Fibre Optic Internet South Africa

Fibre Optic Internet South Africa

Fibre Optic Internet South Africa

“Fibre is not a new technology, and has been around for almost a decade in South Africa. It’s only recently become more visible and available to consumers due to the increase in companies which supply it, as demand for faster Internet increases.

According to MWEB, fibre works through “fibre optic cables that use light impulses to carry data instead of the electrical impulses transmitted on traditional ADSL copper cables. The light bounces along thin glass fibre tubes at the speed of light, which makes it very, very fast”. So, apart from being an extremely fast form of Internet, how will fibre benefit the South African consumer?

Compared to our current copper cables, fibre is exceptionally reliable; it is not affected by weather conditions such as rain or extremely high temperatures, and it can handle 1,000 times more information than copper lines. As these cables are not worth anything in illegal sales, the threat of theft and financial damage is also massively reduced.

This is good news for both businesses and households, as it is financially more sound and convenient. For the average South African consumer, the days of loading and buffering are promised to be an issue of the past!”

h/t to for this info!


Why Is Fibre Optic Internet Faster Than Copper – and Better?

“Copper suffers from a significant signal-loss issue. To accurately read a signal, you have to know the exact moment the signal has stopped and the exact moment it began. As a signal is forced to travel farther, the difference between a start and a stop (zero and one) gets very fuzzy. Copper is best used for maintaining a continuous electrical current since it’s a great conductor. However, for signalling, it remains a very poor material. It’s still great for local networks, but not necessarily something we should be using for global communication infrastructure, considering that copper cables can lose 94 percent of their signal at 100 meters distance (this is the industrial maximum for signal loss through copper).

Researchers have recently been able to send data at 10 Gbps through copper, but at distances no larger than 30 meters.

Fiber, on the other hand, can theoretically send terabytes per second of data without so much as a 3-percent data loss over 100 meters. Two things are at play here: the signal retention and signal clarity. Not only do you absolutely know when the signal began and ended, but you receive a very strong signal across the wire. This allows communication at dizzying speeds so fast that most routing technologies still can’t process them fast enough.”


Keen to make the switch from ADSL to fibre? Click here to chat with one of our agents to see if your area is covered, and get a great deal with SwitchedOn IT today!


h/t to for this!

Does Voip slow down your business internet

Does VoIP Slow Down Your Business Internet?

Does VoIP Slow Down Your Business Internet?

“Depending on the choice you make in your VoIP communications, there may be some slowing in your Internet connection. However there are steps you can take to make this slowing as minimal as possible.

Here are the options you have for VoIP communication services:

You could purchase an IP Phone that resembles a normal phone or you can purchase an ATA, which allows you to plug in any normal phone and begin making calls.

You will also need to subscribe to a service provider who will make the connections through VoIP and your broadband connection for you.

The CODEC you decide you want to use for your VoIP service will also be a major factor on what bandwidth that will be taken up with your VoIP service. A smaller CODEC will run you about 30 MB where a larger one with is around 90 to 100 MB.

The way the VoIP works and why it affects the speed of your Internet connection is because the voice data, or packets will move along the existing network just as other data does. However, you can choose how high or low you want the affect to be on your Internet by asking the provider of your VoIP to up or down the quality to meet the needs of your broadband connectivity.

Some of the variables that take place in the quality and bandwidth use in your systems will work as follows:

  1. Latency- Latency describes the time that it takes for a packet to get from one location to another. Therefore, if there is too much traffic on the line, or if a voice packet becomes blocked behind a large data packet (that like an email attachment), the voice packet is likely going to be delayed to the point that the quality of the call is compromised. With this in mind, we know that the maximum amount of latency that a voice call can tolerate one way is between 100 and 150 milliseconds.
  1. Jitter- For the sound of the voice on a VoIP call to be intelligible, consecutive voice packets have to arrive at regular intervals. Jitter is the explanation of the degree of variability in packet reaching the set destination, which can be caused by bursts of data traffic or just too much traffic on the line. Voice packets can be at most around only 40 to 75 milliseconds of jitter delay.
  1. Packet loss- Finally the amount of packet loss is a common occurrence in traditional data networking systems; however, computers and applications are often designed to request a retransmission of lost packets. In the VoIP, however the process is to take the dropped voice packets and have them discarded, and not retransmitted. Voice traffic can tolerate less than a 1% to 3% for loss of packets before callers experience noticeable gaps in conversation.

