Whether you use Facebook to connect with friends and classmates across the country, or if you use Facebook to promote your business, we all know there are many intricate settings and restrictions on Facebook that can either help or harm our personal and professional brands. This is a story of one of those settings that isn’t helping any of us.
Finally after public demand, Facebook allowed users to create custom or “vanity” URLs in 2009. Users were then able to change the current random character URL (i.e. facebook.com/12956t78312qzb) to a custom address (i.e. facebook.com/johnsmith).
In addition to personal pages, any Facebook Fan Page can also get a custom URL.
However, there are restrictions users need to be careful of.
You are only allowed to change your personal URL twice.
·You are allowed to change the random character URL to a custom URL once.
·You are then only allowed to change your custom URL once again.
Fan Pages have even more restrictions on what can be modified.
Once you select a custom URL for your Fan Page you are stuck with it. You can’t change it. The only way to get a different URL is to delete your Fan Page and start all over again.
This restriction is done for security purposes (understandably) to limit hackers/phishers from modifying accounts or creating bogus pages.
However, there is a small subset of users who NEED to change their URLs. I am among that subset. I accidentally superimposed one letter in my URL and now have to live with a misspelled URL (which doesn’t make me look all that intelligent or professional).Although Facebook gave me the disclaimer that once I selected the URL I would be stuck with,I checked it twice and still managed to miss the typo.
I tried to see if there was someone I could call or email about it, and Facebook has NO channel of communication for customer support. You can search forums or speak with other Facebook users, but the company doesn’t really have a helpline to call (1-800-Facebook doesn’t exist – I checked).
I did find a direct line to Facebook online and after “dialing 1” for customer support; I was told “Facebook does not offer phone support at this time.”
What happens to users who represent their personal brands (consultants, actors, musicians) and they change their names? They can’t update the URL if they get married (or divorced for that matter) to reflect their new name?
Also what happens to a business if they merge with another company, incorporate, or completely rebrand?The inability to change their URL is a huge detriment to their brand. The only way to do so is to delete the profile and build a new one – meaning the 4,000+ fans they have garnered will be lost.
Facebook should do one of two things.
1)Have the developers allow for multiple URL changes.
2)Have a customer service representative available to discuss the situation to see if it will allot for a URL modification.
Either way – Facebook needs to relinquish some control so that users can fully customize their pages. Why should we have to deal with invalid URLs that don’t represent us correctly?
You insure your car, your house, even your pet. These measures are taken to protect your valuables from disaster. With data, not only do you have to have it insured (backed up using tapes, hard drives, cloud servers, etc), but you also need to have a Disaster Recovery (DR) plan in place that has been tested for reliability to assist your organization should a disaster occur.
What would it be like if your ecommerce organization’s website crashed for four days? Sounds horrifying right? Well, recently American Eagle® Outfitters experienced a system failure that lasted an unprecedented four days (followed by an additional four days of technical glitches)
An article from CIO Magazine recounted that American Eagle’s website went down when “atypical and concurrent failures [occurred] with IBM’s hosting servers and back up plans as well as with Oracle’s Data Guard utility program.” I’m not saying that websites don’t have their occasional hiccups, but four days is a massive detriment for a company whose ecommerce site is a large part of their business model.
The article quoted Brian Walker, a Forrester Research principal analyst urging other organizations to look at American Eagle as an example. “Get your responsibilities, processes and systems together now, test them, and correct as needed. Having a clear plan in and of itself will pay huge dividends in the event something happens.”
Senior Help Desk Associate at NSK Inc, Alex Straffin echoes the same sentiments. “Any type of Disaster Recovery plan needs to be tested in every way possible BEFORE the disaster actually occurs.” Many clients utilize NSK’s Backup and Disaster Recovery (BDR) solution that is managed by NSK. “We virtualize all of those clients’ servers off-hours for assurance as part of our ongoing BDR model,” says Straffin.
