Thursday, March 28, 2019

Top 6 Ways Audio/Visual (A/V) Can Improve Your Business

Audio/Visual technologies are dramatically improving the modern workplace. While traditional offices are changing rapidly, with open plan environments, huddle rooms, and mobile/remote working, these challenges must be met with technology in order for these spaces to continue to work effectively. This is especially true when...

Thursday, March 14, 2019

Top Advantages of Upgrading to PoE LED Lights for Your Commercial Spaces

Power over Ethernet (PoE)-based LED lighting has been available for several years. Due to the recent (2018) release of the IEEE Approved Draft Standard for Power-over-Ethernet, the LED lighting industry has started devoting attention to this technology. The new standard includes significant enhancements for LED lighting systems....

Tuesday, March 12, 2019

New Office Technologies Improve Efficiency, Cost, and Management in the Workplace

Businesses are connecting more devices, people, and processes in their attempt to gain a competitive advantage, and are undergoing a digital workplace transformation. The Digital Workplace extends the benefits of the Internet of Things (IoT), changes the way buildings operate, and how workers connect to the technologies in...

Friday, March 01, 2019

Top 10 Ways to Keep Your Data Center Support Infrastructure Up and Running

When data center construction is complete, data center operations & maintenance begins. These services may include comprehensive operational management and regular scheduled maintenance for all facility supporting infrastructure and assets, or just preventive maintenance for specific assets in the data center. The aim is...

Wednesday, February 20, 2019

Free Download: Commercial Workplace Technology Planning Checklist

Planning a New Office Build? You need this FREE Commercial Workplace Technology Planning Checklist to save you $$$ by helping you budget for ALL the Technologies your people will need and use. Our goal is to help you establish realistic and accurate cost estimates for all the Workplace Technologies you...

Thursday, January 03, 2019

NJCCIC Alert: Chinese APT10 Intrusion Activities Target Government, Cloud-Computing Managed Service Providers and Customer Networks Worldwide

The FBI is providing the following information with HIGH confidence – NJCCIC (New Jersey Cybersecurity & Communications Integration Cell) Alert: this FBI Flash is being provided, with no guarantees or warranties, for potential use at the sole discretion of recipients in order to protect against cyber...

Wednesday, September 19, 2018

PTS Partner NJFX Welcomes Subsea Trans-Atlantic Data Cable

The Jersey Shore is becoming a major destination for your photos, status updates and Internet searches. A new trans-Atlantic subsea cable will land in Wall Township, NJ, ferrying European Internet traffic from Google and Facebook to the New York metropolitan area. The HAVFRUE cable, which was announced earlier this year,...

Monday, April 30, 2018

PTS Modernizes State Data Center and Expands Network in Sergipe, Brazil

As the primary contractor of a technical team made up of US- and Brazil-based companies, PTS Data Center Solutions provided consulting services to the state of Sergipe. The Brazilian state had undertaken a statewide IT modernization project, with these priorities: Expand the state fiber and wireless broadband network Modernize...

Thursday, February 15, 2018

PTS’ Pete Sacco Presenting at AFCOM February 2018 NYC/NJ Metro Chapter Meeting

PTS President Peter Sacco will be presenting at the  upcoming February 2018 AFCOM NYC/NJ Metro Chapter Meeting at Bloomberg in NY, NY. Bloomberg and the AFCOM – NYC/NJ Metro Chapter have teamed up to sponsor a wide range of capabilities to assist Data Center Professionals to maintain...

Friday, January 05, 2018

Prepare A Cyberdefense Plan Beyond Meltdown and Spectre Security Risks

Virtually all modern CPUs have a major security vulnerability. Nearly all CPUs built over the past two decades have a design flaw, creating a vulnerability that could allow hackers access to the data that runs through the CPU itself. This data might include passwords, keys, and other critically sensitive data. The vulnerabilities,...