Posts

2021 – The Big Technology Winners & Losers

2021 Best and Worst Technology

Just over a year ago, I sat down to write a technology review of 2020. We had just seen the single biggest transformation that had happened to global businesses in the last 20 years!

The digital acceleration forced upon businesses as COVID-19 hit and government lockdowns continued changed the way that businesses needed to operate. Those who had failed to invest in their IT systems very quickly came unstuck. Businesses looked at their IT teams and demanded their systems be brought up to date.

(If you missed it, you can still read last year’s article HERE)

Entering 2021, I knew it was going to be the year of the cloud, and it very much has proven to be. The global silicone shortages impacting chip production alone assured this. For many business the only choice has to been to go to public cloud and leave the traditional on-premise infrastructure behind. Because of this, and what has turned into a challenging year for different, but somewhat the same reasons as 2020, here is my list of the 2021 winners and losers…

Winners

 

Public Cloud

Both Microsoft and Amazon have this year continued to gather businesses in their ever growing datacenters. This proves that business are finally coming around to the fact that some things can be done better if you let the industry giants do it. I have long believed the future was public cloud. 2020 proved this point with 2021 then accelerating this at a rate that was far beyond anything we thought possible. Business who were steadfast against the cloud removed barriers to get into Microsoft, Amazons and Google’s systems.

Public cloud will in my option continue to be one of the biggest drivers in 2022, with many businesses having an approach of either on-premise with hybrid cloud or full public cloud in 2022. The focus on compliance and data security by the big three continues to make private cloud a challenge to uptake for many businesses as they struggle to complete with the tools and level of protection that Amazon, Microsoft and Google can invest in. Just remember, when moving to Public Cloud that it is a shared responsibility model!!!

Public Cloud

 

Intel

What a difference a year can make! 12 months ago Intel was a shell of its former glory and was looking like a Marvel hero at the end of Infinity War (*Spoolers the hero’s don’t do well in that movie).

With the desktop processor being stuck on an architecture which AMD and Apple had long since surpassed limited to core counts and feeling like it could be a tough 2021 for big blue. Well this all changed with the return of a titan in Pat Gelsinger, after his stint with VMware. Pat returned to put Intel back on the path that he had started them on some 8 years before and successfully accelerated the new chip design out the door.

Dubbed “Alder Lake” the new Intel desktop processor line-up moves away from the traditional design to mirror that of Apple with E and P Cores (Efficiency and Performance). The focus being that E cores can use less power and thus make your laptop battery run for longer. The P cores can be activated to drive the system forward when it needs to complete some heavy compute tasks. These processors were released under the 12-Generation banner and have received praise from across the technology landscape. Windows 11 has specifically taking advantage of the core design and then have shown an experience well above that of the AMD processor with their all power core design.

This has been a good year for Intel and with Pat back in charge, I think we are likely to see them continue to battle Team Red for years to come.

 

Microsoft Windows 11

Windows 10 will be the last operating system you ever need, said Microsoft in 2015.

Well, 6 years later we are all upgrading to Windows 11, a very well thought-out and great overhaul of the Windows operating system. We now have some of the best features of MacOS and Linux with the trusted platform of Windows 10 providing its core.

I am a massive advocate of Windows 11, even if the naming convention is getting a little stupid (but then they could have called it Windows 21 then we all would have been in a much worse place).

In my review of Windows 11 I warned that early upgrades for business can be risky and that Windows 11 offers some challenges. Well I am glad to say, 3 months on my daily driver still remains on Windows 11 and my home device has even been given the upgrade with no real issues to speak off.

I think Microsoft have placed Windows 11 in a great position to be the operating system for businesses and home users in 2022. Hopefully by the later part of 2022 most devices will have moved from Windows 10 and we will finally see the death of Windows 7 (well, a man can dream right?)

windows 11 launch

Losers

 

Private Datacenters

On the exact reverse of the rise of public cloud we continue to see the need for private data center hosting reduce.