Straffin also notes:
DR plans are becoming more necessary as electronic business and ecommerce continue to expand. This is especially important if your site does not have any failover or redundant server configurations, and you are running high dollar, enterprise level ecommerce websites. A good DR plan will also include periodic verifications to assure that over time, your overall disaster recovery plan remains valid and ready to be put into action if needed.
The Bottom Line
As they say in the Scouts “Always Be Prepared.” Have a DR plan in place, that has been thoroughly tested, so should a disaster strike (knock on wood), you will know exactly what to do to reduce or eliminate downtime.
Reuters recently published an article claiming that malware has hit an all time high.They state that McAfee, the number two security software provider, found that malware reached a new record in the first half of 2010. Malware is software code that, when introduced into a system, can hack the computer, steal passwords and identities, and reap havoc on system performance.
McAfee says that 10 million new pieces of malicious code have been catalogued. What is most noteworthy of these findings is that Mac systems are becoming increasingly vulnerable to attacks. Apple users tout that Macs are virtually “insusceptible to viruses,” however as Macs continue to increase their market share, their vulnerability is also rising.
Android Antivirus
In similar news, the first Trojan has been reported on the Android Operating System for smartphones. The malware poses as a media player and once installed on the phone, sends text messages to premium text numbers inadvertently charging the user. Hackers are usually on the receiving end of the text messages, and thus profit from the rouge SMS messages.
According to the article, posted on Mashable.com, Kaspersky Labs is in the process of developing a mobile antivirus application for Android phones, due to be released next year.
The Bottom Line
You need to take precautions. Whether you are dealing with your personal computer or your organization’s infrastructure, steps need to be made to make sure your system(s) are secured.
Basic necessities include using a firewall, password protecting your WiFi, and having an up to date antivirus system installed (including Mac systems).
Additional steps, such as security assessments and security audits can be performed to make sure your organization isn’t vulnerable to outside attacks.
Most importantly, self monitoring is the key. Be sure to stay away from sketchy websites (including those not suitable for the workplace) and making sure you only download files from people or websites you know and trust.
Even though it may be your job to handle sensitive information, how you handle the data is just as important as how well it is secured.
One of the best ways to avoid any sort of legal snafu is to have a privacy policy in place. The policy needs to be all encompassing, meaning it covers EVERYTHING accessed on the company’s network (i.e. email, network drives, Twitter, Facebook, VPN connections from offsite, etc).
The policy should mandate guidelines of acceptable computer usage while using company resources (including all data).
A Security Assessment identifies vulnerabilities within an organization’s infrastructure and will then recommend solutions to secure the system.
A Security Audit installs an application on the network that is designed to identify, classify, secure, monitor and report on sensitive data. A manager is then notified every time the data is accessed so organization’s can track who is accessing sensitive data and when and where the access happens.
If you aren’t sure of your organization’s policy in regards to sensitive data, ask them. If they don’t have a policy in place – inquire about initiating one. This will help to safeguard yourself as well as the data you are in charge of.
InfoWorld just published an article about a recent survey conducted by the International Data Corporation (IDC). In the survey, IDC asked IT executives if they preferred Private Clouds in comparison to Public Clouds. The results showed that many companies expect to use a combination of both Public and Private Cloud services. The mixed use of Public and Private Clouds is also referred to as a Hybrid Cloud.
With a Hybrid Cloud, an organization has their own private (internal Cloud) with services running within their firewall. However, Hybrid Clouds allow users to access data that is stored off site via a Public Cloud.
This model is beneficial when an organization wants to have control over their data storage, but needs additional space for archiving data. They have the security and supervision of the Private Cloud in their network, but can store excess data in a scalable on-demand Public Cloud.
According to Frank Gens, an IDC chief analyst, “Virtually every customer, at least from the midmarket up, will have a mix of both [Public and Private Clouds].”
