Your cart is currently empty!
Tag: Key
Avoiding Common Pitfalls in IT Outsourcing: Key Mistakes to Watch Out For
Outsourcing IT services has become a common practice for many businesses looking to cut costs, improve efficiency, and access specialized skills. However, despite its many benefits, IT outsourcing can be a complex process that is fraught with potential pitfalls. In order to ensure a successful outsourcing partnership, it is essential to be aware of the common mistakes that can derail your plans.One of the key mistakes to watch out for when outsourcing IT services is failing to clearly define your goals and requirements. It is important to have a clear understanding of what you hope to achieve through outsourcing, as well as the specific tasks and responsibilities you want your outsourcing partner to handle. Without a well-defined scope of work, there is a risk of miscommunication, missed deadlines, and ultimately, dissatisfaction with the outsourcing arrangement.
Another common pitfall in IT outsourcing is choosing the wrong service provider. It is crucial to thoroughly research potential outsourcing partners and assess their capabilities, experience, and track record before making a decision. While cost is an important factor to consider, it should not be the sole determining factor. It is also important to consider factors such as the provider’s reputation, communication skills, and ability to meet deadlines.
Additionally, failing to establish clear communication channels and expectations with your outsourcing partner can lead to misunderstandings and delays. It is important to establish regular communication protocols, such as weekly meetings or progress reports, to ensure that both parties are on the same page. Setting clear expectations for deliverables, timelines, and quality standards can help prevent miscommunication and ensure that the outsourcing arrangement runs smoothly.
Finally, overlooking the importance of data security and confidentiality in IT outsourcing can have serious consequences for your business. It is essential to ensure that your outsourcing partner has robust security measures in place to protect your sensitive information and comply with data protection regulations. Before entering into an outsourcing agreement, it is important to conduct a thorough security assessment and establish clear protocols for handling and protecting confidential data.
In conclusion, while IT outsourcing can offer many benefits to businesses, it is important to be aware of the common pitfalls that can arise during the outsourcing process. By avoiding key mistakes such as failing to define goals and requirements, choosing the wrong service provider, neglecting communication, and overlooking data security, businesses can ensure a successful and productive outsourcing partnership. By taking the time to carefully plan and execute your outsourcing strategy, you can maximize the benefits of outsourcing while minimizing the risks.
5 Key Steps to Building a Strong Disaster Recovery Program
Natural disasters, cyber attacks, and other unforeseen events can wreak havoc on businesses of all sizes. That’s why having a strong disaster recovery program in place is crucial to ensure the continuity of operations and minimize downtime in the event of a disaster. Here are five key steps to building a robust disaster recovery program:1. Conduct a risk assessment: The first step in building a disaster recovery program is to identify potential risks and vulnerabilities that could impact your business. This includes natural disasters such as floods, hurricanes, and earthquakes, as well as cyber threats like ransomware attacks and data breaches. By conducting a thorough risk assessment, you can prioritize your resources and focus on mitigating the most critical risks.
2. Develop a comprehensive disaster recovery plan: Once you have identified the potential risks, it’s important to develop a detailed disaster recovery plan that outlines the steps to take in the event of a disaster. This plan should include procedures for data backup and recovery, communication protocols, and roles and responsibilities for key personnel. It’s essential to regularly review and update the plan to ensure it remains relevant and effective.
3. Implement backup and recovery solutions: Data is a critical asset for businesses, so it’s essential to have robust backup and recovery solutions in place. This could include cloud-based backup services, offsite data storage, and regular data backups to ensure that critical information is secure and accessible in the event of a disaster. Testing these backups regularly is also crucial to ensure that they can be restored quickly and effectively.
4. Establish a communication plan: Communication is key during a disaster, so it’s important to establish a clear and effective communication plan. This should include contact information for key personnel, emergency contacts, and stakeholders, as well as protocols for communicating with employees, customers, and vendors. Regular communication drills and exercises can help ensure that everyone knows their roles and responsibilities in the event of a disaster.
5. Train and educate employees: Employees are often the first line of defense in a disaster, so it’s essential to train and educate them on the company’s disaster recovery plan. This could include regular training sessions, tabletop exercises, and awareness campaigns to ensure that everyone understands their roles and responsibilities. By empowering employees to take action during a disaster, you can help minimize downtime and ensure the continuity of operations.
In conclusion, building a strong disaster recovery program is essential for businesses to mitigate risks and ensure continuity of operations in the event of a disaster. By following these five key steps, businesses can better prepare for unforeseen events and minimize the impact on their operations. Remember, it’s better to be proactive and prepared than to be caught off guard when disaster strikes.
