Crosslin Technologies has expanded its team and added Michael Thuma as senior network engineer and Ken Dixon as systems analyst. Thuma brings more than 17 years of experience to the position, most recently having served as director of information technology for John W. McDougall Co. He also has worked as a senior network engineer […]
About Crosslin Technologies
This author has yet to write their bio.Meanwhile lets just say that we are proud Crosslin Technologies contributed a whooping 32 entries.
Entries by Crosslin Technologies
Crosslin Technologies Principal Shane Clancy recently came across an article in the Harvard Business Review that discusses today’s corporate environment and the absence of technology expertise at the executive level. “All Boards Need a Technology Expert” points out that executive leadership typically has broad leadership and management experience rather than a specialized expert focus, such as information […]
Crosslin Technologies has added Cory Willard as a systems analyst. Willard brings more than 16 years of experience to the position, most recently serving as an avionics technician and installer with Carpenter Avionics. He is a veteran of the armed forces, having served in the U.S. Air Force. Willard received his Associate of Arts in […]
Congratulations to Crosslin Technologies Principal Shane Clancy, who was named a winner in this week’s Veterans Awards sponsored by the Nashville Business Journal. Thank you, Shane, for your service to our country. We are so proud that you are now a leader for our team!
We have exciting news to share with you. Crosslin Technologies has expanded its information technology base by acquiring ProAccura, a managed IT services provider and consulting firm located in Nashville. With the combination of companies, Crosslin Technologies now offers managed IT and managed communications services in addition to our existing security and compliance consulting and […]
Integrating electronic health records (EHR) into your small medical practice holds the promise to save time and money. Trading in rows of filing cabinets for a couple of servers may also give you the opportunity to reap bigger rewards from government programs like the Medicare and Medicaid EHR Incentive Programs. Several pain points hold smaller […]
The term “virtualization” has become somewhat ubiquitous in any area of information technology, although the definition seems to change and can be confused with other technologies. For most, it represents a move away from the tangible to the immaterial, from hardware to software, from dedicated equipment to shared storage spaces on the Cloud. So what […]
Often when technology professionals communicate with small business owners and other non-technical professionals, it may seem as if they are speaking an entirely foreign language. Curtailing the tech talk and relating the customer’s needs to technology solutions should be a priority for information technology experts. If he or she does not provide the right information […]
A continuation of the previous blog post, these terms extend the description of the protective technologies that current firewalls are capable of. Unified Threat Management (UTM ) UTM protects from attacks, viruses, Trojans and other malicious threats by consolidating multiple network security features onto one platform. This can include network firewall, intrusion detection/prevention, gateway […]
Some of the tech-talk related to network security can overwhelm of staff not steeped in the nuances of the burgeoning information technologies and ever-multiplying acronyms. For small to medium sized businesses without the budgets to employ a full-time IT security professional, making the right choice on a firewall solution can be confusing. Even having the smallest grasp […]