General

Last Updated on 23 June 2014, Total: 152 Blog Posts

  1. CAN-SPAM Act

    The following are seven important things to remember if your organization is required to comply with the US CAN-SPAM Act. The CAN-SPAM Act sets the rules and establishes requirements for commercial email messages while; it sets out tough penalties for violations - non-compliance can cost your organization thousands of dollars! FTC has put together a handy video outlining seven simple... Read More

  2. Productivity Future Prediction by Microsoft

    A very reasonably view of the future technology is presented by Microsoft's Office Labs where the overall concept integrates information flow, gadgets and everyday surrounding objects seamlessly together. Glass walls turn into huge displays and tables into tablets! Plausible sci-fi as some of the technology shown in these videos already exists; some has reached the level of prototypes while, some... Read More

  3. Technical information about Microsoft SharePoint Server 2010

    All the info you need about SharePoint Server 2010 in one single location! This book includes technical information about the Microsoft SharePoint Server 2010 provider for Windows PowerShell and other helpful reference information about general settings, security, and tools. It also contains several links to articles which you can access online from the Operations Manager console. Search for alert messages... Read More

  4. IT Helpdesk ROI

    In the present global economic slowdown every internal entity within an organization has to operate with tight budgets and need to understand the financial constraints that they are operating under. The internal Helpdesk entity must think of itself as a business unit. How do you make the Helpdesk unit within an organization cost-effective? One of the most effective strategies is... Read More

  5. Cool Data Center Designs

    Is Facebook aiming at something bigger with its new data center? Rather than commissioning the buildup of its data center, Facebook went for a complete new model, which they call the Open Compute Project. The technology behind Facebook's green data center is developed together with major hardware vendors such as HP, Dell, AMD and Intel which shows that Facebook has... Read More

  6. Career Development

    For those IT Professionals who would like to plan their future career based on a job role rather than technology or platform, I suggest Microsoft's Professional Career Chart. The chart is structured around the different roles we find in IT operations, management and software development based on Microsoft technologies. For example, an application developer can match his current job description,... Read More

  7. Cloud Computing Assurance Program

    Auditing or assessing risks related to cloud setups may seem daunting at first, especially if an IT audit and assurance professional may lack cloud computing experience. A fine book published by ISACA & ITGI can give you the necessary heads up to initiate an assurance process. It is an excellent starting point but remember that it has to be modified... Read More

  8. Research IT as a Service

    I would like to share with you a couple of points taken from Ian Foster's presentation about the future of research computing and the current trend of moving the administrative load to the cloud. While, the big science projects are the ones that most often get the required funds and resources, the small to medium projects on the other hand... Read More

  9. Windows Servers Hardening

    A highly recommended best practice in securing Windows Servers is to stop unnecessary services and disable unused functionality. A brief checklist containing high level definitions of tasks to be performed would help administrators reduce the attack surface of their servers. A typical checklist would include: Stopping and disabling all unnecessary services and applications Renaming the Administrator account Creating a new... Read More

  10. Windows Servers 2008 outbound traffic

    Managing outbound traffic has become very crucial in determining computer infections. Malware infects computers and then tries to send out stolen data to perpetrators. Viruses seek to replicate themselves by attempting to send packets to infect other computers. Users might use unapproved applications which may result in the transmission of confidential data. Therefore, it is appropriate to review your Windows... Read More

  11. Read-Only Domain Controllers

    The RODC (Read-Only Domain Controller) in AD DS environments is designed specifically for the branch office scenario. RODC receives authentication requests from branch office users and forwards them to a domain controller in the hub site for authentication. There are two types of configuration scenarios, one option is to allow caching of branch office users login credentials and the other... Read More

  12. Windows Patch Management Considerations

    There are certain times when organizations decide not to deploy a software update solution and use Windows native functionality – Microsoft Update, as their main solution. This may be the best approach when organizations have dispersed offices around the globe with a small number of standalone computers. It is simpler to enable automatic updates on these clients' computers rather than... Read More

Featured Links