In the previous article, we looked at some of the common problems that can popup during In-Place upgrades to Windows Server 2012 R2. More specifically, issues relating to WSUS, MMC snap-ins, and the Windows Firewall were discussed. In Part 2 of the article, we are going to take a look … Read More
First crack at BrainStorm 2016
Source One Technology, Inc. is proud to announce our participation in Wisconsin’s preeminent conference for the K-20 educational sector. This will be our first time at BrainStorm 2016 (17.0). The three-day conference, which runs between February 28th and March 1st, has a Vendor Expo that is only 4 hours. The rest … Read More
The quirks of Windows Server 2012 R2 In-Place server upgrades – Part 1
There are basically two approaches when it comes to server upgrades for going to Windows Server 2012 R2 – performing an in-place upgrade, or creating a new server and migrating over the applications/data. While some administrators are adamant that proper server upgrades –must- be done this way, or that way, … Read More
Using PRTG to monitor Windows Server Backup
While PRTG (available at http://www.paessler.com) has many cool sensors available out-of-box for monitoring valuable network and server related data, unfortunately, it doesn’t have an easy way to monitor the Windows Server Backup service on Windows 2008 R2 and Windows 2012 R2 servers. Today, many small and medium businesses, and even … Read More
Network issues: sometimes it’s the little things that cause the most trouble
Everything in IT is based on something else. We always want to have the newest, latest, greatest technology; Replicating our files shares between two offices, Wi-Fi, VPNs for working from home, Email on our smart phones, etc. There seems to be a bit of magic in a lot of these new … Read More
Active Directory Design, Optimization, and Automation
Part 1 of our Network Remodeling / Redesigning / Restructuring Services series Active Directory is the central repository for nearly all networks today. Some of the most important roles it is responsible for are: end-user authentication, security, and the ability to automagically control how servers, client computers, and end-users are provisioned … Read More
Network Remodeling / Redesigning / Restructuring Services – Overview
This multi-series blog post will be an overview of Source One Technology’s network remodeling/redesigning/restructuring services. This series will give you insight on the network management tools and protocols Source One Technology uses, how future maintenance costs are actually reduced, and how your network infrastructure can easily adapt over the course … Read More
How does the ‘PC Guy’ buy a laptop?
Family, friends, students and customers ask me this all the time… “I need a new computer; what should I get?” Often times, it seems like they are expecting an answer that is filled with meggerbites and giggerhurts. Introspection sets in when I actually ask – What do expect to do … Read More
Using PRTG to monitor your available DHCP leases
How many times do we as network engineers get frustrated when one of our DHCP scope ranges gets dangerously close to running out of available lease addresses, or worse yet, actually runs out of available DHCP addresses, and we start getting calls from the helpdesk asking why people can no longer … Read More
Jumping on the Windows 10 bandwagon
On July 29, 2015, Microsoft released their latest version of Windows – Windows 10. This is a new foray into a delivery system of software called “SAAS” (Software as a service.) All legitimate licensed owners of Windows 7, 8, 8.1 were given one year to upgrade. So naturally, the first … Read More