Eclipse Consulting https://eclipse-online.com Metro Detroit Michigan IT Service Provider Fri, 08 Aug 2025 17:27:52 +0000 en-US hourly 1 https://wordpress.org/?v=6.8.2 https://eclipse-online.com/wp-content/uploads/ECI-Circle2-36x36.png Eclipse Consulting https://eclipse-online.com 32 32 Choosing the Right Server for Your Business: What You Really Need (and What You Don’t) https://eclipse-online.com/news/choosing-the-right-server-for-business/ Wed, 23 Jul 2025 16:47:17 +0000 https://eclipse-online.com/?p=30504 Let’s face it. Buying a server for your business isn’t exactly exciting. It’s not flashy, it’s not obvious to your customers, and you may feel overwhelmed trying to make sense of the tech jargon. Choosing a server is like choosing a car. Some are high-performance. Others are built for ruggedness. But most people want a mid-range vehicle that’s comfortable and safe.

choosing the right server

Likewise, when you choose a server, you want to choose the right engine for your business right now. Done well, it hums quietly in the background, keeping everything running smooth, stable, and scalable. Done wrong, and you’ll feel it… in downtime, slow performance, and unexpected bills. Whether you’re upgrading your infrastructure or buying your first server, here’s what you need to know:

1. Start with the “why”

Before specs, before pricing, before shopping around, understand why you need a server and what you need that server to do.

  • File and data storage: Centralizing access to documents and backups. How much data do you have? How much growth do you anticipate?
  • Hosting applications: CRMs, ERPs, project management tools, or proprietary software. How many applications? What are their system requirements?
  • Virtual machines / remote workstations: Letting your team run isolated environments or access desktops remotely. How many employees?
  • Web hosting / e-commerce: Keeping your site fast and reliable under load. Are you running an eCommerce site? What are the web software requirements?
  • Database management: Running SQL servers, business analytics, or financial systems. What are the system requirements for the performance level you expect?

2. Performance priorities

When it comes to configuring a server, everyone wants to know where they should spend a little extra. Here’s where performance matters most:

  • Processor (CPU): Go for a multi-core Xeon or Ryzen Pro if you’re running databases, virtual machines, or heavy apps.
  • RAM: Always better to overdo RAM than underdo it.
  • Hard drive speed: Makes a big impact on performance.

3. Storage: fast, redundant, and right-sized

  • SSD vs. HDD: Use SSDs for speed, HDDs for capacity.
  • RAID: Redundancy helps avoid data loss.
  • Backups matter: Use offsite or cloud backups even with RAID. RAID alone is not a sufficient backup strategy.

4. On-prem vs. cloud vs. hybrid

  • On-Premise: One-time cost. Better for control and compliance.
  • Cloud-Based: Scalable and remote-friendly but watch for cost creep.
  • Hybrid: Mix of local file server + cloud apps is common.

5. Form factor: tower, rack, or blade?

  • Tower servers: Affordable and easy to maintain.
  • Rack servers: Space-saving and scalable.
  • Blade servers: Overkill unless running large datacenters.
  • Ask whether you’ll be able to upgrade RAM, drives, and CPUs.

6. Budget considerations

The cost of your server isn’t just about hardware costs. Licensing costs for Windows Server, SQL Server, and virtualization products can have a significant impact on how you choose and configure your server hardware. Software is often licensed based on one of the following:

  • Per-core licensing (e.g., SQL Server Standard/Enterprise, Windows Server Datacenter)
  • Per-processor or socket licensing (older or niche cases)
  • Per-user or CALs (Client Access Licenses) (for Windows Server Standard or other add-ons)

Per-core licensing has become the standard for many Microsoft and virtualization products. Servers with more cores will incur higher software licensing costs. This means you don’t want to over-buy cores unless you truly need them, because each core directly increases your licensing cost.

Say you’re running a SQL Server workload. Here’s a simplified look:

Option

2x 12-core CPUs (24 cores total)

1x 8-core high-performance CPU

SQL Core License Cost

24 cores x $1,800 = $43,200

8 cores x $1,800 = $14,400

Hardware Cost

~$5,000

~$3,000

Total

$48,200

$17,400

If you don’t need the extra cores, don’t buy them. In the example above, you save $30K in licensing costs.

Important to note: If you’re running SQL Server in a virtual machine, you’ll still pay per virtual core allocated (unless you license the full physical server).

