Tuesday, July 31, 2012

Telecom Sales Positions Available in Texas


LKC is committed to providing the best telecommunications has to offer. We are fortunate to work with the largest and most creative companies in the country. Recently we have opened an office in San Antonio Texas and are looking for qualified individuals throughout the state that can represent at&t, Windstream, Verizon, and CenturyLink, to name a few of our providers. We pay handsome signing bonuses and ongoing residuals for successful sales people. 

Answering the Sustainability Call: AT&T's Eco-rating System Now Appears In-store AT&T Empowering Consumer Choice as Majority of Americans Welcome Product Sustainability Information to help with Purchasing Decisions of Devices


After their initial debut at Mobile World Congress earlier this year, AT&T* eco-ratings are now in-store. Starting today, customers will begin to see a simple, easy-to-read-and-understand label attributed to all new AT&T-branded postpaid mobile devices. In addition to these new devices, 13 more from the existing portfolio will also be designated with an eco-rating.
This announcement comes on the heels of a survey conducted by AT&T in June of 2012, which notes that, all things being equal, 60 percent of those surveyed would consider the environmental impact of a device before making a purchase.
“AT&T’s eco-ratings give consumers product information they want,” said Jeff Bradley, senior vice president, Devices, AT&T Mobility. “Consumers want the best and fastest devices while being able to make an empowered choice about environmental impacts of the device. Our eco-ratings accomplish just that.”
The eco-rating system assesses 15 specific criteria drawn from five general categories of sustainability attributes - attributes include the usage of environmentally preferable materials, minimization of hazardous substances, energy efficiency, responsible end-of-life treatment and environmentally-responsible manufacturing. Device manufacturers submit an assessment of which of the 15 criteria the device meets. AT&T reviews this report and confirms the data reported. These criteria are then calculated into AT&T’s five-star system, with five stars being the highest. The 15 specific criteria include, for example, the percentage of post-consumer plastic used in the device, restriction of compounds such as lead, cadmium, mercury, nickel and antimony trioxide/antimony compounds and product energy efficient features.
Further explanation of the eco-rating system and information about the application of ratings to individual devices can be found by scanning an on-label QR code, by visiting any AT&T store or at AT&T’s consumer-focused sustainability site, EcoSpace.
The eco-rating system is just one example of AT&T’s commitment to engaging customers around sustainability. In the past year the company:
AT&T is committed to integrating sustainable business practices across its business and was recently added to Corporate Responsibility Magazine’s 12th Annual 100 Best Corporate Citizens List. AT&T was also included in the 2011 Dow Jones Sustainability North America Index (DJSI). Visit www.att.com/csrto learn more about sustainability at AT&T. Also visit www.att.com/csr to view AT&T’s interactive 2011 Sustainability Report.

Monday, July 30, 2012

The 9 most endangered species in the IT workforce


The IT job landscape is evolving quickly. Here's how to avoid IT extinction

By Dan Tynan | InfoWorld

Darwinism is no stranger to IT. Given the pace of innovation, today's plum post is almost always one shift away from becoming tomorrow's pink slip. But the trends currently taking hold of IT organizations may have a broader impact on IT employment than we've seen in years.
It's no secret that the cloud computing revolution and the infusion of consumer devices into the workplace has wrought massive changes in IT. Job titles that were once considered secure are suddenly on the verge of extinction, thanks in part to a world where business users no longer have to go through IT to get to the technology they need to do their jobs.
[ Also on InfoWorld: Bring peace to your IT department by avoiding IT turf wars and the nine circles of IT hell, and stay away from these 20 common IT blunders. | For more IT management wisdom, sign up for Bob Lewis' Advice Line newsletter. ]
Call it the new IT ice age. And tech pros who don't evolve with the times risk joining the T-Rex and the triceratops in the tar pits.
We spoke with a number of IT pros about the jobs they see going away in the years ahead. Here are nine of the most endangered species in IT, along with advice on how you can avoid becoming one of them.
Endangered IT species No. 1: The Brown-Nosed Naysayer (Negativitus infinitus)
For decades, the Naysayer held sway over all tech decisions, wielding the word "no" like a razor-sharp claw to slash all requests, citing security or budget concerns. But the BYOD revolution and the universe of public cloud services available to users have rendered the Naysayer as harmless as a newborn kitten.
"We all know this particular type of IT pro -- the ones who think the customer is never right and users are guilty until proven innocent," says Tyler Lessard, CMO of mobile risk management company Fixmo. "They're part of the reason people are now storing business documents on Dropbox and connecting their own iPads to the corporate network without informing IT, creating new security nightmares. They're being replaced by a new generation of consumer-savvy IT pros who appreciate that we need to make room for employee choice and freedom -- as intimidating as that may be."
Organizations where the Naysayer still reigns supreme will have a tough time attracting top talent, warns Vincent Schiavo, CEO of DeviceLock, a provider of data leak prevention solutions.
"The prime habitat for the Naysayer are organizations unable to hire the most sought-after recent graduates," he says. "They'd rather work somewhere with a more progressive stance on enabling Android, iPhones, and other innovations in personal productivity technology."