Key Components of a Successful Business Continuity Strategy
In today’s fast-paced and unpredictable business environment, it is essential for companies to have a solid business continuity strategy in place. This strategy helps organizations to prepare for and recover from potential disruptions, such as natural disasters, cyber attacks, or other emergencies, minimizing the impact on operations and ensuring business continuity.There are several key components that are essential for a successful business continuity strategy. These components are crucial for ensuring that a company can effectively respond to and recover from disruptions, maintaining operations and minimizing downtime.
1. Risk Assessment: The first step in developing a business continuity strategy is conducting a thorough risk assessment. This involves identifying potential risks and vulnerabilities that could impact the business, such as natural disasters, supply chain disruptions, or cyber threats. By understanding these risks, companies can develop strategies to mitigate them and ensure business continuity.
2. Business Impact Analysis: Once risks have been identified, it is important to conduct a business impact analysis. This involves assessing the potential impact of disruptions on key business processes and functions. By understanding the potential consequences of disruptions, companies can prioritize their response efforts and allocate resources effectively.
3. Business Continuity Plan: A business continuity plan is a comprehensive document that outlines the steps to be taken in the event of a disruption. This plan should include strategies for responding to emergencies, communication protocols, and recovery procedures. It should also outline roles and responsibilities for key personnel and specify resources needed to implement the plan.
4. Communication Plan: Effective communication is essential during a crisis situation. A communication plan should outline how information will be shared with employees, customers, suppliers, and other stakeholders during a disruption. This plan should include contact information for key personnel, communication channels to be used, and protocols for updating stakeholders on the status of operations.
5. Testing and Training: It is important to regularly test and update the business continuity plan to ensure its effectiveness. This may involve conducting tabletop exercises or simulations to practice response procedures and identify areas for improvement. Additionally, employees should receive training on their roles and responsibilities during a crisis to ensure a coordinated and effective response.
6. Continual Improvement: Business continuity planning is an ongoing process that requires continual assessment and improvement. Companies should regularly review and update their strategies in response to changing risks and business needs. This may involve updating the risk assessment, revising the business impact analysis, or refining response procedures based on lessons learned from previous incidents.
In conclusion, a successful business continuity strategy is essential for ensuring that companies can effectively respond to and recover from disruptions. By incorporating key components such as risk assessment, business impact analysis, a business continuity plan, communication plan, testing and training, and continual improvement, organizations can enhance their resilience and minimize the impact of disruptions on their operations. Investing in a robust business continuity strategy is crucial for safeguarding the continuity and success of a business in today’s volatile business environment.
Key Metrics to Track for Effective Network Management
Effective network management is crucial for ensuring the smooth operation of a company’s IT infrastructure. Monitoring key metrics can help IT professionals identify potential issues before they escalate into major problems. In this article, we will discuss some of the key metrics that should be tracked for effective network management.1. Bandwidth utilization: Monitoring bandwidth utilization is essential for ensuring that network resources are being used efficiently. By tracking bandwidth usage, IT professionals can identify potential bottlenecks and make adjustments to optimize network performance.
2. Network latency: Network latency refers to the delay in data transmission between two points on a network. High latency can lead to slow network performance and user dissatisfaction. By tracking network latency, IT professionals can identify areas where improvements can be made to reduce delays in data transmission.
3. Packet loss: Packet loss occurs when data packets are dropped during transmission. Monitoring packet loss can help IT professionals identify network issues that may be affecting the reliability of data transmission. By tracking packet loss, IT professionals can take steps to improve network performance and ensure the integrity of data transmission.
4. Network uptime: Network uptime refers to the amount of time that a network is operational and available to users. Monitoring network uptime is essential for ensuring that the network is running smoothly and that users can access the resources they need. By tracking network uptime, IT professionals can identify areas where improvements can be made to minimize downtime and maximize network availability.
5. Security incidents: Monitoring security incidents is crucial for ensuring the security of a company’s network. By tracking security incidents, IT professionals can identify potential threats and vulnerabilities and take steps to mitigate them. Monitoring security incidents can help prevent data breaches and other security breaches that can have serious consequences for a company.
6. Device performance: Monitoring the performance of network devices, such as routers, switches, and servers, is essential for ensuring that the network is running smoothly. By tracking device performance metrics, IT professionals can identify potential issues with network devices and take steps to address them before they impact network performance.
In conclusion, tracking key metrics is essential for effective network management. By monitoring bandwidth utilization, network latency, packet loss, network uptime, security incidents, and device performance, IT professionals can identify potential issues and take proactive steps to optimize network performance and ensure the reliability and security of a company’s IT infrastructure.