There has been a lot of buzz from people stating we are reaching the end of the internet's capacity. To be honest, all I ever can think of is the episode of South Park where internet access starts to dry up. In the episode, the "internet" is actually a giant Linksys router and Kyle reestablishes the internet by resetting the device. Although hilarious, the probability of the internet disappearing is pretty low (notice how I didn't say impossible).
Fiction aside, the internet is in essence a network of networks that connects computers and other devices across the globe. The internet isn't one specific device but rather a combination of billions of components. Despite its seemingly endless coverage area, a recent article from CNN.com reported that the internet may be reaching its user limits. Soon we may not be able to add more devices to the current configuration.
Here's the kicker; it all has to do with the internet's current configuration. Right now the internet runs on what is called Internet Protocol Addressing Scheme version 4 (IPv4). Within this particular set up - IPv4 only provides slightly more than four billion IP addresses because it is based on a 32-bit format. These addresses are usually represented with decimal points separating the address into four parts (i.e. 192.0.0.000).
IPv4 operates on two basic functions: addressing and fragmentation. The protocol uses the IP addresses to transmit internet datagrams to their destinations (also known as routing). Then these datagrams are fragmented and then reassembled once they reach the destination address. (More information on IPv4 operations can be found in the IETF Publication RFC 791).
Anything hosted on an IP network (computer, printer, smart phone, etc.) is assigned its own unique IP address. Thanks to advancements in technology, ownership of mobile phones, net books, Ipads, and other web enabled devices has exploded. These new devices are gobbling up IP addresses at an alarming rate.
I spoke with Senior QA Associate Apollo Catlin, at NSK Inc, and he mentioned that a smart phone itself "probably has three different IP addresses associated with it." Numerous reports have speculated that within the next two years, we will run out of IP addresses. According to Catlin, when IPv4 was first instated in the 1970's there wasn't any thought of running out of addresses as "they didn't ever think people would have a personal IP address." Back then, IPs were reserved for mainframe computers used by large organizations not individuals.
So What Can Be Done?
The most viable option is to transition from the current IPv4 configuration to IPv6. IPv6 operates on a 128-bit system meaning there are trillions of new IP addresses available under this protocol.
Unfortunately content providers are reluctant to transition to the IPv6 protocol. Catlin states that the transition would require a complete overhaul of the Internet infrastructure in that the "entire middle structure of the system needs to be replaced."
Although tedious, this transition needs to happen soon. Otherwise in a couple of years, internet access may only be available to current users as we may not have any new IP addresses to hand out. The internet is open to everyone; let's not start having to ration it out.
The Flop of the Floppy Disk How Virtualization Is Killing Physical Media
Sony just announced this week that they will discontinue the production of floppy disks as of March, 2011. Higher capacity storage mediums such as CD-Rs, DVD-Rs, and the ultra portable flash-drives that can hold gigabytes of information have led to the medium’s downfall.
I have to wonder though; will these other forms of media (for entertainment and data) become obsolete in the future?
Thanks to advances in technology, specifically virtualization, the need for tangible media has been drastically reduced.
Ten years ago, albums were purchased on compact disc, movies just started coming out on DVD (many of us still bought VHS in the early 2000s), and terms such as “Cloud Computing” and “On-Demand” didn’t even register in our vernacular.
Now, consumers can purchase their music digitally, movies can stream to televisions of the internet, and even applications can be run with a simple internet connection.
With the expansion of Cloud Computing Solutions, and more and more companies hopping on the cloud band wagon, is it any wonder that physical media is losing its prominence? The digital revolution has hit the entertainment industry and we are starting to see a trend within IT.
The biggest news of the past couple of weeks was Google’s announcement to launch a new and improved work-suite to rival Microsoft Office. Their upgraded Google Docs (vs. Microsoft Word), Google Spreadsheets, (vs. Microsoft Excel), and Google Presentations (vs. Microsoft PowerPoint) are all accessible on-demand via a web connection.
