What’s    in technology?
How’s yourIT staff?
Does your IT staff seebeyond the fishbowl?
TRAINING
RETENTIONvacationsrecognition
OUTSOURCING OPTIONS       backup for in-house       project based       full outsourcing
EVERYWHERE ACCESS
encryptionanti-virusanti-malware    consider WHAT is accessed and      from WHERE it’s accessed
STANDARDIZATION  across multiple     platformsCitrix | Google apps | Cloud
VIRTUALIZATIONVIRTUALIZATIONwhat is it andVIRTUALIZATIONwhen do I use it?VIRTUALIZATIONVIRTUALIZATION
Network ofphysicalservers
virtual server = less equipmentemail       tax         A&A      file                                        physical serve...
THE CLOUD                    What is it?      How do I keep it secure?        When is it necessary?photo by Alana Sise – f...
How do you getyour music?
 Anti-virus isn’t enough Anti-malware
Policy of least privilege
 Intrusion  detection /  prevention Network  access control
YEARLYTECHNOLOGY      PLAN     Goals reached     Quarterly goals      Research and       development
What’s new?
William L. Walter, MCSE   wwalter@gma-cpa.com   443.610.7413
Upcoming SlideShare
Loading in...5
×

Technology update seminar at BKR International meeting 5-22-12

396

Published on

Bill Walter, MCP, MCSE, presented a technology update on Tuesday, May 22 at BKR International’s Americas Regional Meeting: ‘Strategies for success in the changing economy’ in San Jose, Costa Rica.

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
396
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
2
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Technology update seminar at BKR International meeting 5-22-12

  1. 1. What’s in technology?
  2. 2. How’s yourIT staff?
  3. 3. Does your IT staff seebeyond the fishbowl?
  4. 4. TRAINING
  5. 5. RETENTIONvacationsrecognition
  6. 6. OUTSOURCING OPTIONS backup for in-house project based full outsourcing
  7. 7. EVERYWHERE ACCESS
  8. 8. encryptionanti-virusanti-malware consider WHAT is accessed and from WHERE it’s accessed
  9. 9. STANDARDIZATION across multiple platformsCitrix | Google apps | Cloud
  10. 10. VIRTUALIZATIONVIRTUALIZATIONwhat is it andVIRTUALIZATIONwhen do I use it?VIRTUALIZATIONVIRTUALIZATION
  11. 11. Network ofphysicalservers
  12. 12. virtual server = less equipmentemail tax A&A file physical servers V I R T U A L I Z AT I O N virtual guests virtual host
  13. 13. THE CLOUD What is it? How do I keep it secure? When is it necessary?photo by Alana Sise – flickr.com
  14. 14. How do you getyour music?
  15. 15.  Anti-virus isn’t enough Anti-malware
  16. 16. Policy of least privilege
  17. 17.  Intrusion detection / prevention Network access control
  18. 18. YEARLYTECHNOLOGY PLAN Goals reached Quarterly goals Research and development
  19. 19. What’s new?
  20. 20. William L. Walter, MCSE wwalter@gma-cpa.com 443.610.7413
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×