About Ken Czekaj

I partner with customers to solve their business problems. Typically, that involves a collaborative design for network, cyber and/or application performance management solutions to address the unique business challenges of enterprise, energy, healthcare manufacturing and financial customers. My expertise is in the areas of Digital Transformation, Cloud, Service Triage, Application Rollouts, Digital Transformation, VoIP, Video, Capacity Planning, Cybersecurity, Latency, Multi-Tier and Virtualized applications. My focus is on solving business problems.

Would Homer Simpson Protect Virtualized Servers? (Hacktivism #5)
avatar

Problem to Solve:   What can we do to protect our Virtualized Server Infrastructure and Application Services against Hacktivism?   OK, I don’t know exactly what Homer Simpson thinks about virtualized servers, but do have a guess on his reaction. 🙂   So the … Continue reading

Protect Critical Unified Communications (Hacktivism #4)
avatar

Problem to Solve: What can we do to protect our organization from Hacktivism, specifically for protecting our critical Unified Communication services? Have you ever had the joy of experiencing your company’s voice communications become unavailable? Well, if you think about it, … Continue reading

Protect the Critical Applications (Hacktivism #3)
avatar

Problem to Solve: What can we do to protect our organization from Hacktivism, specifically in the area of protecting our Critical Application Services? Have your business critical application services ever become “unavailable”? We have all had this happen at one … Continue reading

Protect the Highway – Critical Links (Hacktivism #2)
avatar

Problem to Solve:  What can we do to protect our organization from Hacktivism, specifically in the area of Critical Links and Infrastructure? Have you ever seen any of your critical business links that look a “little congested“? I bet that some of … Continue reading

Protect the Foundation – Critical Services (Hacktivism #1)
avatar

Problem to Solve:  What can we do to protect our organization from Hacktivism, specifically in the area of Critical Services? As we work from the bottom up in creating the strategy, I will admit that this topic may not be extremely “sexy”. But … Continue reading

Protect The House .. from Hacktivism (Series)
avatar

Problem to Solve:  What can we do to protect our organization from Hacktivism?  How can I use my Application and Network Performance Management tools to help assist? Nope, not starting this article out with 80’s movie reference, music video, silly … Continue reading

Paradise by the Service Dashboard Light
avatar

Problem to Solve – My company has many different IT and business solutions and it is difficult to a get a “single pane of glass” service dashboard to see how everything is performing.   What can we do? I will admit that … Continue reading

Don’t let a Multi-Tier Application Make You Multi Tear Up
avatar

Problem to Solve – My company uses a Multi-Tier ERP application that is critical to our business. Service degradations and outages are extremely visible to executive management and costly to our bottom line.   How can we reduce the time … Continue reading

Need a Dr. when your EMR gets sick ??
avatar

Problem to Solve – My healthcare organization is deploying an Electronic Medical Records (EMR) solution as per federal regulation.   What can I do if there are performance issues with it? Ah, the Affordable Health Care Act.   What a fun, enjoyable … Continue reading

Fat, Drunk and Stupid No Way to Go thru Big Data
avatar

Problem to Solve – My company is starting a Big Data / “Internet of Things” initiative as a Business Strategy.     How can I use my APM/NPM tools in this strategic effort? Yes, yes, we all remember the classic movie, Animal House … Continue reading