ITwerx Corp’s cover photo
ITwerx Corp

ITwerx Corp

IT Services and IT Consulting

Lynnwood, WA 67 followers

Now hiring for all positions: engineers, programmers, sales. (Minimum 10 years experience, preferably more.)

About us

Providing technology services and solutions to small to medium sized businesses, (10-200 employees), along the I5 corridor from Seattle to Everett.

Industry
IT Services and IT Consulting
Company size
2-10 employees
Headquarters
Lynnwood, WA
Type
Privately Held
Specialties
Construction Information Technology, Technology Consulting, Managed Services, Project Management, Business Process Analysis, and Vendor Management

Locations

Employees at ITwerx Corp

Updates

  • ITwerx Corp reposted this

    View profile for Michael Hasse

    Every business is unique, so are the technology challenges! Helping SMBs/SMEs for >30yrs (CTO, CIO, CISO and SDVOSB - MSP/MSSP)

    John Munsell tells us the hard truth about DeepSeek here. I would add that the Trojan Horse issue is true for all Chinese products, from phones to security cameras to all software, because it is literally the law there! Let me expand on that further - imagine if the US government required every tech company and manufacturer in America to allow the NSA full access to all code and collected data, to have NSA staff onsite monitoring all personnel, to be able to make changes to code at any time and without review, and, further, maintained close surveillance of all employees and their families (and their personal devices) 24/7 to "ensure good behavior". China took Orwell's 1984 and used it as a playbook for the last 25 years, leveraging technology as a force multiplier in every possible way. While this started internally, they've gotten so deeply entrenched in so many areas around the world through their loss-leader approach to manufacturing that it's now impossible for anyone to remain ignorant of it. #AI #China #SMB #SME #CEO #CIO #CTO https://lnkd.in/g2f6wBZU

  • ### Resolving Data Integrity Challenges in Biotech A biotech laboratory was preparing to deploy a new high-speed analyzer—a sophisticated, multi-functional piece of equipment integral to their operations. The system was designed to work seamlessly with their internal application, but after deployment, the lab encountered sporadic issues with data integrity. Some days, the system operated flawlessly; other days, it delivered incomplete or corrupted data, creating a significant challenge for the lab. #### Identifying the Problem The equipment vendor blamed the lab’s home-grown internal software, while the lab's development team maintained that while their application might not be perfect in every way, they were 100% sure it was rock solid in this particular regard. As their IT vendor, we were asked to investigate the issue and identify the root cause. #### Analyzing the System Our approach began with a thorough review of the integration between the lab’s application and the analysis system. We traced the flow of data and identified the points where errors might occur. Initial checks ruled out any generic causes such as network hardware issues, narrowing our focus to the analysis system itself. During this process, we discovered that the system's data communications actually leveraged a medical protocol developed by Siemens. To fully understand the complexities of this protocol in the given context, we sought input from a subject-matter expert (SME) with specialized knowledge in Siemens Industry protocols and medical data standards. #### Finding the Cause With the SME’s help, we quickly pinpointed the issue: the analysis system occasionally deviated from the protocol, introducing an extra character in the data stream under certain conditions. This seemingly small inconsistency caused the data corruption the lab was experiencing. The SME provided detailed documentation to explain the issue, supported by diagrams and data samples, and referenced specific aspects of the protocol standards. The findings were clear and conclusive. #### Resolving the Issue The vendor never explicitly acknowledged the flaw, but by pure coincidence a firmware update just happened to show up the very next day and no further data integrity problems occurred. #### Key Takeaways This experience highlighted the importance of a methodical, collaborative approach to problem-solving. By combining our technical analysis with input from a specialized expert, we were able to resolve a complex issue efficiently, ensuring the success of a critical project for the lab. #biotech #lab #siemens #mistakesweremade #MSP #IT #CEO #SMB

