Archive for the ‘Industry News – Reprint’ Category

  • Do you assume you have good backups?

    Posted on: May 2nd, 2020 by Adminstrator

    I have had 100's of discussions about how customers do backups. History tells us that 6 out of 10 businesses will experience some type of data loss or technology disaster. They are very proud of their strategy and often go into a lot of detail. When I ask how often they do test restores on important files, do they have multiple backup locations and if they backups are encrypted at both ends they often get quiet. Here are some of the most common problems we see and some simple solutions.

    The goal of backing up files is not to do the backup but being able to successfully restore your most important files and applications if a disaster strikes. If you are backing up only your data it will take a long time to build a new server, install the applications and updates and then load the data. You could be down for a week.

    1.Make sure you have a backup of your most recent images. This will include the operating system, applications and data and allow you to restore a recent image if the event of a natural disaster or Ransomware virus. Know your restore point objectives (RPO) and restore time objectives (RTO) under your current plan and check with management to make sure they are acceptable.

    2. Plan for data growth and expansion. There is nothing worse than having to go to management because you haven't planned for the growth and having to reduce the scale or the number of images you are currently backing up. Or worse, you find out in real time that you have run out of room to complete the backup.

    3. Is your company or industry subject to regulation? Obviously that complicates things, but having external guidelines can help cover all the bases and show you where you can exceed your competition.

    Keeping in mind that regulations and legislation aren’t usually written by IT pros, don’t assume that just because you’re meeting the letter of the regulations that you’ll be a happy camper in the case of a major disaster event or breach. The only true proof is in fully running actual test scenarios and proving that you can restore data trivially and from bare metal if needed. Just ensure that the test doesn’t turn into an event unto itself; have backups of backups ready the first time you run a test, and as needed after that.

    4. Are your backups automated and do you have tools to make sure the backups are completed properly and restored easily? All too often we see human error in manual backups. Also critical files are moved, and the backup is not updated. At the same time, even if backups are automated – you need to manually and randomly check for issues that the automation may not catch, like customer-facing SSL errors, bad file types or naming convention errors, or other issues that humans can see but machines have trouble catching.

    5. Do you have a current Disaster Recovery plan that is updated annually – at a minimum? Too often customers have a good backup in place for systems two or three years removed from the present. While threats like servers getting fried in an electrical storm, server room flooding and fire aren’t going away, new hardware systems, altered power lines, cooling, and a host of other changes will affect your existing plans, and everyone’s disaster plan must now include a number of pandemic considerations, ranging from reduced or remote staff up to long-term shutdown and reductions in availability of partners to deliver service.

    6. Has your current backup vendor reviewed your environment recently to learn about your business, critical infrastructure and growth projections? Do they offer expert engineers to help with the data recovery in the event of an accident or catastrophic event? Because no two businesses are the same, it’s critical that your backup service provider can see all your mission critical assets are covered, including archival data and outliers like CRM connections and mods, API connectors between your internal systems like invoicing and contract management – and other key pieces that are sometimes outside of the scope of a regular backup. Those little details can be the difference between a trivial event and a long-term business chokepoint.


    TSP Pyramid offers a variety of backup and support services. To get started on a practical backup assessment, call your Pyramid account manager today!

  • PTSICloud: An Appealing Mix of Comprehensive Cloud Technology and Caring Customer Service

    Posted on: July 23rd, 2015 by Joel Nimar

    Cloud computing offers an array of conveniences, although many users seem to be running into continued frustrations with their cloud provider. Many users are experiencing a lack of caring customer service from their cloud provider. A shocking third of respondents in a recent Forrester survey claimed that their providers charged them for every question or incident, no matter how minor. Furthermore, several respondents believed that, due to the small nature of their businesses, their cloud providers didn’t care enough to provide a sufficient level of service.

    Although attentive customer service is clearly lacking among many cloud providers, I am proud to say that we have it in abundant supply at PTSICloud. Our customers choose our cloud solution over others because of three simple factors; Technology, Price and Value – And PTSIcloud delivers on all exceptionally.

    Here’s What Makes PTSIcloud Different from other Cloud Providers

    ptsi cloud comparison


    Industry-Leading Technology

    One of the biggest benefits of cloud services is the ability to have outside parties handle logistical concerns. However, if a cloud provider is not equipped with the necessary level of technology, clients may face even greater hassles than they would if they handled such matters on an in-house basis. Our valued clients at PTSICloud enjoy access to highly available reference architecture, which allows for the easy and accurate selection of the best approach to implementation. Our service runs on reliable VMWare; when problems do pop up, they are handled quickly and accurately by PTSICloud’s knowledgeable and prompt operations team. All of our data centers are based in the United States; this enhances tech support and ensures the quick and seamless transfer of data. Despite this local focus on tech support, we also maintain the geographic diversity necessary to ensure that, should security issues take place, there is sufficient distance between the primary and secondary sites.

    Fair & Consistent Pricing

    Clients demand excellent service, but they also prefer to work with providers that offer fair pricing schemes. Our approach to pricing is both fair and consistent – you won’t ever deal with any surprises. Clients working with alternative providers often complain of being charged for everything from API calls to throughput. The result is an unfortunate level of invoicing variation. Our clients, however, can be rest assured, knowing that our flat bill approach will result in predictable pricing.


    Ultimately, clients desire a combination of reliable service, fair pricing, quality tech support and full transparency. We offer all of the aforementioned qualities, thereby minimizing the potential for operational or financial problems related to cloud maintenance. From minimal outages to personalized and customized solutions, it is easy to see why clients are so enthusiastic about PTSICloud – it’s a cloud solution that provides great value to any organization.

    For more information on PTSIcloud, contact us directly at or 978-823-0700.


  • 4 Simple VoIP Tips

    Posted on: May 13th, 2014 by Joel Nimar

    Introduced in 1995, Voice over Internet Protocol has become tremendously popular for commercial use over the years. VoIP offers businesses many advantages over standard phone systems, including cost savings, flexibility, app integration, and more. However, proper set-up is the key to long-term reliability and efficiency. If you’re thinking about making the switch to VoIP or want to reconfigure your current set-up for enhanced functioning, here’s what you can do.

    1. Get a Stable and High-Quality Internet Connection

    An unstable Internet connection is usually the cause of unreliable VoIP. Start by selecting a reputable Internet service provider that services your area. Next, run diagnostic tests to ensure that everything is working correctly. Then, secure the connection with a password, and ensure that your computer security is up. If the connection is still inconsistent, try relocating and resetting the router. If problems persist, you might have defective hardware.

    2. Have Two Different Internet Providers

    Even with a great Internet connection, you can still lose VoIP service during a critical moment. That’s why it’s a good idea to invest in a back-up Internet service. If you want to prevent your business from experiencing downtime and losing profit, there’s really no better option.