How to avoid extinction: Practice forming the word "yes" with your lips, and embrace the new tech revolution. Then develop a mobile device management strategy that allows for granular control of devices and policy enforcement for social media, says Schiavo.
Endangered IT species No. 2: The Data Center Dinosaur (Tyrannoserver rex)
With deep knowledge of a particular type of hardware, coding language, or development methodology, these once-mighty creatures wore their expertise like a protective shell. Now they're being replaced in the evolutionary chain by flexible generalists with a broader skill set.
"In the past these clever creatures were coveted for their deep experience in one specific skill or tool," says Ed Nathanson, director of talent acquisition at Rapid7, a vulnerability management provider. "But thanks to Darwinism, IT pros with a narrow field of focus are largely confined to the 'short-term contractor' habitat."
At Purdue University, IT people like this are called "server huggers," says CIO Gerry McCartney. "They've defined their job by the piece of equipment they maintain," he says. "That's a risky posture to have from a professional standpoint. I think there will be very little need to have local hardware-oriented technical knowledge."
How to avoid extinction: Broaden and diversify your knowledge base now, while there's still time, says Greg Schulz, senior adviser for the StorageIO Group, an IT infrastructure consultancy.
"If you are the hardware guy, you better start learning and embracing software," he says. "If you are the software geek, time to appreciate the hardware. If you are infrastructure-focused, it's time to learn about the business and its applications. You don't want to be overgeneralized, but make sure to balance broader knowledge with depth in different areas."
Endangered IT species No. 3: The Red-Bellied Repair Tech (Breakfixus familiarus)
Repair Techs were once a common sight in offices, called upon to swap out dead hard drives, replace fried motherboards, and keep expensive desktops up and running. But the plummeting cost of hardware and popularity of cheap mobile devices have made them largely an anachronism.
"The species was highly territorial, thriving on the native fauna of the small-business and home computer market," notes John Caughell, marketing coordinator for Argentstratus, a provider of cloud-based applications. "Sadly this once proud beast is fast on its way to extinction as the world moves to devices that seldom see a flat surface, except to recover and recharge."
Hardware has gotten so inexpensive that it's cheaper to replace something that's broken than to waste time and money fixing it, adds Dennis Madderra, chief operations officer for Simpletech Solutions, a managed IT services firm.

"With workstation prices falling, and more and more applications running from virtualized platforms or Web-based interfaces, waiting for a tech to replace a failed power supply or video card is quickly becoming more expensive than just replacing the box entirely," he says. "Why not replace the box with a freshly imaged computer and be off and running in minutes rather than hours?"
How to avoid extinction: Consider taking a horizontal leap to server maintenance, says Madderra. "Anyone who can quickly diagnose hardware issues and errors on a server will have work for years to come."
Endangered IT species No. 4: The Lesser-Spotted System Administrator (Networkus rebooti)
Like worker ants or soldier bees, System Administrators have played a small but vital role in the IT ecosphere by keeping the lights on and the bits flowing. Now their numbers are in peril, as admin jobs that haven't been outsourced already may soon find a home in the cloud.
Jerry Kelly, North American CIO for holding company Diversified Agency Services, says email admins, for one, may soon be found only in museums.
"Ask any startup if they want to build and manage their own email server," says Kelly. "They will stare at you like you're crazy. Most IT directors want to get email out of their environments even more. If your company hasn't moved email to either a private or public cloud, there is a good chance they will soon. Either way, the traditional email admin role at a company will end up like the dodo."
Low-level administrator jobs will be tougher to come by, particularly at small and midsize firms, says Brian Finnegan, associate professor and faculty chair of IT at Peirce College in Philadelphia. While they won't disappear entirely, these tasks will migrate to cloud companies where the demands are higher and the competition stiffer.
"Network, storage, and related infrastructure administration jobs -- the kind of work that keeps the bits flowing through the pipes in individual organizations -- are available with the cloud providers, but you need to be ready for the big leagues," he says. "Those that do remain will require engineer- and architect-grade skills. Working in the server room at your small or midsize company is a world apart from working in a server room at Google or Rackspace."
How to avoid extinction: Become a security wonk or a data analytics expert, two tech fields that are flourishing and will for some time to come, says Purdue's McCartney.
Endangered IT species No. 5: The Pink-Crested Credentialist (Certificatus maximus)
Trailing a long list of technical certifications behind it like a vestigial tail, the Credentialist can still be found in its natural habitat -- usually the HR department of a company it wants to work for. But it has been marginalized by IT pros with actual skills and experience, says Mike Meikle, CEO of the Hawkthorne Group, a boutique management and technology consulting firm.

"This species is known for taking so many certification courses you can't figure out how they manage to get actual work done -- besides installing Transcender software," he adds.
The days when you could slap some Cisco or Microsoft certifications onto your résumé and write your own ticket are long over, says Lenny Fuchs, owner of My IT Department, which provides contract tech services to small businesses.
"Without the work experience to back it up, certifications are almost useless," he says. Fuchs adds he gets a kick out of seeing résumés that read "John Doe, MCTS, CCA, CTSGIT, MCITP, CCNA, MCP. Last held position: Assistant manager at Starbucks."
Thanks to increased automation, even high-level Cisco Certified Infrastructure Engineers could be facing the same fate as encyclopedia salesmen, paperboys, and switchboard operators, says Dante Malagrino, CEO and co-founder of Embrane, a platform-as-a-service vendor.
"In the new programmed network model, it will no longer be about humans configuring machines via a CLI or GUI, but rather more about machines and software communicating via programmatic interfaces," he says.
How to avoid extinction: Become an engineer/programmer by mastering a scripting language like Python, Ruby, or PHP, says Malagrino. Or turn your attention to creating your own intellectual property, such as journal articles and presentations at industry conferences, advises Meikle. "That will help you truly stand out from the crazed credentialists."
Endangered IT species No. 6: The Common Web Designer (Templator fillerupus)
At one time they numbered in the millions; now there are only a handful left. Automated site-creation tools and increasing dependence on sophisticated marketing techniques has deprived millions of HTML and Flash designers of the natural Web lands they once called home.
"Dropping boring prose into a template isn't going to cut it in today's marketing maelstrom," says Simpletech's Madderra. "Companies that wish to flourish online need to build content based upon solid SEO [search engine optimization] principles utilizing media, writing, and design elements organized around a marketing plan. The Internet is swarming with companies champing at the bit to provide these services, some even for free."
As Fuchs from My IT Department notes, "My mom has a website. She made it herself with Go Daddy's tools. Once your mom can master a technology, experts begin to disappear."
How to avoid becoming extinct: Become an SEO maven, says Fuchs.
"With all these site-creation tools and the move to less dynamic websites that are more friendly to mobile devices, Web designers need to become to SEO experts very quickly or they will be out of a job."

