Downtime Is Extremely Expensive – Can You Actually Afford It?

Computer Network Downtime

Downtime is bad for business.

Whether you agree or not, it’s a fact – just a couple years ago, small businesses with up to 50 million in annual revenue reported that just a single hour of downtime cost them $8,600.

Computer Network Downtime

Why Does Downtime Cost So Much?

The main cost of downtime is not the fix itself, it’s the halt in your business’ productivity. If an IT-related or natural disaster occurs and takes critical systems offline, employees will be unable to complete their tasks, yet your normal business expenses will carry on.

During that time, you incur all the expenses of running a business without the revenue you would usually generate. Even if downtime does not grind everything to a halt, some of your staff will have to divert themselves from their normal work to mitigate the problem – again reducing productivity. Furthermore, while your systems are down, you can’t deliver services or sell products to current and potential new clients.

Not all of the costs associated with downtime have a tangible price tag. The trust of your clients and the reputation of your company are invaluable assets that can erode with prolonged or frequent downtime issues. A diminished reputation can negatively affect your future business opportunities.

Some downtime is inevitable, but much of it can be prevented and mitigated.

What Are The Primary Causes Of Downtime?

  • Power Outage: If your power source fails, that can lead to a long list of complications like servers going down and lost, unsaved data.
  • Cybercrime: Cybercrime has increased in recent years and is still on the rise. All it takes is one employee opening a malicious attachment and your business data could be held hostage.
  • Human Error: Accidentally unplugging key equipment, overloading the system, and improper installations can all cause downtime, but maintaining certain policies and procedures can cut down on human error.
  • Natural Disasters: Hurricanes, tornadoes, floods, and earthquakes happen. Having a plan for getting back to business if the unthinkable happens is the fastest way to recover.

What’s The Best Way To Prevent Downtime?

…by stopping it in the first place.

The best way to approach downtime prevention is proactively – you need to keep an eye out for system issues that can spiral into total stoppages. You need to implement backup technologies and best practices to prevent outages. You need to enhance your cybersecurity to protect against cybercrime.

Unfortunately, that’s a lot for you to handle on your own, especially when have other work to see to. That’s why a managed IT services company can be so helpful. They’ll provide 24/7 active monitoring of your systems, business continuity best practices and cybersecurity services that will keep costly downtime at a minimum.

 

5 Ridiculous Ways Technology Transforms Your Industry

Technology Transformation

Incredible Ways Technology Has Changed How We Do Business

How has technology transformed your industry? Explore 5 important ways technology has recently changed how we do business, delight customers and grow businesses  

Technology Transformation

It doesn’t matter which industry we’re in. Technology is a must. It makes things faster, safer and better when used right. It can propel our businesses and leave competitors in the dust. But many businesses are simply unaware of what’s out there and just how accessible it is to any size business. Here are five incredible types of technology that are completely reshaping how we do business.

1. Big Data Revolutionizes Data-Driven Decisions

As business leaders, we’ve always made decisions based upon the available data. But more recent advancements in data collection and analysis have made it easier and more cost-effective to gather data and put it to work. We can make smarter decisions about the direction of our companies where we once had to rely solely on gut instinct.

We can enhance customer experiences to not only increase sales but to raise that net promoter score, building trust, loyalty and powerful word-of-mouth.

2. We Reach Customers in More-Effective Ways

87% of purchases now begin online. This doesn’t mean they buy online, just that they found the product or service online.

Digital marketing technology is a business technology that has transformed how we connect with customers. We can now more precisely target audiences to enhance the relevance of our ads to specific customer bases.

Thanks to the pay-per-click model, we don’t pay for advertising that doesn’t work. And thanks to optimization tools we continually improve strategies to find what does work.