    There are two common ways to set this up. Traditionally, a business’ Internet connection is divided between two separate networks, each with its own Internet service provider. The VoIP systems are hooked up to one, and the computers are hooked up to the other. In the case that a connection is lost, VoIP can be switched over to the ISP that the computers are running on. Alternately, both VoIP and computers can be hooked up to two ISPs at once via a router. When one service is lost, the router will automatically switch to the second service.

    3. Select a VoIP Provider with Good Technical Support

    VoIP will only perform as advertised with installation by a very competent provider. It’s essential that you research providers before settling on one. Always choose a business that is well known for its VoIP services. A great provider will be by your side at every step of the way.

    After having your VoIP system properly installed, you may still encounter issues from time to time. Your VoIP provider should be easy to reach and willing to assist with any problems that you might have. In most situations, support personnel should be able to offer sound advice in a timely manner. If technical problems can’t be resolved, you should be offered other solutions. A free reinstall, refund of some or all of the purchase price, or brand new equipment are just a few ways to make things right.

    4. Select a Vendor that can Assist You with Hardware Selection and Network Settings

    With all of the VoIP phone options on the market, you should never settle for default hardware when options are available. But narrowing them down can be tough, especially if you don’t know what to look for. Pyramid Technology Services has worked with and can offer advice to companies that deal directly with Internet companies as well as provide a network review and upgrade of your current system. We offer a wide selection of brand name phones and can help you pick out a model that you can test to make sure it includes all the convenient features and settings you desire.
    Many of our customers receive VoIP services from Cisco and need Cisco phones, licenses, or call manager servers. When Cisco is unable or refuses to provide the needed support, they turn to Pyramid because we offer everything Cisco does and more. We also have many customers moving to Lync and using SNOM and Polycom phones. Some of them have already outsourced VoIP to the cloud and simply need reliable phones and a reliable network.

    Speaking of networks, we recommend all our customers to save their settings locally from their routers and switches. More often than not, the Internet provider will only have the original settings saved, not the working settings that have been modified. If the power goes out, and the settings were not saved locally, troubleshooting and making repairs could take significantly longer.

    Voip Experts


    Dave Whipple Written by Dave Whipple, Account Manager at Pyramid Technology Services. Dave can be reached at

    Written by Dave Whipple, Account Manager at Pyramid Technology Services. Dave can be reached at
    Written by Dave Whipple, Account Manager at Pyramid Technology Services. Dave can be reached at
  • Pyramid Technology Services Becomes Nimble Storage Authorized Solutions Provider

    Posted on: May 13th, 2014 by Adminstrator

    Pyramid Technology Services to Expand the Reach of Nimble’s Flash-optimized Hybrid Storage Solutions


    Maynard, Massachusetts – May 13, 2013 – Pyramid Technology Services (, a hardware reseller and IT solutions provider celebrating 25 years of business, is excited to announce its partnership with Nimble Storage, a leading provider of flash-optimized hybrid storage solutions.   As a partner joining Nimble Storage in Massachusetts, Pyramid Technology Services rounds out its storage solution product set by offering Nimble Storage’s best in class flash storage solutions to its clients.

    “Pyramid Technology Services is excited to now offer our customers a hybrid storage architecture that’s engineered to be affordable and deliver better performance and capacity,” says Joel Nimar, President of Pyramid Technology Services. Pairing Nimble’s unique storage solution with our design, integration, installation, and maintenance services – our customers will be rest assured that their backup and storage needs are covered.”

    Authorized ResellerNimble Storage has developed flash storage solutions engineered to address the industry’s most pressing storage issues: delivering better performance and capacity at a reasonable price; providing integrated protection with rapid back-up and recovery; and, reining in storage complexity. The company’s products are based on its patented Cache Accelerated Sequential Layout (CASL™) hybrid storage architecture that leverages fast read performance of flash and the cost-effective capacity of hard disk drives. Nimble combines this flash-optimized architecture with Nimble InfoSight, a cloud based management service that delivers predictive support and operational simplicity through deep data analytics.

    “Nimble Storage channel partners are strategically vetted to ensure that they provide an excellent level of service and support for Nimble Storage solutions,” said Kristin Carnes, director of channel sales at Nimble Storage.  “We believes enterprises should not have to compromise on performance, capacity, ease of use, or price. Therefore, we’ve built a partner ecosystem with over 900 partners worldwide, to provide enterprises access to our innovative storage technology from their existing trusted partners.”


    About Pyramid Technology Services, Inc. (PTSI):
    Pyramid Technology Services has 25 years experience providing new and refurbished servers, storage, and networking equipment along with the services and maintenance programs to keep them up and running.  Pyramid Technology Services provides complete multivendor solutions with unbiased hardware and software recommendations to global and government organizations with access to personalized technical and sales support from its Maynard, Massachusetts headquarters. Pyramid sells leading hardware brands such as Cisco, DELL, HP, IBM and Oracle/Sun. More information is available at, or by phone at 978-823-0700.

  • Windows XP reaches end-of-life – are you ready?

    Posted on: April 8th, 2014 by Adminstrator

    xp-end-of-life-windows-xpToday, after 12 years of support, the life of Windows XP is coming to an end.  Microsoft will cease to support this aging operating system, meaning that current users will be left vulnerable to security breaches, malware and viruses.   Security experts are saying that hackers might already know of new ways to break into XP-powered computers but be waiting until after Tuesday to attack because Microsoft will no longer step in to thwart them.

    Windows XP still powers 20 to 30 percent of Windows machines around the world.  By ending support, Microsoft means that it will no longer be providing technical assistance or releasing security updates for Windows XP.  No more security updates means that Microsoft will no longer address security holes in the operating system software, which will open it up to malicious attacks from malware or viruses.  Microsoft Security Essentials will also no longer be available for download after April 8th.  If you currently have Microsoft Security Essentials, you will receive anti-malware updates for a limited time but this doesn’t ensure that your PC is secure.

    Experts are saying that small businesses could be among the most effected by the end of support, because they don’t have the same kinds of firewalls and in-house IT departments that larger companies possess. And if they don’t upgrade and something bad happens, they could face lawsuits from customers, among other dangers.

    How to Stay Protected

    1) Upgrade Your PCs.

    Upgrading your PCs to a newer operating system helps you avoid the cost of purchasing newer devices.  The problem with this approach, however, is that many older computers running Windows XP will not be able to run Windows 7 or Windows 8.1.  To see if your computers can run Windows 8.1, you can download the Microsoft Upgrade Assistant here.

    If you aren’t ready to make the full jump to Windows 8.1, Windows 7 will be supported until 2020.  Windows 7 might be a better option if you are more accustomed to the Windows XP format, but upgrading to Windows 8.1 will ensure that you are implementing the most current operating system available – meaning increased support duration and greater software compatibility.

    2) Purchase New PCs.

    If Microsoft’s Upgrade Assistant (mentioned above) has notified you that your businesses computers are not compatible with Windows 8.1, you will most likely have to purchase new PCs preloaded with Windows 8.1 and then migrate the data from your old PC to the new one.