Many businesses are asking the question; “what can you do better that AWS, GCP or Azure?”. In the past, this difference was a clear winning feature for private cloud, however as time moves on the realisation that what are ultimately smaller players in the hosting market aren’t able to compete with the uptime, security, financial protection and costs that public cloud offers.

While I still strongly believe there are use cases for private cloud, I think the salesman’s arguments of it being “safer” than the public cloud have all been proven to be subjective and businesses should ultimately choose the best solution for them.

Apple

Second year in a row for Apple in this category, and no it’s not Apple Hate!

Apple have been hit pretty hard this year by two factors: the chip shortages and then a lack of interest in the products in a year where many people upgraded midterm.

2020 has seen Apple’s shares drop quite heavily against the backdrop of a lack of device production and thus device sales. Hopefully for Apple this gives them a kick to invent something new or dramatically different in 2022. As the company that coined the phrase “Think Different” it’s about time they did exactly that.

Apple macbook

Onsite Infrastructure

The downturn of on premise infrastructure continued in 2021 with devices being hard to source due to the chip shortage. Add this to the move to the cloud and we can easily see the onsite infrastructure requirement drop down to a new low. However, we expect this to come back with a vengeance in 2022 as kit becomes available and business adjust to a hybrid approach.

Unfortunately for on premise infrastructure this is being held back considerably by the global supply issues and less so by peoples want for the technology.

 

There has been many more winners this year, with business firing on all cylinders in 2021. However, we have also seen that this year some of the losers have taken a much bigger hit than expected.

I think the major take away for 2022 is that the IT landscape was changed by 2020 in a major way. The needs and wants of business have adjusted and now, as IT professionals, we need to fit around the needs of 2022 and onwards and stop looking to legacy for the solutions.

Whatever 2022 brings I am excited to be at the forefront of matching our customers to the latest and greatest technical solutions.

Why Endpoint Protection is still a key line of defence

endpoint security

You won’t believe this. I tell a lot of business owners and IT Managers that they need to ensure they have a robust, well architected and industry leading anti-virus and anti-ransomware product at the core of any cyber security programme. I am shocked by how many businesses rebuff with “we have never had a virus, so why do we need these products”. Unfortunately this level of naivety is exactly what threat actors are betting on. They are leveraging your lack of belief or understanding in the value of protection to slip onto your system undetected and carry out whatever heinous activity they wish.

 

“We don’t need protection!”

First of all I must address the elephant in the room; “We have never had a virus“.

The simple question would be, how do you know? Gone is the age of pop-ups and loud annoying virus sent more to disrupt. Modern attacks focus to data extractions, data corruption/encryption or device harnessing. For all of these, bar corruption/encryption, the aim is to remain undetected. For the most part if you are trying to pull data from a device or harness the computer as a salve for your attack network then you don’t want the device owner knowing you are there. Therefore, the argument that you have never had a virus falls over. You should be saying “We have no idea if we have had or have a virus or suffered a cyber-attack as we don’t have the tools to detect such attacks” .

cyber attack

 

“I barely use that laptop”

Secondly, I need to address the obvious. Any device is at risk regardless of how little you use it, how infrequently it is turned on and how expensive it was when you bought it. This principal also applies to servers, virtual, physical and on cloud platforms. If it is running an operating system based on Windows, Linux, Unix or MacOS there will be an attack out there that is designed for that system. This even applies to appliances provided for dedicated applications like, phone voicemail systems, door access control and system controllers. Because of this, you need to ensure that your servers also have the protection in place and if they cannot have the protection directly installed that you have a product that can protect at network and hypervisor level against incoming attacks.

 

Therefore it is critical that your business protects itself with the minimum protection being put in place in the form of endpoint security. This said, while you can pick up these products for a few pounds from certain vendors, we would always recommend looking at a industry leading vendor. Choose one who specifically work within your business space and have the full suite of tools that can be used. This will help ensure that you reduce the risk your business faces from cyber threats.

endpoint security

If you would like to discuss with myself or any of the cyber security team at Planet IT about how you can better protect your business, should that be with new technology, strategies or even better backups you can reach us using the contact details below;

 

Contact me at – LinkedIn Message James Dell or Email : james.dell@planet-it.net

 

Call 01235 433900 or Email : architecture@planet-it.net

 

Photo by Clint Patterson on Unsplash

Windows 11 is here. It’s glorious but hold your horses!

