Businesses of all sizes face not only increasing security threats but also greater regulatory compliance requirements. Here are some strategies to help find a balance ...
“Help! My Outlook contacts are missing!”
Imagine this scenario… A Microsoft Outlook user gets a new computer. Everything is loaded and it works great. After several minutes of using their new ...
Finding and removing old computer accounts in your Active Directory domain
Any server administrator that works with Windows Server and Active Directory can tell you that it’s not uncommon for Active Directory to be littered with ...
My Default Domain Policy and Default Domain Controller Policy are broke!
At some point in a consultant’s travels, they will come across group policies that nightmares are made of. Let’s quickly talk about one of those ...
Is your data protection policy protecting your employees and students?
It seems like a regular occurrence these days that we hear about a company’s employee records or customer data getting stolen by hackers. Well-known companies ...
Application analysis and end-user experience part #2 – picking your poison
In the first part of this article, we discussed the reasoning behind the rise in popularity of client-side metrics, application analysis tools and quantification of ...
BrainStorm K20 – that was amazing!
This year’s BrainStorm K20 conference in the Wisconsin Dells was positively electric as education technologists from across the Midwest gathered together to connect, inform, and inspire. ...
How to convert VMware VMDK files into Hyper-V VHD files
I use a MacBook Pro in the field daily and find myself needing to spin-up some home-brewed Windows and Linux virtual machines quickly. To accomplish ...
Application analysis and end-user experience part #1 – why should I care?
Those who do not learn from history are doomed to repeat it. Attributed to Winston Churchill, this quote has a particular resonance for IT projects. ...
Internet, Networking, Wireless
Does 802.11ac Wave 2 wireless require replacing your old copper cabling?
The short answer to that question is, no. Explaining why, however, that’s where things get really interesting… It’s also one of those explanations that require ...
How web browsing is crippling your infrastructure and compromising security
Ask anyone what the most resource-intensive applications on their end-user devices are, and you will normally receive a laundry list of software with heavy graphical ...
Update Windows Server 2012 R2 KMS host to allow Win 10 activations
Ready to deploy Windows 10 on your domain but still need to update your Windows Server 2012 R2 KMS host so it can successfully activate the ...
Network resource availability and data integrity
Part 2 of our Network Remodeling / Redesigning / Restructuring services series In my previous post Active Directory Design, Optimization, and Automation we discussed how ...
An ounce of monitoring – a pound of prevention
With an ever increasing amount of technology, networks, servers and solutions, it becomes more important to monitor all aspects of our systems. Network monitoring gives ...
Using the SonicWALL SSL VPN With Windows Domain Accounts Via RADIUS
Setting up the SonicWALL firewall for using SSL VPN is pretty simple, even when it comes to utilizing Windows Domain Accounts via RADIUS authentication. The ...