    Contact Pyramid for Support
    Pyramid Technology Services is a leading provider of managed IT services for small and medium sized businesses. We can help with your Windows XP operating system upgrades for one or many servers and computers.  Pyramid is a certified Microsoft Partner and can make your transition from Windows XP as seamless as possible.  Contact us today. 978-823-0700.


    Upgrade Windows xp

  • Do You Really Own Your Equipment?

    Posted on: April 6th, 2014 by Adminstrator

    You may think that purchasing equipment automatically means you own it, allowing you to repair, update, and resell the hardware by any means you choose.  However, many manufacturers don’t always assume that the right to repair lies with the owner.

    Ask yourself these questions:

    1.) Can you maintain your equipment in any way you choose?

    2.) When the lease or usage of your equipment ends, does the hardware retain value?

    3.) According to the law, can you sell your used equipment?

    4.) Do you really know if you own the computer storage, network devices, or other equipment you employ?


    If you didn’t answer a confident “yes” to all of these questions, then you’re not alone: many original equipment manufacturers (OEM) place unfair restraints on their devices to force you to use their services, including repair and reselling. Not only does this monopolize the maintenance organization industry, but it also prevents small businesses from making efficient, economical choices for their enterprise.


    For years, Independent Maintenance Organizations (IMOs) and resellers have been fighting to protect the rights of the world’s largest online/remarketers of products. Companies such as eBay, Goodwill, and the American Library Association work to ensure that the owners of goods maintain all decision making responsibilities of the good, including repairs and reselling.


    In 2013, the Supreme Court, in a 6-3 decision, re-affirmed that the Copyright Act was not intended to halt the distribution of authentic goods. The decision maintains that consumers have the right to sell, lend, or give away physical goods, regardless of where these goods were made.


    What you need to know is that the years of fighting in courts ensures that you have the right to repair and resell your technological equipment in any way you choose. For the technology industry, the Digital Right to Repair Coalition (DRRC) works to protect digital rights of equipment. The Coalition has spearheaded the Owners’ Rights Initiative (ORI) whose motto is “You bought it, you own it, you have a right to resell it.” The ORI serves as a watchdog organization to ensure that small businesses are fairly treated by large technology manufacturers.


    The Coalition has power because of businesses like yours that join themwith the support of enterprises across the nation, the DRRC can petition and lobby large OEMs to prevent unfair repair and resell mandates.


    Sign the petition today to help ensure the future value of your enterprise.


    Pyramid Technology Services is one of many companies that offers hardware maintenance for IT equipment. Under the protection of the Digital Right to Repair Coalition, Pyramid can be your one-stop-shop for repairing, updating, and reselling the equipment that you, and only you, own.


    Hardware Maintenance Quote

  • 8 Reasons for DataCenter Virtualization

    Posted on: March 21st, 2014 by Joel Nimar

    8 reasons to virtualizeThe benefits of datacenter virtualization are as numerous as they are profound: virtualization reduces costs and hardware, ensures safer back-ups and smoother operations, and increases your green IT profile, to name a few.   Listed below are eight compelling reasons to finally make the leap to the productivity and savings of datacenter virtualization.   1.      REDUCED COST   Perhaps the most compelling reason, data center virtualization greatly reduces your overall costs. Less physical hardware means less money spent  – not only on the initial purchase of equipment, but on subsequent maintenance, electricity, system failures and upgrade expenses. Over time, datacenter virtualization offers significant savings, practically paying for itself.   2.      VENDOR FLEXIBILITY   With virtualization, you’re not tied down to one particular vendor. Due to the abstraction of software and hardware, you can choose whatever programs suit your needs, and the datacenter will take care of the rest. With flexible hardware and software compatibility, you can make the smartest, most economical choice for your enterprise.   3.      SIMPLE, QUICK BACKUPS   Not only are full backups of your virtual server fast, you can also do backups and snapshots of your virtual machines. You can set up snapshots to be taken constantly, ensuring up-to-date data records without worrying about drastically increasing data storage. Additionally, restarting from a snapshot is faster than booting a typical server, which dramatically cuts downtime. Virtual machines can be moved from one physical server to another very quickly.   4.      SPEEDY REDEPLOYMENT   When a physical server dies, redeployment depends on a multitude of factors that ultimately prevent you from getting your server back in action as soon as possible. With datacenter virtualization and the efficiency of backups and snapshots, redeployment can occur within minutes. You’re also more prepared for disaster recovery – not only is redeployment faster for all virtual machines, but they can be moved to other servers if disaster strikes the data center itself. This means your disaster recovery plan is as flexible as it is efficient.   5.      EFFICIENT HEAT MANAGEMENT   Managing the temperature of your datacenter can cost a lot of money. Reducing the heat increases the longevity of your sensitive electronics and reduces data center or server farm costs. Rather than invest money in managing excess heat, consider employing fewer servers through datacenter virtualization to reduce the initial heat output.   6.      GREEN IT PROFILE   Staying green is as important to your business as it is to your customers. Datacenter virtualization reduces your carbon footprint by using less servers and electricity. You can put your best foot forward by ensuring your employees and customers that you’re doing what it takes to preserve the planet for future generations.   7.        SAFE TESTING   Testing in real time can be a fatal mistake for your users if things go poorly. With virtualization, you’re able to isolate testing environments from end users while still allowing them to remain online. And if something does go wrong, there’s nothing to worry about: simply redeploy your previous system from a saved snapshot.   8.      IT’S HERE TO STAY gives you a choice Virtualization is becoming more and more popular for companies both large and small around the globe. Prepare yourself for a potential migration to a cloud server in the future by employing datacenter virtualization today.   Datacenter virtualization is a great way to more efficiently run your company and prevent the massive IT headaches that can occur with traditional server-software builds – it’s also an economical way to keep you on the cutting edge of data center technology. Additional benefits include shorter application roll outs.  Once you switch, even if only a small part of your server, you’ll see the benefits instantly.   Pyramid Technology Services has helped countless businesses experience the benefits of datacenter virtualization. Contact us today to help you make the right switch! Datacenter virutalization   Joel NimarWritten by Joel Nimar. Joel can be reached at

  • New, Used or Refurbished Servers?

    Posted on: March 5th, 2014 by Joel Nimar

    A common question for IT departments looking to reduce their budget:


    Should I buy new, used or refurbished servers?


    Consider two men who walk into a car dealership: one is a 50 year old man with a $700 a month expense account, the other a student on a budget. The businessman walks straight to the newest Cadillac – he can afford a little luxury and speed. The student, however, goes to the used car department. He’s looking for basic and safe transportation. He knows the used cars have been properly inspected and cleaned – this car dealership wouldn’t sell an unreliable used vehicle. Both men walk away with good cars, each tailored to their needs.


    Servers are no different. New servers work best for those who need and can afford peak performance, while used and refurbished servers work well for those companies who need efficient and affordable solutions.


    Price is a consideration when choosing servers: used and refurbished equipment is often between 30-80% less expensive than new equipment. Servers only one or two generations old offer substantial discounts with little sacrifice. Work with your IT department or server experts at your vendor to determine the exact technical specification your company needs for their servers.