7. Redundancy planning

When a server goes down, your business can grind to a halt. Redundancy planning minimizes downtime by avoiding single points of failure. Depending on your budget, we recommend considering the following:

  • Redundant power supplies, which allow the server to keep running if one PSU fails or if a circuit goes out
  • Hot-swappable drives and at least one hot spare (pre-configured for automatic failover)
  • Dual network interface cards (NICs) for failover networking
  • Spare fans and extra hard drives
  • And of course – regular backup and recovery planning and testing

While you don’t need to stock an entire second server, having these key parts ready can mean the difference between a 10-minute hiccup and a multi-hour outage.

8. Don’t forget about support

Warranty and support contracts provide peace of mind in the case of hardware failures. We recommend getting 3-year extended warranty. Cloud hosting providers provide uptime guarantee as part of their service level agreement. 

Need help buying a server?

Know what matters. Spend where it counts. We offer a dedicated Server Specification service to ensure you get exactly what your business needs. This service is money well spent: we’ll help you avoid costly licensing missteps, overbuilt systems, and hardware headaches. Instead of guessing, you’ll get a smart, scalable server that’s built for performance and peace of mind. Let us take the stress out of the process. Reach out—we’ll make it easy.

Explore the possibilities
technology selection

Frequently Asked Questions

How to choose a server for small business?

To choose the right server for your small business, start by identifying your needs; storage, apps, backups, or growth. Decide between on-prem or cloud based on budget and control. Match server specs to your use case, prioritize reliability and scalability, and consider long-term support. For complex setups or limited in-house IT, working with a trusted IT consultant can help you avoid overspending or misconfigurations.

How do I choose the right server?

1. Clarify Your Needs
2. Evaluate Cost vs. Features
3. Compare On-Prem vs. Cloud Hosting
4. Match Hardware to Your Use Case
5. Prioritize Scalability and Reliability
6. Don’t Skip Maintenance and Support

]]>
Shadow IT: The Hidden Risks of Employee DIY Initiatives https://eclipse-online.com/news/shadow-it-the-hidden-risks-of-employee-diy-initiatives/ Wed, 18 Jun 2025 19:41:33 +0000 https://eclipse-online.com/?p=30447 Shadow IT is incredibly common. Hybrid work, work-from-home, and bring-your-own-device scenarios have blurred the lines between work and personal IT tools. When employees feel that IT isn’t providing them with the tools or equipment they need, they’re more likely to look for their own solutions.

shadow it

Employees and employers alike often see the behavior as “taking initiative” and “having an entrepreneurial mindset.” And while those are traits employers want to encourage, using non-approved technologies creates a risk known as “Shadow IT.” 

For employers, it can be tempting to look the other way, allowing employees to shoulder the cost and administration of using their own tools. Our goal is give you all the information so you can decide whether it is worth the risk.

What is Shadow IT?

Shadow IT refers to any software or hardware used by employees without permission from the IT department. Common examples include:

  • Subscribing to SaaS apps like Canva to perform work functions
  • Building low-code apps with Power Platform or other AI tools
  • Setting up software integrations with Zapier, Make, or similar programs
  • Using file storage services like Dropbox or Google Drive for work documents
  • Using personal email accounts or messaging apps for business communications
  • Using personal cell phones or computers for work purposes

While these actions often stem from good intentions, they can create significant security, compliance, and operational risks.

Risks of Shadow IT

Though it may seem harmless on the surface, Shadow IT can introduce serious issues:

  • Security vulnerabilities: Unapproved tools may not meet company security standards. Customer information or other sensitive data may be stored or transmitted insecurely. Once information is stored outside of the company’s security perimeter, you have little to no control over how that information is used.
  • Data loss and leaks: IT teams cannot protect what they don’t know exists. Lost devices or hacked accounts using shadow tools can lead to data breaches. We’ve seen companies lose vital data when an employee leaves because no one has the login credentials.
  • Compliance violations: Companies subject to regulations (e.g., GDPR, HIPAA) risk non-compliance when data is processed through unauthorized channels.
  • Operational inefficiencies: When employees are working outside of the IT framework, it can be hard to build integrations and workflows, leading to data silos and redundancy. These inefficiencies can create confusing customer experiences. For example, a customer may wonder why are they are still receiving emails from one department when they unsubscribed from marketing from your company.
  • Increased overhead costs: If your employees are buying equipment and services on their own and submitting expense receipts, you may not realize you’re paying twice for the same tool or paying for software that no one is using.

How to reduce the risks of Shadow IT

IT Departments cannot possibly monitor or create policies for every scenario. Your goal should be to reduce the need for Shadow IT by providing the tools your employees need to work efficiently. Give your employees guidelines that are clear and communicate why IT policies are in place.  

