Midsize businesses owe their strength to their flexibility, to their responsiveness, and to empowered employees. I give them IT to match and seamless digital transformation that pays for itself through hundreds of thousands of dollars saved in license costs (via the use of Free Open Source Software Technology.)
Spend two minutes on this site to discover some of the things I can do for you, and how I aim to make IT friction-free for your company. Then head to my blog for details.
Use this page to order our services, our payment portal to manage your "subscriptions", and our onboarding page to manage your users.
For a thorough description of my role at your side, ask for a copy of my concise and easy to read IT Flipbook, a resource for those who think about what information technology and IT staff should do for them.
And of course, let's meet.
1 - 4 0 8 - 4 7 9 - 3 1 3 6Download my resume
I am an IT infrastructure engineer, and I am here to "cover your back" with ad hoc technology and expertise. Additionally, I know that what matters most to you on a daily basis is that I solve your software, computer issues, and IT challenges on-site and on time. Problem solving, hands-on friendly support, and empowering training is the heart of what I do. [More]
I help businesses transition to a software-based IT infrastructure where hardware, software and data are disentangled from each other and become easier to use, manage and protect. Users can access the resources they need from the device they prefer. New PC's, applications or servers can be deployed in minutes within or outside of your firewall perimeter. Backups are automated. This infrastructure rests on a small HCI server cluster. It can be scaled to thousands of users. [More]
With remote work, mobile technology, cloud, and shadow IT, the castle-and-moat approach to cybersecurity no longer works. There is no network perimeter to protect anymore, only endpoints and applications. You now need Zero Trust technology. [More]
I shield my clients from the vendor lock-in and security risks inherent to using proprietary solutions (through the use of FOSS). Access to your data and infrastructure by third party entities is limited to service providers you trust (e.g.: SaaS LOB's, Microsoft 365, Google Workspace, Proton...). The tools I use to manage and monitor your computers and M365 are self-hosted in single-tenant servers (to insulate you from supply chain attack.) [More]
When new threats emerge, old threats do not disappear. I shield my clients’ personal computers, servers, virtual servers, virtual desktops, and file shares from viruses, intrusions, leaks, losses, data exfiltration, ransomware, parasitic network traffic, SQL injections, and from DDOS, Zero day, and MIM attacks... [More]
I protect my clients' IT infrastructure from downtime and catastrophes through systematic redundancy. Whatever can fail has its failover mechanism: physical servers (on-prem, off site or in the cloud), firewalls, domain controllers, file shares, applications, personal computers, access to the internet, VPN, network, and Office Suites. [More]
I achieve dramatic savings in license and maintenance costs through the use of free, standard, scalable, and robust open-source software for the management of your personal computers, servers, hypervisors, domain controllers, apps, shares, cyber security, and backups. This alone can cover the cost of my services. [More]
I adapt IT processes to regulatory requirements and ensure that the systems my clients use or select facilitate and enable adherence and reporting. [More]
I manage my clients' vendors and help business units select, implement, and manage the LOB solutions they need to streamline processes and achieve objectives. [More]
I build sites for my clients that are so useful that dispensing with them would be reckless or prohibitive (for their clients.) [More]
For the sake of simplicity, accuracy, and transparency, I price my services on a per device basis. To each device corresponds a service. The "devices" are servers and personal computers - physical or virtual - and the software they run, as well as firewalls and networking equipment. Mobile phones are supported alongside PC's. Prices decrease with quantity. Unless specified, CIO support and software are included.
The aforementioned "service" is the work involved in system setup, ongoing management and monitoring, support to the user, and trainings.
Check our service catalog for more details and options. Use our payment portal to manage your "subscriptions", and our onboarding page to manage your users.
Categories of equipment and their relative service cost
"Paul assists me with the system administration of the local virtualization cluster that runs your virtual desktops, your domain controllers and the servers that host your network shares, PC data, and cloud backups."
"Sophie assists me with the deployment, administration, and management of access permissions for all your Google business services, mobile apps, and Chrome OS devices."
"John assists me with the configuration, maintenance and monitoring of all your networking and cyber security equipment and systems."
Use this contact form to introduce yourself and let me know when and how to contact you. You can also use this form to ask for a free copy of my book. This book is one of the most concise IT Plans you will ever read. Thank you.