Newsletters

Cheap Sensors Can Track People Using Signals From Their Mobile Devices Home-brewed CreepyDOL, using a network of very cheap sensors can track people by using signals sent from their mobile devices Most consumers and workers typically know that their mobile devices are sending off data to the Internet, most do not understand the implications of […]

Read More

Is It Time to Move Email to the Cloud?? I have been either installing, maintaining, or consulting on email systems for over 15 years. During those 15 years, if you wanted a truly integrated email system with calendar sharing and workflow, the best system was hosted onsite. In the past 3 years that has changed. […]

Read More

Can You Survive a Cyber-Attack? Cyber risk Insurance can help prepare you for the worst. Computer hackers broke into the network Startfor in December of 2011. Strartfor provides global intelligence services to businesses. The hackers stole information related to over 85,000 credit card accounts. About 5 million email messages were also stolen and eventually ended […]

Read More

Exchange 2013 I just had a TBJ Coffee Connection on this topic and I thought it would be a good topic to discuss this month. Migration Paths The first item when discussing Exchange 2013 is migration. You will need to be on Exchange 2007 or higher to have the ability to migrate to Exchange 2013. […]

Read More

5 Tips for Server Virtualization One of the hottest technology trends among businesses and IT departments has been server virtualization. The common reason for server virtualization is to get better utilization of your servers, high availability and possibly cost savings. Here are a few tips on server virtualization for small to medium businesses: You do […]

Read More

Performing a Security Audit of Your Network This is a topic that is important and is often over looked. When is the last time you performed a security audit? I ask this question because I have seen some interesting things the past few years. Let me give you an example. I was moving a file […]

Read More

The Biggest Cyber Threats for 2013 With the explosive use of tablets and smart phones, 2012 was a busy year for cybercriminals. The leading security experts are warning of more threats coming in 2013. The hottest targets are devices are running the Android operating system . The Android operating system is installed on 70% of […]

Read More

Communication Line Redundancy One of the items many of my clients have plans for is Backup for their computer systems, what they don’t always think about it communication line backups. As computer systems are becoming more centralized or moved to some sort of cloud or hosted service, communication lines become much more important. If the […]

Read More

Windows Tablet Computers With the release of Windows 8 Microsoft has also launched 2 tablet computer offerings. They are Windows Surface with RT and Windows Surface with Windows 8 Professional. Windows Surface RT This version of the tablet can be ordered directly from Microsoft. It can be ordered in three different versions. The $499 version […]

Read More

Windows Server 2012 – Release to Manufacturing By the time you read this, Windows Server 2012 will be released to manufacturing. A number of improvements and licensing changes are coming for this release. The first major change is the elimination of Enterprise Server. Microsoft now only has Windows 2012 Standard and Windows 2012 Datacenter. With […]

Read More