Endangered IT species No. 7: The Woolly Unix Mammoth (Mainframus obsolete)
Once one of the dominant creatures in the enterprise biosphere, Unix servers -- and, by extension, the people paid to tend them -- are heading for the tar pits. Not because they can't still do the work, but because they're being replaced by more nimble and less expensive Linux boxes, says Anthony R. Howard, author of "The Invisible Enemy: Black Fox" and a technology consultant for Fortune 50 companies and the U.S. military.
When Oracle bought Sun in 2010, it de-emphasized Sun hardware and let Unix support dwindle, says Howard, while failing to keep up with the increased capabilities and dramatically lower costs of open source alternatives.
"A Unix server costs more than $25,000 per server," says Howard. "Linux can now run most of the same applications and costs only around $3,000 per server. One company I personally worked with saved more than a billion dollars over five years by migrating off of proprietary Unix architecture onto Linux. As more folks migrate onto Linux, the Unix admin will eventually go the way of the T-Rex. They ate well during their time upon the earth, but their days are numbered."
How to avoid extinction: Build up your Linux chops in a hurry, and become an expert on which applications can migrate to Linux and which ones need to stay on Sun, says Howard. "When your org does decide to migrate, you can lead the effort instead of getting left behind."
Endangered IT species No. 8: The Purple-Tufted Programmer (Codus cobolus)
Developers who cut their teeth on Cobol or Fortran are a dying breed, but they're not the only ones. IT pros who hack code -- and only hack code -- may quickly wind up on the wrong side of the evolutionary divide.
Routine programming jobs are largely being offshored or eliminated outright, notes Peirce College's Finnegan.
"If you aspire to plan to write code for a living, you'd better be prepared to do it at the level of software engineer," he says. "That means doing it for a large organization on a very large scale, with an engineer's attention to process and quality control, as well as the people skills to function in such an environment."
Even mobile developers aren't immune, notes Chris O'Connor, CEO of Taptera, a provider of enterprise-ready, social sales mobile applications.
"Apps are too cheap and too awesome these days to truly warrant having an internal mobile team building a company a proprietary app," he says. "These internal teams, who spend most of their time navel-gazing at their BlackBerrys, are being replaced by people who listen to end-users and adopt best-of-breed apps for specific enterprise problems."

How to avoid extinction: As with the Data Center Dinosaur and the Sys Admin, coders who want to survive need to expand their expertise and align their skills with the needs of the business, says StorageIO's Schulz.
"Coders and script junkies need to also be integrators of business logic, cloud tools, and more, or they'll join the ranks of mainframers who are becoming extinct," he says.
Endangered IT species No. 9: The Ridge-Backed Technocrat (Bureacratus extremis)
For years they ensured job security by building technology silos and defending their turf via arcane policies only they could understand. Now their natural habitat is overrun by business managers who no longer need to seek approval for technology purchases, and threatened by executives who don't understand why they need to buy more boxes to "scale" their already sprawling networks.
"This species is being forcibly driven into extinction because of the convoluted and archaic policies they force on unsuspecting users and line managers," notes Rob Enderle, principal consultant with the Enderle Group. "They can single-handedly turn jobs into a living hell and make surviving an approval process harder than swimming to the center of the earth."
The technocrat purposefully creates network sprawl to address scalability and performance problems, but ends up creating massive amounts of maintenance and management work, says Peter Doggart, director of product marketing for Crossbeam, a network security platform provider.
"In the past when products failed to perform as expected, technocrats could just insist more boxes were needed and no one would be the wiser," he says. "That day is coming to an end."
How to avoid extinction: Stop defending your turf and start building alliances with other teams, says Doggart.
"Technocrats can survive by making things more efficient and saving money for the application guys," he adds. "They need to embrace a next-generation model and adopt consolidation technologies that can eliminate pain within the organization."
Dan Tynan is contributing editor at InfoWorld, author of the Tynan on Technology blog, and co-founder of eSarcasm, an award-winning geek humor site. Dan Tynan has been writing and editing stories about technology and its discontents for more than 20 years. During that time he’s been an editor in chief and an executive editor for national magazines, written for more than 50 publications, and taken home a closet full of awards.

7 Deadly Sins Of Big Data Users


7 Deadly Sins Of Big Data Users
Sloth, negligence, gluttony...and that's just the beginning. Consider these common mistakes organizations make when assessing the meaning of large amounts of data.

