Vology's Read Club | April's Top Blog Posts

May 4, 2017 Trent Brock

girl texting on phone.jpg

Will April showers bring May flowers? Only time will tell. For now, all we can do is revisit the month's most talked about stories. United Airlines faced backlash after a video showed a passenger being forcibly removed from a flight. After more than 20 years, Fox News forced out Bill O'Reilly amid sexual harassment allegations from multiple women. Samsung launched its Galaxy S8, nearly a year after the Galaxy Note 7 was recalled due to faulty batteries. While we count down to the the unofficial start of summer, let's recollect about Vology's five most viewed blog posts from April.

Redundancy vs. Resiliency

For the fourth month in a row, this blog has been a must-read. Will you have a redundant solution if you have redundant fiber optic connections between two buildings? No. Simple redundancy via two devices, systems, or fiber optic cable does not always result in resiliency. In this blog post, learn why your goal is to design a resilient solution.

Stacking vs Chassis Access Switch Solutions

If you need more than 48 ports in a closet, you’ve exceeded the capacity of the small fixed configuration switches. So, what is your next-best option? Non-stacking or stacking switches? A modular chassis solution? There are too many variables to give a one-size-fits-all recommendation, but this blog highlights the pros and cons of each option.

Top 5 Features to Look For in a Security Solution

Ask any IT professional and they'll tell you cybercriminals are more creative and dangerous than ever before. The fact is, hackers could easily put any small to mid-sized business out of business. Beginning today, start taking your network's security seriously. As you review your options for security solutions, this blog post will introduce you to the five must-have features.

Before Hiring A New IT Employee, Answer These 4 Questions

How many hours have you spent going through hundreds (or even thousands) of resumes to fill a vacant position your IT department? It's unnecessary. Before you waste any more time, this blog will prompt you with four questions that will offer insight into a better alternative that can save you time and money.

Start Protecting Yourself on Data Privacy Day

Data Privacy Day, held annually on January 28, is long gone. But the reality is, your personal information is in jeopardy 24/7/365. It's crucial to understand how data is collected, managed, and used. “Personal information has value – just like money," said the Michael Kaiser, Executive Director of the National Cyber Security Alliance (NCSA). If data privacy is on the forefront of your mind, this blog post provides nine suggestions on how to properly safeguard your personal information.

New Call-to-action 

Previous Article
Hope for the Best, Plan for the Worst with Disaster Recovery
Hope for the Best, Plan for the Worst with Disaster Recovery

Is this the year you create or update your disaster recovery plan? Is this the year you postpone...

Next Article
11 Hidden IT Risks Every Business Leader Should Know
11 Hidden IT Risks Every Business Leader Should Know

This is perhaps the most exciting time ever to work in IT. Transformative technologies abound, a...