Cybersecurity: The Key to a Secure Digital Future
In today’s digital age, cybersecurity has become more important than ever before. With the rise of cyber threats and attacks, protecting our digital assets and information has become a top priority for individuals, businesses, and governments alike. Cybersecurity is the key to a secure digital future, as it helps to safeguard our data, privacy, and online activities from potential threats.One of the biggest challenges in the digital world is the constant risk of cyber attacks. Hackers and cyber criminals are always looking for ways to exploit vulnerabilities in our systems and networks in order to steal valuable information or disrupt our operations. From phishing scams and ransomware attacks to data breaches and malware infections, the threats are varied and ever-evolving.
By implementing strong cybersecurity measures, we can protect ourselves against these threats and minimize the risk of falling victim to a cyber attack. This includes using secure passwords, keeping software and systems up to date, using encryption to protect data, and being vigilant about suspicious emails or websites. It also involves implementing firewalls, antivirus software, and other security tools to detect and prevent potential threats.
In addition to protecting our personal information and assets, cybersecurity is also essential for safeguarding critical infrastructure, national security, and the economy. As technology continues to advance and more aspects of our lives become connected to the internet, the potential impact of a cyber attack increases exponentially. From power grids and transportation systems to financial institutions and healthcare facilities, the consequences of a successful cyber attack can be devastating.
As such, governments and organizations around the world are investing heavily in cybersecurity measures to protect their digital assets and ensure the safety and security of their citizens. This includes collaboration with other countries and international organizations to share information and best practices, as well as developing new technologies and strategies to stay ahead of cyber threats.
Ultimately, cybersecurity is the key to a secure digital future. By taking proactive steps to protect ourselves and our digital assets, we can reduce the risk of falling victim to cyber attacks and ensure that our online activities are safe and secure. By staying informed about the latest threats and best practices, we can help to create a more secure digital environment for all.
Managed Services: The Key to Scalable and Agile IT Infrastructure
In today’s fast-paced and ever-changing business landscape, companies are constantly seeking ways to stay competitive and innovative. One key aspect of this is having a scalable and agile IT infrastructure that can adapt to the evolving needs of the organization. Managed services have emerged as a crucial solution to achieving this goal.Managed services refer to the practice of outsourcing IT functions to a third-party service provider, who takes on the responsibility of managing and maintaining the organization’s IT infrastructure. This can include everything from network security and data storage to software updates and technical support.
One of the main advantages of managed services is scalability. As businesses grow and evolve, their IT needs also change. A managed service provider can easily scale up or down the services they offer to meet the organization’s changing requirements. This flexibility allows companies to adapt quickly to market shifts and technological advancements without the need for costly infrastructure upgrades.
Additionally, managed services provide companies with access to a team of skilled IT professionals who can offer expert advice and support. This not only ensures that the organization’s IT systems are running smoothly but also allows internal IT teams to focus on strategic initiatives rather than day-to-day maintenance tasks.
Furthermore, managed services can help businesses achieve greater agility in their IT operations. By outsourcing routine tasks to a managed service provider, companies can free up internal resources to focus on innovation and growth. This agility is essential in today’s fast-moving business environment, where the ability to quickly respond to market changes can mean the difference between success and failure.
Overall, managed services offer companies a cost-effective and efficient way to maintain a scalable and agile IT infrastructure. By partnering with a trusted managed service provider, organizations can streamline their IT operations, improve their responsiveness to market changes, and ultimately drive business growth and success.
Proactive Maintenance: A Key Component of Asset Management
Proactive maintenance is a crucial aspect of asset management that can help organizations save time, money, and resources in the long run. By taking a proactive approach to maintenance, businesses can prevent equipment failures, minimize downtime, and extend the lifespan of their assets.Proactive maintenance involves regularly monitoring and inspecting equipment to identify potential issues before they escalate into major problems. This can include conducting routine inspections, performing preventive maintenance tasks, and implementing predictive maintenance techniques such as vibration analysis and oil analysis.
By staying ahead of potential issues, organizations can avoid costly repairs and unplanned downtime, which can have a significant impact on productivity and profitability. Proactive maintenance also enables businesses to better plan and schedule maintenance activities, reducing the likelihood of equipment failures during critical production periods.
In addition to preventing breakdowns, proactive maintenance can also help businesses optimize the performance of their assets. By regularly maintaining equipment and addressing any issues promptly, organizations can ensure that their assets operate at peak efficiency, leading to improved productivity and output.
Furthermore, proactive maintenance can help businesses comply with regulatory requirements and industry standards, reducing the risk of fines or penalties for non-compliance. By staying on top of maintenance activities and documentation, organizations can demonstrate their commitment to best practices and quality standards.
Overall, proactive maintenance is an essential component of asset management that can help organizations maximize the value of their assets, reduce costs, and improve operational efficiency. By investing in proactive maintenance strategies, businesses can ensure the long-term reliability and performance of their assets, ultimately leading to a more sustainable and successful operation.