Microsoft 365, Google Workspace, and other network security programs have administrative settings you can use to enforce security standards. Some of the most common ones we use include:

  • Using a service to send all outbound traffic through a pool of IP addresses
  • Not allowing users to forward email to an external domain
  • Setting up Teams and SharePoint file sharing policies
  • Using Microsoft 365 Defender and link protection
  • Setting up Digital Rights Management
  • Using endpoint management to scan all the attachments that come into an inbox and putting suspicious attachments into sandbox
  • Creating email encryption policies with certain words
  • Blocking users from going to p*rn sites or shopping sites
  • Dynamically monitoring network traffic to spot anomalies, like sending lots of files to an external site or email
  • Mandating anti-virus software on BYOD devices
  • Limiting access to sensitive systems until employees have been there for 90 days
  • Offboarding employees and consultants so they can’t access your materials
  • Setting up a litigation hold to save a copy of every email
  • Disallowing use of thumb drives
  • Implement other monitoring and discovery tools
  • Auto-locking screens after a set limit of idle time
  • Enforcing use of password sharing apps (like 1Password)
  • Giving employees locks to drawers or offices so papers aren’t visible

Probably the most important thing you can do is to communicate with employees. Beyond establishing clear policies, we encourage you to listen when employees ask for help. Make it easy to request and approve the tools employees need to do their job efficiently. By creating a stronger connection between IT and employees, you’ll be able to reduce the need for Shadow IT.

Explore the possibilities
it services technology advisor

Frequently Asked Questions

What is Shadow IT?

Shadow IT is the use of technical hardware or software without the knowlege of the IT department within your organization.

Why is Shadow IT risky?

Shadow IT is risky because it means users are using devices or software without IT knowledge or approval. These personal devices are most likely not configured securely or backed up.

What is a Shadow IT policy?

A Shadow IT policy will ensure security compliance by defining how employees can use hardware and software in the business, especially with new technology.

]]>
Vibe Coding: The Pros and Problems with AI Software Development https://eclipse-online.com/news/vibe-coding-ai-software-development/ Tue, 29 Apr 2025 17:18:04 +0000 https://eclipse-online.com/?p=30422 Vibe coding is the art of combining your ideas with AI tools to “feel your way into a new application” by prototyping fast, iterating on the fly, and seeing what clicks. When people use vibe coding with the right parameters and expectations, vibe coding works great!

Problems creep in when vibe coding is used to replace software development, rather than using AI responsibly to assist with the software development process. In a culture that wants results as soon as possible, it can be tempting to jump straight into code building – skipping the tedious parts of the process like requirements gathering, researching, and architecture planning – but those details matter.

vibe coding

What is vibe coding?

Think of vibe coding as:

  • Rapidly prototyping with AI (e.g. “Hey ChatGPT, build me a quick UI for a habit tracker”)
  • Generating multiple versions of a component to see what works best
  • Using AI to code with just an idea, not detailed requirements

Vibe coding is about getting an idea out of your head and into a format you can interact with and show other people. To quote Simon Willison, “vibe coding is for generating code without caring about the code that is produced.”

The pros of AI-powered vibe coding

Vibe coding is great for exploring new ideas, and may even work to create a simple, usable application for one person or one specific function.

1. You’re not a programmer, but you have an idea
Even if you’re not a software developer, you can use AI to generate ideas that you can show others to get their buy-in or critique of the concept.

2. Fast prototyping
You may be a programmer, but at this point, you’re just exploring options. You can go from concept to prototype in hours (sometimes minutes). This is huge when you’re still figuring out what the app *is*.

3. You want a quick answer
You don’t want to figure out how to move an image to the right side, you just want to copy and paste code to make it happen. Vibe coding is perfect for that.

Not quite vibe coding

AI can also be used to assist with software development by programmers who actually do care about the code. While these efforts are often conflated with vibe coding, these examples would more accurately be considered “AI-assisted software development. Many software developers (including us) use AI for:

1. Easy experimentation
Want to try three different approaches to the same feature? Ask your AI programming tool to build all three. Vibe coding makes it easy to explore your options.

2. Simple, low-level coding
AI works great when you want to write simple functions. We recommend that when you add assumptions, you also rebuild the function to be sure your code is solid and it hasn’t forgotten or isn’t competing with prior assumptions.

3. Unit testing
You can use AI to build unit tests – as long as the same AI hasn’t been used to build the code. That’s because if you made faulty assumptions to build the function, you might make the same mistakes in the testing process.