    Performance is also a consideration: new servers will deliver faster speeds than older ones. However, newer 4core/6core/8core processors are so much faster than older processors, you’ll unlikely notice the difference between servers with only one or two generation between them. Most users should be more concerned with disk input/output, which relates to data delivery speed.


    In some circumstances, you may only want to add a similar server to your existing rack instead of buying all new servers, which could mean ordering equipment no longer manufactured. Used or refurbished equipment is your best option. A good vendor will thoroughly test the equipment, update the microcode, and professionally package the server so it’s as good as new.


    What exactly is the difference between a used and refurbished, and where do they come from? That can be a difficult question to define – companies often use these words interchangeably. In general, used equipment is lightly cleaned and shipped to the customer. The better suppliers will burn in the equipment overnight and perform custom configurations to meet your requirements. Some vendors and manufacturers will completely refurbish the systems, making sure they meet the original specifications and meet “like new” quality. The outside is repainted and the boards are upgraded to the latest revision. Refurbished equipment includes a suffix –RF in the case of Cisco product and R at the end of an HP part number and include a warranty similar to new equipment. In the reseller community, used and refurbished equipment comes from leasing companies, end user take-outs, and trade-ins. The manufacturers also sell new surplus product through their factory-refurbished programs, as well as demo equipment and customer returns.


    In all of these cases, the most important thing is that you are purchasing your equipment from a trusted seller. Check with the seller to guarantee that their equipment is tested, cleaned, and fully functional. Make sure the seller resets the server to the original equipment manufacturer’s (OEM) setting. They should also offer a limited warranty. A seller unwilling to address these guarantees may not be a trusted source.


    So which should you choose: new, used, or refurbished equipment?


    First, decide if you want to buy new or used equipment. If you choose used, compare options of used or refurbished equipment to determine what best fits your needs.  Often the most important decision is choosing a reliable seller to guarantee peak-functioning servers.


    Joel NimarWritten by Joel Nimar, President of Pyramid Technology Services, he can be reached at



    Pyramid Technology is happy to help you decide if high quality new, used, or refurbished server equipment is right for you. Please complete the form below for a free server consultation, and we’ll help you find what’s best for you!

    Server Consultation

    Get Expert Advice - Our server experts are trained with an emphasis on design and configuration for specific application requirements.
  • E-Waste On the Rise: What Should I Do?

    Posted on: February 27th, 2014 by Joel Nimar

    E WasteAccording to a recent article published in the Worcester Business Journal, the Recycling of Electronics is expected to hit an all-time high in 2014.  With an exponential growth of new technology, companies are scrambling for efficient and reliable methods of recycling old computers and hardware, or e-waste, as new machines arrive.  Pyramid Technology offers safe, secure, and affordable recycling of e-waste.


    The electronics recycling industry has grown nearly twenty-fold in the past ten years.  A new spike is expected this year due to customers upgrading equipment more often and many companies phasing out Windows XP before Microsoft cuts off all upgrades and security protection for the operating system.  According to Federal laws, recycling old electronics such as hard drives or other computer hardware requires careful monitoring:  you must ensure that your private data is completely erased and that potentially hazardous materials are disposed of in a responsible and sustainable process.


    Pyramid Technology makes recycling e-waste as simple and responsible as possible with our convenient ITAD Services (Information Technology Asset Disposition).


    The Federal Trade Commission and Department of Defense, along with many other international bodies, have created guidelines for the deletion of data from e-waste after numerous improper disposal exposures in the mid 2000s.  In some states, such as Massachusetts, a business is liable for the private data of its customers, especially in the instance of data disposal.


    Pyramid Technology guarantees data deletion in two ways: first, we ensure asset accountability, providing a chain of custody from packing, pick-up, transfer, and disposal of your e-waste.  Our secure chain-of-custody framework ensures that you are kept in the loop with a detailed bill of lading and photographed shipments.  Each asset is tracked by location through its end disposal.  You’ll know when your e-waste is securely disposed when we do.


    Second, our data erasure procedures are up-to-date and comply with most international standards, including the National Security Agency and the Department of Defense.  We make sure your data is irretrievable through a standard 3-pass U.S. DoD 5220.22 M-compliant overwrite.  Should the overwrite indicate even one bad sector, we will physically shred the drive.  Our standards mitigate the liabilities companies face with data privacy-legislation such as HIPAA, GLBA, FACTA, and FCRA.


    Once the data is securely erased, Pyramid Technology follows the most responsible disposal procedures available to ensure your electronics are safely recycled.  We use one of only ten companies in the Northeast with e-Stewards Certification, which strictly requires that any equipment not reused is recycled in the most environmentally responsible manner.  We guarantee that no e-waste or focus materials are exported, landfilled, or incinerated.  All materials are monitored throughout the recycling process in a smelter or refinery where they are re-processed for future manufacturing.  Every one of our disposal services meet or exceed the EPA’s guidelines and are backed by a Certificate of Recycling.


    If your IT Department is similar to others throughout the country, recycling computer hardware has become a more frequent occurrence than ever with the influx of new technologies and the retirement of old – and 2014 promises to be an all-time high.  Utilize Pyramid Technology’s IT Asset Disposition to ensure safe, easy, and affordable recycling of your e-waste.



    it asset disposition services



    Joel NimarWritten by: Joel Nimar, President of Pyramid Technology Services, he can be reached at

  • Managed IT Services for Small Businesses

    Posted on: February 10th, 2014 by Joel Nimar

    Many small business (less than one hundred employees) may not find using Managed IT Services a top priority: with fewer employees than medium and large businesses, small businesses often elect to spend money on progress rather than prevention.


    Managed IT ServicesHowever, a recent independent study from security vendor GFI Software revealed that small businesses often suffer the most from a lack of Managed IT Services.  Without the right support and around-the-clock monitoring,  small businesses expose themselves to viruses and malware that can lead to crippling delays and security breaches.


    Consider that in order to protect their computers, half of all small business IT administrators report that they:


    • spend the equivalent of three weeks or more manually updating antivirus software or removing malware on users’ PCs.
    • do not have the capability to see which PCs or servers on their network are about to fail.


    The independent study also revealed that those with fewer than 25 employees showed higher percentages of lacking sufficient security and monitoring.


    Your small business is not alone – the latest U.S. Census Bureau reports that there are more than 2 million firms with 5 to 99 employees. Luckily, there’s an affordable and effortless solution for you and every other small business: Managed IT Services.


    Managed IT Services and Security provides Web-based interfacing that enables 24×7 remote monitoring and management of all your IT assets including systems, software devices, and virtual resources. We’ll also be informed with automated alerting of any event that may affect the normal operation of IT.  Resolution services will correct these issues before they become a problem for your company


    While the cost of a Managed IT Service may seem steep for smaller businesses, consider the potential price and loss of productivity of correcting a security breach, losing valuable data or rebuilding servers and desktops after a virus attack . Also, imagine what your IT department could do with the additional three weeks or more not spent on manually updating software or removing viruses.


