• Support Representative I – DE, KY

    Support Representative I Support Representative I (SR) are the front line support staff for our customers. SRs are responsible for answering general questions and troubleshooting basic technical support issues, some of which can be performed by the customer through the customer portal. SRs will have the most verbal contact with customers and will be the […]

  • AWS DevOps Automation in the CLoud

    The Stelligent Approach to AWS DevOps Automation

    The quest to find more time to innovate is helping drive the adoption of DevOps — a software development approach that breaks down traditional barriers between Development and Operations to shorten release cycles and improve business agility. According to a 2016 RightScale survey, 74% of organizations report planning to adopt DevOps — up from 66% […]

  • Managing Microsoft azure Cloud Migrations at HOSTING

    Top 7 goals of Microsoft® Azure cloud migrations

    Finally, the cloud is top-of-mind, and you’re ready to move basic or advanced workloads to the cloud for critical applications that can help to make your organization and your cloud services more efficient, productive and competitive. But you face numerous challenges that keep moving the goalpost — from finding ways to protect your legacy IT […]

  • GDPR EU protocol cloud hosting

    4 Steps to GDPR Compliance in the Cloud

    The General Data Protection Regulation (GDPR) goes into effect May 25, 2018. While GDPR is an EU-established protocol, it affects any business worldwide that collects data on EU citizens. Non-European enterprises providing any form of goods or service to European citizens will need to comply with the new mandate. Is your company GDPR-compliant? While you […]

  • when cyber security is your disaster recovery dr strategy

    When Security is Your DR Strategy

    Both Disaster Recovery (DR) and Security/Compliance are critical aspects of your business, but many fail to see how these strategies relate to each other. For example, many security/compliance standards have requirements that speak to the state of the backups you’re running – i.e. Are they encrypted? How long are they kept? Beyond this simple example, […]

  • Taking a layered approach to ransomware protection, wannacry, wannacrypt, cyber attack

    A Layered Approach to Ransomware Protection

    The latest string of ransomware attacks, plaguing more than 100 countries worldwide, has many researchers scratching their heads as to exactly how it happened and how it spread so quickly. While the researchers are doing their digging, there’s one thing we do know for sure: there are steps you can be taking right now to limit […]

  • aligning IT with business objectives checklist KPIs

    Business IT Alignment Checklist

    Following is a checklist to ensure that you hit the mark as you work through the process of aligning IT with your overall business objectives. 1. Identify business drivers  Assess which business objectives require IT enablement (e.g., new product, acquisition of another company, etc.) 2. Create IT vision  Document the general guidelines or […]

  • define your IT objectives in a new way

    Define Your IT Objectives in a New Way

    The previous blog entitled Business Alignment Criteria presents six considerations you should collaborate on with your business colleagues before you begin the process of defining your IT objectives. Once the business alignment criteria portion is complete, you are ready to define your IT-specific objectives. Follow the steps and tips below below for guidance. 1. Understand […]

  • business alignment criteria six key areas IT

    Business Alignment Criteria – 6 Key Areas

    The alignment of business and IT objectives is a rising priority for many forward-thinking CIOs and technology departments. Executives are more interested in conversations about how- IT delivers value to the business and end user than just a technology discussion. Following is a deep dive analysis of six key areas where IT and the business […]