The Art of Effective Agendas and why following them matters

In a world that seems to thrive on chaos and constant change, the age-old agenda might seem like an unnecessary speed bump when adaptability and the ability to be agile is such a valued trait. Well, not so in this writer’s opinion. In both personal and professional settings, the importance of good agendas, and possibly more importantly, the discipline to follow them cannot be overstated.  A well-structured agenda is crucial and adhering to it can make a significant difference to the health of your project. A good agenda serves as a roadmap for any business meeting or endeavor.  It outlines...

Continue reading

Uncovering the Hidden Node Issues

A Guide to Installing and Configuring APs for a Wireless Solution Introduction In today’s fast-paced digital landscape, wireless solutions have become integral to our everyday lives. From homes to businesses, schools to healthcare facilities, the demand for reliable and efficient wireless connectivity has skyrocketed. However, installing and configuring Access Points (APs) for a wireless solution can be a daunting task, especially when dealing with hidden node issues. In this blog, we will delve into what hidden nodes are, why they matter, and how to address them during the installation...

Continue reading

Wi-Fi Channel Overlap and Interference

Introduction There is a lot that goes into configuring a strong, healthy wireless solution, and one of those areas of focus is Wi-Fi Channel Overlap and Interference. However, it’s not a simple focus, it is multi-faceted.  Following are the high-level points that need to be considered and addressed. 2.4 GHz Channels The 2.4 GHz spectrum is in total only 100 MHz wide. While there are up to 13 channels that can be selected, only 3 channels (1, 6, 11) provide non-overlapping channels. Each of these channels have a width of 20 Mhz. Overlapping channels can lead to Co-Channel Interference...

Continue reading

Endpoint Lifecycle Management and the Tiny Pilot KVM

Introduction One of the services we offer our customers is Endpoint Lifecycle Management (ELM), which covers the provisioning and shipping of devices to end users, device recovery, and data wipe (for reuse, sale, or e-waste). The devices are stored, shipped from, and returned to warehousing facilities which have strict (SOC2) access controls that limit the number of people who can physically go on site. We use warehouse facilities in multiple countries including the US, shipping directly to end users in the US, Mexico, Canada, the UK, the EU, India, Australia, and New Zealand. In...

Continue reading

GCC High – Microsoft Offering

Commercial Microsoft 365 Overview Microsoft 365 is a comprehensive suite of cloud-based productivity and collaboration tools that include applications such as Microsoft Word, Excel, PowerPoint, and Outlook, as well as cloud-based services like OneDrive, SharePoint, Teams, and more. Microsoft 365 was designed to help organizations of all sizes and industries increase productivity, collaboration, and efficiency. With Microsoft 365, users can work on documents in real-time with team members from anywhere in the world, share files securely, and communicate through chat, voice, and video. Microsoft...

Continue reading

Basic Building Blocks of Project Management

“In our competitive world, across all verticals, many companies are going lean. Every dollar counts and head count can be one of the most expensive resources a company deals with. This leaves little bandwidth for people or departments to implement change, and change is necessary to a company’s success; without it they will lose their competitive edge and relevance in their industry! Most change comes via projects, and the success of each project is critical for growth and survival. Because of this importance, businesses of all sizes and in all markets are investing in project management.” I...

Continue reading

10 Year Retrospective

I heard a speaker once state: “Those who are invited to the most “games” in life are best equipped to foresee an enemy and know how to confront it before it reaches the gate.” When the speaker stated this, he was still admittedly perplexed by the connection between these tendencies. I am too, but I believe it is becoming clearer now for me in my arena of business With a considerable amount of time spent in the IT Consulting arena, I find myself looking back and trying to find cyclical trends; to anticipate the future prospective enemies at our gates and at the gates of our clients. Regardless...

Continue reading

NAVNET PARTNERS


  • Cisco
  • Cisco/Meraki
  • Palo Alto Networks
  • OKTA
  • Fortinet
  • HPE/Aruba
  • Dell/EMC
  • F5
  • Symantec
  • Rubrik
  • Juniper
  • ZenDesk
  • Microsoft Services
  • Information Security (vCISO)
  • End-User Security Awareness
  • BEI Construction
  • BEI Construction

Contact information

© 2022 NavNet. All rights reserved. Website developed by Nido Interactive.