Worker Productivity and Internet Speed

Sometimes Google Searches Don’t Give You the Answers that You Want!

During a meeting in which we were discussing new topics for our web page, one of our very experienced sales professionals suggested that we do a write-up on the positive impact that fast Internet has on an organization’s productivity. “Great idea.” We all said. We collectively figured that some independent think tank/University must have researched this topic and concluded that every man, woman and child needs gigabit throughput. Sadly, our search found that most of the “research” was done by Internet Service Providers and their outcomes were anecdotal. But does a lack of research invalidate the premise that speed matters when it comes to the Internet? We don’t think so, but we lack the budget to analytically prove that organizations benefit from faster Internet. So lacking in research data, we have chosen to discuss this topic from the perspective of how we all use the Internet. We’ll let the reader draw their own conclusion.

The Cloud – A painful shift unless you have big bandwidth.

If you have decided to move an application from your premise to the cloud, you should understand that the path that the data travels (from server to user device) will run much, much slower with the cloud. The simple fact is that most premise based local area networks move data at multithreaded gigabit speeds. When you move that application to the cloud you will be sharing a single backbone amongst all of your users at speeds in the 1.5 to 20 megabit per second realm. This translates into a network slowdown at a factor of 50 to 666 times. This does not invalidate the cloud. Depending upon your situation, a cloud based application will be the right choice. Just know that your Internet connection’s speed will matter and that your users will let you know when it runs slow.


The virtual private network is a truly remarkable change in network transport topology. It provides remote users secure connections to needed computer applications. It provides a cost effective alternative to the more expensive MPLS and dedicated leased WAN technology for connecting facilities. But in case no one told you, these VPNs run across your internet connection as well. And the users’ satisfaction with the VPN that connects them to their application will be greatly impacted by the speed of your Internet connection.

Telephony and Video – The wild west of network applications

The two most difficult applications to optimize over an Internet connection are telephony and real time video. Simply put, everyone wants to run them over their Internet connections. Unfortunately, by their nature, these applications are ill suited to run on an inadequate Internet connection. There are multiple technical reasons for the challenge with these applications but the simple answer is that if you want to route telephone calls and video conferences over the Internet you need a fast Internet connection.

Summary – Speed Matters

Here is a simple analogy. A rutted single lane road in the country may be adequate for a farmer to move bales of hay. But, when the county fair hosts a popular music figure – and the main road to the fairgrounds is this same road – well, good luck. Now consider building a regional airport or a business enterprise at the end of that road. Welcome to 2016. It might be time to upgrade that highway.

How can Digicorp help?

Since 1976, we have built the IT, telephony and video infrastructures on which thousands of customers rely. Our carrier services division will help you find a provider who will meet your needs for speed and reliability. And, because of a rapid expansion of competitive fiber offerings, we have seen the cost of better, faster service drop rapidly. In just the past 18 months, 10 Mb fiber solutions now are costing the same as what we had been paying for 1.5 Mb copper solutions.

For more information, please call or email Michael Diemer. (262-402-6150 or

CryptoLocker 2016

To start, CryptoLocker is a ransomware Trojan that encrypts a computers drive. Once the drive is encrypted, the data files resident on the system are no longer accessible to the rightful owner of the data. The criminals behind this Trojan then demand an extortion payment to the decrypt the data. An infected system has one of two choices at this point – pay the extortionist or recover data from the most recent backup.
What is making CryptoLocker a real problem lately?
The CryptoLocker ransomware Trojan has been creating serious problems for some time but recently the criminals behind the enterprise have changed their approach. The recently documented attacks are a blend of social engineering combined with traditional malware/virus code. The original infestations largely occurred by way of email attachments or web page exploits.
The most current cases include two elements. The criminal calls an unsuspecting employee or person and tells them that a reputable organization (a bank, accounting firm, etc.) will be sending them an email. This builds trust with the target of the crime. The criminal then sends an email with a word document that is unreadable. It instructs the recipient to click on a macro if the document is unreadable. This macro initiates a web call and downloads the malware. At this point, the infection has begun. Unfortunately, since the executable is generated from what appears a trusted source the standard antivirus software, antimalware software and firewall installations treat the traffic a legitimate.
What can be done?