Men’s college basketball Top 25: The underappreciated key to Duke’s defense
Nine of the teams ranked third through 14th on my last ballot lost this week. That made it tough to sort this week’s Top 25, but it’s not hard up top. There is a clear top three, and No. 1 isn’t a difficult decision either.
Auburn continues to perform at an elite level in a league that’s viewed as head and shoulders above everyone else.
Ken Pomeroy has a trusty tool for comparing the strength of conferences across seasons: the adjusted efficiency margin of a team that would be expected to go .500 in conference play in that league. Currently, this year’s SEC has the best rating in the database, which dates back to 1997. And that got me to thinking it’s possible Auburn is doing something historically awesome, considering the Tigers are undefeated in this stacked league.
Let’s compare Auburn’s start to the eventual champions of the seven leagues with the eight adjusted efficiency margins higher than 18 since 1997. The first record in the second and third columns is where each champions was eight conference games in, and the second is how it finished.
League record Overall record League rating NCAA finish Auburn (2025 SEC)
8-0/??
20-1/??
21.45
???
Duke (1997 ACC)
5-3/12-4
14-4/24-9
21.37
Second round
Duke (2004 ACC)
8-0/13-3
20-1/31-6
20.32
Final Four
Kansas (2017 Big 12)
7-1/16-2
18-2/31-5
19.81
Elite Eight
Kansas (2022 Big 12)
7-1/14-4
18-3/34-6
18.74
National champion
Duke (2001 ACC)
7-1/13-3
19-2/35-4
18.69
National champion
Duke (1998 ACC)
8-0/15-1
19-1/32-4
18.46
Elite Eight
Michigan St. (1999 Big Ten)
7-1
18-4
18.11
Final Four
The best comps for Auburn seem to be 2004 Duke and 2010 Kansas, which both were both undefeated in the best conference in college basketball that year through eight games. Both entered the NCAA Tournament ranked as the top team at KenPom (Auburn is currently No. 1), and neither won the NCAA Tournament.
I’m betting the SEC and Auburn perform very well in this year’s NCAA Tournament, but neither team nor league success is a sure thing. The ACC flamed out in the 1997 NCAA Tournament despite being loaded with talent that year: Vince Carter and Antawn Jamison at UNC, Tim Duncan at Wake Forest. Duke didn’t have its usual handful of future NBA stars but did have Trajan Langdon, who was a great college player. Five of the league’s nine teams finished in the top 12 at KenPom. This was a very, very good league. But the ACC went 8-6 in the NCAA Tournament.
That, plus a dominant Kansas team from 2010 getting Farokhmaneshed in the second round by Northern Iowa is a reminder that you should not always judge a team and/or league by what happens in the NCAA Tournament.
Reminder: Below my Top 25, I give nuggets on an unspecified number of teams each week. So when a team appears in the table but not in the text below, that’s why. Scroll on for notes on Duke, Alabama, Purdue, Texas Tech, Michigan State, Missouri, Arizona and UCLA
2. Duke
Duke’s length can make you feel claustrophobic in the half court, and North Carolina struggled to get quality shots early on in Saturday’s runaway win for the Blue Devils. It’s been written about ad nauseam that every player in Duke’s rotation is 6-5 or taller, but it’s not just the length that makes Duke’s switching scheme work. Combine the strength and physicality of guards Sion James and Kon Knueppel with the lateral quickness of Khaman Maluach and Maliq Brown, plus Cooper Flagg’s ability to play safety and cover a ton of ground, and you’re cooking with gasoline. But James and Knueppel are the two who play an underappreciated role in making it all work.
To understand why the length/physicality combo matters for the guards, watch what happened when either James or Knueppel switched onto a center against the Tar Heels.
When Jalen Washington rolled on this early trip, Flagg was tasked as the tag to help against the roller. Elliot Cadeau was reading Flagg and assumed that he was going to creep into the paint, which meant Cadeau could hit Seth Trimble with a skip pass for a wide-open 3.
Flagg got the steal because he knew he could stay more in the gap as soon as he saw that James was in position and didn’t need any help. The trust that James could fend for himself freed up Flagg for the interception.
Later in the half, when Knueppel switched onto Ven-Allen Lubin, the automatic read was to go to the post against a guard. That’s what UNC did. But does this look like a mismatch?
When James and Knueppel are both off the floor, Duke’s defense allows 99.2 points per 100 possessions, compared to 87.1 when both are on the floor, per CBB Analytics. And when you put them with Flagg and Maluach, that grouping is plus-115 in 196 minutes and holding opponents to 84.8 points per 100 possessions. I wrote earlier this season about the impact of coach Jon Scheyer’s move to put James into the starting point guard role, and the numbers and film continue to justify that decision.
3. Alabama
One thing that makes Alabama’s offense so good: Nate Oats will find a play that works against an opponent and keep going back to it. That approach helped the Crimson Tide win at Mississippi State on Wednesday.
