Nex-Tech Blog | Technology Tips and Tricks | Industry News

Which Social Media Is Right For My Business?

Posted by Megan Hawks on Jan 9, 2019 4:52:08 PM

 

Read More

Topics: Social Media, Carrier, Telecom Industry, Facebook, Google Plus, Snapchat, Linked In, Twitter, Instagram

The 2018 Calix Innovation Award Goes To...

Posted by Deborah Anderson on Jan 9, 2019 3:09:50 PM

Calix, Inc. has announced the winners of its 2018 Calix Innovation Awards. The winners, who represent six broadband leaders from three different countries, were honored at the sold-out Calix ConneXions Innovation and User Conference in October, 2018. Now in its eighth year, the Calix Innovation Awards recognize Calix customers who demonstrate outstanding creativity when leveraging Calix technology to deploy best-in-class services over the past 12 months. The awards showcase innovation in the use of cloud and software platforms, systems and services to transform business models, networks and the subscriber experience.

Read More

Topics: Carrier, Telecom Industry, Calix, Award

Oh, Deer!

Posted by Doug Kuntz on Oct 8, 2018 12:08:54 PM

Often, when I ask telecommunication providers who they use for their CALEA compliancy, I usually get that deer in the headlights look. Most remember hearing the acronym CALEA, but aren’t familiar with what it stands for, or they say, “I remember approving the bills, but not sure with who or why.”

Read More

Topics: CALEA, Telecom Industry

Are We All Insane?

Posted by Megan Hawks on Jul 11, 2018 4:58:04 PM

For years our businesses and services have evolved, but why hasn’t our marketing? Every living creature has to evolve, so shouldn’t our advertising plans? We continuously tell reps to do the same thing we did last year without a flinch. If we understand that times have changed and consumers have altered the way they consume information, why do we keep hitting the repeat button?

Read More

Topics: Carrier, Telecom Industry, Marketing

NTCA Highlights Nex-Tech's CALEA Compliance Service

Posted by Doug Kuntz on Apr 26, 2018 12:43:58 PM

In Februrary 2018, Nex-Tech was featured in an article from NTCA, the rural broadband association, for acting as a trusted third party (TPP) that assists telecommunication companies with compliance in the Communications Assistance for Law Enforcement Act (CALEA).

Read More

Topics: Telecom Industry, CALEA, Carrier, NTCA

Are you Focused on Being Productive?

Posted by Steve Riat on Apr 26, 2018 12:23:44 PM

My office is a time machine!  You may have heard me say this before, but some days it really does seem like I come in to work and the next thing I know, it is time to go home.  What did I do with 9 or more hours?  It is not like I was staring out the window or was caught up in some huge project that was in alignment with our company goals. I decided to spend time looking at what things I was doing and if they aligned with my HIBU (Highest and Best Use).  There were some startling findings.

Read More

Topics: Telecom Industry, Carrier, Solutions, Productivity

MATSS Replay

Posted by Doug Kuntz on Oct 26, 2017 12:03:12 PM

 If you're reading this and have never heard of MATSS, you might have missed out on the Midwest’s premier telecommunications showcase and seminar, hosted by Arkansas, Kansas, Missouri, Nebraska and Oklahoma Telecommunications Associations. This year’s Mid-America Telecom Showcase and Seminar (MATSS) took place October 16-18 at the Sheraton Crown Center in Kansas City, Missouri. As in years past, the MATSS organizers did a fantastic job bringing in quality vendors and speakers covering a wide range of products, services and topics.

Read More

Topics: Telecom Industry

Locking Down Server Security with HP Enterprise

Posted by Loren VonLintel on Sep 14, 2017 11:33:51 AM

Security is a looming issue for businesses. The threat landscape is increasing and attacks are becoming more sophisticated. Protecting servers at the software level is no longer enough. Businesses need to reach down into the physical system level to stay ahead of threats. With today’s increasing regulatory landscape, compliance is even more critical for both increasing security and reducing the cost of compliance failures. In the new world of hybrid IT, the lines are blurred and the perimeter is fluid, changing with the needs of the business. Internet of Things (IoT), for instance, is quickly changing the security focus from a pure software discussion to including hardware and firmware because of the proliferation of devices that must now be considered. Business protection must now happen from the edge, to the core, to the cloud.

Read More

Topics: Business Technology Watch, Telecom Industry

Knowledge Is Power – Remote Monitoring & Management

Posted by Olga Detrixhe on Sep 14, 2017 11:19:20 AM

If there’s anything for certain in IT, it’s that things are uncertain. Computers crash, software doesn’t work as it should, and small problems can easily derail your day to zero productivity. When that happens, the way that you respond can be the difference between a minor hiccup and a full- blown business interruption. What if you could catch and address those issues before they become a big deal? Wouldn’t it be great if that happened automatically, without you even having to get involved? This might sound too good to be true, but that is actually exactly what a Remote Monitoring and Management tool can do for you!

Read More

Topics: Business Technology Watch, Telecom Industry

Electronic Access Control, The Key to Securing your Business

Posted by Nathan Rohleder on Sep 14, 2017 10:59:20 AM

The use of electronic access control is gaining popularity as an approach to aid businesses in securing their facilities.  Access control has been in place since the invention of the mechanical key to keep people secured or locked out of areas.  Just like everything else, technology now plays a large role in today’s access control by eliminating the need to deploy physical metal keys through the use of electronic locking solutions.  Today’s systems allow detailed control over the physical security of the business by controlling who has access to the building, which doors they have access to, and at what times they can access that door.

Read More

Topics: Business Technology Watch, Telecom Industry