By Jeff Bertolucci              InformationWeek
July 30, 2012 08:35 AM
We're swimming in a vast sea of data that's rising every year. And according to Josh Williams, president and chief science officer of Kontagent, a social and mobile analytics company, companies that collect, analyze, and interpret data accurately--and act upon it quickly--have a significant competitive advantage.
At the Kontagent Konnect user conference in late May, Williams made a presentation called the "7 Deadly Sins of Data Science," in which he outlined the common mistakes that organizations make when processing large amounts of data. There's a good chance you're familiar one or more of the Deadly Sins, which include Sloth, Negligence, Gluttony, Polemy, Imprudence, Pride, and, of course, Torpor.
We've summarized each transgression below. If your organization has sinned, now is the time to repent.
1. Sloth: Lazy Data Collection. If your data-collection skills are bad, the data you acquire probably won't help your organization much. "We see a lot of times that faulty measurements lead to faulty management," Williams told InformationWeek. "It's a garbage-in, garbage-out problem."
[ If you had all the data that's available, where would you put it? See Big Data Means Big Storage Choices. ]
2. Negligence: Misapplied Analysis. It's easy to make analytical errors as data starts to filter through your organization. "Not everyone is a data expert, and they can draw the wrong conclusions," Williams said. You must analyze the data rigorously to create simple, easy-to-understand reports.
3. Gluttony: Too Many Reports. A glut of information and good visualization tools often lead organizations to produce too many reports, including those with vanity metrics (e.g., a website's number of registered users) that cause you to miss important facts about your business or industry. "Whether you're doing this in-house or with third-party vendors, it's easy to spit out a lot of reports, a lot of data," said Williams. "Too much information can cloud your judgment, and that makes it hard to make decisions."
4. Polemy: Data Definition, Use Disagreements. If the people in your organization don't agree about what a report means and how to act on it, you'll end up in conflict. Unclear definitions, personal interpretations of what the data means, or uncertainty on how to act on data, can hamper an organization's ability to make decisions. So make sure that different groups within your company aren't going in different directions based on the same data. "It's shocking how often that happens," Williams said.
5. Imprudence: Jumping To Conclusions. When you dig through data and read reports, it's not uncommon to see things that cause alarm. Companies may jump to conclusions without examining data sufficiently. They may even change their business model for the wrong reasons, such as relying on other people's conclusions, misinterpreting data, or reading an industry benchmark and deciding they need to follow a so-called best practice. "We encourage people to verify, run their own tests, and then decide if something that has become common knowledge really works," said Williams.
6. Pride: Decision-Driven Data Making. Rather than running tests and using data to confirm or deny assumptions, this Deadly Sin is where you dig through data to confirm your preconceived notions. "We see this happen a lot throughout organizations, both at the executive level and within teams," Williams said. "People try to confirm what they believe; they dig through data to find it." But the best data-driven cultures have mantras like: "Data wins arguments," he said. Let the data speak the truth.
7. Torpor: Learning And Acting Slowly. "A critical factor is how quickly you act on data, and how quickly you learn from it. This is where a lot of companies fall short," Williams said. You should interpret data methodically, of course. And you'll want to develop a process to ensure that people aren't jumping to conclusions based on the data, or using the data to confirm what they already believe. But once a decision is made, you must act on it right away.
Big data places heavy demands on storage infrastructure. In the new, all-digital Big Storage issue of InformationWeek Government, find out how federal agencies must adapt their architectures and policies to optimize it all. Also, we explain why tape storage continues to survive and thrive.

Sunday, July 29, 2012

L K Consulting is proud to have Manuel Raynal as our Vice President of Operations


Manuel Raynal Bio

Mr. Raynal has more than 25 years of SAP, data center, network, security, and telecom expertise. He
currently serves as the Vice President of Operations for L K Consulting. Immediately prior to joining L K
Consulting, he worked for the Symmetry Corporation where he was responsible for the efficient and
effective delivery of business solutions in the form of SAP managed services, hosting and migrations
across data centers, with no downtime, for many multinational
corporations. Prior to Symmetry, he has
held various management and strategic positions at large enterprises, including GE and the Miller
Brewing Company, where he was responsible for complex SAP landscapes spread across multiple
platforms and data centers. Mr. Raynal is a recognized expert in the information technology arena
with regards to SAP (R/2, R/3, ECC4.06.0,
BW, BI, CRM, SCM, Basis, etc...), infrastructure (data centers,
server migrations, HP, IBM, Cisco, Juniper, EMC, etc...), virtualization (VMWare, HyperV, ZEN), and
project management.
Client testimonial regarding a data center migration with SAP managed services where Mr. Raynal
served as the solution architect:
"Symmetry designed a HA environment that is specific to Edward Don and our needs, and manages it
all for us. Rather than spending their time monitoring and maintaining infrastructure, our internal
resources have moved on to more valueadded
projects. It is really helping us move the business
forward.”
George Barwacz
Edward Don
Case study presented at "Outsourcing 2011" by the client regarding a data center migration with SAP
managed services where Mr. Raynal served as the solution architect:
"Sweet Ovations’ search for a hosting provider — From horror story to happy ending
This session examines how Sweet Ovations, a company that creates sweet ingredients for dairy
products and beverages, was forced to find its own SAP hosting and support services after its parent
company was sold. Learn how and why — despite thorough due diligence and reference checking —
Sweet Ovations’ first choice of vendor was unsuccessful, and see the steps taken to remedy the
situation. Drill down into the key factors to focus on when comparing vendor RFP responses and identify
the items, such as pricing, support, and flexibility for future system enhancements, you need to consider
before you sign your hosting contract. Come away with a list of questions you need to ask to ensure
you select the right hosting provider. Discover the potential cost benefits associated with hosting SAP
services and see how Sweet Ovations’ current hosting arrangements have provided the company with
enough cost savings to fund its next upgrade project."

Saturday, July 28, 2012

Windstreams Ethernet-local-loop-product-overview

Windstream’s Ethernet is available in over 100 Metropolitan Statistical Areas (MSAs) nationwide.