Windows 11 is here

Windows 11 has arrived with a fresh new look, increased speed and a whole host of new and improved features. However, if your business is looking at Windows 11 and thinking, “we only just got off Windows 7”, now is the time to be thinking about the future.

 

You don’t need to update today of course; you officially have until the 14th of October 2025 to get your estate from Windows 10 to 11. However, as many businesses learnt the hard way with Windows 7, the migration to a new operating system is not all plain sailing.

 

Windows 11 brings its own complications and challenges, when it comes to application support, hardware support and the overall end user experience. All of these can be overcome but only if the business understands them and understands how to combat them.

 

How should you start the roll-out?

Our suggested approach is that from November 2021, a strategic steering group be created within your business to test, run, and live with Windows 11 as their primary business device. The aim of this is to begin to unpick the operating system in your business and ultimately to ensure business functionality.

 

We will recommend that for these users, a spare Windows 10 device is kept in your office to provide to these members of staff in the case of a failure. This will ensure your user can get back working in a short space of time, however as a business you need to start assessing and understanding the impact that Windows 11 will have on the company and then laying the foundations for migrating across to the platform with-in one year from active support (October 2022).

windows 11 surface devices

Why starting early is key for business continuity.

This adoption is crucial because many businesses were impacted negatively by holding onto Windows 7 for far too long past its good end of life. This was in part due to the fact the businesses had not invested the time into ensuring they understood the business change and how to successfully manage this. It is vital that this process is started early, the issues learned and how to overcome these. From this you can then develop a staged team by team plan, alongside the testing to ensure that once a satisfactory level of business support and satisfaction is reached that users begin to migrate over from Windows 10 to 11.

 

The Big Rollout.

We suggest completing the migration in a team by team, location by location and in a phased approach. We would suggest that any business needs to be off Windows 10, 1 year before the end of support in 2025 as you do not want to be in the same potion that many where come the end of Windows 7 support. You must remember that once this date hits any system still on this legacy operating system will be at risk from attack and will increasingly be a target for cyber criminals.

 

If you would like to discuss with myself or any of the Technical Architecture team at Planet IT about how you can get ready for Windows 11 you can reach us using the contact details below.

 

Contact me at – LinkedIn Message James Dell or Email: james.dell@planet-it.net

 

Call 01235 433900 or Email: architecture@planet-it.net

windows 11 launch

Webinar Recap: Microsoft New Commerce Experience – Big changes are coming!

Microsoft NCE changes

This week, we hosted a Live Webinar where we outlined the upcoming changes to how Microsoft sell their licences and it affects organisation of all kinds – what Microsoft are calling their New Commerce Experience (NCE).

🚨 As a Microsoft Gold Partner. we were one of the first in the UK to present this. We were so early in fact, that only a couple of short hours after the webinar, Microsoft announced that they will be pushing back the release date for New Commerce Experience from October 14 2021 to January 2022! 🚨

The reality is, that it is still happening. This just gives us a little more time to decide on the licences that best suit your organisation.

So please still watch the webinar recording below. All the information is still key to making the right decision for your business. To ask any specific questions about your situation, reach out to your Planet IT account manager or email enquiries@planet-it.net.

On the webinar, our resident Accredited Microsoft Experts, James Dell & Adam Harrison covered:

✅ The price increases for CSP licences.

✅ Open licensing is moving to CSP. How will this affect you?

✅ How the Enterprise Agreement resizing will affect you.

✅ How CSP licensing terms are changing.

✅ How these changes effect your existing licensing

 

Did you miss it? Or would you like to watch it again? Well, the good news is that we recorded it and you can check it out here:

Your Questions, Answered.

