Taking Up Unneeded Space On The Server

Space is a hot commodity when it comes to your technology infrastructure.  Do you know if you are taking up unneeded space on your servers?  If your company has a terminal server that you log into or otherwise syncs your profile to, you could be taking up more space than you need to be.  Quite frequently folders such as ‘My Documents’, ‘My Pictures’, and ‘My Music’ are synced to a server so that all important information would not be lost during an outage or in the event something bad happens.  This also allows for your files to be accessed no matter which machine you log in...

read more

Stay Calm and Prepare for Maintenance

There will be many times throughout the year that some sort of maintenance needs to be done within your environment.  If you have your own internal IT as well as a Managed Service Provider (MSP), it is important work together to get prepared for the upcoming maintenance. Key – Stay calm and prepare for maintenance! If there is (for any reason) a planned outage in your environment, please let your MSP know as soon as you can.  This applies to everything whether it be server maintenance, implementing a new switch or even a planned power outage.  This quick and easy protocol...

read more

The Importance of Reboot Order

  If you have ever had a planned power outage for building maintenance or needed to reboot your core networking switch, you have most likely had to power down the servers and other machines in your environment.  The order that those machines are powered down and back up may not see important, but if not done properly, it can cause issues. Every environment is different, but also similar.  You may have physical servers, virtual servers on ESXi hosts, SAN or other network storage working together to build your company’s systems.  Some of these different components are dependent on one...

read more

Benefits of Adopting VoIP (Voice over IP)

What is VoIP (Voice over Internet Protocol)?  Basically, VoIP is a technology that allows telephone calls to be made over computer networks such as the Internet.  This relatively new technology allows for complete customization of a service that used to provide very limited options.  While the thought of changing the phone system for you entire organization may sound daunting, the beauty of VoIP is the ease and quick adaption to any business model.  With things connecting directly to the Internet for example, the move can be quick and painless resulting in little or even zero downtown....

read more

Shellshock Bash Bug

The Shellshock Bash Bug is the latest threat in a busy year of attacks on our technological systems.  This buy can open the door for an attacker to steal private information or data (among other terrible, nasty things).  While this is unlikely to impact your desktops or laptops because of firewall systems, there should be a review of any internet based systems or software in order to ensure protection. Servers and infrastructure components that are connected to the internet should be analyzed to determine if a hacker could use this bug to cause damage to your organization.  Unfortunately,...

read more

Geotagging

Geotagging is the process of adding geographical identification to various media such as photos or videos, websites, and text messages.  Basically, the GPS (Global Positioning System) in your smartphone or smart device maps your latitude and longitude position and attaches it to your uploaded media revealing your location.  What geotagging can mean in terms of your personal security or safety is a cause for concern for anyone who uses social media.  Criminals can use the information contained in a geotag to pinpoint your home, the location of your child’s school or daycare, or where you...

read more
Click here for technical support.