What You Should Know If You Missed Cisco Partner Summit 2016

March 28, 2016
Freshly back from another year at Cisco’s annual Partner Summit and this year did not disappoint, with lots of announcements and some fantastic direction for 2016. Here are the major announcements and directions that you should know about.

1. Digital Network Architecture (DNA) automates network operations

  • As the next level of Software Defined Networking (SDN), Cisco’s newly announced Digital Network Architecture (DNA) is an open, software-driven architecture that automates your enterprise network operations.
    • The programmable architecture frees your IT staff from time consuming, repetitive network configuration tasks.
    • Turn up network functions with a few clicks and serve customers in engaging new ways as soon as you think of them.
    • All while lowering costs and reducing risk.
    • See a live online demo of this new programmable architecture.

2. CliQr acquisition provides hybrid cloud orchestration

  • On March 1st Cisco acquired CliQr for $260 Million. As organizations move towards hybrid cloud architectures, the ability to manage software and applications across a multi-cloud environment becomes increasingly complicated, and CliQr helps manage that complexity.
  • With the acquisition, we can expect to see this application level management compliment Cisco’s existing InterCloud Fabric strategy to help clients manage their multi-cloud environments.
  • The CliQr team is expected to join the Cisco Insieme team to be integrated into Cisco’s overall SDN strategy.

3.    HyperFlex for a single point of management

  • Potentially one of the biggest announcements this year was the introduction of Cisco’s Hyper Converged platform “HyperFlex”. Hyper converged is a huge growth area where we are seeing clients take advantage of fully integrated compute, storage and networking platforms.
  • Cisco’s introduction to this space takes advantage of their already strong UCS platform and provides a single point of management across the entire hardware and software solution.

4.    Security – end-to-end coverage

  • Since the acquisition of Sourcefire we have seen Cisco put a much larger focus on their end-to-end security This year, more than ever, Cisco sees the opportunity to take advantage of their security portfolio. Although Cisco was late to the game with their Next-Gen Firewall solution they have come a long way and are now the #1 preferred security vendor selected by CIO’s (graphic below).
  • Cisco’s strategy of covering the entire attack continuum (before/during/after) is a major focus for the organization and seems to be hitting home with customers who have struggled with too many products/vendors to cover this previously.

5.    Spark offers both cloud and hybrid options

  • As mentioned in my Collaboration Summit blog, Spark will continue to be a major focus for the collaboration team. Spark Message/Spark Meeting/Spark Call are all available both as a cloud offering or a hybrid cloud. The hybrid option allows customers to utilize their existing voice/video on-premises infrastructure to fully integrate with Spark cloud to provide all the great new features being released with Cisco Spark.
  • To review, the 3 primary solutions with Cisco Spark include:
    • Spark Messaging – this powerful collaboration tool provides persistent chat, document sharing and escalation to voice and video calls. This has been a fantastic tool to collaborate on a project with a single place to keep all communication. For me this has been a fantastic way to reduce email sprawl and keep all communications isolated under a single platform.
    • Spark Meeting – utilizing the benefits of the cloud Spark Meeting seamlessly enables the integration between the boardroom and your mobile device.
    • Spark Calling – Cisco Unified Communications and Hosted Collaboration Service (HCS) are a fantastic solution for our clients with +200 users, but a hosted cloud solution for the SMB market has been challenging. Spark Calling is going to completely revitalize the SMB telephony environment. With the ability to turn up a new phone quickly and easily by simply plugging in a new phone out-of-the-box and immediately offer enterprise class services at very low cost creates an excellent opportunity for our SMB clients.
  • Hybrid with some components available today and most available sometime in CY16 for both Canada and the US. Below is a quick snapshot of the offer packaging that will be available.
  • Start using Spark messaging for free today join at and invite me to a room to continue the conversation.