We received lots of questions throughout the webinar and did our best to answer them. Watch the recording to see if your questions would be answered at the end, however if you have any more, please reach out to James himself on 01235 433900 or email directly: james.dell@planet-it.net.

Remember to ask him about our Microsoft 365 health Checks!

 

 

 

 

Top 5 Cybersecurity Trends So Far This Year

Cybersecurity trends 2021

We are all too aware that the cybersecurity landscape is changing and will continue to change as the technology we use every day continues to adapt, develop, and alter our daily lives.

Put very simply, this trend is clear when you compare your 2010 Honda Civic to the latest release from Tesla; technology is embedded into every corner of our lives and it now even governs your driver safety.

Because of this, the drive to protect business and individuals from threat actors has never been more important. With an ever-shifting set of cybersecurity goalposts becomes the need to understand, adapt and overcome whatever threats may come your way.

As such in this article I am going to take you through five trends we are seeing when looking a cybersecurity and the defence of your IT infrastructure.

1. The Expanding Cyber-Attack Surface

According to cybersecurity ventures, the world will store 200 zettabytes of data by 2025. This data is coming from thousands upon thousands of different sources and a considerable amount of the data is now being driven by IOT and smart technologies.

As I mentioned in my introduction, think of all the data that every Tesla on the road today is generating, the pure volume of telemetry data, decisions, battery health and all the other statistics these mobile computers are generating is staggering. Now think about your smart home, with fridges that can be remotely controlled, lighting, cooling, heating and even garage doors that can triggered from anywhere across the globe, then add into the mix home security systems link Ring Doorbell. All of this sits outside the realm of what for many would have previously considered data that needed to be secured. However, it is easy to see how data like the time you leave your house, the speed you drive and direction you travel, could be of value to a threat actor and even worse could be data they leverage against you.

This however is just to the point, the fact that as businesses are having to daily adjust the scope of what is and is not part of the business attack surface, this leaves the threat actors room to move and the gaps they need to turn your secure system into Swiss cheese.

5 years ago, CCTV may or may not have been the responsibility of the IT department. Today, with digital cloud driven solutions, this firmly sits within a business IT attack surface and is a clear technological risk.

IT Hardware and software

Similarly, take the smart card reader that opens your office doors and your car parking barrier. This is a business attack surface which in the traditional IT model we would have simply been able to ignore. This is no longer the case. It sits on the list which will continue to grow of new areas where CISO, cyber security experts and IT teams in general need to protect.

This trend will of course continue. As IT professionals we must adjust our

security posture and consider how this effects the technologies we use to protect our data and our systems.

There is by no means a golden bullet but there are key markers for success in this area.

 

2. Ransomware as a Cyber Weapon of Choice

Ransomware has been around for almost two decades and has grown in popularity because it can more easily bring financial rewards to hackers. It is estimated that there are now 124 separate families of ransomware and hackers have become very adept at hiding malicious code.

The reason is that ransomware became a weapon of choice for hackers in the last 18 months was drive by the COVID-19 pandemic. This instantly altered a digital landscape that for many businesses had been slowly changing. In fact, most were stuck to the traditional walled garden of onsite infrastructure and controlled working environments. Now, with the transformation of so many companies and how we operate as a mostly digital, this creates more targets for extortion. According to a research, ransomware increased by 435% in 2020 as compared with 2019.

In 202, the estimated cost of ransomware was £14.5 billion – a rise from £8 billion in 2019 and £5 billion in 2018. That trend will continue to grow.

The likely impact for the near-term future is that there will be more ransomware attacks against institutions and corporations who are less cyber secure and cannot afford to have operations impeded. This includes health care, local governments, and educational institutions. For these sectors the need to adapt and overcome the finical challenges of protecting their businesses has never been more paramount.

 

3. Increase in adoption of cloud services

Cloud vulnerability continues to be one of the biggest cyber security industry trends. Again, the rapid and widespread adoption of remote working following the pandemic increased the necessity for cloud-based services and infrastructure drastically, with huge security implications for organisations. For many, these implications where not understood or ignored as the business threw themselves into a cloud strategy in sheer panic in 2020.

work from homeDon’t get me wrong, cloud services have become essential and offer a range of benefits – scalability, efficiency, and cost savings – but they are also a prime target for attackers.

