the IT solution space. One of the biggest benefits of utilizing a partner is that they will strive to understand your business objectives first, then determine a solution that helps the organization achieve those objectives. Another significant benefit of working with a partner is that when they build that...

read more »

What Type of School Technology Vendor Do You Need?

Posted on Jun 6, 2018 7:20:00 AM

One incredibly important rule: Not all technology vendors are created equal. Many of the issues that stem from IT projects (which arguably don’t actually exist) occur because a school district hires the wrong type of vendor for the results they want to achieve. This misalignment between project objectives and vendor capabilities is incredibly costly and frustrating for everyone involved....

read more »

The Campus Safety Conversations You Should be Having

Posted on May 30, 2018 7:20:00 AM

This isn’t the easiest topic to discuss, but it seems that as soon as a tragedy occurs we all start having more serious conversations about safety precautions. While starting the conversation is paramount, the most important thing to consider is the type of conversation districts are having. Sometimes schools discuss budgetary restrictions or statistics of repeat incidents and lose sight of...

read more »

Network Security Shouldn’t be a Science Experiment

Posted on May 23, 2018 7:20:00 AM

As previously discussed, the days of installing a firewall with antivirus and calling your network secure are long gone. Thanks to an influx of connected devices from numerous sources and an expanding list of network-dependent systems (hello, temperature control and sprinklers!), the likelihood of a network breach is much higher than ever (and also more difficult to detect).

read more »

Subscribe to Email Updates

Subscribe to Email Updates

Recent Posts