Flagship Blog

5 Ways to Enhance Your Customers’ Online Experiences

I don’t know about you, but when I’m doing research, or shopping online, I have pretty high expectations for how websites are supposed to perform. I expect them to be quick, responsive, intuitive, safe, and somewhat personalized. If not, I will close it and look for...

Strategies for Securing Your Business – Part II

Blog Series: IT Perspectives by Jaqui Lynch In our initial security blog we talked about what is meant by security and what kinds of assets need to be protected. One of the items mentioned was the detection and prevention of threats. In this blog we will discuss an...

The Importance of Fast, High-quality Web Experiences

As online channels—and specifically the mobile platform—grow, customer expectations for a superior online experience grow right along with them. If an organization does not provide customers and potential customers with the optimal experience they prefer, users can...

Strategies for Securing Your Business – Part I

Blog Series: IT Perspectives by Jaqui Lynch This is the first entry in a series of blogs covering the role of security in businesses today. When people talk about the fastest areas of growth in IT today we automatically think about cloud, mobile, social media and web...

5 Tips for Increasing Infrastructure Efficiency

Today’s IT departments face significant challenges from two opposing forces: the unprecedented growth in the information and applications required to run business infrastructures the shrinking of funds available for IT optimization projects This conflict has a direct...

Bluemix Shortens Time to Business Value

Cloud, analytics, mobile, social and cognitive—all new technologies—require rapid innovation and shortened development time. Working at “cloud speed” is becoming all-important as the cloud becomes the preferred place for developers to build applications. With that...

Mobile Device Management – Denial is not a Strategy

Still think smartphones are a fad? Are you convinced that tablets have just about run their course? Are you of the opinion that people shouldn’t be doing work wherever they go, anyway? Do you see yourself as a lone crusader for LYOD (leave your own device)? “Denial...

What Does Quality Technical Support Look Like?

</p> <h1>Managed Services</h1> <h2>Flagship Solutions Group can deliver efficiencies across hybrid infrastructures with&amp;amp;nbsp;a broad range of capabilities. We offer clients theflexibility to select the degree of support they want...

Launch New Apps with Speed and Confidence via Hybrid Cloud

The pressure from your competitors is mounting. You may not know it, or see it, but it’s true – especially in a digital sense. More than ever, organizations are focused on developing applications that deliver next-level customer experience and/or improve...

3 Key Considerations for APM SaaS and Analytics

The needs of modern applications, mobile users, and cloud services increasingly dominate APM (Application Performance Management) purchase priorities. Buyers are becoming more diverse and demanding, and important user groups now include not only enterprise IT...

What Good is a Cyber Security Strategy with Blind Spots?

Vulnerability management activities have long been a core requirement for organizations seeking to understand the extent of their exposures and overall security state of their networks. Yet many security teams continue to struggle when faced with the operational...

This Common Linux Practice is No Longer Best

Whenever IT architects, designers, and executives think about placement of new Linux applications on servers, the most common conclusion is to put the applications on x86-based servers. Frequently missing from the initial infrastructure decision-making process is a...

Capturing and Utilizing Data in Motion

Blog Series: IT Perspectives by Jaqui Lynch In my last blogs I talked about Big Data, the Internet of Things (IOT) and Data at Rest. As we learned, there are two main types of data that are of interest in a Big Data environment – data at rest and data in motion (or...

Hyper-Converged. Is it right for you?

Blog Series:  About IT, by Ed Turetzky There is a lot of discussion today about the hyper-convergence of processing power, storage capacity and network. Most of the discussion has been around a couple of newcomers in Nutanix and Simplivity that provide a data center...

Is Bare Metal Really “Cloud”?

The cloud computing industry is evolving. Cloud service providers like SoftLayer are finding ways to deliver the scalability and flexibility of virtual machines on bare metal hardware. But can we really call that “cloud”? Apparently yes and here’s why… Forrester...

Are Storage Arrays Dead?

Blog Series:  About IT by Ed Turetzky We have all grown up with the notion that shared storage requires a dedicated, specialized controller to provide both the performance and functionality necessary. Today we are seeing the move to everything being software defined...

Business Value of Managed Services

According to IDC research, the top 4 corporate imperatives of organizations today are as follows: Drive down operational costs Strengthen customer relationships Improve financial management Lead in product innovation and/or market position However, according to IDC...

Closed-Loop Risk Management

How IBM BigFix and IBM Security QRadar work together to fill in the gaps of cybersecurity With today’s advanced threats growing stealthier, more dynamic and more damaging, the need for integrated, intelligent, automated resources has never been greater. BigFix and...

Expand the Possibilities with Hybrid Cloud

The pace of business is accelerating. Mobile and social trends have influenced client engagement models, driving customers to expect new and better application services delivered faster. Cloud technology is helping businesses respond to these drivers by changing the...

The “Ripple” Effect of Downtime

High levels of IT integration and optimization are now the backbone of business success for organizations operating in every industry. New initiatives are designed to increase alignment of IT with business strategy, drive down costs and provide new business...

What’s Wrong with the Internet of Things?

Blog Series: IT Perspectives by Jaqui Lynch In my last blog, “What To Do With All That Data,” I talked about Big Data and how we define it. One of the key contributors to the need to work with Big Data is the internet of things (IOT). The IOT is where data...

Power Systems Put Your Data to Work

It’s no secret that dynamic technology changes are rapidly remaking how organizations do business. Technology is advancing so rapidly, in fact, that communities of collaboration are forming just to harness it all. The growing torrent of data from both within and...

Top 7 Benefits of Using Managed Services

In past blogs, we have discussed the “high level” reasons that managed services are a means to transformation. (Read: Utilizing Managed Services to Transform Your Environment) But to really understand the value, we need to dig into the benefits – cost savings, higher...

Cybercrime’s Epic Year

Contributor: Limor Kessom, IBM Security Looking back at cybercrime in 2015 leaves little doubt that the year was nothing short of epic. The IBM/Ponemon Institute report 2015 Cost of Data Breach Study put the average total cost of a data breach at $3.79 million, an...

Will You Disrupt or be Disrupted?

Cloud computing is a necessity and here is why: Your customers are making decisions at their fingertips via mobile apps. Your competitors are creating new business moments utilizing valuable insight from nontraditional data sources. You are missing out on new...