Digital marketing allows us to reach customers where they find new products and services through:

  • Search engines
  • Social Media
  • Review Websites
  • Influencers

3. Virtual Reality Gives Employees Real-World Training

From healthcare to aviation to manufacturing, virtual reality (VR) and augmented reality (AR) are helping schools and businesses train employees in very lifelike situations. Employers can help employees become more comfortable in likely scenarios by allowing them to experience it in an artificial environment first. They can learn how candidates may perform at their jobs before sending that job offer to get the best people into important roles.

4. Enhanced Business Continuity Tools Reduce Down-time

From more effective ways to keep business and customer data safe to data backup to re-routing of important functions to remote locations, advancements in technology are making it easier for businesses to both avoid disasters (physical and virtual) and keep moving when disaster strikes.

Developing a strategy, deploying tools effectively and putting a plan into action, of course, take know-how, but those involved in business continuity planning now have a wider range of tools for the business continuity tool belt.

5. Better Technology for Less Cost

It’s not news to anyone that technology gets cheaper the longer it’s in use. And by now many amazing technologies have been around long enough that they’re getting very affordable, even for small business. Yet, many businesses still aren’t taking advantage of them because they don’t know what’s out there.

That’s why it’s important to work with technology experts who can introduce you to technology you’ll find useful to cut costs, enhance productivity, delight customers and more. To learn more about how technology is disrupting every industry, follow our blog.

Quickly Unlock Useful iTunes Store Applications that Are Blocked in Your Country

Unblocking App Store

Unblock Geo-Restricted App Store or iTunes Content in a Few Clicks

Discover how to quickly gain access to geoblocked apps via the App Store or iTunes with a few simple clicks whether you’re on on an iPhone, iPad, Mac or PC.

Unblocking App Store

Apple’s App Store and iTunes apps give you access to thousands of great games, utilities and social connections. But there are thousands more you can never access due to geographic restrictions.

Why Are Certain Apps Blocked?

Location-based restrictions, known as geoblocking, are actions taken by companies or government regulators. They restrict access to content, including App Store apps, based on your location. You can experience these issues on sites such as YouTube or platforms such as Netflix, where certain content is unavailable to certain users, often due to licensing issues or other legal issues.

Geoblocking is usually done by tracking the unique identifiers known as Internet Protocol (IP) addresses. Any request you make to a site or app includes your IP address so the pinged computer knows where to send the requested content. IP addresses are allocated to internet service providers (ISPs) to distribute to their customers and reflect the geographic location of the computer, smartphone or another connected device.

Why Unblock Geoblocked Content?

There are many valid reasons for wanting to access geoblocked content. You may be visiting or living in another country and want to connect with content and functionality unique to your country. Maybe you need to access content that is only available via an app that is restricted at your current location. You might want to compare content presented on different versions of an app.

No matter what the reason, geoblocking can cause frustration for those wanting to access something they can’t connect to. Fortunately, there are some easy ways to unlock this content.

How Do I Unlock Geoblocked Content?

Here’s a step-by-step guide to unlocking iTunes and App Store content in another country. No matter which method you use, be sure to cancel any subscriptions to Apple Music, iTunes Match and other apps associated with your Apple ID.

  • On an iPhone or iPad
    • Open Settings > [Your Username]
    • Click on iTunes & App Store
    • Tap on your Apple ID. Authenticate if asked
    • Click on View Apple ID
    • Select Country/Region
    • Select Change Country/Region
    • Choose a new country, click on Next
    • Accept the Terms and Conditions
    • Enter your payment method
  • On a Mac or PC
    • Open iTunes
    • Click on Account > View My Account
    • Sign in using your Apple ID
    • Press Enter or click on View Account
    • On the Account Information page, click on Change Country or Region
    • Click Agree to the terms and conditions
    • Enter a new payment method
    • Click Continue
  • From your Apple ID profile
    • Log on to your Apple ID account profile
    • Scroll to Account
    • Tap on Country/Region
    • Choose your new country or region. Click Continue when asked to confirm your new selection

Does Unblocking Content Allow Access to All Apps?

