Monday, March 16, 2015

Paving The Way - Workplace Solutions and Technology with EWT


Emerge Workplace Technologies (EWT) is a joint venture between LOTH Inc., based in Cincinnati, Ohio and Emerge Managed Solutions (EMS) a technology corporation based in Northern Kentucky. EWT was formed to address the influence of technology integration into the modern workplace. The newly created company provides consulting, design, installation and support of collaboration, presence and other technology solutions. With a strong understanding of the role technology plays in furniture design, EWT is uniquely positioned to deliver harmonious solutions alongside industry leading furniture companies, such as Steelcase and OFS brands, to achieve the goal of connecting people, place and technology to advance work and life. 

Jesse Kegley, Managing Partner of EMS answered a few questions about this ground breaking joint venture in the Cincinnati market about the success and challenges EWT has faced in its few short months in the market. 

EWT has hit the ground running. What is the big win for EWT and how has it affected Emerge?
So far we have many positive results from the start up of EWT.  I think the biggest win for EWT is in finding how relevant the EWT concept really is in our market.  Emerge and Loth spent a great amount of strategic effort in the planning stages of this new venture.  We identified the market opportunity and the value that is provided in combining workplace solutions and technology.  This value has been proven immediately through the immediate success that we are experiencing.

There was a clear vision for EWT. Since it’s launch, have there been any surprises or new opportunities that you did not anticipate?
We expected ultimate success upon the launch of EWT.  We were not as certain on the speed at which we would gain traction with the Loth sales team, and ultimately the customer base that Loth has.  To date the acceptance of the EWT concept and vision has been tremendous.  Emerge is being exposed to new end user customers through this venture, and together Loth and Emerge are providing a new level of value to the market through EWT.  All in all, we are pleased at the adoption rate even though it has been faster than anticipated.

Talk about competition, what is EWT up against in the market and in one to two sentences, what makes it different and unique?
EWT combines workplace solutions and technology into a single conversation.  To date, there are no other technology providers or workplace solution providers that can do this, in our markets.  By coming together as one solution, we are able to provide a more efficient and comprehensive solution to the end customer.  Bottom line, we simplify the buying decision for the client.


Thursday, November 27, 2014

How To Cut Overhead Costs Right Now

used with permission from Cisco Small Business Resource Center

Connect Remote Workers, Using VPN Security
Quick, name a business trying to reduce its costs.
If that's your company, would you let your workers use your network applications and data from outside the office?
Giving remote workers easy and secure access to your network with virtual private network (VPN) technology can result in big savings.
A VPN sets up a private Internet (IP) connection that uses encryption and authentication to protect the communications traversing it. Acting like private and exclusive tunnels from one place to another, VPNs extend your business to wherever it needs to go: home or satellite offices, shared workspaces, coffeehouses, or anywhere else your workers use their laptops, PCs, or IP phones. The right VPN solution just works.
Until now, most small and medium-sized businesses (SMBs) have been implementing VPNs for these two reasons:

1. Network security
VPNs meet the need to protect information assets, as well as to comply with privacy regulations.
"Network security is vital, even when a business doesn't have to comply with specific security regulations," says Randall Bennett, CEO of Secure Enterprise Computing, a Cisco Select Certified Partner. "We've seen the demand for security in the SMB market go up tenfold in the last two years."
"Our primary reason for going with Cisco VPN technology was security," says Kevin Tucker, IT manager for Birdstep, a technology company with about 100 employees. "We also wanted voice over IP, the ability to connect to multiple ISPs, and flexibility in controlling our firewall."

2. Productivity
Letting employees remotely access company applications makes them more productive.
"It makes it much more efficient," says IT Manager Shay Pickett of Brown Bear, a carwash/ convenience-store chain. Supervisory staff can connect via VPN to the office or any Brown Bear store from any location, increasing their management efficiency and reducing drive time.
"If I can connect to the company's resources at 7:30 a.m. instead of sitting in traffic burning fuel and 'windshield time', it's an advantage for everybody and the environment," says Bennett.
"We had 18 inches of snow recently," says Ryan Halper of Cynnex Networks, a Cisco Registered Partner. "Most people stayed home all week. And with our VPN, it was business as usual."
In today's economy, there's also a third reason to implement VPNs.