What is Ethernet?
Windstream’s Ethernet is a flexible, high-bandwidth solution that can be used for both data and voice traffic. This proven technology allows you to easily add more bandwidth without the time delay and expense of ordering and installing additional facilities.

Ethernet also enables you to:
ƒƒPurchase bandwidth in increments ranging from 10 Mbps to 1 Gbps, often without a change to your fiber-fed loop. ƒƒUtilize other Windstream solutions, including Dedicated Internet, Multiprotocol Label Switching Virtual Private Network (MPLS VPN), or Voice over Internet Protocol (VoIP) ƒƒ Enjoy low equipment costs and a level of scalability far greater than similar Time Division Multiplexing (TDM) solutions Ideal Customer Profile.

An ideal Ethernet customer has extensive yet varying bandwidth needs across various cities, states, or continents. The customer would require the flexibility to expand its bandwidth, yet desire a consistent set of standards and protocols.

Solution Features & Benefits
Easy Integration – Ethernet offers you a near seamless solution to match your VoIP, MPLS VPN, or other network applications Ready for Tomorrow – With ample bandwidth available for growth, Ethernet
is a comprehensive solution that can be tailored to fit your current and future network needs
Exceptionally Cost-Efficient – Ethernet delivers a very cost-effective way to provide high-volume bandwidth for your organization System Simplicity – As a solution that features a universal hand-off, Ethernet helps you simplify your premises-based equipment

Friday, July 27, 2012

FCC's Connect America Funding initiative leaves 13 states in the cold


The Federal Communications Commission released a map Thursday illustrating what states will benefit from the first phase of its Connect America Fund (CAF) and the glaring reality that the agency plan won't address 13 states.
States not getting funding include: Arkansas, Connecticut, Delaware, Kansas, Kentucky, Louisiana, Maryland, Mississippi, New Jersey, Massachusetts, New Hampshire Pennsylvania and Rhode Island.
Alternatively, Wisconsin is leading the funding charge with $38 million.
Recipients of the funding, including a number of large service providers such as CenturyLink (NYSE: CTL), FairPoint Communications (Nasdaq: FRP), and Frontier Communications (Nasdaq: FTR), have either accepted portions or all of the funding made available to them via CAF Phase I. These service providers have three years to use the funds to build out broadband services in "unserved" areas.
"As our new map demonstrates, millions of Americans still live, work, and travel in rural areas where access to high-speed Internet does not exist," FCC Chairman Julius Genachowski said in a statement. "Through the FCC's Connect America Fund initiatives, we're helping complete our nation's broadband infrastructure, which will lead to job creation, economic growth, and innovation in the 21st century. The map is the latest example of how the agency can use mapping technology to spur innovation and to develop new products for the public."

The FCC's map shows the 37 states where service providers will deploy broadband service as a result of the first phase of the Connect America Fund. In addition to breaking down how much funding each state is getting and how many counties and census blocks are being served, the FCC map shows how many people are unserved, which the FCC defines as those who can't get at least a 3 Mbps/768Kbps connection.
While the CAF Phase I program is promising, it's far from perfect with some service providers such as CenturyLink and Windstream (Nasdaq: WINopting to only take a portion of the funding due to various restrictions proposed in the initial program. Meanwhile, AT&T (NYSE: T) and Verizon (NYSE: VZ), despite being eligible to get $47.8 and $19.7 million, respectively, decided to not participate.


Read more: FCC's Connect America Funding initiative leaves 13 states in the cold - FierceTelecom http://www.fiercetelecom.com/story/fccs-connect-america-funding-initiative-leaves-13-states-cold/2012-07-27?utm_medium=nl&utm_source=internal#ixzz21qsNMCCy
Subscribe: http://www.fiercetelecom.com/signup?sourceform=Viral-Tynt-FierceTelecom-FierceTelecom

Google finally made the grand introduction of its much-hyped 1 Gbps Fiber to the Premises (FTTP) service in Kansas City, Kan., and Kansas City, Mo.


Google (Nasdaq: GOOG) finally made the grand introduction of its much-hyped 1 Gbps Fiber to the Premises (FTTP) service in Kansas City, Kan., and Kansas City, Mo.
In deciding where to bring the service first, the service provider has divided up the cities into what it calls "fiberhoods." Before rolling out service, each of the "fiberhoods" needs a minimum number of residents to sign up for service over the next six weeks.
"We're going to deploy our network where there is enough interest, and we're going to deploy soonest in areas where there is the most interest," Google Access general manager Kevin Lo said at a launch event in Kansas City.
Google will take on established incumbent cable operators Time Warner Cable (NYSE: TWC) and AT&T (NYSE: T) in Kansas City, which have their own triple-play service offerings over existing HFC and hybrid copper/fiber last-mile networks.

So what's the cost of the service?

After paying a $300 fee to get the service installed at a home, customers will have the option of three main packages. Google will waive the installation fee for the first two packages if subscribers agree to a two-year contract.

For $120 a month, eligible users will be able to get a package that includes a 1 Gbps Internet connection, hundreds of high-definition networks and a Nexus 7 tablet computer that will operate as a remote control for its video service. With the $70-a-month second plan, users will get Internet and 1TB of storage on Google Drive, while a third plan will offer 5/1 Mbps Internet service.
Google Fiber TV will offer hundreds of TV channels and on-demand films and series, in addition to an eight-tuner, 2TB DVR and a free Nexus 7 tablet to use as remote control.