The play was a pick-and-roll with Mark Sears and Grant Nelson, combined with an exit screen on the left side of the floor for a shooter and Chris Youngblood spotted up on the right side of the floor. Alabama ran it early, and Nelson got an easy dunk:
Coming out of a timeout on the last possession of the half, Oats went to it again and got the same result:
Now fast-forward to the last minute of the game, with Alabama again coming out of a timeout, ahead by just one:
Nelson ended up missing those free throws, leaving the door open for the Bulldogs, but this is why the Crimson Tide are so hard to guard. Their shooters make you focus so much on defending the 3  that a roller can slip to the basket and get to the rim three times on the same play. After two games in a row finishing over 40 percent from 3, the Crimson Tide are now shooting 36.9 percent from deep after a cold start in nonconference play. They’ve been the most efficient offense in SEC play, are up to No. 2 in adjusted efficiency nationally and just seem to be hitting their rhythm with Youngblood finally finding his place — he made seven 3s in Starkville.
8. Purdue
Braden Smith is having one of the most impressive seasons for a point guard in recent memory. Smith currently leads college basketball in assist rate (46.5), which is assists divided by the field goals made by the player’s teammates while he’s on the floor. KenPom tracks assist rate leaders going back to 2004, and if Smith were to finish with his current rate, he’d rank sixth in that time among high-major point guards.
And when you measure him against those other five using other categories, you could argue Smith is impacting winning more than anyone above him.
ARate PPG ORtg W-L Kris Dunn, Providence (2015)
50
15.6
103
22-12
Josh Watkins, Utah (2012)
49.2
15.6
86.7
6-25
Trae Young, Oklahoma (2018)
48.5
27.4
112.1
18-14
Maurice Watson, Creighton (2017)
48
12.9
108.5
25-10
Cassius Winston, Mich. State (2017)
46.7
6.7
106
20-15
Braden Smith, Purdue (2025)
46.5
15.8
116.9
17-5
Smith got a first-team nod on The Athletic’s midseason All-America squads last week, and if he keeps this up or anything close to it, he’d be a lock to make the Associated Press first team at the end of the season, which would lead to a cool accomplishment for the Boilermakers. Purdue would become just the 12th school to produce an AP first-team All-American in three straight seasons without it being the same player for all three years. Adding to the unlikelihood of the feat for Purdue: Both Zach Edey and Smith were three-star, sub-top-150 recruits coming out of high school.
10. Texas Tech
Not only did Texas Tech break Houston’s nation-leading 32-game home winning streak and do it without leading scorer JT Toppin and coach Grant McCasland — both of whom were ejected three minutes, 50 seconds in after Toppin accidentally kicked Joseph Tugler in the groin — the Red Raiders adjusted their game plan to do something you just don’t do against Houston: going at the Cougars in isolation.
Prior to Saturday, Houston was allowing 0.584 points per possession in isolation this season, according to Synergy. Only once in the last two seasons had anyone scored in double digits in iso plays against the Cougars, and that was Texas Tech, with 10 points on isos last season. No team this year had scored more than seven.
The Red Raiders scored 17 points on 12 isolation plays for a 1.42 points per possession success rate. They picked out matchups they liked, spread the floor and went at the Cougars. Look at the intentional spacing here with three shooters off the ball:
Texas Tech’s offense excels in transition and pick-and-roll, but without Toppin and going against an elite defense, this why-would-you-try-it-against-Houston strategy ended up winning the game. Texas Tech went a perfect 4 for 4 in overtime, scoring nine points on iso plays, including six points for Chance McMillian. And get this: The senior guard had scored only five points on iso plays all season.
13. Michigan State
Michigan State’s 13-game winning streak ended on Saturday at USC, and while the run was impressive, it was somewhat aided by the schedule. Since losing to Memphis at the Maui Invitational, Michigan State has played only two top-40 teams in KenPom net rating, and its only win all season against a team currently in my top 25 was against Illinois at home.
Over the final 10 games of the regular season, the Spartans play eight top-40 teams, including seven teams currently in my top 25. No need to apologize for winning, but we should get a much clearer picture of how good the Spartans are over the next five weeks.
14. Missouri
Mizzou is winning by leaning heavily on the 3-ball in conference play, with an SEC-high 3-point rate of 46.2 percent and an average of 10.2 3s per game in conference games. It has helped that Caleb Grill has turned into a modern-day Reggie Miller. Grill is shooting 49 percent from 3 on the year and has made 21 of his 40 shots from deep over the last five games.
Grill is so hard to guard because he can shoot on the move and gets it off quickly:
Â
And when he’s spotted up, he’s been automatic, making 8 of those 9 attempts over the last five games — doesn’t matter the distance:
The key for someone with this kind of range and ability to sprint into shots is leg strength. Grill was a high jumper in high school and won the state title, clearing 6-8.