  • **Helping a 50-Person Law Firm Recover from a Cybersecurity Breach** In times of geopolitical unrest, threat actors take advantage of newly revealed tools and vulnerabilities, posing challenges for businesses of all sizes worldwide. A 50-person law firm experienced this firsthand after their internal staff reconfiguring a firewall left a port open accidentally. The port was secured, and normally this would have been a minor thing that was caught and remedied in short order, but in this case there was a vulnerability even the firewall manufacturer didn't know about, and something got in! The firm’s AI-based endpoint security system, which we had implemented the year before as part of their cybersecurity strategy, detected unusual activity and 𝘢𝘱𝘱𝘦𝘢𝘳𝘦𝘥 to have stopped the intrusion almost immediately. But as we examined what had been caught we realized it was something brand new and there was no way to tell if this had been the first and only activity or if the attackers had already gained access to the network weeks or months prior and this was merely the first action to be "seen" by the security systems. I.e. we had to treat the situation as if the entire network had been compromised and could still have active malware present! The team acted swiftly to disconnect everything to prevent the potential spread of anything else that might be present and still active. In parallel with the isolation effort, we confirmed with researchers that the threat had just been discovered elsewhere as well and work was already in progress to understand the capabilities. In the meantime though, the number one priority was mitigating production impact and restoring operations as quickly as possible! We had a new, temporary environment built from scratch within 24hrs. This included setting up clean systems, essential apps, and even network hardware, (embedded systems like switches and network printers can host an infection completely undetected by many security systems). Since the status of the backups was uncertain, (depending on the true time of infection), current data was brought over from isolation manually via portable storage to be scanned and validated in a separate quarantine environment before being moved to the new systems. While we rebuilt things, the research labs gathered enough information to let us confirm that the AI-based security system had, in fact, successfully blocked the malware before it could cause any harm. This confirmation was critical as it meant no client data was stolen. (Washington state requires notification of all victims in case of personal data loss, which would be a tremendous public relations mess for any firm!) This incident highlights the importance of a layered cybersecurity approach with a proactive response plan. While no system can be completely immune to evolving threats, preparation and swift action can make a significant difference in minimizing the impact of an attack! #cybersecurity #AI #SMB #CEO

  • A small company specializing in government document filing contacted us with a critical issue. Their business relied on a 30-year-old custom database application running on a proprietary SCO Unix system. The original developer and hardware manufacturer were no longer around, and the aging hardware was failing with no replacement parts available. They had been quoted over $100,000 to rebuild the system for a Microsoft environment - a cost they couldn’t afford. A friend of the owner suggested they seek our advice. After assessing the situation, we proposed converting their system to a virtual machine (VM). This approach would preserve their existing setup and run it on modern hardware, avoiding the need for redevelopment. The catch was that the old hardware was literally too old, the SCO boot sequence expected a lot of things to be exactly as it was originally, and modern Virtual Machine hosting options couldn't adequately replicate that environment. Fortunately for them, some of our engineers had worked with SCO systems before and knew a few tricks to bypass some of the requirements, and after documenting the hardware and software configuration in detail we were able to identify and configure a VM environment that was "close enough" to let their specific version of SCO actually boot. After that we created an image of the failing hard drive to safeguard their data followed by extensive testing on the new virtual platform to ensure compatibility and stability. After validating the solution, we completed the migration over a weekend to minimize downtime. By Monday, the company was fully operational on their new system. Even with all of the research and testing, the virtualized environment was a fraction of the cost of redevelopment. This is a good example of how sometimes the obvious answer isn't always the best, especially for small businesses relying on legacy systems!

  • View organization page for ITwerx Corp

    67 followers

    Here’s how we helped a manufacturing client address challenges with aging equipment while managing costs effectively. Manufacturing equipment is built to be durable, often lasting for decades. However, as systems age, vendors may stop supporting them, making replacement parts harder and more expensive to find. This can lead to significant challenges when components begin to fail. One of our clients, a long-established manufacturer, encountered this issue with their operator consoles, which were critical to their production line. Over time, the consoles started to malfunction, causing disruptions. Other components, including sensors, valves, and cameras, were also showing signs of wear. While replacing these parts was costly, upgrading to new equipment presented an even greater expense. When the client contacted us, their main concern was finding a sustainable solution for the failing consoles. Replacement parts were scarce and expensive, and the company needed a more practical alternative. We evaluated the situation and identified a potential opportunity: while the console’s cabling and connectors were specific to the original vendor, the internal components—like monitors and keyboards—were standard, off-the-shelf parts housed in a custom enclosure. This meant we could replace the failing components with readily available ones rather than relying on rare, vendor-specific parts. Working closely with the client, we sourced reliable and affordable replacements for the standard components. This approach reduced repair costs significantly and ensured the client could maintain the consoles without relying on obsolete parts in the future. Building on this success, we addressed the other aging components in their system. Upon further review, we found that many parts labeled as proprietary were actually standard components with minor modifications. By identifying cost-effective alternatives for sensors, cameras, and other parts, we helped the client replace these items affordably and efficiently. By the end of the project, the manufacturer had a practical, sustainable approach to maintaining their equipment. They no longer felt constrained by the lack of vendor support or the high cost of proprietary parts. This collaboration demonstrated that with careful analysis and resourceful problem-solving, aging systems could be maintained effectively without excessive costs. =================================== If you've read this far, then we'd like to ask a favor - we'll be posting a lot more of these - was this a convenient length, style, level of detail etc? And we've worked with many companies across most industries over the last few decades, any requests...? #SMB #CEO #manufacturing

Similar pages