3. Lower costs
VPN technology can reduce your overhead costs for on-site employees; if you use contract workers, you can pare your labor costs too. For example:
Facility: Remote workers don't require your office space, or the monthly utilities, parking, maintenance, and insurance expenses that go along with it. In the United States, office space alone ranges from $1.25 (Paso Robles, California) to $7.00 (midtown New York City) per square foot per month. VPNs let you downsize your facility to the minimum without reducing productivity or customer service.
Equipment: You don't need to provide remote workers with office furniture, either. Contract workers also have their own computers, as do most employees who do some work at home.
Payroll: Using independent contractors relieves you of employee benefit costs, which averaged 42.7 percent of U.S. company payroll in 2007, reports CFO.com.

What Does a VPN Solution Cost?
Halper says the cost to purchase and implement a VPN solution for remote workers depends several factors: the number of VPN users, the degree of redundancy (the backup technology), the type of connectivity (data, video, and/or voice services; software or always-on hardware solutions), and the network security hardware already in place. He says that many companies start with basic systems and then later upgrade to solutions that include redundancy and voice service.
Halper provides these rough cost examples, which cover the purchase and implementation of a basic Cisco data VPN solution:
For a company with a few dozen users and a Cisco Adaptive Security Appliance (ASA) already in place, the cost ranges from about $80 to $120 per user.
For a company without such an appliance in place, the additional cost for a Cisco ASA 5505 would be about $1000 for 10 users.
Now, how many of your employees and contractors could perform their work remotely? How much will this save your business in overhead expenses? A Cisco reseller partner can show you the VPN solutions that will take you there.

Tuesday, November 25, 2014

How Security Pays Off

used with permission from Cisco Small Business Resource Center

Network security has become a requirement for businesses, especially those that rely on the Internet.
Your customers, vendors and business partners probably expect you to protect any information they share with you.

While network security has almost become a prerequisite to running a business, it also pays off in multiple ways. Here are some of the benefits businesses gain from a secured network:

Customer trust
Privacy is assured
Collaboration is encouraged
A strong security stance assures customers that sensitive information, such as credit card numbers or confidential business details, will not be accessed and exploited. Your business partners will feel more confident sharing data such as sales forecasts or pre-release product plans. In addition, the same technologies that keep intruders out can give your partners secure access to information on your network, helping you collaborate and work together more effectively.

Mobility
Secure access on the road
Promotes productivity while out of the office
Strong network security lets your employees safely access your network from the road or from home without introducing viruses or other threats. Secure, convenient network access means that employees can use critical information when they need it, making them more productive when they're away from their desks.

Improved productivity
Less time wasted on spam
Better employee morale and collaboration
An effective network security program can boost productivity across your organization. Employees spend less time on non-productive tasks such as sifting through spam or dealing with viruses. Your network and your Internet connection remain safe, ensuring you and your employees have regular access to the Internet and e-mail.

Reduced costs
Service disruption is avoided
Advanced services safely evolve
Network downtime is costly to all types of businesses. By ensuring your network and your Internet connection are safely up and running, you can be sure that customers can reach you when they need you. Effective security allows your business to add new services and applications without disrupting the performance of your network. Taking a proactive approach to safeguarding your data ensures your business remains up and running when it needs to be.
As your company grows, its networking needs will change. Establishing a strong, secure network today will allow your company to add advanced features such as secured wireless networking or a small office phone system.

Friday, November 21, 2014

Holiday Giving On An Epic Level

Just a portion of the over 4000 items raised in the
Emerge Food Drive
Every year, Emerge hosts a food drive, but this year was an outstanding success. So much so Emerge had to find multiple charities to donate the food too.

What was different this year? Competition. Each department was pitted against each other with the promise of a pizza and movie day, along with bragging rights for the following year.
Items will be brought to the Freestore Foodbank on Monday, but to make room in the office with the overabundance, Erica Freeman from City Merge came by the Emerge office today. City Merge is a local NKY organization in the process of applying for their non-profit status that hosts "Tent Day" in the Northern Kentucky communities of Florence and Burlington every Thursday. Tent Day provides food to local families in need year round.

"With this years success, there is no doubt that we will be following this format for years to come. We are overwhelmed with what we have accomplished as a team and how it can directly benefit local families." Kristen Brown, HR Generalist
Managing Partner Darron Scanlon and Project Manager Scott
Coleman load donated items for City Merge.

Thursday, November 20, 2014

Five Reasons Why Cloud For SMB

used with permission from IBM ForwardView

Talk to John Mason, IBM General Manager, midmarket, and he describes cloud computing “as really leveling the playing field like we’ve never seen in modern history,” for small and midsized businesses.
Businesses of all sizes are using cloud for some similar reasons—to save money, to gain access to computing power and to relieve some of the burden on their staff.