Grill has been on one heck of a journey. I met him six years ago when he was a senior in high school who had suddenly become a coveted recruit after T.J. Otzelberger left South Dakota State, where Grill was committed, for UNLV. Grill went from Iowa State to UNLV to play for Otzelberger, back to Iowa State to follow Otzelberger, then was kicked off the team in 2023 and landed at Mizzou, where he fractured his wrist last season and was granted a medical redshirt for a sixth year. Now he’s one of the most feared shooters in college basketball coming off the bench for the Tigers. That much player movement can leave some skittish, but his college career’s story is getting quite the ending.
18. Arizona
Arizona has become the team everyone thought it would be in the preseason. The Wildcats have cut down on their fouling, and they’ve started shooting and making more 3s with the insertion of Anthony Dell’Orso into the starting lineup. Using Bart Torvik’s sorting tool, here’s a look at the data:
FTRD 3P% 3PR Record Dell’Orso off the bench
32.9
30
32.9
4-5
Dell’Orso starting
26.1
34.5
37
11-1
In addition, 6-foot-8 freshman wing Carter Bryant and sophomore 7-footer Henri Veesaar have seen their minutes go up. The offense is thriving, but it feels like the defense could go to another level, especially with Bryant and Veesaar on the floor. Using on-off numbers, they’ve been the Wildcats’ two best defenders.
25. UCLA
This week posed one of the season’s more challenging decisions on who should be No. 25. Let’s do a blind resume test to show my work.
Torvik has a handy tool that gives an average for resume-based metrics (KPI, strength of record and wins above bubble) and then an average for metrics that measure quality (BPI, KenPom and Torvik). I’ve also included the teams’ Quad 1 record and a stat of my creation, which is the wins over teams currently in my top 25. Let’s take a look at the teams in contention this week:
Resume Quality Average Q1 record WOT25 Team A
22.3
31.3
26.8
4-5
0
Team B
27
27.3
27.15
2-2
1
Team C
28.3
27.3
27.8
5-5
2
Team D
27.7
30.3
29
4-4
2
Team E
33.7
23
28.35
4-6
2
Team F
38.7
27.7
33.2
4-3
1
Team G
11.3
37.7
24.5
8-4
3
Team H
27
26.3
26.65
2-1
0
Team I
13.7
40.7
27.2
5-1
3
Usually I lean more on the quality metric than the resume, but Team I is in my Top 25 because of its Quad 1 record and its wins over current Top 25 teams. Does Team G deserve the same treatment?
What if I were to tell you that Team C just swept Team G, winning the latest matchup by 26, and has won five in a row? And if Team G were in, that would bump Team C’s WOT25 up to four? Justification for Team C, right?
That’s the conclusion I came to, and why UCLA got the final spot this week.
Here’s who was who: Louisville (Team A), Clemson (B), UCLA (C), Creighton (D), Baylor (E), UConn (F), Oregon (G), Saint Mary’s (H) and Memphis (I).
Dropped out: Oregon, Louisville, Clemson.
Keeping an eye on: Creighton, Baylor, UConn, Saint Mary’s, Drake.
(Photo: Jared C. Tilton / Getty Images)
Duke’s men’s college basketball team has been making waves this season with their dominant defense, and one key player who often goes unnoticed is Mark Williams. The 7-foot sophomore center has been a crucial part of the Blue Devils’ defensive success, using his size and shot-blocking ability to disrupt opponents’ game plans.Williams may not always light up the stat sheet with points, but his presence in the paint is felt every game. He leads the team in blocks and alters countless shots, making it difficult for opposing players to drive to the basket or get easy looks inside.
In addition to his shot-blocking prowess, Williams is also a strong rebounder, pulling down boards on both ends of the court and helping Duke limit second-chance opportunities for their opponents.
While stars like Paolo Banchero and Wendell Moore Jr. garner much of the attention for Duke, it’s players like Williams who do the dirty work on defense and allow the team to be successful. His contributions may not always show up in the box score, but they are crucial to the Blue Devils’ success.
As Duke continues to climb the rankings and make a push for the NCAA tournament, keep an eye on Mark Williams and the impact he has on the team’s defense. He may not get the same recognition as some of his teammates, but his importance to the Blue Devils cannot be overstated.
Tags:
- Men’s college basketball
- Top 25
- Duke basketball
- Duke defense
- Men’s basketball rankings
- College basketball analysis
- NCAA basketball
- Defensive strategies
- Duke Blue Devils
- Basketball defense tactics
#Mens #college #basketball #Top #underappreciated #key #Dukes #defense
Mavs GM cites ‘culture’ as key to Anthony Davis-Luka Doncic trade
CLEVELAND — Dallas Mavericks general manager Nico Harrison emphasized the importance of “culture” in explaining his stunning decision to trade 25-year-old superstar Luka Doncic to the Los Angeles Lakers for a package headlined by 31-year-old All-Star big man Anthony Davis.