When you consider the bandwidth usage, it is not directly proportional to the bit rate, and will depend on factors like the protocol that it is programmed to use. Each packet of voice data is contained within a UDP packet with headers and other information.

VoIP software or hardware may give you the option to specify which of the CODECS you want to implement for your VoIP service. This allows you to make a choice between voice quality and network bandwidth usage, which might be necessary if you want to allow multiple simultaneous calls to participate in using an ordinary broadband connection.

Designating the bandwidth priority use is also an important way to save as much bandwidth for the services you find most important. Quality is controlled with prioritization and the right Internet connection.”


Keen to explore implementing VoIP at your business? Click here to get in touch with us today!


h/t to for this great article!


CIO vs CTO – Know your IT Roles

CIO vs CTO – Know your IT Roles

“When you start talking about IT leadership roles and IT career tracks, the question that almost always comes up is “What’s the difference between the CIO and CTO positions?”

Here’s a quick breakdown of the distinguishing characteristics of those two roles.

Chief Information Officer – Defined

  • Serves as the company’s top technology infrastructure manager
  • Runs the organization’s internal IT operations
  • Works to streamline business processes with technology
  • Focuses on internal customers (users and business units)
  • Collaborates and manages vendors that supply infrastructure solutions
  • Aligns the company’s IT infrastructure with business priorities
  • Developers strategies to increase the company’s bottom line (profitability)
  • Has to be a skilled and organized manager to be successful

Chief Technology Officer – Defined

  • Serves as the company’s top technology architect
  • Runs the organization’s engineering group
  • Uses technology to enhance the company’s product offerings
  • Focuses on external customers (buyers)
  • Collaborates and manages vendors that supply solutions to enhance the company’s product(s)
  • Aligns the company’s product architecture with business priorities
  • Develops strategies to increase the company’s top line (revenue)
  • Has to be a creative and innovative technologist to be successful

Which Should I Choose to Employ – a CIO or CTO?

For all of the aforementioned duties to work, the underlying operating platform needs to be agile and plugged into the needs of key business stakeholders—all of which fall under the strategic remit of the CIO. In the age of digital disruption, the success of any business is highly dependent on these two complementary roles and their ability to deliver exactly what the business needs at precisely the right moment.

It is difficult to say which is better and for whom – but it is safe to say that a close working relationship between CIO and CTO is vital.

Keen to outsource your CIO or CTO roles? Click here to get in touch with us today!


CIO vs CISO – Who Does What?

CIO vs CISO – Who Does What?

“Every organization handles security differently, based on their needs and internal structure—but in some mid to large sized companies, both the chief information officer (CIO) and the chief information security officer (CISO) are involved.

The relationship between the CIO and the CISO is something that is often described as “sometimes adversarial” but “ever-evolving.” This is often due to the fact that CIOs and CISO aren’t always considered true peers; in some organizations, the CISO reports into the CIO’s business unit, causing a potential conflict of interest.

That being said, fostering a strong relationship between these two roles is simply critical in managing security and risk.

CIO VS. CISO: Who Does What?

CIO Role

Traditionally, CIOs have always had an information systems and digital management focus. They are the owners of the IT side of the enterprise and typically support the business with technology solutions. Today, CIOs help companies turn away from legacy solutions and out-dated processes in an effort to modernize technology in their organizations and always consider how to make processes more efficient. More recently, the role has evolved to include more cyber security-related tasks. Security tools are now frequently used in IT operations and embedded in day-to-day IT activities and processes. The CIO may, for example, ensure there is a secure process for Internet-of-Things-enabled applications in an organization—or they may look at how other organizations are handling their cyber security to benchmark their own organization’s performance using a security tool.