The method described above only works for free apps available for iOS devices. If you want to access paid apps, you’ll need to enter a payment method — and billing address – for the country

Switching from one country identity to another on iTunes or the App Store is complex, but can be done, by following these steps:

  • Open App Store > Apple ID
  • Click on Sign Out
  • Open Settings/General
  • Click on Language & Region
  • Select Region
  • Select a new country or region and create a new account by finding an app you want to download in the new country
    • Tap on the app. If a screen pops up that the item is not available, click on Change Store
    • Go to the app listing and tap Get > Install
    • Click Create New Apple ID
    • Select the new country or region and complete the Apple ID creation steps
    • Select None under Billing
  • Switching between stores is now possible by signing out of one iTunes or App Store account and signing back in via another

Accessing content in other countries can be critical for many users. With a few taps, you can open up a world of opportunities.

5G Networks Present Need for Improved Security

5G Networks

The Security Risks Are Real with Coming Rollout of 5G Networks

Discover what the arrival of ultra-fast 5G networks means for cybersecurity, driven by the significant number of devices that will be connected to each network.

5G Networks

As ultrafast 5G networks emerge, so too do potential cybersecurity threats. For security experts, the unknowns make predictions for what risks to address more challenging

What is 5G?

5G is a new approach to wireless connectivity. It features speeds 20 to 100 times faster than the existing fastest speeds on 4G long-term evolution (LTE) networks. 5G (which stands for the fifth generation of wireless technology to be available in the United States and worldwide) networks also will support larger numbers of wireless devices.

Given the proliferation of connected devices (the Internet of Things), the ability to connect more objects without affecting performance is a significant benefit.

How Does 5G Technology Differ from Previous Network Solutions?

5G delivers faster speeds and lower latency due to fundamental changes in the network structure. Among the key changes are:

  • Use of higher radio frequencies than 4G, allowing for more data to be transmitted at faster speeds
  • A new technology, Massive MIMO (multiple input multiple output) that uses targeted beams that follow a connected user around a cell site, providing better capacity, coverage and speed. Massive MIMO acts like a spotlight, directing the technology in a specific direction, as opposed to existing 4G tower technology that’s more like a floodlight, firing data in all directions, wasting power and energy.

What Are the New Cyberthreats?

With any new technology comes the new potential of attacks and intrusions. With 5G, more devices can be connected at once, more data is flowing, and data exchange happens at a far more rapid pace. Here are some of the main challenges that come with the new wireless protocol.

  • More Devices Means Lack of Scalability. Today, companies that have large numbers of connected devices on their networks find it difficult to manage and secure these objects. As those businesses adopt 5G, they may be managing hundreds if not tens of thousands of devices. The challenges of scalability of security solutions will only magnify.
  • New Risks Will Emerge. Today, most cybersecurity solutions focus on traditional connected devices — desktop computers, servers, smartphone and other mobile devices. 5G increases the opportunity to connect more types of objects. With each newly connected object comes an increased network threat, another possibility for hackers to expose a security flaw in a device that’s not updated or fully protected.

    5G also encourages more businesses to invest in connected devices as part of their business operations. That means a growing number of new devices, interfaces and technologies.

    Consider the potential number of smart devices in your home — refrigerator, coffee machine, washing machine, doorbell, television, digital assistant and security system are all connected and potential targets.

  • More Privacy Issues. More entities are passing laws and regulations that govern how data can be stored, transmitted and used. That means organizations using 5G will need to comply with multiple regulatory hurdles related to information collected by, stored on and used by connected devices.
  • Unknown Capabilities. Today’s network security systems and processes are constructed to monitor traffic and identify potential threats based on activity and data, all in real time. Doing so allows them to detect and contain suspect activity quickly. The solutions are designed to work with the existing bandwidth speeds and restrictions. With the higher capacity and speeds of 5G, that model may go out the window. New protocols are necessary for encryption, monitoring and prevention, which may mean existing firewalls may no longer work with 5G.