    Additionally, delays caused by viruses at the wrong time can be more crippling for smaller enterprises than larger ones. A hiccup in productivity can bring a small business to a standstill, sometimes resulting in a complete collapse.


    If you’re feeling that you need Managed IT Services for your small business, you’re not alone: 78% of respondents in GFI Software’s independent study indicated they would be interested in a Web-based service that enables antivirus management protection on company PCs. It’s a no-brainer.

    Network Assessment

  • 10 Reasons Your Network Might Be Slow

    Posted on: February 3rd, 2014 by Joel Nimar

    In today’s fast-paced wireless age, every second counts. Review these ten reasons for potential solutions for speeding up a slow network.


    Network Fixes1.) A DNS server that is part of the FTP server can drastically slow down your network. If your DNS and FTP hit critical mass simultaneously and share the same server, your network performance falters. By separating the DNS into it’s own server, you allow for one server to control all traffic accessing the Domain Name System.


    2.) An incorrectly segmented network that doesn’t use VLAN to segregate voice, video, and other data can incorrectly prioritize wireless traffic. Without the correct VLAN infrastructure, packets might be routed through applications that aren’t as important for the corresponding allocated bandwidth. For example, you might want packets for a voice phone call to be given priority over those of a Facebook message. Troubleshooting your VLAN to identify incorrect segmentation can be more complicated than fixing a physical network: Pyramid offers consultation for restructuring your VLAN to correctly prioritize bandwidth.


    3.) Lack of bandwidth can greatly slow down your network. Beyond 100 Mbs connectivity, you begin to outrun available performance of the bus in many PCs and server NICs. Bandwidth issues traditionally occur where a high number of servers or users come together to share connection points, such as social networking sites or a network design with too much distance between the server and user. To increase bandwidth, consider SNMP tools that utilize hardware (such as switches or routers) to count packets for you; using that data, you can identify which points are using the most bandwidth and reallocate as necessary. Pyramid offers SNMP technology to identify bandwidth issues.


    4.) Too many unnoticed errors on the network can greatly slow it down. Troubleshooting your network can help detect these errors. A few common error messages and solutions are:

    • “A Network Cable is Unplugged” – check all Ethernet ports. Replace Ethernet cable.
    • “IP Address Conflict (or Address Already in Use)” – two computers are trying to use the same IP address. Assign a new IP address to one of the computers.

    “The Network Path Cannot Be Found” – Update your TCP/IP configuration.

    Click here for more information about common errors and how to troubleshoot them. Reducing the number of errors will increase speed.


    5.) A high degree of multicast traffic or frequent disruptions of multicast streaming can dramatically slow down your network. The easiest way to control multicasting is to use a Group Management Protocol that runs between the multicast router and the switch. Pyramid can help you find the Group Management Protocol that’s right for your enterprise.


    6.) Recently installed technology or applications, such as VoIP,without proper setup can dramatically slow down your network.  Check the settings of your computers to make sure all software is properly installed and your hardware meets the software requirements. Sometimes new hardware must be installed to accommodate new applications on an existing network.


    7.) An improperly installed Layer 3,which oversees the correct packaging and delivery of your data over a network, can affect the routing of your packets. In the worst cases, poor management from Layer 3 can lead to a complete shutdown of a network. Most often errors come from faulty interface connectivity. If your connectivity appears to be correct, then the error likely lies in the routing. Pyramid can help you identify the source of error, and solution, in your Layer 3.


    8.) Cabling not certified for the speed being used.  For instance using older cabling rated for 100Base-t and using it for gigabit can prevent your network from achieving optimum speeds. Old cabling has been a major factor of a slow network for many of our customers — many customers install new technology without first upgrading the cables in Layer 1 to accommodate the new speed. With improper cables, packets on phone calls can be dropped or networks run poorly. Make sure your cables meet the needs of your network, and if they don’t, new cables must be installed.


    9.) Latency is becoming more common for enterprises as more systems and servers move to the cloud, resulting in end users being further and further away from their data. Increase speeds by minimizing the number of round trips between your system and the cloud. Consider installing a dedicated network connection exclusively for your data and the cloud to increase connectivity. If you use a third-party data center, contact them to ensure you are using the most up-to-date cloud applications that handle latency’s challenges.


    10.) Slow wireless access can result from many different issues depending on your unique location. Objects made of metal or unplanned construction can affect your speed. A proper survey of your location will ensure your wireless design is optimized. For instance, in schools, rows of metal lockers, fish tanks, or new constructions can affect a wireless signal. Consult the professionals at Pyramid to ensure your wireless design is optimized for your location.


    When your network experiences a slowdown, make sure the problem is constant and not just a result of peaking or other intermittent issues. If the problem is ongoing, check for the basic causes covered in this article to try and detect the problem.  Pyramid offers a variety of automated tools, technical personnel, and expert advice to help you meet your network needs. We regularly work with customers to design, troubleshoot, and improve networks to deliver superior performance and solve your most difficult wireless problems. Please contact us today for support! Every second counts!

    network consultation button


    Dave WhippleWritten by Dave Whipple, Account Manager at Pyramid Technology Services. Dave can be reached at

  • How Managed Security Can Help Stop Cryptolocker

    Posted on: January 28th, 2014 by Adminstrator

    Managed securityEncryption can prevent unauthorized individuals from accessing sensitive data, but the authors of CryptoLocker, a relatively new form of ransomware, are using it to prevent users from being able to access their own files. Companies that find they have been infected with this malware are given a notice that they have 96 hours to pay two Bitcoins, currently valued at approximately $300, or the key that decrypts their files will be destroyed. If this happens, the files are essentially lost forever.


    There are a variety of reasons that CryptoLocker has been so successful, at least from the point of the individuals running it. CryptoLocker installs itself onto computers when someone opens a file that appears to contain shipping information. Disguised as a PDF, the file is an exe that installs the malware onto computers and begins encrypting files. It first debuted near the end of 2013 when large numbers of people were sending and receiving shipments, bypassing most people’s normal wariness about opening email files.


    Along with an incredible infection rate (it is estimated that more than a quarter million PCs have been infected) CryptoLocker takes advantage of Microsoft’s CryptoAPI, so decrypting the files without a key is almost impossible. It is also not likely that the perpetrators are going to be caught any time soon. Since they are demanding payment in the form of Bitcoins, they are effectively anonymous. This is not to say that a way to decrypt files will never be found or that the individuals responsible will never be found, but most experts consider these events unlikely, at least in the near future.


    Due to the fact that many in the IT field believe that CryptoLocker will begin showing up in emails that appear to be from major merchandisers such as Amazon, it is important that businesses are proactive about preventing infection. With Pyramid Technology Services, Managed IT, you can secure your company’s files through a two pronged approach: protecting your computers from infection and data backups.