The CISO’s role is all about managing information security risk throughout the data lifecycle. This individual needs to know where the critical data is located, what the company’s risk threshold is should the data become compromised, and how to protect this data while supporting the business’ objectives. CISOs are instrumental in defining and implementing a risk management framework to properly govern, evaluate, and respond to risks involving the company’s protected data. They are also heavily involved in vendor risk management (VRM) of the organization’s third and fourth parties—for example, ensuring critical data is only accessible to those who need access to perform required tasks.

CISOs have, at times, held a reputation for being something of a “no” man—frequently rejecting what they consider to be unnecessary business risks—so some organizations simply cut them out of the decision-making process. With the rise of cybercrime and the evolving threat landscape, this scenario should be avoided. Today’s CISO should have a firm grasp on how to report on the risk environment both holistically and within the organization in order to give the board of directors the information it needs to make decisions.

CIO and CISO Working Together

Both the CIO and the CISO are there to protect and manage assets and information, but from two different viewpoints—and that’s a good thing. For example, today, the CIO’s function is to ensure systems and information available and accessible to whomever needs it—and the CISO’s function is to ensure proper controls are in place so that only those who actually need access to information are able, and the information stays where it is supposed to be.

A key part of maintaining a solid CIO-CISO relationship is ensuring that neither party blindsides the other. For instance, if the CIO takes information to a board meeting that seemingly “blasts” the security side of the organization without the CISO’s prior knowledge, that’s a quick way to erode the partnership. The only thing this will accomplish is cementing an “us vs. them” or a “CIO vs. CISO” mentality—which is futile. Be sure lines of communication are open and regularly used throughout this working relationship.”

What Does A CIO Do?

CIOs in large organizations typically delegate the oversight of day-to-day IT operations to a technology deputy and rely on a team of specialists to manage specific areas of IT. The role of the CIO continues to rapidly evolve as organizations become more digital.

The chief information officer at one organization could have an entirely different set of responsibilities from the CIO down the street. A very high-level definition describes CIO as “a job title commonly given to the person in an enterprise responsible for the information technology and computer systems that support enterprise goals.” It is the CIO’s job to innovate, collaborate, balance the IT budget and motivate IT staff.


What Does a CISO Do?

A CISO’s job is to increase shareholder value by protecting the company’s market share, revenue and brand. In order to win management support for security, they need to show how they have prioritized, modeled and priced risk. For each new project, they need to identify, analyze and evaluate the risks, measure the costs of securing the services and present viable options. This information helps decide how to allocate resources and also proves the CISO’s value to the company.

It’s important for CISO’s to prioritize what’s most important to the company and what generates the most revenue, then apply the appropriate security for that piece of the corporate world. They need to be able to develop a strategy for an overall architecture and delegate the technical responsibilities, all while still providing guidance and oversight.


Why both a CIO and CISO?

The CIO and CISO have different goals and are measured on whether or not they accomplish those differing goals. Though they may often be on the same page, they are going to disagree on occasion and tensions will sometimes flare. Should the CIO have the final say when that happens?

If a CISO reports directly to the CIO then they might argue that their advice is only being taken whenever and wherever it doesn’t directly contradict whatever the CIO already wants to do. While their CIOs would likely reply that they deviate from the CISO’s recommendations only when those recommendations would unnecessarily hamper performance and growth.

This suggests that an organization is better off from a security perspective when the CISO does not report directly to the CIO.

This doesn’t mean the CISO can’t be effective when answering to the CIO, just that the natural tension that exists between their roles is less likely to surface when it’s contained within the IT structure. If the CEO and Board aren’t aware when the CIO and CISO disagree, it’s then all on the CIO to determine which path to take between their differing viewpoints.