    Yet with few 5G networks operational, there is little to baseline for testing or assessment. Hardware will likely need to be upgraded, processes changed and new guidelines developed and implemented.

  • Integration and Automation. Today’s solutions can operate independently of other systems, but the impending 5G revolution means integration and automation will need to become part of future solutions. Security solutions will need to connect to the entire IT operation and data will need to be synchronized throughout multiple security layers.

What Can the Security Profession, Carriers and Businesses Do to Prepare for 5G Security Needs?

The solution to 5G security challenges will be multilayered and the responsibility of multiple parties. Among the key changes necessary are:

  • Carriers will need to extend firewall protection to cover new distributed networks of connected devices
  • Improved authentication and management of devices
  • Self-updating, self-reporting, self-hardening and self-healing devices will need to become the norm
  • Access and discoverability protocols will need to be built through multiple layers

The benefits of 5G are significant. With the right security programs and solutions in place, it’s likely to be a big leap forward in connectivity.

Managed Services SLAs: What Should You Expect to See?

Managed Services SLA

Key Things to Look for in Your Managed Services SLA

When you hire an MSP, you must sign a service level agreement. Here’s how to evaluate your SLA and ensure you’re getting what you expect from this relationship.  

Managed Services SLA

As if choosing the right managed service provider wasn’t enough, it’s also crucial to make sure that the SLA (service level agreement) you develop between your company and your managed service provider is sound and satisfactory.

Below, we’ll go over what you should expect to see within your managed services contract (SLA). We’ll also discuss how you should review this document with your lawyer to ensure you’re getting the proper value out of this relationship and doing what’s best for your business.

What does an SLA set out to do?

The core goal of a service level agreement between a company and the managed service provider they are hiring is this:

To outline the payment structure and service responsibilities of both parties and to specifically define and document exactly what services the MSP will offer, including what hardware and software is covered, daily monitoring services, troubleshooting services in emergency situations, response times, and more.

Of course, all service level agreements will be slightly different. Some will offer more or less information. Certain SLAs will include information about items such as liability protection for the managed services company. Still others will go into detail about expected performance standards.

What should you look for in your managed services SLA?

Your managed service provider will draw up the service level agreement. Ostensibly, this is a service level agreement they use and have used with all of their clients. It will, of course, be modified to fit the parameters and needs of your business and the unique relationship the MSP has with your business.

However, it should follow a general format. When your MSP shows you the service level agreement they have drawn up, you should expect to see the following:

Services Provided by the MSP

This section will outline exactly what services the MSP will be providing to you on a regular basis. This will often be based on the specific level of service that you have agreed to pay for.

For example, if you own a medium-sized business and the MSP you are working with has three levels of service, you may choose the mid-level of service as you don’t need the extent of services offered to larger businesses.

How Problems Are Managed

The overall services your MSP will provide will be based on daily, monthly, quarterly, etc. services. These are systematic tasks that will be undertaken regularly (such as monitoring security or providing software updates).

On the other hand, your SLA also needs to outline how troubleshooting and problems will be handled by your managed service provider. If you have an issue, for example, you’ll need a protocol for managing:

  • Responsibility: What areas of your company’s IT are they (your MSP) managing and monitoring?
  • Emergencies: What constitutes an emergency?
  • Response Time: If and when you report an emergency, what is the minimum timeframe that your managed service provider will respond within?
  • Reporting Method: How do you report an emergency? Will this vary based on the time of day or week? What information do you need to provide?

When Your MSP Is Available

Lastly, your SLA should outline when your MSP will be available on a daily, weekly, and yearly basis. What if you have problems in the evening after business hours? On the weekend? On a holiday? All availability times and any applicable extra charges should be documented.

Going over your SLA with your lawyer

Once you are satisfied with the service level agreement you have been provided with by your MSP, make sure to go over it with your lawyer. They’re on your side and will, therefore, be able to determine if any aspect of the SLA is unfair to you legally or could present potential problems.

