Source One Technology has appointed Mark Duerwachter as Vice President of Operations to expand partnerships and accelerate its growth. “We’re thrilled that Mark has joined the team,” said Jesse Rink, President of Source One Technology. “His experience of building and managing highly-effective vendor and local business alliances will be critical … Read More
Virtual Wire Pairs – Improving Network Security Without Extra Hardware
Ever found yourself in the unfortunate circumstance of having to support devices on your internal network that tend to pose a higher security risk than you’re comfortable with? Perhaps an older Windows 2003 or Windows 2008 server, or an outdated kiosk device that is managed by a 3rd party vendor. … Read More
Coronavirus Scams: What to Look Out for and How to Stop Them.
The world has quickly changed over the past few weeks, but the one thing that hasn’t is the inclination of shady characters to exploit individuals and organizations with a variety of coronavirus scams. As well as what to look out for, we highlight some IT best practices to help you … Read More
5 Causes of Poor Wireless Access in Schools and How to Fix the Problem [Updated 2020].
We asked K-12 educators and school professionals in Milwaukee what the top issues with their school IT were. It came as no surprise to us that internet and poor wireless access were at or near the top of everyone’s list of issues (as was funding). In this article we’ll … Read More
How To Get Your Office 365 Migration Right First Time!
Office 365 provides great features, capabilities, and functionality to empower your business to keep pace with the demands of doing business today. In this overview of carrying out an Office 365 migration, we will look at several key aspects of migrating to the Office 365 SaaS environment. However, a migration … Read More
Is this IT Project Management, or a Hamster Wheel of Work??
Life in information technology can feel like one big project that never ends. It can also feel like the types of assignments are non-stop, with life moving from one job to the next. The hamster wheel feeling is no doubt valid, but we should take a step back to help us … Read More
Windows Server Data Migration Tools and Best Practices [2008 up to 2019]
In a previous post, we talked about Windows Server 2008 end of life upgrade strategies and considerations that need to be made when choosing an upgrade path. If an in-place upgrade is not an option, performing a migration or data migration to a different server running a supported Windows Server operating system is a great … Read More
Windows Server 2008 End of Life Upgrade Strategies [GUIDE].
In case you haven’t heard, Windows Server 2008 and Windows Server 2008 R2 are reaching the end of all support on January 14, 2020. This means there will be no new regular security or other updates for the platform. As with any end of life scenario that may be looming, you need … Read More
The IT Director’s Guide to Starting a New Job
There are no IT Director manuals on how to start a new job. You just do it because no two situations are the same. On the bright side, there is advice to be offered from those who have done it before. In this article, I’ll share a few of my … Read More
Storage Spaces Direct Deployment Best Practices.
Introduced in Microsoft Windows Server 2016, Storage Spaces Direct (S2D) is Microsoft’s new software-defined storage solution that allows enterprises to create logically defined storage volumes across hosts using locally attached storage. With the release of Windows Server 2019, it has continued to mature and is an even more powerful solution. … Read More
5 Best Practices in deploying VMware vSAN the Right Way.
Software-defined technologies have gained tremendous momentum in the enterprise datacenter. In fact, most organizations when looking at storage refreshes today are considering software-defined technologies as a replacement for traditional storage architectures such as iSCSI and Fibre Channel SAN, NFS, and others. The predominant leader in this space is VMware vSAN. … Read More
The Complete Windows 10 Migration Checklist!
In this article Microsoft Windows IT Pro MVP, Rory Monaghan details his Windows 10 migration checklist. He details the steps you need to consider and the tools he recommends to help you complete a successful migration. Before structuring a Windows 10 project, you must first define your minimal viable product. … Read More
Technical Debt and How to Leverage Quality to Beat It.
Data, data, data. I love data. Way too much. More than is normal. I’ve written about it. Given workshop and conference sessions on it. I’ve extolled the virtues of high, accountable expectations around Help Desk management more times then I care to admit. A technical college even trusts me to … Read More
We are growing – yet again!