Misconfigured cloud settings are a significant cause of data breaches and unauthorised access, insecure interfaces, and account hijacking. All of these are avoidable but for many businesses they simply don’t know the vulnerabilities are there. During our webinar series, I often talk about the shared responsibility model. It is key to keeping the door closed to attack but is greatly misunderstood or even ignored by a lot of businesses.

 

4. Social engineering attacks getting smarter

Social engineering attacks, like phishing, are by no means new threats but have become more troubling amid the widespread remote workforce of the last 18 months. Attackers target individuals connecting to their employer’s network from home because they make easier targets. The attack looks to exploit the weak link in most businesses’ security posture, the end user.

As well as traditional phishing attacks on employees, there has also been an uptick in whaling attacks targeting executive organisational leadership. This trend sees CEO, CFO and other business managers being impersonated to other employees or customers to gain financial details or gain credentials.

SMS phishing – sometimes known as ‘smishing’ – is also gaining prominence, thanks to the popularity of messaging apps such as WhatsApp, Slack, Skype, Signal, WeChat, and others. Attackers use these platforms to try to trick users into downloading malware onto their phones, which for many are now heavily linked to the corporate network be that via email or shared file access. For many businesses, MDM or MAM are technologies they still haven’t invested in.

Organisations are increasing their protection against phishing, but criminals are always looking for new ways to stay ahead. This includes sophisticated phishing kits which target victims differently depending on their location. To stay ahead of these trends, businesses need to ensure their staff understand and can act as the human firewall against these attacks – social engineering is not something that technology alone can protect your business from.

 

Managed IT support Oxford

5. The Future, Privacy-enhancing computation techniques.

To change pace slightly now and look less at the trends around attack vectors and how the threat actors are getting in and more around how the cyber security industry is helping us all fight back.

Privacy-enhancing computation (PEC) techniques are emerging that protect data while it’s being used — as opposed to while it’s at rest or in motion.

This marks a dramatic shift in the level of protection we can leverage onto data and how we can continue to work to lock out the threat actors from data at all stages of its life cycle. This technology will also enable secure data processing, sharing, cross-border transfers and analytics, even in untrusted environments.

This technology is rapidly transforming from academic research to real projects delivering real value, enabling new forms of computing, and sharing with reduced risk of data breaches.

I would expect to see these products in your security portfolio in the next 12 months.

 

With the landscape continuing to move beneath our feet daily, as IT professionals, we need to stay ahead of the trends and ensure that we are looking at what threats are just over the horizon.

No IT team can afford to rest on their laurels as the successes of yesterday will not protect you from the threats of tomorrow.

If any of this is of concern to you, whether you are an IT professional, a business leader or simply have cybersecurity fears, please reach out to me or one of my team and we will be more than happy to assess your situation. We are in this war together, and we can’t let the bad guys win!

email: architecture@planet-it.net

call: 01235 433900

or connect with me on LinkedIn: https://www.linkedin.com/in/delljames/

 

 

 

Windows 365 – Windows 11 Comes to your Browser!!

Cloud PC Windows 11

Microsoft has just announced a new “Cloud PC” product where users can stream windows devices from anywhere!

When COVID-19 hit, many people in offices were forced to start working from home. Because of this, Microsoft sped up into the development of Windows 365 so people, wherever and whenever, can work more collaboratively.

Windows 365 will work similarly to what we know as game streaming. The computer will be hosted in a data centre, somewhere remotely, and then streamed to local technology.

This means all sorts of devices from anywhere, ranging from family computers in your home to monitors in the office, that runs Windows desktop can leverage Windows 365 and then you can close the session knowing that your data is safe, secure and saved.

Security Is Key

It is way more secure than working on a local PC, as your local PC is most likely full of personal applications, data and untrustworthy applications, which may go against your business practices. Windows 365 then solves multiple problems such as keeping Word documents and important PDFs where they belong, in business cloud storage, and not at risk of exploitation.