When vibe coding breaks down

Vibe coding can be a great way to start a project and explore “what’s possible” but often it is impractical and risky to use in a multi-user production environment.

1. Not understanding what’s real or practical
“How do you get pepperoni to stick to a pizza? SUPER GLUE.” When jokes like these become part of the AI language model you are using, you may get nonsensical answers. AI has given answers about the population on Mars, due to taking in science fiction content. Someone needs to build prompts and validate the output based on real life scenarios.

2. Missing the big picture
Vibe coding is great for the “what if we tried this?” stage. But eventually, you need to deeply understand real user needs, architecture, edge cases, security, etc. We recommend you use vibe coding as a discovery tool, then switch into “real” software development once the application direction is clear.

3. Missing the details
Regardless of how your code is developed, someone needs to understand the business processes and workflows. Skipping the requirements gathering phase means that a process may work in many cases, but not the exceptions (and most businesses have to accommodate exceptions.)

For example, calculating shipping rates may seem straight forward, until you consider state and local taxes, orders from external systems, back orders, combined orders, and the like. By definition, vibe coding isn’t the right fit for complex scenarios.  

4. Operating outside of IT
Vibe coded applications are often built by business users, which means they largely operate outside of policies and procedures set by the IT department. No clear architecture and lots of quick AI-generated code means you can end up with something that “works” but is hard to scale or maintain. The application may present security or compliance concerns. We’ve seen a few cases where a “small app” suddenly gets picked up by the department and populated with thousands of records, creating a performance bottleneck (among other problems).

5. Missing coding expertise
If you’re always saying “yes” to the AI ideas, you might end up with code that doesn’t fit your actual goals or design principles. Treat AI like a junior dev with great autocomplete—not as a decision-maker. Trouble shooting AI code isn’t always easy – especially if you have no programming expertise. You can end up in code loops, where you keep getting errors and you don’t know why.

Even experienced software developers can have trouble remembering, “What was I thinking? Why would I write it that way? Why am I getting an unexpected result?” When users don’t understand coding or data architecture, the results can be unreliable.  

When to use vibe coding

  • When you’re exploring a new app idea or feature.
  • When you’re stuck and need to try a different angle.
  • When you want to demo a concept without investing in full dev cycles.
  • When speed > polish in the early stage.

And when **not** to use it:

  • When you need solid performance, security, or scalability.
  • When you’re working in a high-stakes production environment.
  • When team collaboration or documentation is key. (Vibe coding is often solo and fast-paced).
  • When the AI model doesn’t have enough source material or is not trained in the programming language you want to use. For example, CoPilot is good at programming in Python, but not so good at programming in Gleam (a newer programming language.)

Final thoughts

Vibe coding with AI is a bit like improv—you don’t always know where it’s going at first. It’s a powerful way to explore ideas quickly, get out of your head, and let the *code itself* tell you what works. Just remember: once the vibe gives you clarity, the next step is to slow down and build it right.

We recommend using AI to explore ideas—then engineer with intent.

Need help with an app?

Want help using AI to vibe out your next app idea? Or want to turn a prototype into a scalable app? Our team would be happy to help you through the process of building a custom application for your business. Let’s chat!

Explore the possibilities
software development

Frequently Asked Questions

What is AI vibe coding?

Vibe coding is a programming approach that uses AI to generate code from your prompts, allowing you to develop software without traditional coding experience. 

How do I vibe code?

Vibe coding can be done with AI tools to help generate your code from natural language descriptions. You choose your AI tool, start simple describing your project, iterate and refine.

Can ChatGPT vibe code?

Yes. ChatGPT and other AI services can take your natural lanuage and act as a software engineer to build the apps for you.

]]>
Why SaaS Data Backup is More Important Than You Think https://eclipse-online.com/news/why-saas-data-backup-is-important/ Thu, 10 Apr 2025 17:32:07 +0000 https://eclipse-online.com/?p=30405 Many businesses depend on SaaS data for operations but often overlook data loss risks. SaaS providers follow a shared responsibility model, meaning businesses must protect their own SaaS data. Regular backups help prevent loss from cyberattacks, human error, and compliance issues. Automated backups ensure security, business continuity, and long-term data protection.

saas data backup

Most businesses have become highly reliant on Software as a Service (SaaS) platforms to run their business. Look at the list below and think about how many SaaS solutions you use.