Besides saying that subscribers can order the new products at Google.com/fiber, it would not reveal where it will launch the service or when it will go live.
For more:


Read more: Google officially debuts its FTTP service in Kansas City - FierceTelecom http://www.fiercetelecom.com/story/google-officially-debuts-its-fttp-service-kansas-city/2012-07-27?utm_medium=nl&utm_source=internal#ixzz21qLzggoe
Subscribe: http://www.fiercetelecom.com/signup?sourceform=Viral-Tynt-FierceTelecom-FierceTelecom

at&t IP Flex a converged network Solution


Build a new outlook on how your voice service benefits your bottom line and overall productivity.
AT&T IP Flexible Reach is a SIP trunking service that delivers integrated access for IP PBX, TDM PBX or Key System environments, providing potential total cost benefits through the consolidation of voice and data – one provider, single transport, and management options.
Voice and data traffic riding over the same transport drives greater bandwidth utilization and potential access to cost savings. This managed Voice over IP communication solution includes calling plans that support inbound and outbound calling on your data network, giving you local, U.S. long distance and international reach for your U.S. sites.

To find out more call 262-893-0509


https://www.e-access.att.com/spot/spot/Messages/DnloadAttachCached.asp?id=PNQHBOKV51XPE63HHR0H&isHTMLDocument=false


Monday, July 23, 2012

AT&T, CWA hammer out tentative wireline labor agreements Read more: AT&T, CWA hammer out tentative wireline labor agreements - FierceTelecom http://www.fiercetelecom.com/story/att-cwa-hammer-out-tentative-wireline-labor-agreements/2012-07-23?utm_medium=nl&utm_source=internal#ixzz21SyW4hWl Subscribe: http://www.fiercetelecom.com/signup?sourceform=Viral-Tynt-FierceTelecom-FierceTelecom

lkconsulting.net
Contracts cover Midwest and AT&T Corp


Read more: AT&T, CWA hammer out tentative wireline labor agreements - FierceTelecom http://www.fiercetelecom.com/story/att-cwa-hammer-out-tentative-wireline-labor-agreements/2012-07-23?utm_medium=nl&utm_source=internal#ixzz21Syb4a27
Subscribe: http://www.fiercetelecom.com/signup?sourceform=Viral-Tynt-FierceTelecom-FierceTelecom




AT&T (NYSE: T) reached "tentative" agreements with the Communications Workers of America (CWA) union on Friday covering wireline workers in both the AT&T Midwest region and AT&T Corp (CWA Communications and Technologies unit).
The Midwest contract covers over 13,000 workers in Illinois, Indiana, Ohio, Michigan and Wisconsin; the AT&T Corp contract covers about 5,700 employees located throughout the country, the service provider said in a statement. 
Each of the contracts will be presented to CWA members for ratification over the next few days. The union members have been working under the terms of the previous contract they agreed upon in 2009, but that expired April 7.
Under the proposed three-year agreement, AT&T said it would offer workers "wage increases in each year and a modest pension increase."
This agreement with the CWA comes on the heels of AT&T announcing last week that it agreed to a one-year labor contract extension with the International Brotherhood of Electrical Workers (IBEW) union covering about 7,000 workers.
Labor negotiations between unions and U.S. telcos like AT&T and its fellow RBOC Verizon (NYSE: VZ) continue to be a thorny issue. With traditional landline phone service revenues continuing to decline, service providers are trying to cut costs in their wireline divisions, asking union workers for concessions on health care, sick time and retirement benefits.


Read more: AT&T, CWA hammer out tentative wireline labor agreements - FierceTelecom http://www.fiercetelecom.com/story/att-cwa-hammer-out-tentative-wireline-labor-agreements/2012-07-23?utm_medium=nl&utm_source=internal#ixzz21SyiK971
Subscribe: http://www.fiercetelecom.com/signup?sourceform=Viral-Tynt-FierceTelecom-FierceTelecom

Friday, July 20, 2012

CIOs and system administrators being two places at once


 More than ever CIOs and system administrators alike are being pulled in two separate directions, both equally important. In one direction the development of increasingly flexible and robust systems requires an increasing amount of time to research and provision, leveraging the largest advantage in the marketplace. On the other hand there is a real need to bring intelligence to business operations, improving and streamlining existing infrastructure. The people who plan well will involve experience and obtained actionable insight into the process of progress, this too takes time.
Even though it sounds straight forward enough, the experienced IT professional can tell you, doing both these things at once can feel a lot like changing shoes during a marathon.
Starting off on the right foot              
 We asked 300 of our clients at random if they ever purchased a solution which was explained as “difficult to install, troublesome to maintain and expensive to upgrade” guess how many said yes. Solutions are sold just as that, an end to or improvement over a less than perfect current system. In reality heterogeneous infrastructure provides no end to obstacles and dead ends when it comes time to install the would-be wonder product. Yet despite the hazards of progress, and the many ways to overcome them, one thing can be agreed on, the right person for the job is always the right choice.

Our Answer               
    Just imagine, someone who wants to do exactly what you need done, someone who has installed that piece of hardware over a thousand times, knows that certain software inside and out and is waiting to help your team make it all come together. Our team of highly trained, certified and field tested technicians will help you provision, install and setup your environment. By following the right process from the beginning we avoid the common pitfalls of implementation and allow for the smooth integration every IT purchase should end with. This allows for the ongoing maintenance of your infrastructure without the loss of time configuring solutions onsite.
Whether you need an advanced solution which you receive preconfigured and ready to plug in right out of the box, or onsite assistance with integration, we will always be able to make sure that the solution stays a solution and doesn’t turn into an obstacle.