The trend of offering applications through the web versus running from a local machine is gaining speed at an alarming rate to keep up with advances in virtualization technology. With SaaS (Software As A Service) applications, users don’t have to download and install programs on their laptops/desktops, and don’t have to worry about downloading patches or updates.
For applications that aren’t offered in SaaS form, most software companies offer downloadable executable files when you purchase the program via their website. You don’t have to purchase CD-ROMs that will become obsolete when the newest release version hits the market.
Within the next few years, IT departments may rely solely on on-demand options rending most forms of physical media unnecessary and irrelevant.
Boston-based IT consulting firm runs assessment of new Massachusetts law on data privacy compliance for CPA firm
Boston, MA, April 12, 2010 – NSK Inc, a leader in IT consulting for small to medium businesses, was contacted by Ziner & Murphy regarding their data storage needs. Ziner & Murphy, a Certified Public Accountant (CPA) firm in Stoneham, MA approached NSK about the new state regulations regarding data privacy. NSK Inc. was hired to perform a Massachusetts Personal Information Compliance Assessment (MPICA).
Changes in Massachusetts General Law (M.G.L.) Chapter 93H, with new regulations 201 CMR 17.00, now require companies that own, license, store, and/or maintain personal information about a resident of the Commonwealth of Massachusetts, to establish minimum standards in guarding the data in both paper and digital records. MPICA is designed to scan a company’s server and system components, locate where personal information is stored, and check to see if the current systems settings are in compliance with the new regulations.
According to David Murphy, the firm learned of the new regulations through the Massachusetts Society of CPAs, and subsequently contacted NSK Inc. “We had worked with NSK in the past, and knew that they are a very knowledgeable and professional firm.” NSK Inc, already prepared for the new regulations, dispatched a technician to perform the assessment for the CPA firm.
An NSK Inc technician installs the MPICA software on a company’s server as well as any desktops or laptops used by office personnel. The software locates where personal information is stored and analyzes whether or not the data is protected according to government standards. MPICA checks password strength and change frequency, current antivirus protection, firewall settings, e-mail and ftp settings, and if the client’s computer systems are updating new releases on a regular basis. NSK Inc can then offer solutions to fix any vulnerabilities found in the system.
Murphy says that being a CPA firm “Our relationship with our clients is based on trust.” Having the MPICA performed, and the system upgraded “We have enhanced this trust with our clients.”
For more information about MPICA, please visit http://www.nskinc.com/it/201CMR17_mpica.html.
About NSK Inc NSK Inc is a leader in information technology consulting, with a focus on IT management for SMB companies Headquartered in Boston, MA with an additional office in Palo Alto, CA, the company offers a wide array of IT services for business driven information challenges. They provide service and support for small and medium-sized businesses and groups working within large organizations. NSK Inc also creates custom software products for investment banks, equity management organizations, and other specialized industry areas. For more information, please visit http://www.nskinc.com.
Press Contact For more information, please contact:
Massachusetts State Office of Minority and Women Business Assistance recognizes Nancy Keddy as a woman business owner, opens doors for opportunities
Boston, MA, March 26, 2010 – NSK Inc, a leading IT Consulting Firm has just received the Woman-Owned Business Enterprise (WBE) certification from the State office of Minority and Women Business Assistance (SOMWBA). As a result, NSK Inc will be listed in both the SOMWBA Directory and in the Massachusetts Central Register. As a member, NSK Inc is now eligible to better compete for government contracts as well as garner better connections through the services available as a WBE certified business.
Nancy Keddy, a veteran of the Information Technology industry, is now recognized by the Massachusetts Government for her achievements as a female CEO. Keddy, founded NSK Inc in 1996 and the company has grown into a leading IT consulting firm for small to medium businesses in the Greater Boston Area. “Since I am a woman-owned IT Service company, I am a minority in this industry,” states Keddy. “Having the WBE certification opens up a window of opportunities that otherwise may not have been available to NSK Inc.”
