16 Apr

Data Deduplication – Turn it on now!

If you are not taking advantage of Windows Server 2012’s data deduplication capability you are losing out on one of the best things about the OS from a Configuration Manager Admin’s perspective.  I continue to come across organizations that are not leveraging this in their environments.  It’s free (as in nadda, zip, cost’s you nothing Read more…

14 Apr

Wi-Fi Made Easy with Meraki

In the last few years wireless technology has become an increasingly popular method of network access for employees and guests alike. It is almost expected of some businesses, such as cafes and libraries, to have wireless networks to which guests can connect. New York City has even announced that they will be converting 7,000 telephone booths Read more…

09 Apr

Email is Now Much More Than Just a Messenger

Note: The article below, written by Brian Podolsky, originally appeared in March 2015 Issue #9 of Legal IT Today. It is reprinted here with permission. Please visit Legal IT Today to subscribe and read more from the legal technology community. Ever since taking off in the 1990s, email’s importance has grown exponentially. Initially just a means of Read more…

01 Apr

Message Retention Management and Exchange Web Services

Anyone out there remember “BaseFolderOnly”? If that term means anything to you, it may elicit feelings of rage and frustration. For those of you who may not recognize this term, please allow me to explain. When Microsoft debuted Exchange 2007, it introduced new message retention management tools, now commonly referred to as MRM 1.0. Initially, Read more…

18 Mar

Staying Mobile with Intune

Microsoft Windows Intune

You may not have heard of Microsoft Intune, the cloud-based software distribution tool—or should we call it a remote assistance tool? How about an endpoint protection solution, or maybe even a mobile device manager? Thankfully, it has all of those features baked right in. On paper this sounds very similar to the features offered by Read more…

13 Mar

Security Alert! eDOCS DM Auto Logon Vulnerability and Hotfix

Today, OpenText announced a hotfix that patches a critical security vulnerability in the eDOCS DM platforms.  According to the communication that was delivered to customers and partners: The eDOCS DM 5.3.x and 10 Web Services application programming interface (API) contains a security vulnerability that could be exploited to allow a bad actor to programmatically authenticate Read more…

11 Mar

Protecting Your DM Environment with Guardian for eDOCS

Society tends to focus on newsworthy, external attacks by cyber terrorists looking to corrupt your data and confiscate personal information. This shifts the focus away from equally as important internal security threats. They are not as exciting and creative as viruses like Cryptolocker, but internal security threats can be just as detrimental. Cryptolocker can encrypt Read more…

10 Mar

Why Do Software Updates Take So Long in Task Sequences?

Why does the ‘Install Software Updates’ step take so long in a Configuration Manager operating system deployment task sequence? Having set up and deployed machines over and over, I’ve seen many a task sequence seem to apparently freeze (or hang) on the Software Updates step of a task sequence. Why does this step take so long, assuming Read more…

04 Mar

Will 2015 Be the Year of Information Rights Management in Legal?

Digital Rights Management (DRM) is not a new concept.  In the 2000s, many music and movie providers started including DRM technology into downloads, to ensure the product is not shared illegally or pirated. More recently, coffee maker Keurig announced plans to embed their new line of appliances with DRM technology. The move was a way to beat back Read more…

  1. 1
  2. 2
  3. 3
  4. ...
  5. 39
XSLT by CarLake