While their roles are entirely intertwined, it is always a great idea to have two similar minds on board rather than just one.


Need some help selecting CIO roles within your business? Get in touch with us today!

h/t to for this informative article!

Can I Use VoIP With WiFi

Can I Use VoIP With Wi-Fi?

Can I Use VoIP With Wi-Fi?

“The simple answer to this question is yes, but it’s a little bit more complicated than that. If you have a wireless router and network then you can use your VoIP phone in a wireless way. If you’re on the move, you can use VoIP via WiFi connections but you will need to arrange this with your VoIP provider and it may cost more.

Unfortunately VoIP is not typically ideal over WiFi. There are several reasons for this:

The main issue with VoIP over WiFi is that Wireless Networking is a half-duplex standard which means that a device can either transmit or receive at any given time. This provides a direct conflict with Voice conversations which tend to be bi-directional. The technology is kind of like trying to use a phone as a walky-talky where you have to hold the button down to talk and let go of it to listen. Wifi has sufficient bandwidth to cope with this somewhat, but it is far from an ideal medium.

The biggest pain-point of all VoIP (not just Wireless)  is Quality of Service. Nothing you run on your network demands more “real time” bandwidth than voice. Voice quality can be horribly distorted if any packet loss, delay or jitter is present on your network and that’s particularly bad news for WiFi (which is a slow, shared, contended media as described above).

To deal with these issues, VoIP traffic needs to be granted absolute precedence on your Wireless network over any other type of traffic or it will be very poor. This is one of the reasons that VoIP over Wireless tends to starve your network’s performance. “

If you need any advice on VoIP solutions, or business internet solutions for that matter – don’t hesitate to get in touch with us today!

h/t to linkedin for this excellent article!

Cover Image Credit: GetVoIP

Backups vs Disaster Recovery

Backups vs Disaster Recovery – Is Prevention Easier than Cure?

Backups vs Disaster Recovery – Is Prevention Easier than Cure?

“Data centre downtime means an organization can’t serve its customers and it can’t execute transactions, leading, potentially, to thousands of rands of lost revenue. Recent data shows that 76 percent of companies experienced an outage in the last year and only 13 percent of those outages were the result of natural disasters. Most “disasters” are related to human error and minor power outages, and the expectation is that data recovery should be fast without flooding, torrential rain, or other factors to address. However, using a backup solution to meet business continuity needs will not work. Data backup is simply not a comprehensive information and application recovery solution.

Common examples of backup methods include off-site tape and cloud storage. Many companies think these methods will protect them if there’s an outage or a disaster. The unfortunate reality is that while backup is generally inexpensive and convenient, it does not ensure quick recovery when a disaster occurs – it only ensures that the data is stored somewhere and can be accessed – eventually.”

What Is Backup?

To learn backup vs disaster recovery, start with the basics. What is backup? In short, backup is copying your files to another disk. This can be through a tape backup, a secondary computer, or a cloud hosted backup solution.

It is important to have a backup solution in place. Backup protects your data in case of theft (a single laptop to office break-ins), employee accidents (deletion of an important file), or a technical issues (crashed hard drive). With this protection, you can access a copy of your data and restore it easily.


What Is Disaster Recovery?

Disaster recovery is similar to backup but is used for larger instances. A complete image of your disk drives and servers are mirrored. The image allows you to restore the system quicker than reinstalling an OS and copying files.

Don’t get caught up on the term “disaster” and believe it has to be major incident. A disaster can be your entire network crashes and your employees can no longer work for the day (or longer). With a disaster recovery plan, your employees can continue to work by using the mirrored system. With your employees set, your IT works on fixing the problem with the original network.


Backup vs Disaster Recovery: How To Upgrade

While a backup is important, your company should upgrade to a disaster recovery plan to insure full protection. The first step is storing your backups off-site. You can do this through a cloud hosted backup or by storing your secondary copies in another location away from your servers. We recommend using a cloud backup system as it is the most reliable solution and easy to access. It has been reported that 50% of all tape backups fail to restore.