  • Business Communications: Microsoft 365, Google Workspace
  • File Storage: OneDrive, Dropbox, Google Drive, Box
  • Accounting software: QuickBooks Online, Xero, Wave
  • CRM software: HubSpot, Zoho, Salesforce
  • Business operations software: Dynamics 365, Sage, Macola, Prophet 21
  • Project Management Software: Monday, ClickUp, Asana, Trello
  • Email marketing: ActiveCampaign, Mailchimp, MailerLite

SaaS solutions offer convenience, scalability, and reduced infrastructure costs—but there’s a hidden risk many organizations overlook: data loss.

Protecting your SaaS data

Many people assume that because their data is in the cloud, it’s automatically safe. But the reality is that SaaS providers operate under a shared responsibility model. While they manage the infrastructure and ensure application uptime, protecting your data is 100% YOUR RESPONSIBILITY.

We’ve seen scenarios where clients have tried to backup SaaS data, only to find:

  • An employee overwrote files, and the SaaS platform was unable to restore their account data.
  • Customer and vendor records could be downloaded, but not the associated notes or transactions.
  • The data was backed up in a proprietary format and couldn’t be accessed.
  • The application didn’t come with API access or have 3rd party tools to enable automated backups.

The worst-case scenario is when clients discover they have no backup in the midst of an emergency. Business continuity is challenging when you don’t know who owes you money or which orders are in process.

SaaS backups are vital to business continuity

Sometimes our consultants feel like “nagging parents” reminding clients of the importance of doing regular backups and testing the backup recovery process. But the truth is that having a solid, consistent backup and recovery process is essential for businesses of any size.

No one wants to think about natural disasters or accidents, but most of us (by choice or by mandate) have health insurance, car insurance, home insurance and business insurance.

We would argue that having your data backed up is as vital – or even more important – than insurance for keeping your business running. And what we’ve seen is that as businesses have migrated to the Cloud and SaaS applications, many have become more lax, trusting the SaaS vendors to back up the SaaS data. The truth is that the vendors are backing up their application and data – but that doesn’t mean they can (or will) restore YOUR data.

SaaS vendors backup their entire environment. To parse out the backup data for an individual company may not be possible or the data may not be usable without the software application they provide.

For that reason, regular backups of your SaaS data are not just a good idea—they’re essential.

5 Reasons you need SaaS data backups

1. Your SaaS vendor could go out of business

Even the biggest names in the industry aren’t immune to financial trouble. If your SaaS provider shuts their doors or discontinues a product, your access to critical business data could disappear overnight. While some vendors provide options to export your data, these processes can be slow, manual and incomplete. We’ve spent hours tediously downloading files – and cleaning up database records – manual processes that are timely and can be expensive.

2. Cyberattacks are increasingly common

Cybercrime is on the rise, and SaaS platforms are attractive targets. A successful breach could compromise your data or render it inaccessible. Even with advanced security measures in place, no system is immune. Ransomware attacks, in particular, can lock you out of your SaaS applications entirely. Maintaining secure, external backups allows you to restore your data without paying a ransom or suffering prolonged downtime.

3. Human error (or malicious intent) happens

People make mistakes—and sometimes, those mistakes involve deleting or overwriting critical data. Worse, a disgruntled employee with access to your SaaS environment could deliberately erase or corrupt important files. Most SaaS platforms have limited retention periods for deleted data, meaning accidental deletions can become permanent if not caught in time. Regular backups offer a safety net against both unintentional errors and malicious actions.

4. Compliance and legal requirements

Certain industries are bound by strict data retention and protection regulations. Losing SaaS data can mean non-compliance, leading to legal repercussions and hefty fines. Implementing a backup solution helps ensure you meet regulatory standards and can provide necessary documentation when required.

5. Business continuity depends on data availability

Imagine losing access to your customer database, financial records, or project files. How long could your business function without them? Data loss disrupts operations, impacts customer trust, and can lead to significant financial loss. Backing up your SaaS data is a crucial part of any disaster recovery plan, ensuring you can quickly resume operations after an incident.

5 Best Practices for Backing Up SaaS Data

1. Implement Automated Backups: Use a reliable third-party solution to schedule automatic backups of critical data.

2. Follow the 3-2-1 Rule: Keep three copies of your data, on two different media types, with one stored offsite.

3. Regularly Test Restores: Ensure your backups are functional by performing regular restore tests.

4. Control Access: Limit data access to essential personnel and use multi-factor authentication (MFA) to reduce risks.

5. Monitor for Anomalies: Use tools that alert you to suspicious activity and unusual data changes.

How Eclipse Consulting can help

Our goal is to help you prevent future technology problems by:

  • Selecting the right SaaS solutions in the first place. Does the solution you’re considering offer backup options? How easy will it be to migrate to a different platform in the future? Are you locked in?
  • Evaluating your backup options. What content is critical to business operations? We can help you put business continuity plans in place.
  • Finding backup solutions. We can either look for commercial third party solutions, build custom software, or recommend periodic manual backups.