Additionally, Windows 365 will have ultra-fast connections to Azure and Office 365 data, which is very useful when it comes to handling data and finding sufficient ways of sharing workload amongst peers.

Microsoft is marketing it as the new way of using a PC, they want to find a way of demonstrating and solving the difficulties of working from home, so as they state, it is a “hybrid Windows for a hybrid world”.

 

So when do we get to see it, and how does it work?

The software will launch in August for business customers of all sizes however under the technical covers of it all, it is built on Azure Virtual Desktop and managed through Microsoft Endpoint Manager (MEM), Microsoft’s cloud-hosted device and application management solution and for those without MEM, tools are directly integrated into the Cloud PC portal. A MEM licence is therefore not essential.

Windows will also use multi-factor authentication capabilities and admins can apply security policies using MEM if needed. Furthermore, Microsoft has designed a custom “security baseline” meaning a set of policies can be applied to Windows 365 as a simple baseline, however, you can modify this to fit your criteria.

There are even plans in the future for an offline mode, though this will not be included in the initial release. When that happens, they would then be supporting an offline mode where the whole virtualisation environment can run locally and be isolated from your local operating system. When your connection gets restored then that workload will automatically move back up into the cloud. In the complex cybersecurity environment we have seen, businesses need a solution that helps their employees collaborate, share and create while also keeping their data secure.

If you want further information about Windows 365 and how this could change your business practices, then please feel free to reach out and get in contact using the details below

Call 01235 433900 or Email : architecture@planet-it.net

 

Harriet Besford

This article was written by 17 year old Harriet Besford, a Didcot Sixth Form student who joined us at Planet IT for a week’s work experience. Harriet has a keen interest in Cyber Security with plans to study it at University. I think from reading this article, you will agree that she has a strong future in this field!

 

It’s Time Your Business Adopted UEM, And This Is Why!

UEM Endpoint Device Management

The way in which we manage our workforces’ devices is changing. Gone are the days of large, overly complicated on-premise management solutions like Quest (Dell) KACE and Microsoft System Centre. With the continued drive of remote working, flexibility and ultimately employee separation our management tools need to change, now.

Luckily, Microsoft where ready for this move to remote management. They and have spent a long time and A LOT of investment in turning the 2011 product of Microsoft Intune into the 2021 product, which is now known as Microsoft Endpoint Manager, a now formidable UEM (Unified Endpoint Management) tool.

Evolution – just in the nick of time

The original Intune product was designed to answer the question of the time: How to we provide some form of management to the changing device landscape? With the launch of new form factors, and splitting operating systems at the time, this EMM (Endpoint Mobility Management) tool focused on delivering the same basic functional control across the spectrum of devices it supported.

Microsoft is not a company to miss a shift in the market. They released that as we moved into the late 2010’s and into 2020’s that business no longer wanted two products, one to manage devices onsite and one to manage them in the cloud. With this they began the process of taking the features from Microsoft’s System Centre Configuration Manager and merging them with the EMM tool, Microsoft Intune.

This process happened just in time to be ready for the world shifting events of Early 2020. The now mature product from Microsoft gave the best of Config Manager, Intune’s EMM and the fringe features of MDM and MAM that the suite had been dabbling with.

intune device management

So, the question then becomes, why are you not using it?

For nearly all business,Microsoft Endpoint Manager can play a huge part in ensuring:

1. All your devices controlled,

2. Windows is up to date,

3. patches and software are being deployed and managed.

This on its own takes away 3 key functions you may have existing systems in place to support. However, the largest success for Microsoft Endpoint Manager comes in the form of flexibility. Your users don’t need to be on your VPN, in your network or even in your country to get software updates or even new packages.

This is only then strengthened when we look at the white glove, of out of box experience which can be leveraged with Autopilot.

UEM Device managementImagine you never had to build a laptop again!!