    Pyramid Technology Services can provide virus and malware protection by ensuring that your firewalls and security protocols are up-to-date, and if you don’t have them already, we can provide them. Automated and regular scans help to ensure that even if an infected file does slip past active monitoring services, it will be detected by an in-depth scan. We also provide automated operating system updates which patch known holes that hackers exploit.


    In the event that your files do become compromised, either due to CryptoLocker or another unexpected event, our regular backups of your files will ensure that you don’t lose any data. A combination of off-site backups and regular testing by Pyramid Technology Services means that your files are safe, irrespective of how the initial data was lost.


    Written by:  John Cappello, Director of Technical Services, Pyramid Technology Services

  • Ahead of the Curve – Protect Yourself with BYOD Solutions Now!

    Posted on: January 20th, 2014 by Joel Nimar

    In 2013, nearly 58% of workers used their mobile devices to access business networks — half of this access occurred unmonitored and unmanaged. Rather than rely on policies that forbid the use of personal technologies, many companies have embraced Bring Your Own Device, or BYOD. Enterprise BYOD has led to innovative security and management software known as Mobile Device Management (MDM).

    Byod softwareIt’s no surprise that many employees prefer their own device: personal mobile devices allow for user customization, easy access, and around-the-clock use. IT departments face the new challenge of handling unmonitored exposure of private data to security breaches. Those who don’t tackle BYOD head-on risk having employees “end-gaming” IT policies and using personal devices anyway, accidentally exposing confidential information and IT systems. According to the Ponemon Institute, 6 out of 10 security breaches in 2013 were traced back to mobile devices.


    There’s simply no turning back.


    Pyramid Technology Services offers the latest, award-winning BYOD solutions for Mobile Device Management and remote monitoring. Our MDM software equips IT departments with the tools to address critical security issues, simplify administration, and improve performance for smartphones, tablets, and off-network Mac OS devices.


    With our MDM software, you can easily view a detailed list of BYOD mobile devices in your network through a customizable service center dashboard. You also receive alerts on device availability and security-related issues, such as:


    • prolonged device unavailability
    • “rooted” Android devices
    • new or foreign SIM cards
    • unusual data roaming which may result in raised costs


    Additionally, our MDM software rapidly protects sensitive personal and corporate information in unforeseen circumstances. For instance, if a device is lost or stolen, you can remotely lock out access, reset a passcode, or wipe a device. Your IT department can customize alerts to your security needs.


    It also ensures that all devices comply with current enterprise policies, as well as government regulations, with customizable compliance solutions.


    In order for employees to implement successful and secure data sharing, BYOD usage policies must be easy and efficient for both your IT department and users. Pyramid Technology Services BYOD solution allows you to automatically deploy customized security and usage settings for different groupings. When a user enrolls their device with MDM software under a specific grouping, appropriate settings are instantly activated. Your IT department can customize:


    • passcode requirements
    • network settings for proxy connections
    • data limitations for uploading and downloading,
    • access to your VPN


    Customizations are easily controlled from a user-friendly dashboard that allows for remote monitoring.


    Embracing BYOD has never been easier with Pyramid Technology Services Mobile Device Management security solutions. Companies that have incorporated BYOD with the help of MDM software have seen improvements, and not only in securing data: four out of five enterprises with BYOD in place have also experienced cost benefits. Let Pyramid Technology Services help you secure your company while allowing your employees and users the flexibility and access they need for their best productivity. BYOD is the future — let us help you embrace it!


    Joel NimarWritten by: Joel Nimar, President of Pyramid Technology Services, he can be reached at

  • 10 Tips for Creating Effective Passwords

    Posted on: January 17th, 2014 by Adminstrator

    Password SecurityPassword security is more important than ever. Some people don’t place much importance in creating strong, unbreakable passwords. If their bank account gets hacked, they’ll soon realize that the proverbial ounce of prevention is well worth it to safeguard their private information. Here are ten tips for creating robust, unbreakable passwords.

    10. Think about it.
    Don’t use the first thing that pops into your mind. Try using the first letters from each word in a phrase you won’t forget. For instance, use acronyms like ouamd from “once upon a midnight dreary.” Add a couple numbers, and you’ll have a strong password, such as 1OUa2MD3.

    9. Use one strong master password.
    An example would be taking your first name and adding special characters between each letter. A password like M!I$K=E9 is secure and easy to remember.

    8. Use plenty of special characters.
    Special characters make passwords very difficult to decipher. A string of special characters and numbers is extremely effective, like 9!21$3!4$.

    7. Be playful.
    Substitute numbers for letters. Turn words backwards. Use random capitalization.

    6. Complicate things.
    Don’t use passwords that are the minimum length. Add a few extra numbers just to make them harder to guess. Don’t use lazy passwords, like password.

    5. Don’t use your pet’s name.
    In fact, don’t use your spouse’s name, your child’s name or any name that is intimately associated with you.

    4. Don’t tell anyone.
    Nobody else needs to know your password. Keep your passwords private, even from lovers or close friends.

    3. Change your password regularly.

    Use a system that you won’t forget. You might change them on the fifteenth of every month or the first day of every other month.

    2. Spell out numbers.
    If you use a number to complicate your password, try spelling it out. For instance, instead of 9MiKe2, try nineMiKe2.

    1. Shun clichés or slang.
    Don’t use the latest catch phrase, like HeyYa or WhatsUp. Don’t use the name of your favorite band. Make it hard for hackers to guess your password.

    These simple tips will keep your passwords safe from anybody who would want to steal your private data or cause problems for you.

    Written by John Cappello, Director or Technical Services at Pyramid Technology Services

  • Pyramid Technology Services Monthly Sweepstakes – Enter to Win!

    Posted on: January 17th, 2014 by Adminstrator

    Pyramid Technology Services is pleased to announce that for 2014, every month we will be giving away a trendy new item to those subscribed to Pyramid Technology Services newsletter.

    January sweepstakes: UP Onyx wristband – The simplest way to understand your day and night.

    The UP wristband plugs into your phone via the Simple Sync connector to help you learn how you sleep, move and eat. UP provides unique insights to help you live each day better than the last.

    january sweepstakes

    NOTE:  If you are already subscribed to Pyramid Technology Services, you’re automatically entered!  No need to enter each month.

    If you are not subscribed, enter here to win:   Enter to Win

    Become a fan and get updates about our monthly giveaways!
    Facebook Icon linkedin icon Twitter icon


    NO PURCHASE NECESSARY. The “UP Wristband” Sweepstakes is offered to those subscribed to Pyramid Technology Services email list. Sweepstakes begins January 17, 2014 and ends on February 13, 2014 12PM EST.  Sweepstakes sponsored by Pyramid Technology Services, 10 Riverbank Road, Maynard, MA 01754.  One grand prize consisting of a UP Onyx wristband valued at $129.00.  Prize will be awarded to a randomly chosen entrant using a random generator. Winner will be announced on Pyramid’s Facebook, Twitter, and Linkedin accounts.  Winner will be notified via email.  Void where prohibited.