6.    Cisco ONE Software and ELA

  • Cisco continues to revamp the way that they handle software and licensing.  For all customers the Cisco ONE licensing platform with the Smart Licensing portal can dramatically change the way you purchase and manage licenses. Software no longer needs to be tied to a specific piece of hardware and be re-purchased when the device needs to be refreshed.
  • Perpetual licensing and software bundling available with Cisco ONE can dramatically reduce TCO. Cisco ONE is available for the Data Center, WAN and Access layer portfolios.
  • Cisco’s software Enterprise License Agreements (ELA) are seeing huge success with mid – large size customers with offerings for both Collaboration and Security. The Cisco ELA program provides an “all you can eat” offering which can dramatically reduce licensing costs over the course of the contract. In one customer Long View saw an instant cost savings of 20%, with no additional costs for 3 years even with organic growth.
  Another busy year for Partner Summit with lots of information. If you’d like to hear more or continue the conversation please join me in my Spark room and I’d be happy to meet face to face or via video.
Read More >

Can Cloud Clear Software Licensing Complexity?

February 18, 2016

It’s time to stop making transactional decisions around technology and start having more strategic conversations that include your cloud solution architects and enterprise technology strategists. There is a balance to strike between on-premises and cloud/SaaS models, as part of a strategic conversation around the complexity in product offerings, licensing and consumption models, and the business value that each brings. It’s really about looking at all the angles and having an open mind to new ways of doing things.

Cloud challenges the norm.

The transformation to cloud can be a challenge because it’s new, not everyone is aware of the options, and it’s a totally different way to consume. With more technology providers providing cloud and on-premises options for products, more due diligence is required to understand the differences in the models and the implications to the business around cost, agility, and flexibility to name just a few. Making decisions around cloud requires understanding the business requirements and mapping those to the available solutions.

Can cloud reduce complex licensing headaches?

Vendors have come to realize that complex licensing schemes do not retain customers. More and more customers are looking for technology combined with ease of use, and if not provided, they are quick to look at alternatives with less onerous investments. That is why we are seeing competitive innovation in the industry to drive to services oriented products that solve business problems and overcome challenges. Manufacturers are aware and hence you see the trend of license simplification. I recommend customers look at innovation and consider cloud options strategically, especially as vendors invest in cloud and create programs to incent customers to migrate to the cloud.
  • Take Oracle as an example. Oracle’s on-premises licensing model is complicated if you don’t use their hardware or hypervisor. On the other hand, Oracle licensing in the cloud, whether on AWS or Azure, is based per VM with the freedom of hypervisor and a reduction in complexity. Oracle’s savvy licensing team has morphed to allow customers to license in an easier way in the cloud, while at the same time paying only for what is consumed, which is great for your failover and disaster recovery instances.
  • Or Windows. Who would have thought that Microsoft’s Windows operating system would move to a user model with no more software assurance rules like MDOP, VDA, per device? Microsoft has innovated to stay competitive in the market, while also simplifying licensing as much as possible. We also see this with traditional Office device licenses moving to Office 365 user based subscriptions as an option.
  • Who started the trend? Adobe moved first to a subscription only offering, while Microsoft, Oracle and others still provide perpetual and subscription offerings, allowing for a slower transition. Moving to a subscription model doesn’t just help customers; it also helps manufacturers by reducing the need for compliance audits that can sometimes hurt customer relations.

So what can cloud offer?

  • Know what you pay for: in a cloud model, you know exactly what you are using and what you are paying for, so it’s easier to be compliant with vendor licensing agreements. This keeps audits at bay, and let’s your compliance managers sleep well at night. Ask IT operations managing the on-premises datacenter how painful it is to manage the different licensing schemes and maintain licensing compliancy and server sprawl.
  • Reduce shadow IT: taking charge of cloud purchases can also reduce employees’ personal use of credit cards, if cloud subscriptions are owned within the organization, reducing shadow IT. If not, it’s too easy with Azure and AWS for individuals to go around IT, if cloud can answer their needs quickly and simply.
  • Clearer measurement: with cloud purchases centralized, IT is also in a better posture to measure the environment and what’s happening in which department versus today’s sometimes “cloudy” IT sprawl. Show me a CFO who wouldn’t love to see a pay-per-use model where there is no wastage on unused subscriptions/capacity.
  • Innovation and support: by thinking big picture, you can focus on transforming internal customers smoothly to cloud when it is the right model, and provide the necessary architecture and managed services to support them, either internally or with a partner that provides managed support.