Wouldn’t that just be great? Not only that, but imagine that if a device needed to be moved from user to user. Then you could remotely reset and deploy a fresh version of the operating system and all applications to the device, join it to the domain and have it ready to be reused.

Well with Endpoint Manager and Autopilot you can do just that! The core logic behind the approach is that you don’t need to touch a device to get it ready to use.

Now this can either be directly from the factory or on a previously managed device. This will reduce the time to resolution on support issues and ultimately free up you and your team to work on project that are more important.

With this process, gone are the days of creating a gold image having to run sysprep and then trying to configure the Out of Box Experience with an answer file. Microsoft has simplified this down to a steps-based process. This uses the latest image from Microsoft alongside an answer file based on the Microsoft Endpoint Manager interface, not on a text file. This combined gives you a great position to show business improvements from a system implementation.

Where can YOU make improvements?

The biggest question to ask yourself is where could you optimise your;

  • device management,
  • system imaging,
  • software deployments,
  • application installations and updates,
  • operating system updates
  • and device provisioning?

If the answer is that any of these could be improved, then Microsoft Endpoint Manager is the platform you need to be looking into.

These are just some examples of what Microsoft Endpoint Manager can do. I would be remised to say that the above is a fair representation of all that the suite has to offer. The product is massively impressive and continues to develop and grow as Microsoft as a company moves away from the legacy of its on premise-based solutions to a truly cloud driven SaaS approach.

I know taking this step might seem like a leap in certain circumstances. However, I am always available to discuss how you can leverage better device management for your business. As are the rest of the Technical Architecture team at Planet IT

Please feel free to reach out using the contact details below:

Contact me at – LinkedIn Message James Dell or Email : james.dell@planet-it.net

Call 01235 433900 or Email : architecture@planet-it.net

Windows 11. Huge Steps Forward, But The Death Of Many Devices

windows 11

Microsoft have announced Windows 11!

For now, we can ignore the fact that Microsoft promised that Windows 10 was the last Windows version…. and all the other misleading info around this new version even existing. Windows 11 is here, and it has LOTS of improvements and design changes.

However, this article is not to talk about those. As Windows users, we all know that the move from OS to OS can be hard. Businesses struggle to get the user base, applications and configuration from your current version of Windows to a new one. It can be a mammoth task!

You won’t have a choice to keep Windows 10

That said we know Microsoft will ultimately force your hand. In 2025 Windows 10 will lose support and join XP and 7 in the list of operating systems people continue to use even though they are not supported or safe.

The big change with Windows 11 is that a number of hardware items that were previously supported with Windows 10 will no longer be supported. This is what drove me to write this article. It means many businesses will need to replace a lot of machines. So, I wanted to highlight the devices you may have that are now on a limited life span, a ticking clock as it were, to the end of support.

The official Windows 11 requirements:

  • Two Process cores of 1Ghz or higher
  • 4GB of RAM
  • 64GB of Storage
  • TPM 1.2 or higher with Secure Boot Capabilities

Windows 11 devices

What this therefore means, is that Intel’s i3, i5 and i7 processors from the 6th and 7th get are not eligible to update to Windows 11. While on the AMD side all A and Fx Series processors are not supported. Ryzen 1000 and 2000 chips will also not support Windows 11.

Now this is a big change as Microsoft. In the past they have done their best to only remove a small number of devices from support. This was truefor upgrades to Windows 8, 8.1 and 10 all supporting the same devices which could run Windows 7.

What does that mean for my IT estate?

Audit now! You need to understand which devices you have that won’t be supported on Windows 11 and they need to enter a hardware refresh plan in the next 3 years. By 2025, these devices must be replaced.

For many this won’t be an issue. But for some education and small businesses, this is going to be a large finical burden. These changes can also hit companies using custom built PC’s which use hardware which may be from cross generations. There’s a chance these will not support the Windows 11 software.