Here is an opportunity for experienced Sr. Systems Engineers and Sr. Network Engineers to join our team of consultants in the Greater Milwaukee area. The primary responsibility is to provide networking/server support services for our customers. A strong candidate will be able to provide on-going technical support services and planning … Read More
How to Protect Your Office 365 Tenant – Essential Implementation Steps.
With many organizations choosing to move services to the cloud, the difficulty for most is related to the overall Security within the Cloud. If you are using Office 365 for services such as Email, Instant Message, Collaboration, File Storage or even as a fully-fledged cloud Phone System, Microsoft provides multiple … Read More
Digital Transformation in Schools – It’s Not All About the Technology.
Over the last year, I’ve done a great deal of reading on Digital Transformation in schools, businesses and other organizations, and nowhere in what I’ve read has there been a focus on devices, storage arrays or core switches. Quite the opposite. Scholars and industry experts write about how organizations are … Read More
Understanding the E-Rate Process [Download Primer].
The E-Rate process has begun for the 2020-21 application cycle, so we’ve created a quick guide to show you who can claim funds and what you can claim for. Who’s covered? All public and private Pre K-12 schools and public libraries. You receive discounts based on the number of students … Read More
Join us at the Catholic Educators Convention 2018
Join Source One Technology at the Catholic Educators Convention 2018 at the Wisconsin Center, Milwaukee, to learn more about how we support private schools in Wisconsin. You can register for the event on the Archdiocese of Milwaukee convention page.
Achieving Zero % Network Downtime [A Practical Case Study].
In the 2017-2018 school year, the Technology Services team I was part of at Hartford Union High School (HUHS) delivered zero % network downtime! It was a great achievement and was always the outcome we were striving for. In our case, it gave students and staff uninterrupted access to digital … Read More
Using Aruba ClearPass for Network Access Control [Use Cases].
Organizations today love the idea of anywhere, anytime connectivity, but in their rush to get everything connected, often ignore the need for secure Network Access Control (NAC). In this article, we show you how you can use Aruba ClearPass to identify, control and respond to common network access issues and … Read More
How to Run Windows Applications on Chromebook.
Running Linux and Windows applications on Chromebook isn’t an issue for most organizations – why would it be? The whole point of Chromebooks is that they’re tied to Google’s ecosystem of web-based applications and backend systems. The hardware, software, services, deployment, and management cost you a lot less than the … Read More
We’re hiring another Sr. Network/Server Consultant
WE ARE GROWING – AGAIN! Here is an opportunity for experienced Sr. Systems Engineers and Sr. Network Consultants to join our team in the Greater Milwaukee area. The primary responsibility is to provide networking/server support services for our customers. A strong candidate will be able to provide on-going technical support … Read More
We’ve moved to new offices in Brookfield.
It’s our biggest migration to date – not data, desks! Source One Technology has moved from Waukesha to Bishops Woods, Brookfield! Get in touch if you’d like to discuss how we can help you save time and money on frustrating network and computer issues, or if you just want to … Read More
12 Dos and Dont’s at Christmas for trouble-free IT.
It’s the holiday season—many of us have already given thanks, and some of us are now celebrating with friends and families. Some of us fortunate enough might be busy donating money and/or volunteering our time to help those less fortunate. As always, we need to remain vigilant for individuals who … Read More
Fixing Business IT Problems – A Simple Guide for Business Owners.
Fixing business IT problems can be a regular source of pain for many small business owners. Technology is great when it’s working, but can soon become a time and money drain otherwise. Despite the fact that worldwide IT spending was flat in 2016, it still totaled approximately $3.41 trillion. That’s … Read More
Malware Evolution or in Other Words “All Your Data Are Belong to Us.”
It’s a twist on a popular internet meme based on a phrase from the classic arcade game, Zero Wing. Only, in this case, it’s not a game. It’s your data – your files and documents. It’s your pictures and your videos. It’s your finances. It’s your life. It’s worth more … Read More
Gmail IP Address Ranges – Here’s How to Find ALL the Public Ones.