How to manage the speed of innovation?

Cloud does simplify some traditional IT problems but it also adds a new set of challenges. Changing traditional mindsets and adopting new approaches is just the start. As cloud helps your technology keep pace with the speed of innovation in today’s market, how will you handle the operational changes it drives? How will you support your end users with constant updates and upgrades, instead of a more traditional long term roll out process? Because the vendors are innovating more and more quickly, you need to be ready to support your users, applications and infrastructure, whether you do it yourself or ensure your partner is capable of supporting the speed of change across all three.

In the future not too far away…

I think in the future we will go to manufacturers and choose a rate card and plan similar to buying a wireless plan from a mobile provider now, based on the services we need and not just on product licensing schemes. Technology vendors know they can no longer stay with traditional product and licensing approaches, using audits and complex licensing schemes. We are already at the point where the focus has shifted to product capabilities, efficiency and simplification so that IT can help drive business innovation. Today’s cloud marketplace accelerates innovation even faster, with integrated 3rd party offerings built on Azure and AWS, expanding the list of possibilities for customers. Make sure you're taking advantage of the speed of innovation to reduce complexity while enabling business value!

Learn more about hybrid cloud and end user experience.

Read More >

Securing the End User

January 28, 2016

What does the future of security really look like?  Here are some security facts to keep in mind throughout 2016 and beyond:

End Point Security Protection

Security breaches cost on average of $3.79 million, and in the case of enterprises, the cost can be extraordinary (Target’s breach cost $1 billion) according to Ponemon Institute, a security research center, in conjunction with IBM. Unfortunately, they are also increasingly common. In healthcare, for example, two recent articles claim that 1 in 3 medical records in the US will be breached this year and that 45% of those breaches will be caused by lost or stolen laptops.  That works out to 48 million records breached from the end point and $7.39 billion in costs to healthcare (at a cost of $154 per record). Bring-Your-Own-Device (BYOD) initiatives (whether formal or driven by users) have increased the risk of losing data through the end point. Users commonly connect to corporate data through multiple devices, only one or two of which are managed by IT.

Microsoft Enterprise Mobility Suite (EMS)

Microsoft has addressed the issue by enabling security on the end point, application, and content level with the launch of Enterprise Mobility Suite and its bundled products. This unified solution limits access to content in several important ways and watches for anomalous behavior that could signal a breach.

Level 1 - Securing the device

Enterprise Mobility Suite includes mobile device management through Microsoft InTune, which delivers application and device management through integration with System Center 2012 Configuration Manager, all via a single management console.

InTune also provides comprehensive settings management for mobile devices, including remote actions such as passcode reset, device lock, and data encryption. InTune can even remove corporate data and applications when a device is unenrolled, non-compliant, lost, stolen, or retired from use.

Level 2 – Securing the application

Securing not just corporate applications, but apps provided by 3rd party SaaS companies is also important. A recent study showed business partners were responsible for 22% of security breaches.

EMS provides unified identity for single-sign-on for thousands of popular apps like,, and User experience improves with automatic authentication using the active directory password, and IT gets better control of data by enabling or disabling access.

Level 3 – Actions within an application

Microsoft EMS can also limit user access to content within an application. For example, using Azure Rights Management, companies can restrict access to documents based on their permission levels within SharePoint- regardless of where the document is stored. Without active user credentials, the document remains safely encrypted and inaccessible even if it has been forwarded and saved on a local hard drive.

Administrators can also limit app functionality like copy, cut, paste, and save, within the managed app ecosystem. They can also prevent users from copying corporate information into their personal storage.