In the case of a disaster time is critical. Therefore, the major advantage of a disaster recovery plan is that it images your disk drives and servers. With a mirror of your system, you are able to recover faster and not wait for data to be copied. Virtual servers with the correct disaster recovery installed can be restored within an hour, if not minutes.

As always, test and check your backup system on a regular basis to insure it is working. Also test if your data can be easily transferred quickly and accurately. Run through test scenarios to ensure everything is working properly. If it is not, then take the time to fix it before a real emergency happens. Now that you have the details of backup vs disaster recovery you can make an informed decision for your company.”

To get in touch with experts who can help prevent – as well as restore in the case of disaster – get in touch with SwitchedOn IT today!

h/t to for this invaluable info!

Cover Image Credit: Server Cloud Canada

disaster recovery plan

Disaster Recovery Plan – Ensuring your Business Bounces Back

Disaster Recovery Plan – Ensuring your Business Bounces Back

Disaster recovery in IT encompasses various types of measures which can be included in a disaster recovery plan (DRP). Disaster recovery planning is a subset of a larger process known as business continuity planning and includes planning for resumption of applications, data, hardware, electronic communications (such as networking) and other IT infrastructure.

How Is Disaster Recovery Performed?

  • An analysis of all potential threats and possible reactions to them

Your DR plan should take into account the complete spectrum of “potential interrupters” to your business, advises Phil Goodwin, research director of data protection, availability and recovery for research firm IDC. (IDC is part of IDG, which publishes CSO.)

  • A business impact analysis (BIA)

To effectively determine DR priorities, put each major information system through a business impact analysis, recommends Mark Testoni, president and CEO, SAP National Security Services, Inc.

  • People

“A common mistake many organizations make in their DR plans is “too much focus on technology and not enough on people and process,” Goodwin says. “IT is an enabler. Never forget you’re not just recovering data and servers.” He recommends thinking about how to build a DR plan in the context of your entire organization. “What behaviors will you need from your user community? What do they need to get up and running again after a disaster?”

Also, identify by name the critical people charged with responding to a crisis, says John Iannarelli, a security consultant and speaker and former member of the FBI Cyber Division. Make sure you have their email, cell and home numbers. Make it clear who will be called in to work during a crisis. Know who you’ll call for help, such as law enforcement, and if possible, establish a relationship with authorities before a disaster strikes. And decide in advance who will speak for your company to the victims, clients and employees in the event of a disaster. “Know what you plan to say, how much you plan to reveal, and how you’ll reassure those who might be nervous of continuing business with your company,” he adds.

  • Updates

Another big mistake organizations make is not updating their disaster recovery plans after changes are made to their internal systems, such as major software updates, notes Mark Jaggers, a Gartner research director focused on IT infrastructure strategies. Your plan isn’t complete unless it takes into account all the technologies, systems and applications currently in use.

  • Priorities

“Identify what’s most important,” recommends Iannarelli. “Not everything in your business is worth saving or needs to be protected. Your proprietary information, of course, is. But any info that is for public release is not as important. Think of it as if your house were on fire. What would you grab as you run out the door?”

  • Regular practice drills

“Just having a DR plan isn’t enough, the plan needs to be regularly tested, and people need to practice procedures, just like a school prepares its students for fire and emergency drills on a regular basis. If not regularly practiced, the plan is ineffective.” 

  • A consideration of DRaaS

The growing practice of moving data operations into the cloud has helped give rise to disaster recovery as a service (DRaaS). These on-demand services from providers such as iland and IBM have made DR easier and more economical, which in turn is enabling more organizations to be better prepared for disasters, Goodwin says.


Need some assistance in planning and executing disaster recovery for your business? Click here to get in touch with us today!

h/t to csoonline for the great info!