Final Thoughts

While SaaS solutions bring tremendous value to modern businesses, they are not infallible. Relying solely on your SaaS provider for data protection is a risky gamble. By implementing a robust backup strategy, you safeguard your organization against data loss—whether from business closures, cyberattacks, or human error.

Don’t wait for disaster to strike. Prioritize your SaaS data backups today to ensure your business remains resilient tomorrow.

Explore the possibilities
backup and recovery services
Frequently Asked Questions

What is a SaaS example?

SaaS is any cloud-based software that users can access via the internet without needing to install it on their devices. A few examples include:
Google Workspace – Businesses and individuals use these tools for email, document collaboration, and file storage.
Dropbox – A cloud storage service that allows users to store and share files from any device.
Salesforce – A customer relationship management (CRM) platform used by companies to manage sales, marketing, and customer service.
Zoom – A video conferencing tool for online meetings, webinars, and remote collaboration.
Shopify – An e-commerce platform that enables businesses to create and manage online stores.

What does SaaS mean?

SaaS stands for Software as a Service. SaaS is using software applications over the internet, like when you access a program through a web broswer rather an installing it on your computer.

Why is SaaS data backup important?

Backing up SaaS data in your applications help you maintain your data availability, ensure data recovery and guard against cyber threats.

]]>
Securing Success: How to Select the Best Security Cameras for Your Business https://eclipse-online.com/news/the-best-security-cameras-for-business/ Tue, 11 Mar 2025 14:03:00 +0000 https://eclipse-online.com/?p=30357 Have you been considering getting security cameras for your business? Before you get enamored with all the shiny features available these days, it’s important to first assess your surveillance system needs. Our goal is to help you gain peace of mind and make informed decisions about how to protect your business using security cameras.  

best security cameras

Why do you want a security camera system?  

Businesses are increasingly installing security cameras as part of a facility security plan. The type of security camera system you need depends on your goals.  

Security camera systems can be effective tools for: 

  • Deterring crimes, such as theft and vandalism 
  • Keeping an eye on remote assets or properties  
  • Safeguarding valuable inventory 
  • Providing employees with a sense of safety  
  • Monitoring business operations  
  • Gathering evidence for legal matters or insurance claims  

Security cameras provide valuable documentation of events that can be critical in resolving disputes or investigating incidents. For instance, in the event of a theft or workplace accident, having recorded footage can serve as critical evidence in legal matters, insurance claims, or internal investigations. This documentation not only aids in accountability but also helps businesses maintain their reputation by demonstrating a commitment to safety and integrity. 

Where do you want security cameras? 

Surveillance systems serve as a crucial line of defense against theft, vandalism, and other criminal activities. Identifying the best locations for installation is crucial to maximizing coverage and ensuring that all critical areas are monitored.  

By installing security cameras, businesses can deter potential offenders, as the knowledge of being watched often prevents criminal behavior. This deterrent effect not only protects physical assets but also enhances employee safety and fosters a sense of security among staff and customers alike. 

Common locations for security cameras include: 

  • Business entry points 
  • Over cash registers  
  • Parking lots  
  • High-traffic lobbies and hallways  
  • Warehouse loading docks   

Types of security cameras 

Once you know why and where you need security cameras, the next step is to understand the camera options available to you. The most common types include dome cameras, bullet cameras, PTZ (pan-tilt-zoom) cameras, and covert cameras.

Dome cameras are popular for indoor use due to their discreet design and wide-angle capabilities, making them suitable for monitoring large areas without drawing attention. Their design also makes it difficult for potential intruders to determine the camera’s direction, enhancing their effectiveness. 

Dome security camera

Bullet cameras are ideal for outdoor applications. These cameras are typically weatherproof and designed to focus on specific areas, such as entrances or parking lots. Their elongated shape makes them easily visible, which can act as a deterrent against criminal activity. PTZ cameras offer advanced functionality, allowing users to remotely tilt, pan, and zoom in on specific areas, providing a versatile solution for large spaces or high-traffic areas where monitoring is crucial. 

bullet security camera

Covert cameras are discreet and designed to blend into their surroundings, making them useful for monitoring sensitive areas without drawing attention. These cameras can be disguised as everyday objects, such as smoke detectors or alarm clocks.  

covert trail security camera

Each type of camera has its unique advantages, and the choice will depend on your specific surveillance needs and the environment in which they will be installed. 