Microsoft’s Data Loss Prevention (DLP) solution, well known in Exchange, is now available with SharePoint too.  DLP watches for sensitive information like social security or credit card numbers and prevents their transmission by redirecting users and notifying IT.

Securing the End User is an important part of any information security strategy, and it goes far beyond simply training and retraining on policies.  These Microsoft tools help IT enforce best practices and remain in control of sensitive corporate data.

Read More >

Data Visualization – Power BI, $30 Oil and the Switchboard Operator

January 26, 2016

With oil at $30 a barrel, every marginal penny of cost counts. You can't work any HARDER. You simply MUST work smarter. Every oil and gas organization on the planet is in a race to explore reservoirs of data (pun intended) in search of cost savings, some for means of survival.

History repeats itself, how to scale?

At the turn of the last century, when a burgeoning industrial economy was booming, Alexander Graham Bell commercialized a new technology dubbed the telephone. Now the telephone had great promise. To talk to anyone, you simply picked up a handset and asked the switchboard operator to be connected to anyone that was connected to the same switchboard. An unknown futurist said "Someday soon, you'll be able to instantly speak with anyone in the world." The unknown pundits, who were also good at math, retorted "Are you kidding? Even if we could connect all the switchboards, do you know how many switchboard operators the world would need?"

Fast forward a hundred years or so, to infinite connections.

"Someday soon, you'll be able to instantly connect to and visualize any data source in the world." In much more learned terms, the modern-day futurists at Gartner say that we're there, that 2015 was a watershed year.

Traditional BI and analytic models are being disrupted as the balance of power shifts from IT to the business.

The rise of data discovery, access to multistructured data, data preparation tools and smart capabilities will further democratize access to analytics …

No report writer required!

To make a call, all you need is a phone, a telco account, and a phone number; no switchboard operator. To run self-service BI, all you need is data, access credentials, and a self-service BI tool; no BI report writer. There are many self-service BI platforms that proclaim dominance in the business intelligence market. If I were a betting man, my money's on Microsoft’s Power BI.

Innovate or be superseded…

Firstly, and most importantly, Microsoft is setting a new pace of innovation. Download the recently announced Power BI Desktop and you can expect updates every 30 to 45 days. Peruse the growing list of commercial data sources in the Azure Marketplace and you can expect new sources every visit. Secondly, we can't ignore Microsoft's muscle when they flex it in the personal productivity space. The patterns are way too familiar. WordPerfect was superseded by Word. Harvard Graphics spawned the launch of PowerPoint. VisiCalc and Lotus were replaced with Excel. Tools like FoxPro and Progress were consolidated by Access. I predict that so too will be the fate of data visualization tools like Tableau, Spotfire, Cognos, and BusinessObjects in favour of Power BI. So grab your well files, your facility construction costs, your land files, some regulatory data, some commercial oil and gas data, a forward price curve, and explore. It makes good cents!
Read More >

Why ITO Value Realization Fails

January 8, 2016

We often hear about IT Outsourcing (ITO) agreements that failed to meet the expected business outcomes.  In fact, failed provider-client relationships usually tend to get more press then successful ones and this unfortunately promotes a belief with some people that outsourcing does not work. The reality is that failure to realize anticipated value from an ITO agreement is often the result of improperly set expectations and requirements between both the provider and the customer and poor governance throughout the life of the contract.  What follows are some of the common causes of ITO value realization failure and how they can be addressed.


What to outsource?

Only outsource what can justifiably and quantifiably be done better and/or at a lower cost by a service provider. The idea is not to arbitrarily get rid of all IT functions but rather, to refocus IT resources on activities that matter to the business.

Not just about cost reduction

Some customers’ ITO plans put too much emphasis on IT cost reduction and not enough on business outcomes. Cost of service is definitely an important factor in outsourcing but when it becomes the sole source of focus, organizations often end up only with the “same mess for less”. In addition, true IT costs are not always fully taken into consideration and limited to direct operating costs leaving items such cost of errors and cost of controls unaccounted thus skewing the Total Cost of Ownership for IT.  This leads to skewed IT Total Cost of Ownership and savings falling short of expectations.