  • What Is Managed IT Service And How Can It Help My Business?

    Posted on: November 20th, 2013 by Joel Nimar

    Managed IT Service Providers (MSPs) are specialists in the practice of taking over the day-to-day responsibilities of managing and monitoring IT infastructure. These providers resolve IT problems, acting as your outsourced personal IT department or supplementing your existing staff

    MSPs can save you considerable time and greatly reduce your current IT costs. What’s more, MSPs can deliver real advantages for IT systems of midsized and small business that you can enjoy immediately.

    Here are ten reasons you should consider outsourcing your IT systems:

    1.) A full IT staff, half the cost

    When outsourcing IT services, you get the benefits a large, experienced in-house IT staff (including a system admin and CIO) without paying the associated costs. Many companies cut IT costs by over 60% when they switch to an MSP.
    2.) Top quality expertise

    Your staff should be able to do their work without having to worry about IT. Experienced IT staff of an MSP can deal with the frustrations, distractions and complexities of technology’s most difficult problems – not your staff.

    3.) Up-to-date support

    It’s a full time job keeping up with the latest technology. Don’t waste time creating special teams to learn what’s up-to-date — let an MSP implement the latest technologies and support your staff through the learning process.

    4.) No need to hire and train IT personnel

    Recruiting and training qualified IT employees drains time and money that most small to mid-size businesses can’t afford. Outsource your IT to an MSP to ease the process of getting the most qualified IT personnel instantly.

    5.) Only pay for the IT you need

    Employing a full-time, in-house IT employee often doesn’t justify the money spent. Tech problems are often unpredictable, occurring after days or weeks of relative calm. With MSP pricing, you only pay for the IT services you actually need and use when you actually need to use them or pay a flat monthly guaranteed fee no matter how much service you need.

    6.) Less time wasted, more productivity

    Troubleshooting technology can halt business to a standstill. MSPs can troubleshoot broken technology instantly – better yet, they can anticipate problems before they occur, preventing problems that could impede your workflow, allowing your staff to focus on maximizing day-to-day operations. An MSP can provide a variety of services – such as managing security, network monitoring, and anti-spam and virus filtering – that your staff won’t need to worry about.

    7.) Savings trickle down to customers

    Money spent on research, development, and implementation on in-house IT departments drain resources that ultimately affect your most important asset – the customer. With remote technology services provided by an MSP, you don’t need to waste money that keep prices low for customers.

    8.) The very best security

    Viruses, spam, and other vulnerabilities can result in a major loss of time, money, and worst of all, customer trust. In fact, many small to mid-sized businesses hire an MSP for its security benefits alone. Every credit card transaction or email can make you or your client vulnerable to credit fraud or a security breach. Effortless protect yourself and your customer’s private information by utilizing an MSP’s around-the-clock network monitoring and virus filtering.

    9) Effortlessly follow compliance codes

    Staying on top of constantly shifting federal and state regulations is a full-time job – penalties for not following code can be costly. Specialists at an MSP ensure compliance with all regulations set by the Payment Card Industry (PCI), HIPAA, FDA, SAS70 (aicpa), PIPEDA (Canada), and others.

    10) Secure, reliable backup service

    Small to midsized companies can’t risk operating without a backup service – permanently losing crucial data because of accidental file deletion, hardware failure, or natural disasters (such as water damage from Superstorm Sandy) can cause the total collapse of a company. 85% of business with catastrophic data loss go bankrupt within three years. MSPs offer constant local and cloud storage to backup your files, as well as failover servers that protect your data in every worst-case scenario. Protect yourself so you don’t end up becoming another statistic!

    Contact us today for more information on Pyramid Technology Services Managed Services.

    Joel NimarAuthor bio:
    Joel Nimar is the President of Pyramid Technology Services, a Managed Services Provider (MSP),  providing IT management and consultancy services. Pyramid provides results and savings and takes the IT worries off your shoulder.

  • Technology Revolution in the Classroom – Pyramid Technology Services and Pond Creek-Hunter Public Schools

    Posted on: November 13th, 2013 by Joel Nimar

    In February, 2013, when Pond Creek-Hunter Schools in Pond Creek, Oklahoma, was preparing to upgrade its technology across the district, Pyramid Technology was on site discussing network upgrades, configurations, best providers, pricing options, installation services and support strategies.


    From the office to the classroom, Superintendent Joel Quinn wanted to ramp up the schools’ IT capabilities, with special focus on providing students and teachers with cutting edge digital technology and a dynamic on-line learning environment.


    Major Shift to Digital Learning in Classroom    

    The school district was investing in a 1:1 laptop program, a major education/technology initiative where students receive instruction at school and at home through the use of their own laptop computer. Pyramid provided pricing options and support as the 1:1 program started to take shape.


    IT Upgrade Critical /Pyramid Develops District Technology Plan

    It was clear, however, that technology in the pre-k to high school system was outdated and holding the district back.  The schools were still reliant on very old equipment.   The network could not handle wireless demands and there were multiple server issues.  The Pond Creek-Hunter public schools were in need of a comprehensive, reliable and easy-to-manage IT environment.


    “There is major change taking place now in our classrooms, ” says Joel Quinn, “Every high school student now has his/her own Lenovo laptop and is adjusting to a new technology-driven environment at school.  Our middle school students are also part of this change.  All learning in grades 5-12 is shifting to incorporate computers and technology into the educational process.”


    “Textbooks are no longer in the classroom,” adds Quinn. “Our teachers have spent two years working together in Professional Learning Communities with Moodle.  This is a free web application and Internet-based source for developing curriculum and producing online courses that are now accessible to Pond Creek-Hunter students through the newly implemented WiFi network.”


    Pyramid Partners with Enterasys for Technology Upgrade

    In preparation, Pyramid presented the Pond Creek-Hunter Schools with an array of technology solutions for network upgrades, wireless network, servers, backup data recovery (BDR,) and a disaster recovery solution to manage the IT environment.


    Pyramid introduced Pond Creek-Hunter to network provider Enterasys Secure Networks.  Working together, Pyramid and Enterasys designed and installed a new network and seamless, wireless capability to ensure smooth, uninterrupted Internet access for all students, teachers and staff – a solution that will lead the school district into the future with speed and functionality.


    Optimizing the Computer Environment

    Pyramid’s technical staff revitalized an existing server, added a new Dell server and, using

    Hyper-V, implemented a virtualized server to the computing environment while optimizing the efficiency of the configuration.  Pyramid advised Pond Creek-Hunter on best options for backup data recovery. The school system decided to go with a local BDR appliance installed in a different building on the same network that backs up and acts as the server whenever the main server is not functional.


    On Time. On Budget. Always Available.

    “Pyramid Technology is easy to work with and very flexible,” adds Joel Quinn. “ They provided project specifications and a network infrastructure, including WiFi support to unite our entire campus.  They are both the on-the-job technical experts and consultants when needed.  Pyramid helped us manage costs and delivered on time and on budget.”