NSK Inc’s broad range of services include:
• Backup Disaster Recovery • Networking • Project Management • Hosting • Managed Care • Custom Application and Web Development
The SOMWBA provides resources and referral services for certified firms with opportunities at the federal, state, and municipal level as well as in the private sector. The agency also provides contracting, financial resources, and business membership and networking opportunities. NSK Inc can now take advantage of these benefits to build the company’s network outside of the Greater Boston Area as the agency works throughout the state of Massachusetts.
About SOMWBA The State Office of Minority and Women Business Assistance is an agency within the Massachusetts Department of Economic Development which promotes the development of certified minority business enterprises (MBE), women owned (WBE) business enterprises, and minority non-profit (M/NPO) and women (W/NPO) non-profit organizations. It does this by facilitating their participation in Massachusetts business and economic development opportunities. Specifically, SOMWBA offers services in certification, enforcement, business assistance and advocacy. For more information, please visit: http://www.somwba.state.ma.us.
About NSK Inc NSK Inc is a leader in information technology consulting, with a focus on IT management for SMB companies. Headquartered in Boston, MA with an additional office in Palo Alto, CA, the company offers a wide array of IT services for business driven information challenges. They provide service and support for small and medium-sized businesses and groups working within large organizations. NSK Inc also creates custom software products for investment banks, equity management organizations, and other specialized industry areas. For more information, please visit http://www.nskinc.com.
Associate at Boston-based IT Consulting firm is now certified in small network implementation and management
Boston, MA, March 17, 2010 – One of NSK Inc’s IT Associates, Michael McGowan, recently announced that he has received the CCENT™ certification from Cisco®. CCENT, short for Cisco Certified Entry Networking Technician, validates skills in installing and managing small enterprise network systems, and is a stepping stone towards the Cisco Certified Network Associate (CCNA®) certification. McGowan’s new credentials demonstrate his knowledge and experience in data networks, IP addressing, wired and wireless networks, and network security in the small enterprise sector.
McGowan states “It took me about four months to prepare for the exam.” His efforts have paid off immensely. “Having a CCENT certification will help me provide better support with internet/networking, troubleshooting, and configurations for NSK and its clients.” Although time consuming, McGowan says, “The experience was totally worth it, as it is the largest industry-wide certification.” He will spend the next four months working towards his CCNA certification.
McGowan isn’t the only NSK member who is Cisco certified. Ben R. Howard, a Senior IT Associate, holds his CCNA certification. Howard says that “Having the CCNA Security certification ensures that NSK meets the standards set forth by Cisco to have an understanding not only of how to configure a range of Cisco products, but to recognize security issues and how to effectively configure and deploy the devices to address the issues.” NSK Inc is consistently expanding their knowledge base, and with two employees now Cisco certified the company can manage a multitude of network systems for their growing client base.
About Cisco Systems
Cisco, (NASDAQ: CSCO), the worldwide leader in networking that transforms how people connect, communicate and collaborate, this year celebrates 25 years of technology innovation, operational excellence and corporate social responsibility. Information about Cisco can be found at http://www.cisco.com. For ongoing news, please go to http://newsroom.cisco.com.
About NSK Inc
NSK Inc is a leader in information technology consulting, with a focus on IT management for SMB companies. Headquartered in Boston, MA with an additional office in Palo Alto, CA, the company offers a wide array of IT services for business driven information challenges. They provide service and support for small and medium-sized businesses and groups working within large organizations. NSK Inc also creates custom software products for investment banks, equity management organizations, and other specialized industry areas. For more information, please visit www.nskinc.com.
Simplicity and efficiency are the overarching benefits of having a public cloud. Public clouds are offered as a service, usually over an Internet connection. An off-site third party provider hosts and manages the system. Users connect to the system via web applications or services. Public clouds usually charge a monthly usage fee per gigabyte and bandwidth transfer charges.
