It seems like a regular occurrence these days that we hear about a company’s employee records or customer data getting stolen by hackers. Well-known companies ...
Application analysis and end-user experience part #2 – picking your poison
In the first part of this article, we discussed the reasoning behind the rise in popularity of client-side metrics, application analysis tools and quantification of ...
BrainStorm K20 – that was amazing!
This year’s BrainStorm K20 conference in the Wisconsin Dells was positively electric as education technologists from across the Midwest gathered together to connect, inform, and inspire. ...
How to convert VMware VMDK files into Hyper-V VHD files
I use a MacBook Pro in the field daily and find myself needing to spin-up some home-brewed Windows and Linux virtual machines quickly. To accomplish ...
Application analysis and end-user experience part #1 – why should I care?
Those who do not learn from history are doomed to repeat it. Attributed to Winston Churchill, this quote has a particular resonance for IT projects. ...
Internet, Networking, Wireless
Does 802.11ac Wave 2 wireless require replacing your old copper cabling?
The short answer to that question is, no. Explaining why, however, that’s where things get really interesting… It’s also one of those explanations that require ...
How web browsing is crippling your infrastructure and compromising security
Ask anyone what the most resource-intensive applications on their end-user devices are, and you will normally receive a laundry list of software with heavy graphical ...
Update Windows Server 2012 R2 KMS host to allow Win 10 activations
Ready to deploy Windows 10 on your domain but still need to update your Windows Server 2012 R2 KMS host so it can successfully activate the ...
Network resource availability and data integrity
Part 2 of our Network Remodeling / Redesigning / Restructuring services series In my previous post Active Directory Design, Optimization, and Automation we discussed how ...
An ounce of monitoring – a pound of prevention
With an ever increasing amount of technology, networks, servers and solutions, it becomes more important to monitor all aspects of our systems. Network monitoring gives ...
Using the SonicWALL SSL VPN With Windows Domain Accounts Via RADIUS
Setting up the SonicWALL firewall for using SSL VPN is pretty simple, even when it comes to utilizing Windows Domain Accounts via RADIUS authentication. The ...
The quirks of Windows Server 2012 R2 in-place server upgrades
There are basically two approaches when it comes to server upgrades for going to Windows Server 2012 R2 – performing an in-place upgrade, or creating ...
Using PRTG to monitor Windows Server backup
While PRTG (available at http://www.paessler.com) has many cool sensors available out-of-box for monitoring valuable network and server related data, unfortunately, it doesn’t have an easy ...
Network issues: sometimes it’s the little things that cause the most trouble
Everything in IT is based on something else. We always want to have the newest, latest, greatest technology; Replicating our files shares between two offices, ...
Active Directory design, optimization and automation
Part 1 of our Network Remodeling / Redesigning / Restructuring Services series Active Directory is the central repository for nearly all networks today. Some of the ...