Data Recovery from Hard Disk vs Cloud Storage

Data Recovery from Hard Disk vs Cloud Storage

Data Recovery from Hard Disk vs Cloud Storage

“The term “storage” is one of the most important factors associated with IT infrastructure setup for a business or individual. With time there has been a shifting trend till this day where we have the choice of choosing from a list of portable storage equipment such as the external hard drive, to a universally accessible cloud storage platform.

Cloud storage has been embraced well, considering the remarkable demand. Despite this fact, many organizations still get caught up in a dilemma of choosing between the storage platforms ie. a physical portable hard drive and a cloud based service.”

Both systems have their own distinct set of advantages and disadvantages, which we’ll be running through now:

Physical Storage vs Cloud Storage

We can likely all agree to the fact that both allow you to store data and make it available whenever required, though some IT experts and managers responsible for data security and risk mitigation do not advise having mission critical data stored over portable storage mediums. It’s the smaller firms that do not have dedicated IT departments would usually go that path until some sort of disaster strikes. The most common reason for choosing an external hard drive to store crucial data is usually the cost associated with it. Because external hard disks are cheaper and easily available, firms tend to be inclined towards this choice. But industry experts consider it as a risky choice for the reason that the disks might fail OR get robbed leaving them with nearly no option to recover the business critical data. It may even give rise to a chain of complications thereafter. Hence they rather rely on a cloud based server solution due to its ability to create multiple instances over the storage cluster.

Backup to Physical Storage Devices

Why do smaller enterprises opt for physical storage devices? Well the reason is pretty straight forward, ‘the cost’ (usually). Firms are able to save on the costs to some extent by choosing an external storage medium such as portable disks to secure copies of their data. Also, easy availability is one of the reasons for it to be so popular.

Benefits of External Hard Drives for Data Storage

  • The Cost Factor

“Hard drives are inexpensive nowadays. Users find good deals over popular sites, especially during festive seasons. Moreover, with the advancing technology, the hardware size of external storage devices is shrinking. So if you ever come across a situation where you need extra space for storage, all you need is procuring a new device and get going. Though a user doesn’t get a choice of scalability but they do have a lot of flexibility with it.”

  • The Processing Power

“With an evolving technology with better advancements being introduced every day, consumers today have USB 3.0 at the disposal. Devices compatible with USB 3.0 technology get to leverage higher transfer speeds reducing the time required to take secure a backup of crucial business data.”

  • Overhead Costs

“Depending on the storage requirements, consumers might have to invest, but it’s a one-time expenditure which is usually considered as an asset. Firms with lower IT budgets usually opt for procurement of hard drives as it’s an investment which is one time. This is quite the opposite if you’ve signed up for storage as service wherein an invoice pops-up every month.”


Disadvantages of External Hard Drives for Data Storage

  • The Risk of Theft or Misplacement

“Theft is one of the serious concerns with having your data stored on an external/portable hard-drive. We get to read and hear about news about thefts and robberies of some sort almost daily. Similarly, it’s quite possible that one of your competitors might try to get their hands on to the device that stores your confidential business documents. OR you are probably visiting some store while on your way back to home and you simply misplace the bag which has the storage device.

Since it’s an electronic device, there’s also a chance of its components to fail for any odd reasons. No one can really guarantee the recovery of data in such cases. You might call-in for data recovery experts or ship the device over to a third-party, which again involves the risk to data security.”

  • Security of Devices

“Be it physical or digital, security is one of the most crucial aspects in both storage types. Most users with no technical background wouldn’t usually understand the risks associated with the transfer of files via. an insecure medium. For that reason file/data encryption before transfers is strongly recommended.

We are well aware of the risks associated over the Internet, though scammers and fraudsters usually pose an increased risk during festive seasons, yet one must stay protected otherwise too. For online transfers, use of secure encrypted mediums can be a key to keeping your data safe from thefts.”