Measurable Performance

Contracts are sometimes filled with terms or service attributes that cannot easily be measured or quantified.  While terms like “best of breed”, enterprise class, strategic and innovation all sound good, they are also very subjective and difficult to quantify. Make sure service agreements are based on measurable performance items.

Realistic Service Levels

How do expected provider service levels compare to current service levels? Internal service level agreements (SLA's) or objectives are not always clearly defined prior to outsourcing and are negotiated without formal requirements and impact analysis. Negotiated service levels must be attainable and must also measure what matters to the business. Very much like business continuity planning, the criticality and resumption of business processes should not be defined without a proper impact analysis.


One of the advantages of ITO is the transfer of some of the operational IT risk to third party.  However, it does not mean all risks are eliminated and does not relieve a company from due diligence around risk identification, assessment and mitigation. Like car insurance is no remedy to distracted driving, organizations must keep risk management a priority. Outsourcing can bring other risks such as loss of IP, non-performance, provider business failure, etc. that must still be managed and mitigated.


Although listed last, governance, or more specifically the absence of it, is the most frequent cause of ITO agreement failure. Contracts are in place for reference and should be used as last resort for conflicts that cannot be resolved otherwise.  The old adage "an ounce of prevention is worth a pound of cure" really applies here. Strong and effective governance from both the client and provider side will prevent issues from escalating to a point that can jeopardize the relationship irreparably. Governance must be applied in a spirit of partnership and in the best interest for both parties.

None of the items discussed above are overly complex and with the right amount of planning, can all be addressed. If a single item should be highlighted as the most important to remember, it is that agreements cannot be successful if they lean too much in favor of one party.  Both client and service provided must get value from the relationship for sustained success.

Learn more about the Economics of IT.

Read More >

Woman in IT Spotlight: A Conversation with Natasha Florence

December 18, 2015

Name: Natasha Florence

Current Role: Director of Sales Operations

Company: Long View

City: Calgary, AB

Years in the IT industry: 15



How did you get into the technology industry?

As most of us, I wasn’t sure what I was going to do upon graduation from university. A marketing professor gave me very good advice. She told me to get into B2B sales, it was an “untapped” career with potential. Little did I know she was onto something. I knew enough about myself then that whatever I would chose, it would have to be something I was passionate about. Technology was always interesting to me. I may be dating myself (chuckle), but Microsoft’s bold mission to have a PC in every home resonated with me, especially when I was lining up at the university labs for hours to write my papers. The internet wasn’t around then and Microsoft Windows was released in my first year of school. I actually had to get books from the library for my papers. And if the local library didn’t have the book, well that was that. So, I was always intrigued by the possibilities of technology. I applied for an IT sales job out of university to sell Microsoft software and 6 years later I had the privilege of working direct for Microsoft. And today I still get to be part of that story by being here at Long View.  

What is a day in a life in your current role?

Every day I am looking at how our team can enable our sales organization to get them “ready” for the marketplace. I'm responsible for the overall management, operations, and strategic direction of Sales Operations within the organization. This includes everything from internal systems CRM projects, sales strategies, opportunity management, to working with marketing, training, artifacts, proposals, etc. Our team also provides data, analyses, modeling, and reporting to support sales force quarterly business reviews.  

Tell us about the most transformative project you were a part of?

I think that project is happening right now at Long View. The technology market has changed substantially in the past few years with the uptake of various consumption models like cloud; and that speed of change isn’t going away. In addition, technology has enabled “digital business” in diverse forms. Our customers are becoming more sophisticated in when and how they buy resulting in a perfect storm that makes it more difficult to sell. As our organization is transforming to adjust to the market, our sales team needs to shift and have the right tools at the right time in order to execute effectively. It’s exciting! We have built an engine that does this! The collaborative effort is phenomenal.  

What’s one piece of advice you would lend to a fellow woman in IT?

