Planning, Design, and Implementation Services

Convergent Computing provides a multitude of Consulting design, planning, and hands-on implementation services. They include:

Planning,  Design, and Implementation
  1. CCO works with on-premise and cloud-based solution providers such as Microsoft, Google, Ping Identity, VMware, Box.net, Cisco, Citrix, etc 2-3 years before products release to the public in early adopter programs.  With early adopter experience, CCO's consultants get weeks, months, years of experiences with technologies before they are broadly available
  2. Having early adopter experience with a broad range of technologies, CCO helps organizations plan, design, migrate, implement, and support their implementation of on-premise technologies and cloud-based solutions.
  3. Also because of CCO's early adopter experience 2-3 years in advance, when helping organizations plan and implement current technologies, CCO knows the direction of future products and leverages that knowledge to ensure implementations and integrations done today will take in account product changes, modifications, eliminations, and changes in upcoming releases.
Infrastructure and Architecture Redesigns and Implementations
  1. CCO not only provides operating system and application design planning assistance, but also infrastructure and architecture redesign assistance.  As organizations acquire new companies, merge with new changes, change business models, change organization names and structures, the need to modify existing IT structures requires change.
  2. CCO has helped hundreds of organizations plan their redesign and staged implementation of things like Microsoft Active Directory, Microsoft Exchange messaging, document management systems, DNS naming systems, PKI Certificate services, and other core environment structures to meet the current needs of the organization.  CCO provides best practice tips, tricks, and knowledge transfer based on successful previous implementations.
Security Audits and Reviews
  1. With recent world events as well as State, Federal, and Global regulations (SOX for public companies, HIPAA for healthcare, GLBA for financial services, DPD for European-based organizations), businesses are seriously evaluating their security systems to ensure they are protecting valuable organizational data assets.
  2. CCO consultants, Chris Amaris Andrew Abbate, and Rand Morimoto wrote the Pearson Education book "Network Security for Corporate Executives" that addresses security from desktops to servers to physical security and gateways to virus protection and wireless security.
  3. CCO performs network penetration tests, security reviews, and security audits, and has the ability to not only recommend best practices at improving an organization's security, but can roll its sleeves up and help an organization tune and optimize their systems to be secure, and can implement security appliances and tools for ongoing monitoring and security management.
Single Sign-on / Identity Management Planning and Implementation Assistance
  1. For years, organizations have had the dream of minimizing the number of times a user has to logon (logging on to the desktop, accessing applications from an iPad or mobile phone, logging on to the accounting application, logging on to email, etc). The technology now exists that provides a method of creating a truly single sign-on directory environment by providing "federated" secured access across disparate systems regardless of whether the applications are on-premise or in the cloud.
  2. Because CCO is deeply experienced across multiple platforms (Windows, Apple Mac, iPad, Android, iPhone, Blackberry, Linux, Unix, etc), the consultants at CCO provide assistance to organizations in the creation of a single sign-on and identity management environment.
Security Lockdown Assistance
  1. Surveys have found that over 93% of CEOs want very high levels of security in their IT environments, however very few organizations have actually initiated the proper steps to lockdown the security of their networks.
  2. CCO helps organizations identify the holes in their networks (whether it be physical access holes, operating system holes, Internet holes, remote access holes, or the like) and provides hands-on assistance to plug-up the holes.
  3. Unlike many security consulting firms that only provide reports that security problems exist in an environment, CCO actually rolls up its sleeves and helps organizations implement the security that they want and need.
1-yr, 3-yr, 5-yr Technology Roadmap and Budget Planning
  1. Every year organizations go through budget cycles to have funds allocated for the ongoing maintenance of their network as well as new technology implementations. CCO assists organizations by providing a vision of the next 1-5 years of the future of technologies that ultimately lead to a documented technology roadmap and IT budget plan
  2. CCO has a qualified vision into the future of technologies because of its role on the beta and development cycle of products 3-5 years before the technology releases.  CCO President, Rand Morimoto, keynotes conventions around the world on a very popular topic "IT Technology Trends: A Sneak Peek into the Future".
Clustering / Fault Tolerance / Disaster Recovery Planning, Design, and Implementation
  1. More critical to organizations than keeping abreast with new technologies is the ability to provide business continuity of their existing technologies in the event of a system failure or disaster.
  2. CCO provides disaster recovery planning assistance that involves designs built around clustering technologies, fault tolerance failover technologies, offsite data centers, network attached mirroring technologies.
Desktop Imaging and Software Update Design, Planning, and Implementation
  1. Organizations with a lot of desktop and laptop systems have found ways to image systems and provide software updates through a series of add-on technologies. However there are several new technologies that have recently become available that further simplify the desktop, laptop, tablet, and mobile phone imaging and software update process across multiple platforms (ie: Windows, Mac, Linux, iOS, Android, etc)
  2. CCO helps organizations understand new methods of leveraging built-in and new add-in technologies to simplify the desktop management process in an organization.
Document Management and Data Management Design, Planning, and Implementation
  1. While disk storage has gotten cheap where an organization can easily put in terabytes of storage on the network, most of the information being stored (and backed up on a regular basis) is obsolete or duplicated information. With so much information, users have a hard time finding the information they want.
  2. New document management and data management technologies now provide organizations the ability to more easily store, look-up, and manage their information.
  3. CCO's consultants have written books on technologies that help organizations "get control" of their information and data management, including ways of best utilizing on-premise and cloud-based storage!
Server Consolidation and System "Rightsizing" Planning and Implementation
  1. Over the years many organizations have repeatedly added more servers to their network to serve the needs of specific departments, or to satisfy the performance demands of the growing organization.  However as server and virtualization technology has improved that allows a single server to host a significantly larger base of users, plus organizations consolidating information access requirements with organizational servers instead of departmental servers, the ability to consolidate or "rightsize" server allocation can drastically lower the overall cost of operations for an organization.
  2. CCO authored a 100+ page "rightsizing" guide that helps organizations understand methods of minimizing the number of servers used in a file/print or messaging environment utilizing the latest in on-premise and cloud-based solutions, and CCO's president, Rand Morimoto, speaks at conferences and conventions regularly on the "Future of IT" that includes leveraging systems management as a method of creating the optimized private and public cloud environment.