If you are struggling to understand which devices will and won’t accept Windows 11, there is a tool from Microsoft which will tell you in your device is eligible to run the Windows 11 which you can get here: https://aka.ms/GetPCHealthCheckApp

If you would like to discuss with myself or any of the Technical Architecture team at Planet IT about how you can get ready for Windows 11 you can reach us usin:

LinkedIN: James Dell

Or email james.dell@planet-it.net

install windows 11

NOW it’s time to embrace the fibre roll-out!

fibre broadband

In the last 12 – 18 months Planet IT has seen a huge rise in the demand for better connectivity, fibre ethernet and faster speeds, motivated by the desire to move to resilient cloud-based solutions and the drive for remote working.

Many organisations pre-COVID, were simply “getting by” with copper variants such as FTTC (fibre to the cabinet) and GEA (generic ethernet access). These were previously adequate for the business requirements of the SME market. However, the epidemic has increased the need for reliable, sizeable, and dedicated managed data circuits.

Accessible to the masses

Historically, ethernet circuits or leased lines (as they are commonly referred to) were deemed cost prohibitive to the masses (unless you were a large corporation). But, they relied heavily on available infrastructure, exchange capacity or location. This is no longer the case. In fact, many rural locations are surprisingly well supported. They are no longer suffering with poor speeds or service restrictions, as a direct consequence of outdated equipment or lack of infrastructure in the exchange.

Now’s the time!

With the upcoming switch off around copper-based services, there has never been a better time to review data connectivity in your area.

Currently the UK is undergoing a major fibre roll out utilising underground fibre optic cables to transmit data far quicker and with fewer reliability issues than copper wires. This has resulted in the cost to deploy such services reducing considerably, making ethernet circuits accessible to all, without a high price tag.

Furthermore, many ISP’s will absorb the first £2,800 of ECC’s (excess construction charges) previously passed on to the end user, as these covered the costs to determine the route required to deliver circuits to site.

copper vs fibre broadband

Why Ethernet?

It’s simple! Just look at the benefits:

  • Speed: Synchronous dedicated bandwidth (simply put, you get the same speeds up and down)
  • 99% SLA – Faster engineer response and fix
  • Security
  • Flex up & down to help cope with peak times and demand.
  • Real time bandwidth management and reporting
  • Exchange and Carrier diversity
  • Increased efficiency

As an aggregator, Planet IT offer managed ethernet circuits at a price which do not involve a sharp intake of breath, strong coffee, and a seat!

Challenge Accepted

In fact, why not challenge us to beat your price? We are so confident that we will be able to beat your current price, that if we cannot, we’ll buy you lunch!

Best case scenario, you save on your ethernet. Worst case, you eat for free.

Give me a call on 01235 433916 or email farah.nazir-chapman@planet-it.net… I’m up for the challenge. Are you?

Virtual Roundtable Recap: Facing and Overcoming IT Challenges In Education

Education IT Event

This week, our panel of special guests came together for an educational virtual round table event. Our panellists discussed the challenges they have faced in their education provider and how as IT professionals, they overcame these challenges.

We also opened the floor up to our selected guests so that the panel could try to help them with their challenges.

Our panel included:

David Higgs, Security and Service Experience Centre Lead at Imperial College London

Mike Pearce, ICT Network Manager at St. Cuthbert’s Roman Catholic Academy Trust

Graham Rivers, ICT Network Manager Moulsford Prep School

James Dell, Head of Technical Architecture and Education specialist at Planet IT

 

Discussion Points included:

  • The challenges encountered when delivering IT solutions to their organisation
  • How our guests overcame these challenges and turned them into successes
  • New trends & technologies critical for educational IT in the next 12 months
  • The ever increasing threat of cyber attack
  • BYOD (Bring Your Own Device)
  • Hiring and building a team on a budget

 

Did you miss it? Or would you like to watch it again? Well, the good news is that we recorded it and you can check it out here:

Remember, if you you have any questions or challenges that you dafe in your Education IT career, then please reach out to James Dell and he would be more than happy to talk you through the solutions he found to any similar obstacles. Call 01235 433900 or email james.dell@planet-it.net

 

Looking for a technology partner?
Let’s talk

  • This field is for validation purposes and should be left unchanged.