Cost: Having a cloud computing model in place, organizations can trim their IT budgets because they don’t have to purchase physical hardware (which also saves on energy costs), as the servers are virtual – hosted at a third party. Organizations can customize their clouds with specific storage parameters, applications, and security options so that they only pay for what they need. Since the cloud is hosted by a third party, the organization doesn’t need to spend money to have an employee monitor the system; it is taken care of by the host.
Time: In house servers take time to maintain. If hardware or software configurations need to be altered, or if a server crashes or needs to be restarted, the process can often take a couple of hours or a couple of days depending on the situation. With cloud computing, because everything is virtualized, reconfiguring the cloud takes minutes.[1] Also - because the servers are hosted on the cloud, if one server fails, another can instantly be activated, reducing down time.
Maintenance: Due to the fact that the public cloud system is hosted off site, internal employees are not responsible for maintaining the system. The design lets users update or introduce technologies into the system at a much faster rate as everything is managed at the host company. Having a virtualized public cloud means never having to deal with a physical server; it can be maintained from a simple configuration screen.[2]
Disadvantages of a Public Cloud
Lack of Control: Due to the fact that third party providers are in charge of storing and maintaining the data systems, many feel as if they don’t have enough control over their personal data.
Speed: Public Clouds are based on internet connections, meaning the data transfer rate is limited to that of the Internet Service Provider (ISP), which is usually no more than 10mbps. If an organization is storing and transferring large amounts of data (high definition video for example), a public cloud may not be the best bet.
Lack of Investment: Although a great cost saving method by reducing the need to invest upfront, renting the service from an outside provider also means that there is little capital gained. Having items such as servers and network equipment can pay off in the long run as assets and tax advantages.
The Benefits of Private Cloud Computing
Private clouds are built from software that runs on a piece of hardware at the organization. The difference between a public cloud and a private cloud is that a private cloud is controlled by the organization. The benefits of this system are that although an investment due to the fact hardware is required, it costs considerably less than traditional data management systems. The cost savings is due to virtualization in which one physical server acts as host to several virtual servers, each of which runs on a layer of software.[3]
Control: Due to the fact that the hardware is on-site, organizations have more control over their data. The organization is in charge of monitoring and maintaining the data giving them complete oversight of their data.
Performance: The private cloud is deployed inside the firewall on an organization’s intranet, meaning that transfer rates are dramatically increased. Read access off of private clouds can be as fast as 100mbps, or even more if the organization has a gigabit Ethernet connection. Storage capacity is also higher with a private cloud. Private clouds usually start with a few terabytes and can be increased by adding additional disks.[4]
Disadvantages of a Private Cloud
Cost: Private clouds are more expensive than public because they require both hardware and maintenance personnel. To build a private cloud, an organization needs to invest in hardware or use already existing systems whereas a public cloud is all handled off site. Private clouds also require system administrators. However, one system administrator could easily manage a 100-node cloud with a part-time effort. [5]
Maintenance: Since the private cloud is hosted on sight, the organization needs to provide adequate power, cooling, and general maintenance. The host organization also runs the risk of data loss due to physical damage of the unit (i.e. fire, power surge, water damage).
[1] “Seeding the Clouds: Key Infrastructure Elements for Cloud Computing.” IBM. Feb.
Ben. R Howard, a Senior IT Associate at NSK Inc recently took the CISSP Certification Exam and passed, placing him among roughly 64,000 other IT professionals in the world who have the certification.
The CISSP (Certified Information Systems Security Professional) is a highly prestigious certification that requires a massive amount of training and credentials in order to be considered to even take the exam.
CISSP candidates must have at least five years of experience in information security as well as experience with two of ten domains of security before they even apply. They then have to train and prepare for a sixty page exam that lasts for six-hours.
Those who pass receive the certification. A CISSP Certified Associate knows how to formally manage an all encompassing security program. The CISSP credential is a testament to the years of experience, knowledge, and competency of information systems, these personnel have achieved.
