vSphere 5: The best VMware virtualization hypervisor yet

vsphere5

As soon as I read about the release of VMware’s newest hypervisor ESXi 5 back in the summer of 2011, I couldn’t wait to get my hands on it.  After several years of happily using the 4.1 platform, I was very curious to see about all the new enhancements that […]

Posted in VMware | Tagged , , , , , , , | Comments closed

Our Report from MIT’s Sustainability Summit

This past Friday, we had the pleasure of attending MIT’s 2012 Sustainability Summit.  The summit was a great opportunity to engage with individuals on the cutting edge of the sustainability movement and to learn about the emerging ideas and best practices that apply to the IT field and the industries […]

Posted in General, Sustainability, Training | Tagged , , , , , , | Comments closed

Google Apps for Business a Clear Challenge to Microsoft

Google-Coffee1

Last week, several of us here at Welsh Consulting attended an event sponsored by Google entitled “Coffee. Cloud. Conversation.”  The pretense was to discuss trends in cloud offerings, but the real agenda was to sign up new resellers and channel partners.  The highlight was a chance to chat with a […]

Posted in Cloud Computing, General, Microsoft | Tagged , , , , , , | Comments closed

Boston’s Recent Disaster Recovery Reminder

  Recent power outages crippled oper­a­tions for many busi­nesses in Boston. Unex­pected disasters like the recent NSTAR outage can result in computer system crashes and data loss. Does your company have a reliable data backup and disaster recovery plan? Welsh Consulting specializes in helping clients backup their data reliably and […]

Posted in Disaster Recovery, Information Security | Tagged , , , , , | Comments closed

Microsoft Critical Security Bulletin MS12-020

This morning, Microsoft released a patch to correct vulnerability in the Remote Desktop Protocol that can be exploited to run arbitrary code on a Terminal Server. Our team has tested the patch and are now scheduling 20 minute sessions to apply this to our clients’ Terminal Servers.  For further information, […]

Posted in Information Security, Microsoft | Tagged , , , | Comments closed

Welsh Employees Volunteer at Community Servings

Community servings 1

Recently teams of Welsh Consulting employees took the afternoon off to volunteer at Community Servings, a not-for-profit food and nutrition program providing services throughout Massachusetts to individuals and families living with critical and chronic illnesses.  For the staff at Welsh Consulting, a firm providing IT strategy and support to businesses […]

Posted in General, Press Release, Welsh Consulting Events, Welsh Consulting News | Comments closed

What’s 201 CMR 17.00 and Why Should You Care?

security photo

All Massachusetts businesspeople should know at least a little about the new state regulations with the not-so-catchy name of 201 CMR 17.00. In less than a month, the third and final phase of these regulations takes effect. The regulations require any business that handles sensitive personal information of state residents […]

Posted in General | Comments closed

Comcast Leads On Cryptographic Signatures

computer-security-240cs01031232

Thousands of domains owned by Comcast have been cryptographically signed according to a recent blog post by the company announcing the completion of its deployment of DNSSEC, or Domain Name System Security Extensions.  This is good news for businesses that want to begin signing their domain names, especially those dealing […]

Posted in Information Security | Tagged , , , , , , | Comments closed