  • External hard drives Portability – A Risk in itself

“Unlike the device which is constantly connected to the computing machines, external hard drives are also portable, which means that they can get dropped, knocked, crushed. The connected storage devices, in fact the entire computing machine is cooled by means of fans. Whereas the external hard drive seldom have any temperature control mechanism, except the air ducts.”

  • Storage over a Cloud System

“Cloud is one of the most trending topics in the Industry today, wherein various services have been effectively built around it. Few of the popular services are PaaS, SaaS, DaaS, IaaS etc. We’ve even been using a few services on a day-to-day basis without knowing that it’s based over Cloud infrastructure. Few popular examples would be: Google Mail, Google Drive, Dropbox, iTunes, Google PlayStore etc.”


Pros of Using a Cloud based Storage solution

  • Anytime-Anywhere accessibility of data

“Referring to the examples above, with a cloud based solution you needn’t be dependent on a hardware device of any sort. If you wish to access your files, all that you need is an Internet connection, which now-a-days is easily available. The servers have strong encryption and firewalls, so whenever data is transferred to-and-fro, you can be rest assured about its security.”


  • Stronger Encryption over Cloud systems

“Most Cloud systems use strong encryption & security technologies across different layers within the system, i.e. Server, Network, Database etc. Plus you have the choice of sharing the essential levels of access by individuals based on their roles and expertise. This isn’t something which you can do over a hard drive, once one has access to it, the data can be accessed with a single click of a button.”


  • Ease of Shareability

“With a cloud platform to host your files, it’s easier for you to share it, that too in a secure manner. Plus you can share specific files and folders which are hosted over the storage server while other files and folders can stay hidden from the recipient, which further increases the security of your data.”

  • The Cost Factor associated with Cloud Storage

“Well, this aspect basically relies on the ‘demand and supply’ rule. If the demand is more the supply would be slow initially but eventually that grows too. Once equilibrium is attained, the cost associated with Cloud services reduces too. That’s also because an increasing number of service providers start investing in this model.

Today IT companies and service providers have started offering cloud services on a pay-per-usage basis, so one would only need to pay for something that’s used, unlike the traditional fixed billing cycles where a consumer would have to pay a fixed amount for a usage period irrespective of the usage. Plus, one can also expect other benefits with the service, so in a way consumers get multiple advantages at a mere price.”

Cons of using Cloud as a Storage Platform

  • Speed and Performance over Cloud

“Since the transfer and synchronization is dependent over network speed and connectivity, users may find a difference in speed and performance levels of file transfers. This is an area where improvement can still be expected; rather many companies invest in research and development towards finding ways to make the process faster. Therefore, most companies recommend consumers to upload only the mission critical files over to the cloud. This keeps the file size to the minimum hence improving the transfer time and costs low.”

  • The Cost Factor

“As referred earlier, users get an advantage with using Cloud wherein they are only changed basis of the consumed resources. Eventually with time the data increases too, adding more to the expenditure. Therefore in order to keep the cost under control, one may choose to segregate the data based on its sensitivity and keep only which is utmost essential, while the back dated data can be stored over a local storage.”

  • Cloud Service Provider and Reliability

“Well, let’s get this thing clear, judging the reliability about a service provider involves some amount of research, there’s no shortcut to that. Until you have the required in-house infrastructural setup and the amount to invest in the other essential aspects required for supporting it, you’d need to depend upon a provider that best matches your requirements.”


To get in touch with IT professionals at SwitchedOn IT today, click here!

h/t to for the information sourced!


Cover Image Credit: PC World

Cloud Based Network Protection

Cloud Based Network Protection

Cloud Based Network Protection

“When it comes to protecting your business network, it doesn’t matter what size you are. Big company, small company, start up; hackers will still want your information and they’ll still stealthily poke holes in your network wherever they can.

You need to get security measures in place – and fast.

That’s why “security as a service” companies have become vital for anyone looking to deploy security for everything from documents to your entire business.

