Case study: Familiprix gears up for new projects with the help of SAP HANA on IBM Power

Posted by Laurent Chayer_ on Jan 23, 2018 7:45:00 AM
Solution synopsis

Familiprix consolidates its infrastructure, simplifies the production environment and increases system uptime when it has IBM Gold Business Partner Present implement an IBM Power E850 server that runs a Linux operating system and an IBM Storwize device to support its new SAP S/4HANA application.

Read More

Topics: IT infrastructure, SAP Hana, Case study

The spectre of vulnerabilities at the CPU level is now hovering over IT infrastructures

Posted by Claude Gagne_ on Jan 9, 2018 11:45:00 AM

On January 3, 2018, two important security breaches named Meltdown and Spectre were publicly disclosed. These are two critical bugs located at the processor level.

Description of the vulnerabilities

Two flaws in processor design from leading chip makers could allow hackers to access sensitive information.

Read More

A look back at Present’s top blog posts from 2017

Posted by Jennifer Bridgeman_ on Jan 3, 2018 8:00:00 AM

Happy 2018! As we look ahead to a bright future, we wanted to take a moment to look back at the ideas we’ve shared and the topics we’ve covered this past year.

Read More

Best wishes for the holidays from the Present team!

Posted by present on Dec 19, 2017 11:45:00 AM

We would like to take this opportunity to send you and yours our very best wishes for a joyous and safe holiday and a wonderful New Year!

Our offices will be closed from December 23rd-January 1st, yet we are always available for any urgent situations.

Read More

Topics: Events

9 common risk factors linked to an enterprise’s IT network

Posted by Francois Desjardins_ on Dec 12, 2017 7:45:00 AM

The IT network is a driving force for all businesses today because of the volume of information that is exchanged electronically. But, when we talk about connectivity and information sharing, we also must address the increased risk of data loss or service disruption. Breaches in the system can be disastrous. 

To find out if a sword of Damocles hangs over your business, it is important to analyze the potential risks your network faces daily. If you experience one or more of these 9 problematic situations, you should remedy it as soon as possible. Here are our recommendations.

Read More

Topics: IT infrastructure, IT security

7 IT statistics that will blow your mind!

Posted by Jennifer Bridgeman_ on Nov 30, 2017 7:45:00 AM

We’re always coming across lots of statistics in our research and so our marketing department decided to put together a list of seven IT statistics that we found
interesting, even shocking!

We then asked our in-house experts if they could comment on each statistic; to put some context around the figures and hopefully provide some further insight into these astounding facts.

Take a gander!

Read More

4 steps to transform IT into a business unit

Posted by Marc Beaulieu on Nov 16, 2017 7:45:00 AM

For companies to succeed in this digital age, they must transform IT from service to the business units and cost center to strategic business partner.

In order to do this, IT needs to fundamentally shift the way it approaches business. IT can no longer be just a department that keeps the lights on–it needs to think strategically like other business units, focusing on ROI and efficiency.

Read More

Ruckus Cloudpath: security for wired AND wireless networks

Posted by Marc Therrien_ on Nov 1, 2017 7:45:00 AM

In recent years, IT experts have put a lot of emphasis on the importance of properly securing wireless networks. In fact, while the message has gone over well for wireless, this is far from the case for wired networks as most companies continue to neglect the protection of their LAN network. Companies are unknowingly at increased risk of being attacked or having their sensitive data accessible to anyone with a network connection at their disposal. 


Take for example your residential WiFi access. You most likely need a password to connect to the Internet. However, if you connect your workstation directly to your router, authentication is no longer necessary and you have immediate access to your network. This is exactly the same principle for companies. Remote access to the network is secure, but the wired entry doors within the building are unlocked when companies do not impose some form of authentication before a user can connect to the network.  

Read More

Topics: BYOD, IT infrastructure, IT security

Krack: WI-FI defect threatens to expose your data

Posted by Claude Gagne_ on Oct 18, 2017 4:06:20 PM

A major vulnerability has been discovered in the WPA2 protocol of Wi-Fi networks. 

Read More

6 reasons to entrust your Office 365 migration to a consultant

Posted by present on Oct 17, 2017 7:45:00 AM
Office 365 is a platform that brings together a suite of services and applications that aim to improve the efficiency of communications and business collaboration. Given all the available offers, it is a solution adapted to all sizes of companies.  When you plan to migrate to this platform, as many are,  hiring a consultant specializing in the field will help you get the most out of this rapidly evolving solution suite.


According to market intelligence regarding specialists in migration to Office 365, these skilled people are scarce and have limited availability. It is, incidentally, a common reason why migration projects in many companies are postponed. Fortunately, companies such as Present have expert consultants who are experienced in migrating to Office 365 and are ready to assist you. Here are 6 reasons to do business with a consultant specializing in migrations to Office 365. 

Read More

Topics: IT infrastructure, CIO/IT leaders, Office 365

About this blog

The right use of technology addresses business challenges and drives business growth in all areas of an enterprise.  We hope this blog will offer insight into developing strategies and tactics to enable you to identify those key drivers of growth and keep pace with and anticipate the rapid technology change of today.

Subscribe to Blog Updates by email

Protecting your business assets: Lower your risks with a disaster recovery plan

Recent Posts