OneNeck Blog

From ERP application management to cloud and hosting solutions, IT hardware and managed services, you’ll find it here on the OneNeck blog.

  • Azure Reserved Instances | Ensuring RIs Are Being Utilized Correctly

    Azure Reserved Instances | Ensuring RIs Are Being Utilized Correctly

    If it’s been a while since you have looked at Azure Reserved instances, now is a great time to revisit them. Not sure what Reserved Instances are for? Read on, you may just save some money.

    Read Article
  • How Much Risk is Too Much?

    How Much Risk is Too Much?

    For a long time, security initiatives have been driven by compliance mandates and a healthy dose of fear. But as threats continue to become more sophisticated, so must our efforts in...

    Read Article
  • Choose an IT Vendor | Review Managed Services & Colocation

    Choose an IT Vendor | Review Managed Services & Colocation

    Does selecting an IT vendor and deciding on the right direction for your company seem to get more complex with every conversation? Without a crystal ball to reveal precisely which...

    Read Article
  • When it comes to avoiding risk, what is OneNeck doing?

    When it comes to avoiding risk, what is OneNeck doing?

    Security is intrinsic to our services (for all customers) and organization (all the way to the president and CEO of our parent company TDS Inc.). It’s part of every service we...

    Read Article
  • Avoid Issues with Window/SQL Server 2008 Upgrade or Migration to the Cloud

    Avoid Issues with Window/SQL Server 2008 Upgrade or Migration to the Cloud

    Have you upgraded or migrated your server to the cloud yet? With SQL Server 2008 support having ended in July 2019 and Windows Server 2008/R2 support ending in January 2020, if you...

    Read Article
  • OneNeck an Environmental Leader in Colorado

    OneNeck an Environmental Leader in Colorado

    In a recent statement, the Colorado Department of Public Health & Environment recognized OneNeck IT Solutions, and its data center in Denver, Colorado, as an environmental leader in the...

    Read Article
  • How to Choose the Best Venue for Workloads | IT Strategy

    How to Choose the Best Venue for Workloads | IT Strategy

    If there’s anything that can be said about today’s IT environment, it’s that choice abounds, which is why we find ourselves smack dab in the middle of this hybrid reality in which we...

    Read Article
  • Key Takeaways From Oracle Open World 2019

    Key Takeaways From Oracle Open World 2019

    This year #OOW19 and #CodeOne had a different color and feel, with lots of exciting announcements from Larry.

    Read Article
  • Containers 101: Benefits of Containers & Differences Between VMs

    Containers 101: Benefits of Containers & Differences Between VMs

    Although containers aren’t new (been built into Linux for 10+ years and been available in FreeBSD, AIX and Solaris), containers seem to be all the rage, and for good reason. The agility...

    Read Article
  • IT Partner Bringing Value through Optimization Services

    IT Partner Bringing Value through Optimization Services

    Is your business racing to keep up and redefine yourself? It’s a situation most businesses face as they strive to remain relevant in today’s digital economy. And, they count on their IT...

    Read Article
  • HCI - Driving Real Business Results

    HCI - Driving Real Business Results

    Find out how converged and hyperconverged infrastructure can help transform your business. All businesses have to transform and adapt to do business in an increasingly digital world. But to

    Read Article
  • Cloud Backup vs NAS

    Cloud Backup vs NAS

    When it comes to selecting the best backup—NAS (network-attached storage) or cloud-based—there are a multitude of factors IT leaders must consider. To break it down, a recent TechTarget...

    Read Article
  • Components of Successful IT Security

    Components of Successful IT Security

    In its simplest form, compliance is about setting rules and following them, every time. No wavering, no audible—everyone simply follows the rules—every time. Seems easy, but it’s not...

    Read Article
  • 6 Ways to Relieve “Security Fatigue”

    6 Ways to Relieve “Security Fatigue”

    Do you ever feel that your non-IT co-workers are trying to thwart your security protocols – ignoring software update alerts, opening suspicious emails or not following password best...

    Read Article
  • 3 Components of Hyperscale Cloud Environment

    3 Components of Hyperscale Cloud Environment

    When it comes to setting up and running a cloud-based IT environment, businesses of all sizes (including small and mid-sized companies) can benefit from leveraging a hyperscale cloud. 

    Read Article
  • Reasons to Backup Office 365

    Reasons to Backup Office 365

    I need backup for Office 365? Isn’t it already included?  In short, no. The misconception that Microsoft fully backs up your data on your behalf is all too common.  To the contrary,...

    Read Article
  • Anatomy of Ransomware

    Anatomy of Ransomware

    Ransomware is a type of malware that threat actors use to infect computers and encrypt computer files until a ransom is paid. After the initial infection, ransomware will attempt to...

    Read Article
  • Wi-Fi 6 Is Here with Features Like Speed & Capacity

    Wi-Fi 6 Is Here with Features Like Speed & Capacity

    There’s no denying it – the wireless network is the primary way we connect to the digital world. In fact, it’s so big, that traffic from wireless and mobile devices will account for 71%...

    Read Article
  • Understanding Software-Defined WAN

    Understanding Software-Defined WAN

    Bandwidth needs are skyrocketing. To meet the growing demand, there is a transition underfoot to move away from traditional the wide area network (WAN) to the software-defined wide area...

    Read Article
  • Enhance IT Security with Analytics-Driven SIEM

    Enhance IT Security with Analytics-Driven SIEM

     Finding a mechanism to collect, store and analyze security only data is relatively simple. There is no shortage of options for storing data. Collecting all security relevant data and...

    Read Article
  • loading
    Loading More...