Howard hopes to broaden NSK’s ability to provide security services to its clients with his new certification. Having a CISSP Certified IT Associate, will only help NSK Inc move forward as a premier consulting firm in Boston.
2009 could be called “The Year of the Cloud.” The information technology sector has been buzzing with terminology such as “cloud computing” and “virtualization”. So what is all the hype about? In order to see why cloud computing has taken the technology world by storm (pun intended); we need to know what it is, how it works, and why it can be beneficial.
What is Cloud Computing?
“Cloud computing” isn’t a technology, but rather a model of computing.[1] A cloud consists of servers, networks, and applications that are available to end users via a network (usually the Internet). So anytime “cloud” is mentioned, it is referring to hardware, software, or services that are accessible from virtually anywhere, with a simple network connection.
“Virtualization” is usually in reference to server virtualization where one physical server actually hosts several virtual servers. In cloud computing, one stand alone server can make an entire data-center complete with servers, networking devices, systems management, storage, and security, look like a single computer. This lets companies buy exactly the amount of storage and security they need.[2]
Public Cloud
Public clouds are offered as a service, usually over an Internet connection. An off-site third party provider hosts and manages the system. Users connect to the system via web applications or services. Public clouds usually charge a monthly usage fee per gigabyte and bandwidth transfer charges.[3]The service is on-demand and users can add or subtract the amount of storage in their cloud simply by contacting the host provider.
Private Cloud
Private clouds are built from software that runs on a piece of hardware at the organization. The difference from a public cloud is that this system is controlled by the organization. The benefits of this system are that a private cloud, although an investment due to the fact hardware is required, costs considerably less than traditional data management systems. Deployments of a private cloud are easier as they are software based, and the system is more secure as the system is within the organization’s firewall and managed locally.
Why Go Virtual
There are a multitude of factors as to why a company would want to become virtualized. The most common reason why businesses adapt the cloud model is efficiency. Cloud computing drastically reduces the amount of time, money, and maintenance needed to operate a traditional data management system. With traditional systems; a company has to buy equipment; dedicate space within the office, while providing specific power and cooling needs to house the hardware; and hire administrators to install, secure, and maintain the data system.[4]
The cloud computing model helps to maximize efficiency and minimize cost.
Boston based IT consulting firm gets rave reviews from Earthworm Inc. for their recycling and conservation efforts for 2009
Boston, MA, February 24, 2010 - NSK Inc, a leader in IT consulting for small to medium businesses, has been recognized by Earthworm Inc. for their recycling efforts over the course of the 2009 calendar year. Based in Somerville, MA, Earthworm Inc. specializes in recycling office waste materials and implementing corporate recycling programs. NSK Inc and Earthworm began a partnership in 2009 to increase the sustainability of NSK Inc’s Boston office.
Over the course of a year, NSK Inc completely revamped their recycling program and made numerous positive contributions to the environment. NSK Inc reduced their carbon footprint (the total amount of greenhouse gas emissions caused by an organization) by 1.79 metric tons. Almost two tons of carbon was saved from being released into the atmosphere through NSK’s green initiative, helping to reduce their carbon footprint and reducing environmental impact.
In addition to lowering carbon emissions, NSK Inc also saved 180 pounds of bottles and cans, roughly 2400 pounds of paper (the equivalent of 20 trees), and recycled 390 pounds of electronics equipment. According to Tim Lasonde, the President of NSK Inc, “Being green fits within NSK’s mission of helping companies use technology to grow their businesses so that they are more efficient and productive. If we can show success and savings within our own organization, we can also help others achieve similar goals.”
NSK Inc’s efforts towards an eco-friendly business don’t stop with the Earthworm partnership. Nancy Keddy, Founder and CEO of NSK Inc, believes that the efforts are an ongoing event. “We must always be improving our processes and considering their impact on the environment.” In addition to the Earthworm program, NSK is currently transitioning their billing system to be paperless. Keddy says, “We are forward thinkers, so recycling is a must.”