Don’t shy from using your voice - it matters. Have your convictions - they matter. Be a team player.  

When you are not in the office what do you do for fun?

I hang out with my family every chance I get.  My husband and I try to keep our children active with skiing, hiking, and swimming. Or I “nerd out” and take courses. I am a lifelong learner, likely because my mother was an educator.
Read More >

What You Missed at Cisco Collaboration Summit 2015

December 15, 2015

As always I thoroughly enjoy the annual Cisco Collaboration Summit! Summit 2015 included more technology announcements than in many of the previous years. Major announcements include:

  • Cisco Spark Messaging

  • Cisco Spark Calling

  • Cisco Spark Meetings

  • Cisco Spark Hybrid

  • Collaboration upgrade promos

  • Much more


Learn more! Watch Lane Irvine, our Collaboration expert live from San Francisco vlog with updates on all the major announcements this year.

Read More >

SharePoint Prevents Shadow IT

December 9, 2015

Many managers outside of the IT department find themselves empowered to make technology buying decisions without first understanding security, compliance, and governance considerations. The resulting Shadow IT can lead to the following big problems for the CIO:

  • The company’s data is insecure as it is distributed over too many sites
  • Application Portfolio Management (APM) is impossible
  • Identity and credentials cannot be systematically managed
  • Integration or even alignment of processes is needlessly complex
Some companies deploy SharePoint to prevent this Shadow IT by addressing many of the legitimate business needs that drive users to adopt these unsanctioned systems. SharePoint solves business problems for users while maintaining the security and IT management standards their business requires.  

SharePoint Can Be a solution

Microsoft SharePoint meets both the end user need for “App” style problem solving and IT governance best practices. Its security and permission features, eDiscovery, ability to integrate, and extensibility make it an enterprise ready IT system.  SharePoint also has an answer to many of the needs and products that end users may seek out. Nearly everyone uses some of the consumer grade tools listed below. They work well for personal content, but in a business setting, they are Shadow IT.  SharePoint has analogous functionality for all of these tools and can be used to head off the need to employ them.  

Dropbox and

File storage and sharing sites like Dropbox and make a user's files available on any device with a browser or app. These systems are ideal for personal files that need to be shared or accessed on several computers. For business, they pose some problems. The consumer versions of these products do not have solutions for controlling who can access what information, constraining access from former employees, and eDiscovery and legal hold requirements SharePoint goes toe to toe with these file storage and sharing products through its OneDrive for Business offering, having all of the features end users love and the control IT needs.  

Google Docs / Forms / Calendars

Most everyone uses the Google productivity tools in their personal lives. Google is mobile friendly, supports simultaneous editing, offers version controls, and makes sharing simple. Unfortunately, it also creates some headaches for IT. Personal Google accounts cannot be centrally managed or controlled. Accidentally sharing confidential information with the wrong person is as easy as a mistyped email address. Former employees could end up having access to confidential information for years before anyone notices. Critical information could even be made public and searchable online. SharePoint document libraries, calendars, and other basic intranet tools offer more robust collaboration, simultaneous editing, a variety of sharing options, and mobile access. The content is also manageable and controllable in keeping with IT best practices. Data loss prevention and right management are game changers in controlling corporate information.  

Project Management Tools

There are literally hundreds of SaaS project management tools easily available to anyone with p-card. These tools are often free to start using and simple to adopt. The trouble is, they also are an information silo. Besides the identity and security problems mentioned above, getting information into or out of these systems may be entirely impossible. SharePoint works very well as a light project management tool. Especially for projects that require a lot of collaboration. For projects that lack the complexity that justifies full Microsoft Project, SharePoint is a great fit.  

SharePoint Solves Shadow IT

Once users are made aware of the variety of problems they can solve with SharePoint, they often decide that buying, deploying, training, and adopting a system outside of the sanctioned IT ecosystem poses too many risks, is too costly, and simply doesn’t make sense. Of course, poor Microsoft SharePoint deployments can actually increase security risks, as it is another avenue through which information can pass outside of the company. Governance, Data Loss Prevention, Rights Management, and training are critical to enabling end users without exposing the company to phishing or other malicious behavior.


