Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

10 Budget-Friendly Ways for MSPs to Show Customer Appreciation

Maintaining strong relationships with your customers is essential. As an MSP, your customers rely on you for their IT solutions, cybersecurity, and overall technological support. But beyond providing these services, creating a sense of appreciation and gratitude can enhance customer satisfaction, add value to the relationship, and boost loyalty. While grand gestures may seem appealing, sometimes it’s the small, thoughtful actions that can make the biggest impact.

Lead Gen or Operational Efficiency-What's more important for sustainable MSP growth?

This month, I want to address a question I was sent from one of our MSP partners. As a smaller MSP looking to grow, they were wondering what they should focus on first: Marketing and lead gen to fill their sales pipeline? Or strategies to improve their organizational and operational efficiencies? They recognized that both areas are currently a source of weakness for their business.

UniSuper Google Cloud Outage Reveals Need for Keen Backup and DR Planning

Earlier this month, Google Cloud disclosed that it accidentally deleted the account of its customer UniSuper, a $125 billion Australian pension fund. According to a joint statement from Google Cloud and UniSuper, the deletion occurred due to an “inadvertent misconfiguration.” As a result, more than 600,000 pension fund users were unable to access their accounts for over a week. UniSuper had geographical redundancy built into its Google Cloud environment, according to the statement.

How, and Why, We Applied Machine Learning to Cove Continuity, Part 2

If you haven’t already read part 1, click here to do that first. If you look at the screenshots, they’re actually quite simple to understand. Anyone can easily identify whether the OS booted successfully at first glance. Look at the following examples and you’ll see what I mean : So, rather than the existing deterministic method, which relied on indirect evidence, we opted to use machine learning and neural networks to analyze and classify screenshots like a human being.

Using Customer-based Custom Properties in Ncentral

What’s this Paul, are you banging on about Custom Properties in N‑central again? Yes I am. For those of you familiar with my work, you’ll know I’m a big fan of Custom Properties and how they can help expand what you can do in N‑central. But I’ve been thinking about this recently and I found that when I talk about Custom Properties I tend to just focus on what you can do with device-based Custom Properties, which leaves customer-based Custom Properties out in the cold.

Leveraging Google Business Listings and Reviews to Grow Your MSP

In today’s business environment, much of the success of any MSP relies heavily on their online presence and reputation. This is because the vast majority of business consumers use the internet as their first port of call to discover, research, and select service providers. In this blog, I’m going to look at the pivotal role Google Business Listings can play in this process and how getting reviews for your MSP businesses can help to foster growth and enhance credibility.

How, and why, we applied machine learning to Cove Continuity, part 1

Over the next three blogs, I want to explain how we used machine learning to increase Cove Continuity boot-check accuracy to 99%. Cove Continuity offers the ability to restore source (protected) servers/workstations to virtual machines (VMs) in Hyper-V, ESXi, or Azure. After a VM is restored, Cove performs a boot-check test to prove that the system was properly restored.

PSA, ITSM, or ESM: Choosing the Right Platform for MSPs

Choosing the right management platform is crucial to Managed Service Providers (MSPs) that need to scale their business and improve service delivery. But with options like PSA, ITSM, and ESM available, how do you know which is right for your particular maturity level? In this blog, I want to quickly help you find your level when it comes to service delivery, by breaking things down into three simple stages: Ealy, Developing, and Mature.

Demystifying Zero Trust: Understanding the Zero Trust Security Model

In the previous blog post we looked at why it’s important for MSPs to get to grips with Zero Trust and Zero Trust Network Access, as well as how to explain the benefits to customers. In this post we’re going to take a deeper dive into some of the philosophy and principles behind Zero Trust.