Why cloud?
As Mason sees it, IBM can now be even more relevant to small and midsized businesses, working with them to take advantage of technology and solutions that were once the domain of larger companies.
Cloud is making a difference for IBM clients such as nViso—a midsized business that helps retail clients analyze customer behavior for deeper insights. The need for scalability to make sure response-rate resources are available to meet demand is common in the social media environment, and it’s one of the reasons nViso chose IBM SmartCloud Enterprise as the platform for its API. “Having IBM as a partner brings greater security to the provisioning of services,” says Tim Llewellynn, CEO of nViso.
Today, the use of cloud computing is evolving beyond cost containment. Mason sees it as a shift to using the cloud to support systems of engagement—those front-office applications that often directly touch the customer and typically involve line of business executives.
Mason believes there are five top reasons small and midsized businesses should consider cloud now.

1. Cloud offers better insight
Fifty-four percent of leading organizations are using analytics to derive insights from big data, in turn helping them target customers and product opportunities more effectively; cloud provides greater flexibility and access to leading-edge analysis tools.
Cloud also helps organizations share data across applications, enabling insights to be developed from disparate data points—linking mobile accesses to a business’ web site with a local sales promotion to drive purchases, for example.
“The real challenge for the midmarket,” says Mason, “is figuring out how to get closer to the customer and be more relevant, more targeted—big data and analytics delivered in the cloud can do that with huge efficiencies for small and midsized companies.”

2. Cloud helps collaboration
Cloud allows work to be accessed from multiple devices and from anywhere, which in turn makes it much easier for teams to collaborate on shared data.
There’s also a perception that cloud divides IT and line of business into dueling camps. Mason says that cloud is actually bringing lines of business into closer collaboration with the CIO. “IT will have a point of view of how will [the cloud solution] integrate into our existing systems, what might some of the security concerns be—it’s not all driven by line of business.”

3. Cloud can drive better engagement
Using cloud to quickly and efficiently improve systems of engagement can mean forging a tighter link with the customer.
For example, if a sales executive wanted to trigger event-based communications based on customer actions, such as mobile device location or social media participation, she could do so by tapping into an existing cloud-based solution for sales and commerce—without a lengthy IT deployment, and possibly without any involvement from IT at all.
“Back-office optimizations and cost efficiencies are almost reaching their point of diminishing returns,” Mason says. “It’s more of the outbound, outward-facing connection points and optimizing that experience, primarily for the customer, to drive top line growth, rather than efficiency in the back office, which has been the emphasis of IT for the last couple of decades.”

4. Cloud is speed
Fifty-two percent of leading organizations are turning to cloud to drive more rapid innovation in products and services. No more waiting to make the cut on the IT department’s long list of priorities.
“We’re seeing solutions that line of business decision-makers can quickly implement and see value from,” says Mason. “[Cloud] is shortening the decision from recognizing a need to implementing a solution to that need; it’s short-circuiting many of the traditional elements of ‘how do I solve this problem.’”

5. Cloud benefits are measurable and you pay as you grow
From efficiency gains to improved employee mobility, leading organizations are able to measure significant benefits from their cloud investments, and can pace their investments so they avoid a big up-front capital expense and pay monthly as the business scales.
Mason says that cloud “removes a lot of the barriers of upfront capital investments—if you can pay for something as a service, as needed, by the hour or by the month, it negates the lack of in-house technology expertise and needing to buy, install and maintain technology on your own premises.”
Leveling the playing field—cloud, mobile and data
We asked John to describe some of the IBM investment decisions that really demonstrate the commitment to the plight of the start-up, the small and the midsize enterprises. Mason points to IBM’s 2013 acquisition of SoftLayer and the $1.2 billion investment in 2014 to expand its global cloud footprint.

“This was a huge indicator to me of IBM’s commitment to bring the benefits of cloud solutions to companies of all sizes,” says Mason. “Over the past year, we’ve seen that investment grow with additional data centers coming online around the world, and most recently, an agreement with Intel to bring new security features to the cloud.”
IBM SoftLayer gives clients the ability to choose a cloud environment and location that best suits their business needs. Mason says that, “the simplicity, flexibility and security of the SoftLayer offering is exactly what midmarket clients in particular are seeking.”
Looking to other playing field levelers, Mason first cites the IBM agreement with Apple as a way to help companies of all sizes take advantage of mobile solutions for their business. And then with a twinkle in his eye he added Watson Analytics to his list--the newly announced natural language-based cognitive service for data driven decisions. “It will give SMB clients instant access to the most powerful predictive and visual analytic tools available – and a freemium version will shortly be available for any business professional, regardless of a company’s size or location.”