Taking your time when reviewing your service level agreement will put your mind at ease and increase the likelihood that you and your managed service provider will enjoy a strong working relationship.

Using the Cloud to Boost Business

The Cloud Business

Boost Business with the Cloud

Using the cloud offers a variety of benefits for your business. Find out more about how you can use cloud technology to boost business.  

The Cloud Business

The cloud has grown in popularity among businesses in all industries. However, if you have not already transferred your business’s data and operations to the cloud, you may wonder if this technology is really in your best interest to expend the time and energy you will need to invest in order to implement cloud computing.

Below are some of the ways the cloud can boost business for your company, making it well worth the investment.

1. The cloud saves you money.

Implementing the cloud for your business prevents you from needed to invest in the same expensive infrastructure and programming of a company with in-house operations. This can save your company a significant amount of money over time.
The cloud can also save your company money by eliminating the need for in-house IT personnel. When you make the move to cloud computing, all of the programs and services you use will be maintained by your provider. Thus, you won’t need your own full-time IT staff.

2. The cloud boosts productivity.

The programs and processes you are able to access when you utilize the cloud are often more advanced and efficient than those you could afford on your own. In addition, if you choose the right provider, your programs will also be more reliable and kept up-to-date at all times. This leads to enhanced productivity overall.

3. The cloud improves collaboration.

With the cloud, it is easier to connect with colleagues, share information and work on projects with others. These improvements lead to more collaboration within your company, which in turn improves outcomes.

4. The cloud grows with your company.

One of the best things about cloud computing is its scalability. You pay only for the services you need, making it much more cost-effective. These services can also be scaled up or scaled down easily when your needs change, allowing for easier growth.
Moving your company to the cloud may seem overwhelming at first, but the potential benefits are clear. If you are not already using the cloud, it is time to start exploring this option and considering how it can improve your business. Before making the switch, be sure to investigate different providers so you can find the one that offers the best services at a fair price.

Using Managed IT Services to Save You Money

Managed IT Services

How Using Managed IT Services Saves You Money in the Long Term

Wondering how to make your business’ IT run better without costing more? One popular option to consider is managed IT services companies. 

Managed IT Services

Digitization. Network. Security. Mobile. As the average business sees more and more complexity in their IT requirements, it can become harder and harder to keep up with the necessary changes to protect your business’ interests and sensitive data. But what if the process could be easy without costing an arm and a leg? Managed IT services can provide this level of care, often at the same or even a lower cost than you would see using in-house employees. Here’s a quick look at how managed IT services can help make your business more efficient and effective.

Using Managed IT Services to Save You Money

Let’s start by defining what a managed IT service is and is not. A managed IT service provides you with a range of services. You pay a monthly subscription cost, and in exchange, the service takes care of your IT needs that are covered under those services. These services can include software updates, managed software-as-a-service options, backup services, website management and similar possibilities. Because they are responsible for these IT assets, these assets are carefully managed to provide you with optimum performance, security and efficiency.

Increase team efficiency by reducing downtime.

Well-run IT systems allow your employees to work at their highest levels of efficiency instead of focusing on computer problems and wasting their time updating systems and on hold with a help desk. Wouldn’t you rather have your people focusing on what your company is best at, promoting growth? When there’s a problem with your IT assets under your managed IT service, your employees don’t have to worry about fixing the problem – the managed IT service handles the entire process.

Every week, 140,000 hard drives fail. An estimated 44% of companies believe that an hour of downtime costs them about $10,000. Instead of having your companies having to stop their work and deal with distractions caused by an IT failure, they can simply continue on another device while the managed IT service takes care of the problem.

Enjoy peace of mind with better network and data security

Every day, we hear about another company that has had its data exposed through a security breach. In fact, in the first four months of 2018, over 260 million records containing sensitive data were exposed. You don’t want your company to be the source of the next big data breach, losing your company’s credibility and trustworthiness in the market, do you?