If you’re like most firewall administrators, you dislike the idea of opening up port 25, 465, and 587 for outbound traffic to the -entire- internet. Doing so can result in your organization’s public IP address getting blacklisted in a hurry if any of your internal devices get infected with malware, … Read More
Hiring yet another Sr. Network/Server Consultant
WE ARE GROWING! Here is an opportunity for experienced Sr. Systems Engineers and Sr. Network Consultants to join our team in the Greater Milwaukee and Waukesha areas. The primary responsibility is to provide networking/server support services for our customers. A strong candidate will be able to provide on-going technical support … Read More
Nonprofit IT Security Plan for Data, Systems and Processes.
As if running a nonprofit organization, raising money and helping the community isn’t enough of a struggle. Every nonprofit must worry about hackers targeting their computer network. Charities are extremely vulnerable for a variety of reasons so we’ll look at how to create a nonprofit IT security plan to protect … Read More
Continuous Improvement in IT Service Delivery for Education.
In this article, Director of Technology Services, Nathan Mielke, walks you through how his team at Hartford Union High School (HUHS) have adopted an attitude of continuous improvement to transform IT service delivery at the school and have pushed end-user approval over and above 90%! IT can sometimes be the … Read More
Managed Service Provider (MSP): What They Do and Why You Need Them.
For most organizations, IT is ‘plumbing’ – you know you need it, and it needs to work, but you’d rather not have to roll up your sleeves to work out how to flush your caches or fix that data leak! A Managed Service Provider (MSP) is a technology consultant who … Read More
Security Risks Affecting Your Network and How to Deal with Them.
Infiltrating the security of your core business network could be devastating for any sized business, particularly small businesses. Ransomware freezes the system, holding it hostage for a fix. Viruses corrupt data and destroy entire databases throughout a computer network. Spyware steals company secrets or uses personal data. Any one breach … Read More
Cloud Computing Services: Migrating Systems to the Cloud
Here’s a scenario where Cloud Computing Services can provide value-add for your company… Imagine a small Milwaukee video production company’s editor filtering through a network of drives, looking for the right clips to complete a teaser video for his new client. Burning the midnight oil to complete a project due … Read More
Is Cyber Insurance a Necessity or a Luxury?
Many of us view insurance as a necessary evil. We loathe paying the premiums, but we all deal with it at some point—whether it’s health insurance, car insurance, homeowners/renter’s insurance or some other type of insurance. Add one more type of insurance to the list, now there is cyber insurance … Read More
If you missed BrainStorm 2017…
If you’re responsible for the IT in schools, the BrainStorm 2017 K20 Conference is a ‘must-attend’ event. We’ve been going for the last few years, and as well as getting to share what we do with attendees, BrainStorm is also a great place to learn about what’s keeping IT professionals … Read More
Desktop Support and Desktops – Have We Made Them Too Complicated?
Once upon a time, desktop support was the entry-level echelon of the IT infrastructure ladder. The mapping of drives, checking of cables, and maintenance of printers was considered to be the perfect area for junior staff to cut their information technology teeth. Career progression moved you further towards the “back” … Read More
Microsoft Deployment Toolkit and Windows Deployment Services.
In this article, I will be highlighting the benefits of having the “right” Microsoft Windows Deployment technologies setup within your environment, along with Microsoft Deployment Toolkit (MDT) to simplify your client operating system deployments. The article will list the important Microsoft technologies that need to be in place to make … Read More
Is Application Virtualization Now a Necessity?
Microsoft’s move to Windows 10 and Server 2016 puts enterprises into a state of “perpetual migration” that brings a whole raft of challenges to enterprise IT departments, including taking into account whether Application Virtualization is now a necessity. In a previous article, I discussed this state, and some of the … Read More
Minimise the risk of ransomware with these 10 effective methods.
Ransomware is a type of virus/malware that restricts access to an infected computer (by encrypting the files) and requires the person pay a ransom to the malware operators to remove the restriction and gain access to those files again. The risk of ransomware attacks is an increasingly popular security concern … Read More