Security as a service can be loosely described as a “software as a service” security tool that doesn’t require any on-premise hardware or software distribution. Unlike older security tools, like anti-virus software that needs to be installed on every single computer on your network, it’s almost plug and play — you click a button (and likely put in some credit card information) and suddenly you’ve got major security resources at your fingertips.

These security services aren’t the same as an on-premise firewall that watches the network from a physical appliance attached in your data centre. These products promise to protect you from malware, help you keep track of who signs into your network, monitor all your other cloud applications such as Salesforce and Google Docs, and more.

Small businesses can benefit from this kind of distribution model because it doesn’t require a big IT or security teams to get it up and running. Of course, you’re trusting a lot of your security to another company, but in reality these security-focused third parties have more resources (read: time and money) to focus on security than you do.”

h/t to for this info!

How does Cloud Based Network Protection Work?

  • Secure the server

With cloud web security; traffic gets to the cloud instead of being routed to the servers directly. The cloud analyses the traffic and only allow the legitimate users to gain access. Any traffic that the cloud does not approve, it blocks it from getting to the server.


  • Inspects and filters data

The traditional systems have applications that filter data before it reaches the server. The applications are expensive and hard to maintain. They filter traffic after it reaches its network. Sometimes the machines get overwhelmed and may shut down to block both good and bad traffic, and they may not serve the intended functions.


Traffic is redirected to the security cloud first where it gets filtered before reaching the application system.


  • Data management and secured encryption

Encryption methods use complex algorithms to conceal and protect data. Cloud based security manages the identity of data and limits access from unrecognized applications that could decipher the encrypted files.


  • Compliance

Cloud based security has set compliance rules to be strictly followed to ensure the safety of the data base. They are bound by laws and regulations to maintain high standards of privacy and protection of client’s information.


Need some help in securing your network through cloud-based backups? Click here to get in touch with us today!

h/t to for this great info!

Data Migration vs Data Integration

Data Migration vs Data Integration: Know The Differences

Data Migration vs Data Integration: Know The Differences

Data migration: The process of transferring data between computer storage types or file formats. It is a key consideration for any system implementation, upgrade, or consolidation.

Data integration: Combining data residing in different sources and providing users with a unified view of them.

To delve a little deeper, Data Integration can be described and explained as a combination of technical and business processes used to combine different data from entirely separate – sources in order to turn it into valuable business insight.

This process essentially aligns, combines and presents each data store to an end-user.


Data Migration Explained

“Data Migration is the process of transferring data from one system to another while changing the storage, database or application. In reference to the ETL (Extract-Transform-Load) process, data migration always requires at least Extract and Load steps.

Typically data migration occurs during an upgrade of existing hardware or transfer to a completely new system. Examples include: migration to or from hardware platform; upgrading a database or migrating to new software; or company-mergers when the parallel systems in the two companies need to be merged into one. There are three main options to accomplish data migration:

  • Merge the systems from the two companies into a brand new one
  • Migrate one of the systems to the other one.
  • Leave the systems as they are but create a common view on top of them – a data warehouse.”

h/t to dataintegrationinfo for this info!

Data Integration Explained

“Data integration involves combining data from several disparate sources, which are stored using various technologies and provide a unified view of the data. Data integration becomes increasingly important in cases of merging systems of two companies or consolidating applications within one company to provide a unified view of the company’s data assets. The later initiative is often called a data warehouse.

Probably the most well known implementation of data integration is building an enterprise’s data warehouse. The benefit of a data warehouse enables a business to perform analyses based on the data in the data warehouse. This would not be possible to do on the data available only in the source system. The reason is that the source systems may not contain corresponding data, even though the data are identically named, they may refer to different entities.”

Data Integration Areas

Data integration is a term covering several distinct sub-areas such as:

  • Data warehousing
  • Data migration
  • Enterprise application/information integration
  • Master data management”

h/t to dataintegrationinfo for this info!


Need some expert advice on all data related solution? Click here to get in touch with us today!