Dr Thomas Keane Honored

Esthesia Oral Surgery Care, Dr Thomas Keane Solbrekk Customer

I was not at all surprised when I heard that Dr. Keane was selected as one of the top local, small business leaders.  To see the details of the award, click here.

Dr Keane has been a computer network and Laserfiche client of mine for over 10 years.  It has been great to work with him as he has grown his practice.  He is a great doctor, business owner, employer, and a great family man.  I want to congratulate Dr Keane; he truly deserves this award.

Larry Phelps
Minneapolis, Minnesota
Solbrekk, Inc

Laserfiche Medical Records

Who needs to send secure email?

encrypted emailIf you are sending emails containing medical patient information, personal information such as social security numbers, and private company information; then you need to make sure that this information if kept secure.

I recommend that you look at ZixMail.  They have a network of over 20 millions members.
Zix Encrypted Email has a solution whether you need just a few users or have hundreds of users.

Organizations who need this are: Health Care Providers, Law Firms, CPA firms, and anyone who sends private information.

For details see: ZixMail Datasheet

ZixPortal Datasheet

Prevent Data Security Breaches with Email Encryption

Email Encyption Article on Minnesota Independent Insurance Agents & Brokers Website

Top Technology Breakthroughs

CRN News recently published an article stating what they thought were the greatest technology breakthroughts in the past 25 years. Well, for many of you 25 years would take you back to your blackmart app childhood, but for others of us we have watched the crazy growth of technology and how it has impacted our lives.

If you were asked to list some of the technologies that really changed your life, what would the be?

Here is that CRN listed as the top 25:
1. Software As A Service – rather than purchasing software capability you rent it, such as Webex.
2. Realtime Collaboration/Communications – AOL Instant Messaging and text messaging are examples of this.
3. IPOD – Apple Computer’s device that allows mobile storage of audio and images.
4. Google – the search engine that gave new meaning to information overload. Watch for other technologies they are developing!
5. Blackberry – the phone, PDA and web browser in one device.
6. Linux/Open Source – a growing software movement that has Microsoft’s attention.
7. The Web Browser – made the internet accessible to the average user.
8. The Virus – has spawned a whole industry.
9. The Y2K Scare – design oversight, hype and distrust all characterize this event.
10. The PDA – hand held organization!
11. Wireless Communications – cell phones, wireless PDA and WIFI have invaded nearly every business and household.
12. E-Mail – this change the method of communications for most people in their business and personal life.
13. The Mouse – change the way we interact with computer applications.
14. The Internet – has changed business probably more than any technology listed here.
15. Ethernet – this invention is the conduit that allows most of the data communication that is happening today.
16. The Network Operating System – allows standalone PC’s to share resources.
17. The Office Suite – today the standard of office tools.
18. The Graphical User Interface – Windows changes the ease of use of computers forever.
19. The Modem – became the standard for many years to remotely connect computer systems.
20. The Laptop Computer – gave birth to what we call today, mobile users.
21. The Relational Database – capability once only existed on mainframe computers became common place.
22. The Word Processor – the most widely used application to date.
23. The Spreadsheet – one of the most powerful application we use.
24. The IBM PC – this product legitimized the personal computer industry.
25. The x86 CPU – Intel produced a legacy of products that have lasted nearly 30 years.

For the complete article go to: CRN ARTICLE</a

Information Security: What you really should know.

You should attend this seminar if you:
o Have computer users
o Want to learn more about information security
o Are in a regulated industry and/or process credit cards
o Use vendors to store or process data
o Want to learn about technology risks that may impact your business
o Want to know what your options are for protecting intellectual property and other confidential data
Speakers
Mark Ritchie Minnesota Secretary of State
Matthew J. Harmon, CISSP, CISA, GSEC Blanski Peter Kronlage & Zoch, P.A.
William Larsen Watchguard Technologies, Inc.
Darlene Tester, JD, CISSP Bluestem Brands

Event Information
When:
Tuesday, June 29, 2010 Time:
Registration: 8:00 am to 8:30 am
Program: 8:30 am to 10:30 am
Q&A Session: 10:30 am to 11:00 am

Where:
Golden Valley Golf & Country Club
7001 Golden Valley Road
Golden Valley, MN 55427 Cost:
$25 per person – Prepaid
$35 per person – At the door
Continental breakfast and security reference
handbook included

RSVP:
Reserve a seat by June 23, 2010 for you or your guest(s) by contacting Cecille Rice at 763-404-4736 or events at solbrekk.com

Economical, Environmental, Efficient

Did you know that:

■ The average office worker uses 10,000 sheets of copy paper each year.
■ The United States alone, which has less than 5% of the world’s population, consumes 30% of the world’s paper.
■ Over 40% of wood pulp goes toward the production of paper.
■ Printing and writing paper equals about one-half of U.S. paper production.
■ The costs of using paper in the office can run 13 to 31 times the cost of purchasing the paper in the first place

Here is a great video that reminds us how important paper-less technology can be:

Minnesota Polution Control Agency – The E’s of Office Paper Reduction