At Long View, we start our engagement process with security and governance in mind. We guide clients through the process of:

1)      Envisioning how technology can help their businesses; 2)      Minimizing risks; 3)      Deployment; and 4)      Management and ongoing maintenance.

Please contact us to talk about minimizing shadow IT in a compliant and secure way.

Read More >

Secret Santa: Supporting the Community during the Holidays

December 7, 2015

Ho, Ho, Ho! We’ve become a Secret Santa!

To get in the Christmas spirit this year, our Vancouver branch signed up to sponsor two families through the YWCA Presents of Peace program. The Vancouver YWCA is an amazing organization focused on helping women escape abusive relationships and drug addictions by providing emergency shelters, transition housing and support groups as these women rebuild their lives. We have been paired with two single mothers who have finally found the right support and are trying to start a better life for their kids. These are some of the most vulnerable families in Vancouver, and they are quite literally starting over with nothing.​ Our Goal is to raise $2,000 by December 16th to offer a little support and a lot of love, and to ensure these two moms have a special Christmas with their kids, despite their current situation. Every dollar we raise will go towards purchasing the items on their wish lists, and we will use any leftover donations to buy gift cards for their preferred grocery store to help pay for holiday meals and stock up their cupboards. Thanks to our amazing team we have nearly reached our fundraising target. We’ve currently raised $1,590! Our volunteers will help with fundraising, shopping, wrapping, and delivering gifts.  The team will deliver the wrapped gifts on the weekend of December 19th.

Want to be a Secret Santa?

Read More >

Our “Follow the Sun” Journey into Europe

December 1, 2015

In May of 2015 Long View announced a major milestone for the company with the official opening of its first European office located in Amsterdam, the Netherlands. This milestone marks the successful realization of  the first stage of our ‘follow the sun’ support strategy, which will not only expand the physical presence of the company into new geographies to improve support capabilities, but will also enhance the delivery of services and the well-being of our people.

We are a branch-based company and a growth-oriented company. We’ll continue to do what we do best – bringing value to our clients through sustainability, innovation, and customer-service dedication — and we’re very excited to be establishing a presence in the European market.


Why Amsterdam?

It’s probably the question we get most often, while the Netherlands boasts a competitive fiscal climate, the primary drivers for choosing a suitable location were focused not on cost but on improving service delivery, increasing productivity, and providing a better work life balance for Long View staff.  With a time difference of 8 hours ahead of Mountain Standard Time, Long View can now offset its after-hours support requirements to its Amsterdam location, allowing access to a larger daytime resource pool and the provision of improved working hour conditions for our staff.  This ability to migrate after-hours support to a normal daytime shift in Amsterdam also provides us with the capability to apply more effective leadership to the after-hours team which has already resulted in significant productivity and service quality improvements. In addition to the already mentioned benefits of the Amsterdam location, which are no doubt significant enough, there are many other advantages to be mentioned. The Netherlands is one of the most ‘wired’ countries globally and has one of the world’s best and most connected technology infrastructures which helps to ensure the optimal performance and continuity of Long View’s IT services. It is also harbor to a conducive and innovative environment, and is culturally similar to both North American and Long View’s culture. In its role as the gateway to Europe, Amsterdam is one of the world’s most prominent international business environments in the world and offers a mature and dynamic workforce. While Dutch may be the national language spoken in the Netherlands, nearly everyone speaks and writes in English and often several other languages at, or very close to, a first language level. With its beautiful canals that span 100+ kms, historic sites and culturally rich setting. Amsterdam was the clear and obvious choice for Long View’s first European office and first leg of our “follow the sun” 24/7 support strategy. Long View Amsterdam 2015 Holiday Party

Aan de slag! / Let’s get to work!

We have a few consulting openings on our Amsterdam team, see if we have a role that’s right for you -

Read More >
1 5 6 7 8 9 28