When you work with a managed IT service, their primary focus is making sure that your IT assets are current on all security patches, updates and anti-virus software, not the rest of the activities that your company undertakes. That allows you to focus on building your business, rather than about whether you’ll be one of the 60% of companies that go out of business within six months of a major data disaster.

Lower your company’s overall IT costs.

Though it seems counterintuitive that hiring out your company’s IT needs would save your business money, it’s actually been proven time and again. If you don’t hire a professional into your company, thinking it’s an unnecessary expense for a small business, then you’ll have employees wasting time trying to troubleshoot their own computer issues or waiting on hold for help desk personnel. Even if you do hire in a professional to handle your in-house work, how will they spend their time if there isn’t enough work to keep them occupied?

For these reasons, businesses typically find that the expense of a managed IT service is lower than that of trying to manage their own IT assets in-house. Because the managed service is only focused on the IT costs of your company and is focused on improving their own efficiency, these companies are focused on providing you with the most efficient service possible. They’re able to share the cost of education, new technology and equipment across a number of clients, reducing the cost.

As you can see, working with a well-run managed IT service can save your company time, money and potential risk. Are you ready to consider the options that are available to you? We offer a range of services, either in a package form or a la carte, should you only want help with a couple of areas. Please feel free to reach out today to discover how we can help your business get ahead through solid managed IT service solutions.

Why is Effective Business Continuity Management Important?

Business Continuity Management

Why is Effective Business Continuity Management Important?

Business continuity management (BCM) denotes how organizations plan for and respond to risks. Mission-critical functions must continue to run after disruptions such as bad weather or hackers.

Business Continuity Management

A business continuity plan documents how your organization will continue to operate after a natural or man-made disaster, severe market conditions or sudden changes in leadership. This could be anything from a stock market crash to a hurricane to the death or dire illness of a key leader. BCPs are hot topics thanks to growing legislation and increased risks related to data security and other events. Every organization would benefit from adopting some kind of BCP framework, however modest.

What is Business Continuity Management?

Business continuity management (BCM) denotes how organizations plan for and respond to risks. Mission-critical functions must continue to run after disruptions such as bad weather or hackers. Smart planning also makes it possible for employees to return to business as usual quickly.

How Does Business Continuity Work?

The most effective way to achieve transparent, seamless risk management and disaster recovery is via a business continuity management system. This may require some outside assistance since any BCMS adopted should follow international standard ISO 22301 requirements. All businesses can begin the first phase themselves, however, by building a continuity plan that identifies and minimizes risks.

What’s the Big Deal With ISO 22301?

ISO 22301 lays out a road map for an effective BCMS and is the most credible resource for successful business continuity management. Becoming ISO 22301-certified signals to clients that your company has a game plan in case disaster strikes — certification helps clients decide that your firm is a solid investment for their business.

This certification proves to prospective clients that your organization will continue to provide the products or services they need, even if an emergency arises. It also gives you an:

  • Independent evaluation of your business continuity management, providing assurance or offering areas for improvement
  • Accredited certification with regular audits to ensure continual improvement
  • Oversight of regulatory requirements to ensure legal compliance. This could include the EU General Data Protection Regulation (GDPR) or new state and federal privacy regulations impacting customer data collection and storage.

What’s is Disaster Recovery vs. BCM?

People are often confused by the difference between these two terms. They aren’t synonyms. Business continuity deals with relocation and business functions while disaster recovery, which is a subset of business continuity, deals with the technical recovery of systems and resources.

Disaster recovery outlines how to recover technical functions, sites, operations and applications. A business continuity plan may contain many disaster recovery plans.

What Are the Key Components of a BCP?