About Earthworm Inc. Earthworm seeks to conserve natural resources by promoting the recycling of office waste materials. We promote recycling by operating both small and large scale commercial recycling programs, and by serving as an educational resource to the public. This combination of hands-on experience and environmentalism enables Earthworm to be a pioneer in offering sustainable, workplace recycling programs. For more information, please visit www.earthwormrecycling.org.
About NSK Inc. NSK Inc is a leader in information technology consulting, with a focus on IT management for SMB companies. Headquartered in Boston, MA with an additional office in Palo Alto, CA, the company offers a wide array of IT services for business driven information challenges. They provide service and support for small and medium-sized businesses and groups working within large organizations. NSK Inc also creates custom software products for investment banks, equity management organizations, and other specialized industry areas. For more information, please visit www.nskinc.com.
Press Contact
For more information about NSK Inc, please contact:
Cathie Briggette NSK Inc. (p) +1 617 303-0480 (e) cathie@nskinc.com
Boston IT consulting firm making switch to new, web-based, professional services automation system for time and project management
Boston, MA, February 19, 2010 – NSK Inc, a Boston-based IT consulting firm specializing in small to medium businesses, recently purchased the Autotask® Software System for the company’s Professional Services Automation software (PSA). Optimized for use by IT Providers, Autotask is an all in one resource for project management, billing and invoicing, and time reporting. The system runs off of a centralized cloud database and allows users to update from anywhere, a key reason why NSK chose the system.
Tim Lasonde, the President of NSK Inc couldn’t be happier. “Of all the products and PSA systems we looked at, Autotask is the easiest to implement. It has all of the features we need to enhance our clients’ experience.” NSK will be utilizing Autotask as a way to allow technicians from NSK to log hours and report remotely from any location; a benefit for when they are on the job and not in the office. Emily R. Steinberg, Office Manager at NSK Inc says that Autotask is a step up from the current system configuration. “It will help to keep NSK better organized and allow for easier billing and invoicing, as well as employee time tracking.”
The selection process wasn’t an easy one for NSK Inc. “We looked at many companies over the past two months, watched many demos, and participated in a few trials,” says Lasonde. “Autotask was the right choice for NSK because it allows us to improve our services for businesses in Greater Boston, streamline billing and invoicing, and measure the success of our employees.” NSK will implement Autotask over the next two months, and expects to be fully transitioned to the system by the start of the second fiscal quarter.
About Autotask Corporation Autotask Corporation is the leading provider of innovative, web-based Business Management Software and Services designed exclusively for IT Service Providers, MSPs, IT Consultants, Systems Integrators and other technology solution providers. Accessible via any PC, at any time without any downloads, Autotask helps IT professionals intuitively manage and automate the key operations for their service business and integrates seamlessly with most Managed Services software applications. For more information on Autotask please visit http://www.autotask.com or call 518-720-3500. Autotask®, Autotask Go!®, Autotask Pro® are registered trademarks Autotask Corporation. All other trademarks mentioned in this document are the property of their respective owners.
About NSK Inc. NSK Inc is a leader in information technology consulting, with a focus on IT management for SMB companies. Headquartered in Boston, MA with an additional office in Palo Alto, CA, the company offers a wide array of IT services for business driven information challenges. They provide service and support for small and medium-sized businesses and groups working within large organizations. NSK Inc also creates custom software products for investment banks, equity management organizations, and other specialized industry areas. For more information, please visit www.nskinc.com.
Press Contact
To schedule a press briefing, please contact:
Cathie Briggette NSK Inc. (p) +1 617 303-0480 (e) cathie@nskinc.com
After marching for and with women at the Women's March on Washington with her daughter Jennifer, in January of 2017, she decided that she wanted to be more involved in women's issues and empowerment. And so Herself360, was born from this want.