5 key factors in security camera selection 

Beyond security camera type, you’ll also need to decide whether you need:  

Indoor vs. outdoor models  

The effectiveness of a security camera system depends on buying the right cameras for the environment. Outdoor cameras are built for ruggedness, whereas indoor security cameras prioritize esthetics as a key consideration.  

Wired vs. wireless models  

Your decision to go with a wired vs. wireless system impacts installation, functionality, and overall performance. Wired cameras are less susceptible to interference and often support higher resolution footage, which can be crucial for identifying details in recorded images. 

On the other hand, wireless security cameras offer significant advantages in terms of flexibility and ease of installation but require strong data security and a strong Wi-Fi connection to function optimally.  

Live monitoring models  

One of the most significant advancements in security camera technology is the ability to monitor feeds remotely. Remote monitoring capabilities allow business owners and security personnel to access live and recorded footage from anywhere in the world through their smartphones, tablets, or computers. 

This flexibility is invaluable, as it enables real-time oversight of business operations and immediate response to potential security threats. Additionally, remote access to camera feeds fosters greater transparency and accountability among employees, as management can monitor activities without being physically present. 

Video storage and access 

Before purchasing a camera system, you’ll want to consider: 

  • Access needs – How frequently you’ll need to access non-live video for review.
  • Retention needs – How long the video data needs to be kept. Does it need to be backed up on a regular basis? Can it be overwritten on a regular basis? 
  • Budgetary limitations – High-resolution video and high video retention will increase data storage costs. 

Integration capabilities   

Security cameras can be integrated with alarm systems, access controls (door lock systems), and environmental sensors. For example, users can receive instant alerts when motion is detected, the room temperature increases (fire), or when a camera goes offline. This feature allows for proactive measures, such as notifying law enforcement or assessing a situation as it unfolds.  

Additional camera features to consider  

In addition to deciding on camera models, you’ll want to think about whether you need specialized features such as:  

  • Night vision 
  • License plate reader
  • Exclusion zones 
  • High resolution 
  • Wide angle 
  • 360-degree views 
  • Connectivity (wired / wireless) 
  • Power (wired / battery / solar)
  • Motion detection/activation 
  • AI classification 
  • 2-way audio 

Keep in mind  

Your business may require different cameras in different locations. For instance, your retail side of the business may need indoor dome cameras over the cash register but the warehouse may need outdoor bullet cameras to monitor the parking lot and warehouse entrance.  

Need selection and setup assistance? 

Our team would be happy to help you select, install, and support your security camera system. Our services include: 

  • Camera system selection 
  • Mounting cameras securely, making them vandal-proof when necessary 
  • Connecting cameras to power / network / storage devices 
  • Setting up video storage and backup  
  • Creating integrations to other systems  
  • Delivering a data security plan 
  • Training staff how to operate system and respond to alerts  

A well-installed and maintained security camera system can significantly enhance the safety and security of your business.  

Explore the possibilities
technology selection

Frequently Asked Questions

Are wired or wireless security cameras better?

It all depends on your needs for what the best security camera will be. Wired cameras are less susceptible to interference and often support higher resolution footage, which can be crucial for identifying details in recorded images. 
Wireless security cameras offer significant advantages in terms of flexibility and ease of installation but require strong data security and a strong Wi-Fi connection to function optimally.  

Where should I install my security cameras?

Common locations for security cameras include: 
-Business entry points 
-Over cash registers  
-Parking lots  
-High-traffic lobbies and hallways  
-Warehouse loading docks   

Does my small business need security cameras?

Security cameras can be effective tools for: 
-Deterring crimes
-Keeping an eye on remote assets or properties  
-Safeguarding valuable inventory 
-Providing employees with a sense of safety  
-Monitoring business operations  
-Gathering evidence for legal matters or insurance claims  

]]>
What is a Lockstep Upgrade? https://eclipse-online.com/news/what-is-a-lockstep-upgrade/ Mon, 03 Mar 2025 16:27:47 +0000 https://eclipse-online.com/?p=30333 In our last article, we shared the importance of planning your Windows 11 upgrade. Today, we thought we’d share one particularly challenging scenario we occasionally encounter when upgrading business software —the lockstep upgrade.

lockstep upgrade

What is a lockstep upgrade?