  1. Be aware. Notify employees of the potential risks. The best mitigation for socially engineered attacks is employee behavioral training.
  2. At your unified threat gateway (ex. Fortigate) enable deep SSL inspection and enable data leakage prevention (DLP) to block outbound executable calls. Please note, this process should stop all incoming executables. But, it may require more IT intervention because in protecting against unwanted intrusions it will block some needed functions.
  3. There is hope that Microsoft will offer an update to Office that will block macros from initiating executable content.

If you have questions about CryptoBlocker or any IT related issue please speak with your Digicorp engineer or account manager.

Celebrating 40 Years in Business

On September 22nd, 2016, Digicorp will celebrate 40 years in business. We take great pride in this accomplishment. More than any other aspect of achieving 40 years in business, we appreciate our thousands of customers and the bond that we have formed with them through the years. Further, we are fortunate to have an outstanding circle of dedicated employees, suppliers and business partners. We are a technology company, but is these many human elements that make our work a fulfilling pursuit.

We’ve Come A Long Way


In 1976, as our country was proudly celebrating our 200th anniversary to a disco beat while rooting for an underdog named Rocky Balboa, we were still years away from bringing technology to the masses.  We talked on rotary phones and marveled at our new electric typewriters. Maybe we had heard stories about two youngsters named Steve Jobs and Steve Wozniak who were forming a start-up company called Apple… but, it was an “analog world” to be sure. It was in 1976 that Digicorp, Inc. (then known as Barch Communications) began delivering two way radio solutions to organizations in the greater Milwaukee area. This began our journey down a path of working with dynamic and ever-changing technologies. Our objective – demystify, simplify and make cost effective the technical solutions that our valued customers need.


Now 2015, we look back and wonder, how did we ever get by without the technology we use today? Today, Digicorp provides a comprehensive array of computer, telephony and video solutions to customers located throughout Wisconsin and Northern Illinois. The solutions we provide to our thousands of customers touch all parts of the globe, and all types of organizations.  Whether In health care, manufacturing, education, law, government, banking/insurance, distribution or any other industry – we are the trusted partner to design, build and support the infrastructures that make essential computer, voice and video communications happen.

Our Ethos

We have accomplished a lot in 40 years, but what really matters is what we do next, and HOW we do it.  Our goal is to always remember that high-tech means nothing without “high-touch”. We work in a complex industry, but in the end, we are in a people business. We will stay committed to the human element of technology in all aspects of our organizational pursuits.

We can’t wait to see what the next 40 years brings—thanks for being part of our journey.


George Fahr | President/CEO | Digicorp, Inc.

Press Release – NCS

Date – October 8, 2015

Digicorp, Inc., a Wisconsin privately held corporation, headquartered in Brookfield, Wisconsin has acquired NCS, Inc. also headquartered in Brookfield, Wisconsin. Both firms specialize in the design, implementation and support of computer systems and business telephone systems.

Digicorp President George Fahr stated. “We are thrilled to have NCS and, specifically, owner Tom Phelps, join our organization. Our companies focus on the same technical solution areas. Further, we have two common business philosophies. First, we want to be a cost effective partner for our customers. Second, we want to provide support with a sense of urgency. Our customers need to do more with fewer resources – our job is to help them achieve this objective.”

HP Defective Media Retention (DMR)

A Requirement for Those Impacted by Compliance Issues

If you dig into HIPAA, Sarbanes-Oxley and the Gramm Leach Bliley Act, you will find you are responsible for controlling your sensitive data. Failure to do so can lead to fines and legal costs. But, what happens if you have a computer hard drive failure? In most cases, the hardware warranty requires that you return the drive to the manufacturer. If you keep the drive, as is required by a majority of the regulations, you will be charged for a replacement part.

This is a losing proposition for your organization. There is a solution – HP DMR.

With a HP DMR maintenance plan you are allowed to keep the failed drive. Thereby, allowing you to save or destroy the failed drive in accordance with your organization’s security policy. If you have questions about your sensitive data and how best to manage it, please call Digicorp (262) 402-6150. We will help you purchase the right solutions for your needs.

For more information read this article from HP, “Keep sensitive data safe.