News

/News

Are you aware of the latest online scam that is costing businesses huge sums?

Phishing is the attempt to acquire sensitive information, such as: usernames, passwords, and credit card details, often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication. - Wikipedia (https://en.wikipedia.org/wiki/Phishing) At Aviator IT, [...]

By | March 11th, 2016|Security|

This Simple Tool Can Protect Your Online Accounts from Getting Hacked

A client of ours recently got an email from a security consulting firm that contained the username and password he uses for multiple websites.  This email explained that they had found his credentials in an online [...]

By | March 4th, 2016|Security|

Beware of the Lowest Bid on an IT Project

We work with a biotech company in the Bay Area that recently spun off a subsidiary to merge with an East Coast company. Politics being what they were, the East Coast firm wanted to stick [...]

By | January 28th, 2016|Business Strategy|

IT Sanity Saver #1

(This post is intended for IT professionals.) I know you’re running backups. But with IT resources being thin (or maybe the only real resource being you), you probably don’t have time to check them regularly. [...]

By | December 14th, 2015|Disaster Recovery|

Why Are Businesses Going to the Cloud?

We have seen cloud services become a greater and greater part of our consulting practice over the years, so we know that they appeal to our clients, but we are always curious about why businesses [...]

By | August 27th, 2015|Cloud|

Scott Jackisch on Product Management Talk Podcast

Many thanks to Cindy Solomon of ‪#‎prodmgmttalk‬ for letting me come on her podcast and talk to the product management community about cloud computing and futurism..

By | April 30th, 2014|Cloud|

Storage High Availability: The Achilles Heel of Server Clusters

Let me start by saying that storage high availability is not a feature that every business is going to need in their computing infrastructure.  Fault tolerant systems in general are arguably unimportant to businesses that can [...]

By | December 28th, 2012|Uncategorized|

What can small IT services providers learn from the big enterprise folks like GE?

I recently read this TechRepublic blog post about how GE is restructuring its IT practices to revitalize American manufacturing.  GE's new process is borrowing ideas from agile development and Gemba, among others.  One way to [...]

By | December 4th, 2012|Business Strategy|

Dedicated Hardware Hosting for Test Labs

It's essential to research a new technology before implementing it.  You need to read the documentation and scan the blogs and forums for gotchas.  Then you need to make a plan.  But ideally you would [...]

By | November 30th, 2012|Business Strategy, Cloud|

Amazon Glacier Will Be the Future of Online Backups

I was pretty excited when Amazon first announced its new Glacier product. This offering allows archiving of data at $0.01 per GB per month with a 3-5 hour recovery time. Now they have added a [...]

By | November 14th, 2012|Disaster Recovery|