Reza Ashrafi
Business Technology Insights, IT Innovations, and Tech Talk
Reza Ashrafi is the IT director for James McElroy and Diehl, PA., a mid-sized law firm based in Charlotte, North Carolina. He is also a technology hobbyist and entrepreneur. As such, Reza is immersed in IT innovations and small business technology issues daily. In this blog, he shares business technology insights as well as commentary related to his personal interests in technology.
Tech Talk and Business Technology Solutions for All
While the topics in this personal technology blog are often covered in some depth, Reza’s goal is to provide useful, accessible information for small- and medium-sized business (SMB) owners and managers, techies, and anyone with an interest in the topics discussed.
Small Business Technology Issues and Business Technology Insights
Among other topics, some of the areas covered in the blog include:
- Applications and integrations for SMBs;
- Networks and systems;
- Hardware and software;
- Storage and virtualization;
- Cloud services;
- Security and liability;
- Databases and privacy; and
- Hyperconvergence.
A Personal Technology Blog with a Focus on IT Innovations
Reza’s career in IT developed out of an original interest in graphics and animation that has persisted and run parallel with his career in business technology. Among the matters of personal interest covered here, you’ll find discussion of fractal technology and its many uses in various aspects of technology, including the following:
- Graphics and animation;
- Ray tracing;
- Rendering; and
- Encryption and security.
If you’re interested in the topics and more, read on for tech talk and business technology insights from an experienced IT director and technology enthusiast.
Password Policy Best Practices for Small- and Medium-Sized Businesses
Compromised login credentials—email addresses, usernames, and passwords—are a common root cause of cyber hacks and security breaches. IT professionals have been harping on this topic for years, yet the numbers show that password protection is still a very serious...
Read These Thin Client FAQs before Deciding Whether It’s Right for You
Thin client computing has a long history compared to some of its technological counterparts, with the first use of the term thin client dating back to the early 1990s. The concept, as well as the hardware and software that accompany it, has undergone many adjustments...
How Will IBM Watson for Law Firms Change the Legal Profession?
The incredible technological innovations occurring in the world today keep life as a law firm IT director exciting. These advances also bring added pressure to innovate and use new technology to add value and efficiency to client services. IBM Watson for law firms is...
How Law Firms Use Data Analytics: IT Issues
One of the fastest growing fields in business today is data analytics: the ability to cull through data, compile it into a usable format, make a visual display of the data, and deliver it to users so they can make informed decisions. The effective use of data...
Managing Mobile Security: Risks of Law Firm Mobile Devices
In the past, law firms protected confidential and sensitive data by securing it in locked file cabinets within locked rooms. Now, almost all information is manipulated and stored electronically. Even printed or handwritten documents are scanned and stored digitally in...
Security through Encryption for Small Business
Anymore, tech is an integral part of successful businesses of all shapes and sizes. With regular use of technology, however, comes the risk of keeping your digital assets—and those of your clients-safe. Businesses routinely lock their doors when closed, but few take...
The Versatile and Varied Business Applications for Fractals
An Internet search for the term “fractals” displays fascinating, intricate images and entrancing videos. These are excellent visualizations for understanding fractals and fractal concepts, but graphics are only one of the many actual uses for fractals. The business...
Akamai Edge Computing Applications: Tools for Modern IT Infrastructure
The mass adoption of cloud computing over the last decade or so has changed the way businesses operate, but the world’s hunger for data and connectivity continues to push IT infrastructure and design in new directions. Some of the technologies that are being used to...
Small Business Disaster Recovery Basics
Maybe you think it won’t happen to your business because your business just isn’t that large and important. Yet 60 percent of small businesses have experienced cyber attacks in the form of denial of service attacks, phishing, and social engineering attacks. The...