A lockstep upgrade happens when multiple components—such as software, hardware, firmware, or drivers—must be upgraded simultaneously. If one component is upgraded without upgrading its dependencies, the system may experience performance issues or not work at all. 

When lockstep upgrades are needed, it feels like a Catch-22 with no easy place to start. There’s no chicken or the egg, it’s chicken and egg, both, at the same time.

Software developers rely on assumptions to create a secure and stable system. These assumptions are listed as requirements for the operating system, firmware and drivers needed to run the software.

In theory, if you keep your technology infrastructure up to date, you shouldn’t run into a problem. However, we occasionally encounter clients who can’t update certain computers for various reasons. For example, they may have a mission critical legacy software program that they’re reticent to replace. At some point, this will likely trigger a lockstep upgrade where the computers and software must be replaced at the same time.

Example lockstep upgrade scenarios

1. Windows OS & drivers
Upgrading to Windows 11 without updating GPU drivers may lead to crashes or poor performance. Here’s where you can check your readiness for Windows 11

2. Business software & backend systems
A business upgrading a CRM system may also need to update the database, middleware software, or API connections to maintain data compatibility. 

3. Cloud & on-prem systems
Cloud applications may require specific API versions, forcing simultaneous upgrades in on-prem infrastructure. 

Windows 11 potential lockstep upgrade scenarios

In Windows 11, we foresee lockstep upgrade issues to occur in instances like the ones below. Of course, we can’t anticipate or prepare for every client scenario, which is why we are encouraging clients to plan their Windows 11 upgrade as soon as possible.

If you have a complicated technology infrastructure or a limited budget, it is especially important for you to plan ahead to ensure business continuity once Windows 10 is deprecated in October 2025. Please reach out to schedule a time to talk!  

1. Hardware compatibility issues
Windows 11 has strict system requirements, including TPM 2.0 and Secure Boot. Older hardware that doesn’t support these features may require BIOS/firmware upgrades in lockstep with the OS upgrade.

Example: A user upgrades to Windows 11 but finds their PC unusable because the motherboard firmware wasn’t updated to support TPM 2.0.

2. Driver incompatibility
Some device drivers may not be updated to support Windows 11, leading to malfunctions or crashes.

Example: A GPU driver for an older NVIDIA card isn’t updated at the same time as Windows 11, leading to display flickering or crashes until the driver is updated.

3. Business software dependencies
Some line of business applications may not be fully compatible with Windows 11 without simultaneous upgrades to newer versions.

Example: A company upgrades its PCs to Windows 11, but legacy accounting software requires an older .NET Framework version that isn’t available by default.

4. Virtualization issues
Windows 11 has built-in security features like VBS (Virtualization-Based Security), which may require hypervisor updates or BIOS changes.

Example: A user upgrades to Windows 11 but cannot run virtual machines because the required firmware settings were not changed in lockstep.

5. Software dependencies on older components
Some software relies on outdated components like Internet Explorer (removed in Windows 11) or older versions of PowerShell.

Example: A custom business app that depends on Internet Explorer stops working after the Windows 11 upgrade, requiring an app rewrite.

6. Group Policy / Active Directory issues
Organizations using Group Policy settings from Windows 10 may need updates to maintain compatibility with Windows 11’s security and feature changes.

Example: A company upgrades to Windows 11 but experiences login failures because old Active Directory policies don’t support the new security model.

7. Peripheral device issues
Printers, scanners, and other peripherals may need new firmware or drivers to work with Windows 11.

Example: A user upgrades to Windows 11 and finds their business-critical label printer doesn’t work because the manufacturer hasn’t released updated drivers.

Book a Windows 11 Readiness Assessment

Eclipse Consulting can help you to prepare for the retirement of Windows 10 by running a Windows 11 Readiness Assessment for your organization. This assessment will help you understand:

  • What hardware needs to be replaced
  • Whether your software applications are compatible
  • Security risks within your tech stack
  • Your data migration requirements
  • The total cost of a Windows 11 deployment 

The key to a smooth transition is to start your Windows 11 planning early – especially if you suspect you may have compatibility issues.

Explore the possibilities
IT support

Frequently Asked Questions

What is a lockstep upgrade?

A lockstep upgrade happens when multiple components—such as software, hardware, firmware, or drivers—must be upgraded simultaneously.

Why do we need a lockstep upgrade?

Sometimes the only way to get anything upgraded is to update everything at the same time. This is the lockstep process.

What is the lockstep process?

The lockstep technology process involves upgrading your software, hardware, firmware, and drivers all at the same time – making sure there aren’t any performance issues.

]]>