“As we turn the page, I think it’s important to know that [Mavs coach Jason Kidd] and I, we’ve had a vision and the culture that we want to create since we’ve been here,” Harrison said before Sunday’s 144-101 loss to the Cleveland Cavaliers. “The players that we’re bringing in, we believe, exemplify that. We think defense wins championships, and we’re bringing in one of the best two-way players in the league.”
The Mavericks and Lakers finalized the three-way deal that the Utah Jazz helped facilitate around midnight ET on Saturday night. The Mavericks will also receive promising third-year wing Max Christie and the Lakers’ 2029 first-round draft pick while sending injured big man Maxi Kleber and reserve veteran forward Markieff Morris to Los Angeles along with Doncic.
The reaction throughout the league and team, however, was shock that Dallas would part with a five-time first-team All-NBA selection who is approaching his prime, particularly only months after Doncic led the Mavs to the NBA Finals.
“Well, let’s be clear: I’m the one making the decision and [Kidd]’s supportive of it, so it’s me,” said Harrison, who has made major trades before the deadline in each of his four years as Mavericks GM. “I don’t do anything that’s scary. I think everything that we do, we put a lot of work into it, we study it and we re-study it and we go back. I understand the magnitude of it.
“So the easiest thing for me to do is do nothing, and everyone would praise me for doing nothing. But we really believe in it — and time will tell if I’m right.”
Sources told ESPN that constant concerns about Doncic’s conditioning were a major factor in the Mavericks’ decision to approach the Lakers about a trade for Davis. Doncic has played in only 22 games this season because of injuries, primarily a left calf strain that has sidelined him since Christmas Day. There was extreme frustration throughout the organization about Doncic’s lackadaisical approach to diet and conditioning, which Dallas’ decision-makers believed negatively impacted his durability, sources said.
Harrison, however, demurred when asked whether he was implying that Doncic did not fit the culture that the Mavericks are attempting to build.
“Listen, one thing about me, I’m not going to talk bad about any players,” Harrison said. “I mean, that’s not going to do us or me any good. I just say there’s levels to it. There’s people that fit the culture and there’s people that come in and add to the culture. And those are two distinct things. And I believe the people that [are] coming in are adding to the culture.”
Later Sunday, Doncic posted a message to Dallas on social media, telling fans that “[I] thought I’d spend my career here and I wanted so badly to bring you a championship. The love and support you all have given me is more than I could have ever dreamed of. For a young kid from Slovenia coming to the U.S. for the first time, you made North Texas feel like home.
“In good times and bad, from injuries to the NBA Finals, your support never changed. Thank you not only for sharing my joy in our best moments, but also for lifting me up when I needed it most.”
Harrison said the trade was made to “make our team better,” but he also mentioned Doncic’s contractual situation as a consideration. Doncic was eligible to sign a five-year, $345 million supermax contract this summer, and league sources said he anticipated agreeing to that deal.
Instead, the Mavericks traded him before they could offer him such an extension. Because of the trade, Doncic no longer qualifies for a supermax deal. He can sign an extension with the Lakers for as much as $229 million over five years this summer. Doncic can opt out of his contract after the 2025-26 season, when several teams, including the Miami Heat, are expected to make a maximum offer to free agents.
“There’s some unique things about his contract that we had to pay attention to,” Harrison said. “There’s other teams that were loading up that he was going to be able to decide, make his own decision at some point of whether he wants to be here or not. Whether we want to supermax him or not, or whether he wants to opt out. So, I think we had to take all that into consideration, and I feel like we got out in front of what could have been a tumultuous summer.”
Harrison did not discuss potential Doncic trades with any franchise other than the Lakers, as the Mavericks made acquiring 10-time All-Star and five-time All-Defensive Team selection Davis their goal. Harrison initiated talks with Los Angeles general manager Rob Pelinka over coffee when the Lakers were in Dallas to play the Mavs on Jan. 7, and those discussions progressed over the following weeks.
“We kept it between us,” Harrison said. “We had to keep it tight. J-Kidd didn’t know about it, but J-Kidd and I are aligned. We talk about archetypes, and we talk about the culture that we want to create. So I know the type of players that he likes without actually talking to him.”
Kidd, who coached Davis as a Lakers assistant on the 2019-20 title team, said he wasn’t aware of the trade until the “11th hour.” It was briefly discussed in a Sunday morning team meeting, but Kidd said none of the Mavs players asked questions when given the opportunity.
