Are you more likely to go to a new restaurant if you see a commercial for it but have never heard anything about it, if a stranger posted a positive review online, or if you have a friend who recommended it to you? Assuming you trust your friend’s judgment, the obvious answer is taking your [...]Read the rest of this entry »
The goal of Electronic Health Records (EHR) is to reduce the need for transcription by collecting patient information such as demographics, progress notes, problems and medications, vital signs, past medical history, immunizations, laboratory data and radiology reports. However a recent survey of EHR users found that EHR service providers are not meeting expectations and that [...]Read the rest of this entry »
Purchasing new servers is an important investment in your company’s technology infrastructure. It can be hard to distinguish one “box” from another, and you may wonder why some computers and servers cost less than others that, on first look, seem “the same”.
Non-branded hardware, also called “white box” equipment, is assembled from parts purchased from a [...]
The overwhelming majority of small businesses (80%) with less than 75 employees use Microsoft’s Small Business Server (SBS) software. Despite its success, Microsoft will stop selling SBS 2011 later this year, terminating the life support cycle for the software.
Why would Microsoft kill such a successful product?
The advent of cloud computing is perhaps the single most [...]
The cost of unplanned IT downtime can be overwhelming.A recent report by the Ponemon Institute estimated that about $5,000 per minute is lost during an outage across industries and that the average issue last about 90 minutes. This is one important reason why you should carefully consider when it is time to replace your server, [...]Read the rest of this entry »
I was one of approximately 100 I.T. Professionals in attendance at the Hartford Security conference June 21, 2012 at The Crowne Plaza in Cromwell. It was a valuable day of information with two major themes repeated in all of the speaker’s programs:
Zero Day Malware
Bring Your Own Device (BYOD)
I will take these one at a time [...]Read the rest of this entry »
The classic buy vs. build question permeates many aspects of our business and personal lives. Whether we are talking about a personal residence, a commercial building, a new line of business, or a piece of software there is an analysis that we must do to weigh the trade offs and calculate the value of each [...]Read the rest of this entry »
On February 23, 2012 President Obama released the “Framework for Protecting Privacy and Promoting Innovation in the Global Digital Economy”. The main purpose of this act is so that individuals are able to control their own privacy settings. It is important for consumers to be aware of this bill so that they are aware [...]Read the rest of this entry »
On Thursday, February 16, 2012, Senior Network Engineer at ForeSite, Bill Reyor appeared on the Fox CT Morning Extra Show. In the segment Bill, along with William Genovese, appeared with Fox CT’s tech reporter Rick Hancock, to promote a free computer clinic put on by the New England Society of Information and Technology (NESIT), on [...]Read the rest of this entry »
ForeSite Has the Precise IT Recipe
We call it our “recipe.”
Since every organization’s IT needs are different, ForeSite’s recipe is the precise blend of IT support services your organization needs—not what we decide is right for us.
In short, this is called a “managed IT service.”
What is a managed IT service?
The generic concept of any managed service [...]