A successful business continuity plan includes the following:

  • Succession plans for key employees
  • Identification of critical functions with priority identified
  • All employees’ contact information and role in the plan
  • Tested backup strategies

Ready for Disaster? Tips for Creating a Smart Business Continuity Plan

Business Planning

Mitigate Disaster with a Comprehensive Business Continuity Plan

When you create a detailed business continuity plan, you can keep disaster from disrupting your operations. See how to get started here.  

Business Planning

When disaster strikes, disruptions to your operations could negatively impact your construction projects, pushing them past the deadline and over budget. And it is not just natural disasters you have to worry about, either.

Everything from serious IT problems to the loss of important team members has the potential to wipe out your operations. That is, unless you have a smart business continuity plan in place. With this plan, you can keep your operations moving along like normal, helping ensure the success of all your construction projects.

Importance of Having a Business Continuity Plan

In optimal conditions, there’s no doubt everything runs like clockwork, as your team works hard to complete their individual tasks. If anyone fails to come through, however, everything could grind to a halt. Furthermore, without writing it out, only a few in your company may know just what everyone should be working on and how it all comes together.

Therefore, you need a business continuity plan just in case serious disruptions leave you without certain team members, equipment, or workspaces. In many ways, this plan is a big-picture overview of everything that goes on at your construction firm. It also identifies all the workarounds you can use when faced with disruptions caused by different disaster scenarios.

Above all, your plan should detail who is in charge of each department in the absence of key players and all the ways they can keep moving forward in their daily duties. With that approach, you can keep major disruptions from throwing your workforce off track or preventing them from completing their tasks.

How to Create a Continuity Plan for Your Business

Without knowing what is on the horizon, there is really no time to waste in creating your business continuity plan. Thankfully, you can easily approach this process by using the following steps.

Take a Complete Inventory of Your Company

Taking inventory of your workforce, contacts, and equipment is the very first thing you must do to create your plan. You will likely need to take a big step back from your construction company to complete this step.

To start, create a list of all your employees, noting the major players in each department. Add their contact information in full, so you can find how to reach out at a glance. Then, create similar records of your material suppliers, clients, and other important contacts.

Next, you can move onto creating a complete inventory of all the equipment used on each of your job sites. Make sure to include their make, model, and serial numbers, so you can find parts or file claims as needed to keep things moving along. In addition, note any local parts suppliers, repair techs, and equipment dealers for those brands to complete your log.

Outline Existing Processes and Highlight Critical Areas

With the completion of the inventory step, you will need to look at your operations. Go from department to department, look at the duties of each employee and how they support other departments. Along the way, busy yourself with creating flowcharts for all the distinct processes used to run your construction company.

Throughout this process, identify your key operations and the major players you depend on to get the work done. Then, see who can fill in if those individuals cannot make it work. Also, add ways employees can workaround specific disruptions and continue to fulfill their core duties.

Identify Temporary Workstations and Keep Them Updated

If your core employees cannot get to their normal workstations, everything should not grind to a halt. But it will unless you have already identified temporary workstations and made the effort to keep them updated.

The workstations should have all the equipment and software normally used by the team and be completely ready for their use. So, create an update schedule and make sure the temporary workstations are included whenever you complete a major equipment or software upgrade. Furthermore, ensure your employees know about the existence of these workstations and how to access them.

Create Your Plan for Maintaining Critical Operations

With your understanding of your core operations, you can create a plan for each of your employees, helping them mitigate the effects of the disaster. Working across all departments, you will need to indicate who is responsible for getting each system back online and up to their normal operating levels. They should have a clear direction on the steps to take and the tools they will need to complete the assigned tasks.

Your plan should cover not only the construction tasks you are responsible for in that moment, but also all the administrative ones. You need to let your payroll department know how to proceed, for example, to ensure they can continue to process payments for all your employees.

Once you are finished creating your business continuity plan, store the main copy in a secure location and provide each department with their own copies.

Don’t Wait — Create Your Business Continuity Plan Today

So, now that you know what to do, there’s really no reason to wait. Start building your business continuity plan today to protect your operations from disaster. Otherwise, your employees could be left without the knowledge needed to keep your business afloat until everything returns to normal.