“It is a little shocking, but in the sense, we have to push forward,” Kidd said. “As an organization, as a team, we have a game to play, and we have to be pros about it. But we understand what Luka has meant to the Mavericks, and we wish him and his family the best in L.A. Also, Maxi and [Morris]. But we have to push forward, and we believe we have a team to do that.”
Trading Doncic, who averaged 28.7 points, 8.7 rebounds and 8.3 assists per game in his 6½-year Mavericks tenure and led the league in scoring last season, has not received positive feedback. The Mavericks fan base has reacted angrily on social media and in small protests outside the American Airlines Center.
“I’m sorry they’re frustrated, but it’s something that we believe in as an organization,” Harrison said. “It’s going to make us better. We believe that it sets us up to win, not only now, but also in the future. And when we win, I believe the frustration will go away.”
Harrison was adamant that the addition of Davis, in particular, immediately boosted the Mavs’ championship hopes. Davis, who is recovering from a minor abdominal injury, is averaging 25.7 points, 11.9 rebounds and 2.1 blocks this season.
“He fits our timeframe,” Harrison said. “If you pair him with Kyrie [Irving] and the rest of the guys, he fits right along with our timeframe to win now and win in the future. And the future to me is three, four years from now. The future 10 years from now, I don’t know. They’ll probably bury me and [Kidd] by then. Or we’ll bury ourselves.”
In a shocking turn of events, Dallas Mavericks General Manager Bob Voulgaris has revealed that the team’s strong culture played a key role in the blockbuster trade that brought Anthony Davis to Dallas in exchange for Luka Doncic.Voulgaris, known for his analytics-driven approach to team-building, explained that the Mavericks’ emphasis on creating a positive and winning culture was a major factor in their pursuit of Davis.
“Our culture is built on hard work, accountability, and a commitment to excellence,” Voulgaris said. “We knew that adding a player of Anthony’s caliber would not only elevate our on-court performance, but also reinforce and strengthen the values that we hold dear as a team.”
The trade sent shockwaves through the league, as Doncic was widely regarded as the face of the Mavericks and a rising superstar in the NBA. However, Voulgaris and the Mavericks front office were confident that the addition of Davis would take the team to the next level and help them compete for championships.
“We believe in building a team that is greater than the sum of its parts, and Anthony is the perfect fit for what we are trying to accomplish here in Dallas,” Voulgaris added.
Only time will tell if the gamble pays off for the Mavericks, but one thing is for certain: the team’s commitment to culture and winning is unwavering.
Tags:
- Mavs GM
- Anthony Davis
- Luka Doncic
- Trade
- Culture
- Dallas Mavericks
- NBA trade
- Basketball
- Sports news
- Player exchange
#Mavs #cites #culture #key #Anthony #DavisLuka #Doncic #trade
Remote Monitoring: A Key Tool for Ensuring Business Continuity
In today’s fast-paced business world, ensuring business continuity is more important than ever. With the rise of remote work and increasing reliance on technology, businesses must have the tools in place to monitor their operations effectively. One key tool that has become essential for ensuring business continuity is remote monitoring.Remote monitoring is the process of monitoring and managing a company’s IT infrastructure, network, and systems from a remote location. This allows businesses to keep a close eye on their operations, even when employees are working from different locations or during non-business hours.
There are several benefits to using remote monitoring as a tool for ensuring business continuity. One of the main advantages is that it allows businesses to proactively identify and address issues before they escalate into major problems. By monitoring key performance indicators and system alerts in real-time, businesses can quickly respond to any issues that arise and prevent downtime or disruptions to their operations.
Remote monitoring also provides businesses with greater visibility into their IT infrastructure and network. This visibility allows businesses to track performance metrics, identify trends, and make informed decisions about their technology investments. By having access to this data, businesses can optimize their systems and ensure they are operating at peak efficiency.
Another benefit of remote monitoring is that it allows businesses to monitor their operations 24/7. This means that businesses can keep an eye on their systems and networks at all times, even when employees are not in the office. This constant monitoring helps businesses detect and address issues as soon as they arise, minimizing the impact on their operations.
In addition to monitoring IT infrastructure and systems, remote monitoring can also be used to monitor physical assets, such as equipment and machinery. By implementing sensors and monitoring devices, businesses can track the performance and condition of their assets in real-time. This proactive approach to asset monitoring can help businesses prevent equipment failures and costly downtime.
Overall, remote monitoring is a key tool for ensuring business continuity in today’s digital age. By proactively monitoring IT infrastructure, networks, and physical assets, businesses can identify and address issues before they escalate into major problems. With the ability to monitor operations 24/7, businesses can ensure that their systems are running smoothly and minimize disruptions to their operations. By investing in remote monitoring tools and technologies, businesses can improve their resilience and adaptability in an ever-changing business environment.