Technology Asset Recovery Services ("TARS")


Technology Asset Recovery Services ("TARS") are programs designed for companies that want to maximize the Return on Investment of their excess or obsolete equipment, while mitigating compliance risks associated with these assets. The combination of our market knowledge and refurbishing capabilities creates the highest available return to our clients.
L K Consulting offers two types of Technology Asset Recovery Services, which are available separately or in combination: Equipment Consignment and Current Value Realization. LKC offers our consignment services for those who are interested in the greatest return on their excess equipment. After we receive your equipment, we will perform a complete inventory audit and provide you with a report of our findings. Each month, we will send you a report detailing what equipment was sold and for what price. We will send you a check for your portion of the proceeds once the equipment has sold. We offer real time access with 24/7 visibility of your asset portfolio to ensure transparency.
Customers who need to quickly close out their position in excess equipment can take advantage of our Current Value Realization program. If you prefer to receive all your proceeds right away, we can simply purchase your excess equipment from you at current market prices. Our service offering provides our clients with complete transparency in terms of fair market values (FMV) so that together we can make informed decisions.
We offer Valuation Services which provide the most accurate data available based on real market transactions. Our experts can also provide insight on FMV versus Net Book Value, FMV versus OEM Trade-in offers, and lease return analysis.
With our Secure Logistics, we manage a national network of cargo vans, box trucks, and tractor trailers to provide our clients with the most affordable pickup and transportation services in the industry. We are able to assist with every phase involved during logistics process, from technical de-installation to final delivery to a secure processing facility.
Our partner has over 35 years of experience in the refurbished IT Hardware business. We have tenured professionals with expertise in specific product lines including Cisco, Dell, Sun Microsystems, HP, IBM, EMC, Avaya, Nortel, Juniper, Foundry and others. Our global customer base offers you the greatest opportunity for maximum return on your excess or obsolete equipment. We have customers located in Europe, Middle East, Asia, Canada, South America, and Africa.
For equipment that no longer has re-marketable value, we provide a highly compliant recycle solution through downstream partners that are either eSteward or R2 certified.

Steven Kirchner | LinkedIn

Steven Kirchner | LinkedIn

IT Services Maintenance & Support


IT Services Maintenance & Support

IT Services
Maintenance & Support
L K Consulting provides alternative maintenance solutions to the manufacturers.  We support new technology, near end of life, end of life, end of software support or out of warranty IT network Hardware.  We provide business solutions to some of America's largest corporations and government organizations throughout the world.  We also serve the IT needs of many emerging and growing companies. Our total solutions approach, comprised of best-of-breed equipment and a comprehensive portfolio of services will deliver a flexible solution to maximize your investment.  Our goal is to be the premier third party network maintenance provider delivering world class IT services and solutions the world over.
With LKC’s comprehensive alternative maintenance plans, we can deliver a cost-efficient IT solution that will save you money over the manufactures maintenance or warranty plans.   In a number of situations we blend our solution with the manufacturers to substantially lower the price point of the OEM as the sole provider.  It’s a collaborative, cost effective solution combining the best attributes of us and the OEM. This provides for an outstanding level of support and offers coverage for the majority of products in your infrastructure.  Our customized solutions reflect the varied and distinct industries of our clientele.  When IT staffs are looking for alternatives to the manufactures plan or multi-vendor support plans, we have the right combination that will fit your needs.

We formulate a unique solution for your enterprise or network that matches our highly experienced and certified team of Engineers, and industry experienced Managers.  With your specific system requirements in mind, we will create a custom solution based upon your resource, technical and budgetary requirements. By applying our expertise in routing, switching, wireless, LAN, VPN security, and VOIP communications we create a cost-effective, single-source hardware and service solution that is second to none.

You may not find our services or approach elsewhere, our technical support (TAC) hotline, a true single-point-of-contact management team and customized billing and invoicing plan. Those aren’t extras you pay for either. They’re included in our flexible plans and part of the reason we are a solid leader among third party maintenance providers.
Cisco Networking Support is our specialty.  We are a Cisco Certified Partner with an unparalleled professional sales and support team.  We are dedicated to helping medium to large companies, local, state and federal government agencies tackle the most complex IT Networking issues.  We are agile and flexible with our offerings.
Services that LKC can provide include:
Onsite hardware and software support
7x24x365 Telephone hardware and software support
Web portal support
Spares support either on-site or located close to your site with our parts depot
Preventative maintenance
Engineering Change Notices and Field Change Orders
On Site Availability 365 days a year by a Trained and Certified Technician:
24x7 (24 hours a day, 7 days a week)
12x5 (12 hours a day, 5 days a week)
9x5 (9 hours a day, 5 days a week)
On site response times for a trained technician to arrive at your facility:
4 hours
2 hours
Next Business Day (NBD)
Call us for a free evaluation (262-290-5210) of your hardware support requirements. We will provide you with a written analysis of your maintenance costs which could result in more reliable service and lower support costs.
Upgrades and Parts
LKC can help your bottom line by providing hardware upgrades that leverage and extend the life cycle of existing systems. Hardware upgrades coupled with Third Party Maintenance Options can put more dollars to the bottom line as well as pushing out the timelines for technology refresh programs and the purchase of new systems. However, when your systems have reached their end-of-life, LKC can de-install the old equipment, install the new equipment and recycle your retired IT assets. We can also recover your old assets by purchase, refurbish them and sell them as used equipment, then sharing some of the revenues with your company.
Call LKC for:
Hardware upgrades
Parts (spares or production)
Installation of new systems
De-Installation of older equipment
Recycling of retired IT assets
Recovery of older equipment that still has value
Cisco SMARTnet® and an Alternative
LKC can provide Cisco's SMARTnet® support services.
IT Express Services is a Cisco Certified Channel Partner providing SMARTnet® maintenance.
Our objective is also to have a very cost effective alternative to Cisco's SMARTnet®
Provide the same services and access to IOS updates and upgrades that can be obtained from Cisco.
An alternative that is especially cost effective on older Cisco switches and routers that need coverage and the IOS is not continually updated
Our Quality Field Sourcing delivers all our clients’ field technician requirements.
Clients come to us to achieve a breakthrough in performance and total cost of their Field Service Technical Operations by deploying our certified engineers as a supplemental field service resource.