Intel Humiliated by Losing CPU Market Share to Eager AMD

Intel Processors losing to EMD

Intel Processors losing to AMD

Intel Humiliated by Losing CPU Market Share to Eager AMD

Intel’s continued problems with delivering CPUs are expected to go on throughout the fall and potentially 2020. Intel’s CEO Bob Swan told shareholders during their second-quarter conference call that the delays in processor deliveries would continue until September.

The fallout benefits AMD, which increased its market share from 9.8 percent in 2018 to 18 percent by the end of June 2019.

Why is Intel having trouble shipping CPUs on time?

The culprit is Ice Lake, Intel’s high volume 10nm processor. The chipmaker announced Ice Lake at CES 2019, but the processor hasn’t been forthcoming in the volumes Intel promised. The 10nm project has slowed Intel’s other chip line production. Lower-end processors have especially suffered, leading to supply chain problems for manufacturers, retailers, and customers.

What are Intel’s problems with the 10nm CPU?

The current problems continue Intel’s struggles with 10nm chips which date back to 2013. Intel’s initial goal for 10nm CPUs was 2015. Year by year, Intel has pushed back the deadline for 10nm CPUs. Intel’s second-quarter conference call gave late 2019 as the deadline — but the real date is more likely to be 2020 for most people who want to buy PCs with the new CPU.

The bottom-line culprit is engineering choices. Intel’s 10nm design selections have consistently held mass production back on its 10nm CPU project. As problems continued, Intel responded by refining its 14nm CPU performance and production process. TSMC and Samsung have 10nm CPUs, but their performance is equivalent to Intel’s 14nm CPUs.

What is so good about increasingly tiny CPUs?

Intel and its competitors, including AMD, are continuing R & D on smaller and smaller gate-size processors. Smaller gate sizes allow more CPU cores, or they enable a smaller die for the same performance as a larger CPU.

Smaller CPUs also use less power and generate less heat, a must for mobile devices and laptops. With desktop PCs, heat and power consumption aren’t as important, so processor performance can be improved in other ways.

How have Intel’s supply problems affected its business?

Intel’s stock has increased 6% since January 2019 according to Fortune, but rival AMD’s stock has gone up 83%. Nvidia’s stock has risen 25% since January.

The supply problems are mirrored by leadership problems at “Chipzilla.” Intel’s former CEO Brian Krzanich resigned in June 2018 when a relationship with a former employee was disclosed. Krzanich’s replacement Bob Swan is credited with improving company morale and redirecting the floundering 10nm CPU team.

Has AMD taken advantage of Intel’s delays?

AMD is gaining market share with scaled-up production of 12nm circuits. The Santa Clara-based chipmaker is gaining market share from Intel with its Ryzen 14nm and 12nm CPUs. It has announced 7nm Ryzen and Rome CPUs. AMD’s year-to-year market share in desktop computers grew from 12.2% in the first quarter of 2018 to 17.1% by the first quarter of 2019. In notebooks, AMD’s share grew from 8% to 13.1 %.

AMD also expects the number of Ryzen CPU notebooks to grow significantly in 2019, with desktop units growing by 30% and notebooks by 50%. Lenovo, the world’s #2 PC manufacturer, will be using Ryzen 7 Pro 3700U chips in its upcoming ThinkPads.

Which Intel and AMD news should industry pros and investors watch in upcoming quarters?

Intel has delayed shipments of all of its CPUs, not just the promised 10nm Ice Lake and variant chips. Rivals AMD and Nvidia have taken advantage of ongoing delays to ink new deals with major companies including Lenovo.

Investors and industry pros should keep an eye on CPU market shares for the rest of 2019 and into 2020. This will indicate if the agile upstarts are going to continue to take on “Chipzilla” and change the landscape of computing power in 2020 and beyond.