Latest Posts

How the Cloud is Going Green

Building a “green” business with a focus on reducing environmental impact is not just trendy — it makes sound business sense. Often, minimizing the carbon footprint of your business means not only reducing waste but also minimizing power usage and a movement toward energy efficiency. Since energy costs money, reducing the amount of electricity needed […]

The World of Summit

At Summit, we strive to be a complete solution for all your IT needs. But how do we do it? Here’s a rundown of all the products and services we offer.

Enterprise Storage Options

Enterprise storage optimization isn’t always given top priority. Managing systems, dealing with issues and helping end-users can easily take up all your time. This leaves little left to plan and optimize your enterprise storage system proactively.

VoIP Troubleshooting

While Voice-over-IP (VoIP) telecom systems have been around for years, they still encounter issues from time to time. VoIP systems rely on the internet and are therefore vulnerable to interruption or outage when network issues occur, such as latency, packet loss and jitter. When you run into issues that take down one of the main […]

Tech Industry Environmental Impact

When you think of the tech industry, you may think about ever-increasing efficiency, faster speeds and shrinking chip sizes, but there is a dark side to the advances. Also known as Moore’s law, the exponential doubling of the power of computer chips has led to an increase in electronic waste. However, physical waste is only […]

Grey Market Fear, Uncertainty and Doubt

You may have come across advice in the IT industry, stoking fear that not buying through traditional Original Equipment Manufacturers (OEMs) would somehow endanger your business. That used or refurbished equipment may be counterfeit, that used equipment is more expensive or comes without warranties or even that it’s illegal to buy used or refurbished equipment. […]

Choosing the Right Firewall

Your firewall protects your internal network from the public internet. It is the first line of defense to stop intrusions and malicious attacks from entering your network. The manufacturer of the firewall hardware provides definition files. The firewall scans the network using these definition files, which provide patterns for normal network traffic. By comparing the […]

Tariffs and Technology

If you’ve read the news recently, then you’re aware that the tariffs on Chinese merchandise have been raised again — in fact, they’ve more than doubled. As we discussed in our blog post on price increases, tariffs can play a significant role in the increasing prices of essential networking equipment. Tariffs and Trade Wars Major […]

How Summit Reduces Tech Waste

Waste from technology, known as e-waste, can be especially toxic and, as people are getting new cell phones every other year, it’s becoming a real problem. However, by recycling and refurbishing old technology instead of throwing it away or buying used equipment instead of new, you can be part of the solution. Why Go Green? […]

Vulnerability Scanning 101

Protecting your network is an essential part of network maintenance. One of the ways you can keep your network safe is by performing regular vulnerability scans. A vulnerability scan is an assessment that checks for vulnerabilities, or weak spots, in your computer, server, network, or infrastructure. How Does it Work? One of the most common […]