By using us as a single source for field technicians across North America our clients achieve cost savings of up to 70% compared to full time field staff employees or the cost of multiple layers of service companies and sub-contractors.
Our mission is to deliver the highest quality field service results, create extraordinary value, and continually enhance our clients' and members' field service experience.
For our clients, we commit to the highest satisfaction through consistently delivering the most efficient, effective, and highest quality field service solutions.
http://lkconsulting.net 

Cloud Computing in Health Care to Reach $5.4 Billion by 2017: Report - Health Care IT - News & Reviews

Cloud Computing in...

L K Consulting

Here's a post I thought you would like

Here's a post I...

L K Consulting

Report calls AT&T, Verizon top U.S. 'investment heroes' - FierceTelecom

Report calls AT&T, Verizon top U.S. 'investment heroes' - FierceTelecom

L K Conculting

Switching and routing market to grow 4.4% in 2012, breaking stagnant Q1 - FierceTelecom

Switching and routing market to grow 4.4% in 2012, breaking stagnant Q1 - FierceTelecom

L K Consulting

Steven Kirchner

Steven Kirchner | LinkedIn
L K Consulting, LLC

Personal Media in Enterprise (white paper by tigerspike)

lkconsulting.net

Please visit our site for the complete white paper.


Personal Media has already changed the way that we consume media and
information. Innovative smartphone and tablet applications have changed the
way that we go about our daily lives. We believe that Personal Media is now
set to change the way that we work, and this whitepaper series is designed
to highlight how wide-reaching these changes might be. It has been written
for CIOs, CEOs and CMOs of large enterprise organisations, to help them
understand the benefits that employee use of Personal Media can bring to
their organisations, as well as prepare for the challenges that are inherent with
this new way of working.
We believe that there are a number of areas in the computing landscape that
are currently undergoing ‘generational scale’ changes at about the same time.
Delivery platforms are evolving, communication and collaboration channels
are being reinvented and the consumer technology world is, for the first time,
driving innovation within the enterprise. These changes have the potential to
impact operations across multiple business units, which is why we feel it is
important to extend the reach of this whitepaper series to include CEOs and
CMOs, as well as CIOs/CTOs.
Here in Personal Media in Enterprise – Part 1 we discuss how and why the
growing trend of ‘consumerisation of IT’ within the enterprise is taking place,
and the new challenges this trend brings to CIOs, CEOs and CMOs of large
organisations.

Monday, July 9, 2012

L K Consulting: Rural Broadband Alliance: USF reform will do more ...

L K Consulting: Rural Broadband Alliance: USF reform will do more ...: blog.lkconsulting.net  Rural telcos think current reforms will drive up prices for consumers July 9, 2012 | By Sean Buckley The FCC ...

Rural Broadband Alliance: USF reform will do more harm than good


blog.lkconsulting.net Rural telcos think current reforms will drive up prices for consumers
July 9, 2012 | By Sean Buckley
The FCC may have good intentions with refocusing the Universal Service Fund (USF) toward funding new broadband rollouts, but the Rural Broadband Alliance thinks that the reforms will drive up prices for their rural telco members' customers.
A key provision of the USF regulation reform, which went into effect last Sunday, calls for a cap on USF payments to rural telcos.
However, members of the alliance argue that the FCC needs to revise the caps it puts on these service providers.
Stephen Kraskin, legal counsel to the Rural Broadband Alliance, said customers will notice new charges on their phone bills. "Some of our companies have started job cut backs, some have frozen planned investments and related jobs, some are not filling jobs, and others are cutting back," he told Computerworld.
While the FCC says the reforms are all about driving new broadband investment, Kraskin said the caps actually will not only inhibit these service providers from increasing broadband speeds, but others might not be able to pay back their Rural Utilities Service (RUS) loans.
However, the FCC argues the reforms are necessary. "The commission's bipartisan reforms bring long overdue fiscal responsibility and accountability to USF, eliminating inefficiency throughout the program," a spokeswoman said in an email. "These reforms will require some carriers that are spending much more than their peers to adjust."
The spokesperson added that the reforms will actually give these telcos more money to spend on expanding their respective broadband rollouts, creating new jobs, but not drive up service costs.   
This is not the only group to rail against the FCC's USF reforms.
Previously, three other organizations that also represent rural telcos--the Organization for the Promotion and Advancement of Small Telecommunications Companies (OPASTCO), the Western Telecommunications Alliance (WTA) and the National Exchange Carrier Association (NECA)--jointly filed a petition for reconsideration and clarification with the FCC.
Small and midsize businesses (SMBs) face all the same challenges as even their largest counterparts. In fact, SMBs are now leveraging technology and services such as hosted VoIP to level the playing field with much larger companies and compete on a global level. 

However, SMBs also don't always have the same amount of time and resources as the enterprise to research new technologies which often puts them at a disadvantage. That should no longer be the case, at least not when it comes to Hosted VoIP for SMBs.


lkconslulting.net