Michael O'Dwyer | | IT Insights
Whether your company has a single wireless network or multiple networks and access points, Wi-Fi interference issues are a common problem, frustrating users and IT pros alike and slowing down network traffic.
Exfiltration is a decidedly unpleasant word, and it's rarely connected with Google's benign application suite used freely by millions all over the world — Google Apps. Specifically, how secure is Google Drive? Google Drive, a potentially massive repository of...
The internet is huge. So huge that humans have spent years trying to quantify the concept. As noted by Live Science, for example, a study published in Supercomputing Frontiers suggested that the internet had a storage capacity of 10^24 bytes, while tech company Cisco...
While it’s important to secure data no matter where it lives, data in motion is at its most vulnerable for hackers and needs to be a focus point for your security and compliance efforts.
Aaron Kelly | | Security
An audit to review PCI compliance at a large US-based transportation company revealed a number of file transfer problems that kept them from getting a passing grade. And with the PCI 3.1 “Business as Usual” mandate, the company’s auditors stressed the importance of...
Adam Bertram | | Security
When writing large PowerShell scripts or modules, it will eventually become necessary to split up the code into modular pieces. Modularity can be achieved by using basic and advanced PowerShell functions. It also encourages good coding practices. One way to build modular...
As noted by Tech Financials, infrastructure outsourcing is now a go-to option for service providers, since it allows them to maximize their strengths while shoring up their weaknesses with third-party expertise. But what does this trend mean for companies at large? Is it...
Adam Bertram | | Security
With companies moving services to the cloud, applications offering robust APIs and a driving need for automation, we need a more mature scripting language.
Michael O'Dwyer | | IT Insights
Any discussion on the methods used to debug Bluetooth will not involve the use of soldering irons or replacement of components at a hardware level. The reason for this is quite simple — a Bluetooth radio is either on or off, with chipsets and Bluetooth stacks (the...
When a Windows server is running as expected, no one notices. But as it begins running low on resources, a system administrator typically finds out quickly just how important that server is. Performance suffers and Windows performance counters can help. It's important...
Adam Bertram | | Cloud | Security
As part of this cloud transition, it's important to realize that even though you can't see a system it still needs to be managed. Let's talk about PowerShell automation.
Adam Bertram | | Security
As an IT professional or manager, when you think of the word "script," what comes to mind? Are images of VBScript and batch files still haunting you to this day? Are you just thinking about a nice, little piece of code that automates some mundane task? If so, let's get...
Michael O'Dwyer | | IT Insights
If you require software licensing tips, don't expect your software vendors to be of any real help, given the prevalence of outsourced call centers by many of the world's global players. If you can understand the accent of your assigned contact, congratulations! You have...
Jacqueline Lee | | IT Insights
It's undeniable: the way IT fits into business operations is changing. Proving the value of information technology teams as business partners could be the difference between the outsourcing of services and outsourcing of, frankly, everyone.
When it comes to which server operating system is better, you know the score: Redhat for security, Windows Server for easier all-around operation.
On Aug. 18, Jeffrey Snover finally got his wish. It was a wish that we in the PowerShell community knew was eventually coming judging from his tongue-in-cheek responses when asked about it for many months. Windows PowerShell was renamed simply to PowerShell because...
Aaron Kelly | | Security
We've grown accustomed to hearing about cyber security failures at large enterprises like Target. But security threats and breaches are not just limited to the Fortune 500s of the world. Businesses of all shapes and sizes are vulnerable to cyber security threats and data...
Andy Morris | | Security
Continental Automotive is one of the world's leading automotive suppliers, employing over 215,000 people in 55 countries. With five divisions and a global network, Continental has a lot of data to transfer between several thousand internal and external customers,...
Mark Underwood | | IT Insights
By now, most IT professionals have dipped their toes in the solid-state drive (SSD) vs. hard disk drive (HDD) waters, but may not have had time to sort out the different types of SSDs used in their machines.
Aaron Kelly | | Security
There are quite a few routes you can take when it comes to a file transfer solution and the type of encryption to use, but say you are an SMB with very limited budget. How are you going to protect your data when you don’t have the money that an enterprise has access to?...
Let's stay in touch! Register to receive our blog updates.
Let's stay in touch! Register to receive our blog updates.