22 Feb

Take Your RPO Down to Seconds With Zerto

Having a copy of your data offsite has always been imperative in any Disaster Recovery (DR) plan.  Back in the time before time, that was done by sending backup tapes offsite. Among our smaller clients, this was typically done once a week by a member of the firm. Our larger clients would send tapes offsite Read more…

21 Feb

Roaming Internet Explorer and Chrome User Saved Passwords with UE-V

It is possible to capture and roam user-saved passwords in Internet Explorer and Chrome with UE-V, but first you have to complete a few steps. The first thing to understand is how the passwords are stored and encrypted/decrypted on the local machine. Both web browsers leverage the Windows DPAPI (Data Protection Application Programming Inferface) to encrypt Read more…

15 Feb

The New Windows Server Licensing Model and Pricing, Explained

Windows Server Licensing Model Microsoft has changed its Windows Server licensing  model and you may need to claim your Software Assurance licenses. Failure to do so may cause you to have to repurchase new licenses with Software Assurance instead of paying the cheaper Software Assurance renewal price. Microsoft Windows Server is now licensed as a Read more…

14 Feb

Brian Spagna Named VMware vExpert 2017

Congratulations to Brian Spagna, VMware vExpert 2017! The title of vExpert is highly regarded in the world of IT and among our clients. It demonstrates not only a thorough expertise in VMware but also a record of influential contributions to the technology and community of professionals who work with it. vExperts, according to the award’s selection Read more…

08 Feb

The CIS Critical Security Controls

The Center for Internet Security (CIS) Critical Security Controls is a security standard centered on a list of 20 technical controls that organizations can implement to better defend themselves from cyber-attacks. The controls take a prioritized approach, making them different from security risk management frameworks such as NIST 800-53, ISO 27001, and COBIT. These well-known risk Read more…

06 Feb

Shmoocon 2017: Threat-Casting, Fake News, and Ransomware

Good luck getting in So, you want to go to ShmooCon?  You better start planning now. This conference is harder to get into than your favorite music artist’s concert.  The conference is affordable, but tickets are extremely limited. You have to be prepared if you want to get one. Here are the stats on ticket Read more…

03 Feb

An Inside Look at Tech Day, a Kraft Kennedy Conference

Last week Kraft Kennedy employees across the U.S. and U.K. gathered in-person and remotely at sessions with titles such as: Escape the Room: Breaking Out of Citrix Sessions Modern Perimeter Security and Multi-Factor Authentication Stoicism and Consulting: Ancient Philosophy For Modern Times Microsoft Azure – Get Your Head in the Cloud Microsoft Dynamics, Analytics and BI Read more…

02 Feb

Project Management Leadership Styles: Which One Are You?

You may be an official Project Manager or find yourself informally placed in that role. Either way, you will encounter people with different styles of working and communicating. To be successful, match your leadership style with the team dynamic with consideration for the type of project you’re working on. I have some familiarity with this, having Read more…

27 Jan

NetDocuments Tips and Tricks

In our experience with NetDocuments deployments, end-user training follows a consistent agenda. While there are key differences in every environment, we aim for everyone to feel comfortable with the essentials instead of trying to fit in all the nuances and features that they may or may not use. The following tips will help all kinds of users Read more…

Powered by WP Tutor.io
  1. 1
  2. 2
  3. 3
  4. ...
  5. 51