    “Pond Creek-Hunter Schools knew what they needed from technology,” says Dave Whipple, “and we have a good working relationship.  Joel Quinn and his team had done their research and talked with other schools.  As consultants, we made recommendations, provided solutions and connected them to the right technology providers.”


    “Pyramid understands the education technology marketplace,” adds Whipple. “We explained to Pond Creek-Hunter why partnering with Enterasys was the right choice.  Pyramid Technology Services has the experience and expertise to assist customers in taking the next step forward with IT strategies, installation services, and cloud requirements. We offer choices and suggest the best investment for savings in the long run.”


    “Pyramid met our needs and expectations,” says Joel Quinn, “and they are always here when we need them.  Last summer, we were up against a tight timeline. Pyramid was on top of every detail as we upgraded and installed the new technology infrastructure throughout the school system.  We were operational and ready to greet returning students on August 1, the start of the new school year.”



  • Pyramid Technology Services: Emphasizing Quality, Service, & Flexibility

    Posted on: October 14th, 2013 by Joel Nimar

    Founded in 1988, Pyramid Technology Services in Maynard, Massachusetts is a certified woman-owned business that specializes in new and refurbished systems, network devices, and spare parts for new and legacy systems. The company’s broad customer base includes end-users, resellers, Fortune 1000 companies, and government agencies. International sales account for approximately 40% of Pyramid’s revenue.


    Joel and Claudia Nimar founded Pyramid as a part-time business in 1988. By 1997, the company had expanded into a full-time operation. During the past 19 years, the Nimars have changed their business focus to match customer needs and industry trends. Company president Joel Nimar explained:


    “Ten years ago, we were a Digital VAR and sold 100% Digital equipment. But then Compaq bought Digital and HP bought Compaq. Well, we knew we needed to diversify. Now, Digital products account for about 33% of our business, and we have expanded our product line to include Cisco, Sun Microsystems and Enterasys. That’s been a real challenge for us and our employees because it required different skill sets, technical expertise, and knowledge of more product lines.”


    Although Pyramid’s product focus changed, the company’s customer base remained the same. Pyramid modified its product lines as customers migrated to other platforms. Yet many of Pyramid’s customers still depend on legacy systems – especially VAX/Alpha systems – and Pyramid continues to support those older technologies.


    One interesting example is the Hubble Telescope project. Pyramid worked with a major defense contractor to supply spare parts for the Hubble Telescope’s data collection systems. This was not a situation where the system owner could just upgrade to the latest technology, Nimar noted: “They spent ten years and a billion dollars writing software. There was no way to throw that out in favor of a new technology.”


    Changing technologies have given Pyramid the opportunity to expand its customer base. The Web in particular is “a marvelous source of leads,” said Nimar. “I get leads every day from our Web site.” The company is a Tradeloop Premier member and participates in the End User program as well. Nimar said that Tradeloop “helps drive more traffic to our site and helps us find new customers, particularly internationally.”

    Once new customers choose Pyramid as a supplier, they tend to maintain the business relationship for a long time. Nimar attributed those long-term relationships to Pyramid’s focus on customer service and quality:


    “A lot of our customers are long-term customers. They appreciate our high quality and our ability to test and integrate equipment. We get a lot of repeat business because we’re quality oriented and take the time to visually inspect and test 95% of the products we sell. We offer a 60 day warranty to resellers and 90 days to end users, and an optional 1-year warranty upgrade.”


    Pyramid’s commitment to service extends to the outside community. The Nimars donate a percentage of the company’s profits to various charitable causes, including Open Table, a local organization that feeds 140-180 hungry people each week in Concord and Maynard, MA. Every Christmas, Pyramid sponsors the majority of gifts for the Open Table kids, and the employees enjoy the happy assignment of shopping for the presents.


    The company’s flexibility, product knowledge, dedication to quality, and a commitment to both customer and community service have helped Pyramid grow and prosper amid changing technologies and market conditions. The Nimars make this promise to each customer:


    “We get the job done right the first time. Pyramid offers quality products at a price that will keep you in business.”

  • Pyramid Technology Implements 24/7 Data Center at New Mattapan Community Health Center

    Posted on: September 24th, 2013 by Joel Nimar

    mattapan community health centerIn August, 2012, when Mattapan Community Health Center (MCHC) was preparing to move into a new 50,000-square-foot, $34 million complex, Pyramid Technology Services was working nearly round the clock to help restructure and set up the customer’s new technology environment.


    The 40-year-old community health facility, now the largest employer in Mattapan Square and funded in part by a federal grant, has doubled in size and tripled its capacity to serve patients in Mattapan, Hyde Park and surrounding Boston neighborhoods.


    Earlier in summer, MCHC selected Pyramid Technology and purchased 120 desktops, monitors, servers and networking gear. At this point, the extensive planning and procedures for upgrading applications and servers along with operating systems evolved. As moving day approached, Pyramid disassembled equipment from the old address, then upgraded and re-installed both old and new technology at the1575 Blue Hill Avenue location — all in a weekend.


    All the while, the project scope was expanding to include a new data center for the customer. MCHC talked about its high availability data needs for a very large patient population and the importance of access to Boston Medical Center.


    Partnering with network communications provider Windstream, Pyramid co-located both new and old servers and storage on the premises, and implemented an investment in virtualization that leads to improved business and operational agility.


    Pyramid configured a state-of-the art 24/7 data center with brand new physical servers and virtualized servers, routers, switches, desktops and other related technology equipment and helped coordinate the networking and communications. The goal is to ensure MCHC stays in continuous communication with Boston Medical Center and its electronic medical records system — a critical factor in serving the expanding patient population.


    “Having a cohesive team of health center staff and dedicated service and equipment vendors was key to the success of Mattapan Community Health Center’s move to their new LEED Silver Certified health center facility. Pyramid Technology Services, stood out as a true partner in the process,” says Adrienne Benton,project manager/transition planner, Onyx Spectrum Technology, Inc.. “Pyramid was responsible for providing the equipment, supplies, manpower and subject matter expertise to support the planning, and implementation of a modernized data center, telecommunications and desktop systems.”


    “Mattapan Community Health Center is a leader in the community,” says Joel Nimar, President of Pyramid Technology Services, “and we are pleased to have played an integral role in their expansion and the creation of a state-of-the-art data center. They have revolutionized the way they do business while meeting new federal requirements.”


    “The data center installation went smoothly and we had the right people on hand,” explains Nimar.”Everything was up and running when they opened for business on Monday. At Pyramid, we work hard asan independent technology provider to bring the technology and people together. The new data strategy and IT assets will help Mattapan Community Health Center benefit from a more seamless communication process.”


    “The Pyramid team was always ready to add value wherever they could,” adds Benton, “and was able to bring in extra resources to meet critical deadlines to benefit the client. Most importantly, the Pyramid team was easy to work with.”


    Since the move, Pyramid continues to consult in best practices for data backups, redundancy and other critical pain points for businesses like MCHC that require special compliance like HIPAA.