“Where previously larger companies had an advantage, today it’s not really the case anymore,” says Mason. “You can argue that small and midsized companies don’t have the legacy technology to deal with and can move faster, be more nimble and more in tune with their customers.”

Tuesday, November 18, 2014

7 Steps For Safer Surfing

used with permission from HP Technology at Work

You might not think about it when you’re browsing the web, shopping online and interacting on
social media, but you are the first line of defense against cyber security risks. The power to be safe is in your hands, and at your fingertips. Developing and maintaining good habits can make online activity much safer, and more enjoyable for you and your colleagues.
The following 7 good habits take only minutes to learn. and are easy enough to incorporate into your daily work life.

1. Create strong passwords
Passwords are usually the first, and sometimes only, protection against unauthorized access. They are the keys to your online kingdom, so keep these guidelines in mind.
Many websites will let you know whether your password is safe when you’re in the process of creating it. Pay attention to that, and if the site indicates that your password is weak or not secure, create a better one.
Do not use your name, common phrases or words or acronyms that can be found in the dictionary—including foreign languages.
Avoid prefixing or suffixing your password with numbers or using known keyboard patterns like “Qwerty2.”
Stop making sense. Create passwords that use a variety of letters, symbols and cases so you’re less predictable to hackers and password-cracking systems.
Use a random-password generator app like 1Password to create and store unique passwords.

2. Lock your computer screen
You never know who might use your computer when you’re not around, so it’s important to lock your screen to prevent unauthorized access. In the office, a co-worker, guest, or a service provider might view or use your unattended computer. This is an easy way for private information to become public.
It only takes a few seconds to lock your PC. Just press the Ctrl+Alt+Delete keys and then select the option “Lock this computer.” For your smartphones and tablets, use the passcode feature, as these devices are just as vulnerable as your PC.

3. Secure mobile devices from loss
While mobile devices such as smartphones, tablets and laptops are valued for their portability, this convenience can become a security risk. It’s easy to lose or misplace these devices, so be sure to:
Make a list of phone numbers, and email addresses to report stolen or lost devices
Use a hardware cable lock for your laptop, or store it in a locked drawer
Keep smartphones and tablets with you when in public
Never put devices in your checked baggage when traveling

4. Protect data on mobile devices and removable media
Mobile devices and removable media, such as USB drives, enable us to easily share and transport information, but can lead to the loss or misuse of data. Although it’s important to protect the actual devices themselves from loss, it’s equally important to protect the information they contain by:
Turning on and accepting software updates
Creating regular backups of important data
Erasing all data before you discard, donate or give away a device
Encrypting all data, if possible
Using anti-virus software and keeping it up-to-date

5. Identify URLs before clicking
Simply stated: think before you click. A malicious website that looks legitimate is a common method used by criminals. However, verifying the real destination is easy—just place your cursor over the displayed URL, and the true destination will reveal itself with a small pop-up. Don’t click if it looks suspicious.
For URL shorteners like tinyurl.com and bit.ly, simply add a plus sign (+) to the end of the URL to display its true source. For QR codes, choose a reader app that allows you to preview the destination before opening the link. And when it comes to mobile apps and software, download from a trusted source, like Google Play, Microsoft.com or Java.com.

6. Use public Wi-Fi safely
Public Wi-Fi is riskier than corporate or home Wi-Fi because you can’t determine its setup and security features. So, take extra precautions when using it.
Do not access sensitive personal accounts, such as financial accounts
Ensure websites use HTTPS and display a lock icon
Watch out for “shoulder surfing” from people and security cameras
Never use a public computer, such as one in a hotel lobby, to access personal information
Use only for general web browsing, e.g., weather forecasts and restaurant reviews

7. Think before you post to social media
Social media provides a convenient, fun way to stay in touch with friends and family. But be cautious about what you post. Understand both personal and business risks, and take the following precautions.
Always comply with your company’s rules for business conduct
Ask friends and family to keep your personal information private, including relationships
Be cautious about participating in games and surveys or clicking on links suggested by others
Review and update your social media privacy and security settings often

Use daily
Bad habits might die hard, but good habits can protect you from cyber threats. You are the first line of defense in protecting yourself, your colleagues, and your devices against security risks. And as criminal methods and tactics are becoming more advanced, it’s more important than ever to establish and maintain good security habits.