Adam Bertram | | File Transfer | IT Insights
It's easy to copy files with PowerShell Copy-Item via the command line. Once you specify the source and destination location, it just happens. Unfortunately, many administrators don't think about how this process occurs until it doesn't work.
Adam Bertram | | IT Insights | Security
Large organizations typically have lots of devices that require IP addresses. Client desktops, tablets, mobile and desk phones, servers and more all consume IPs. The only way to manage IPs at this level is to use Microsoft Dynamic Host Configuration Protocol (DHCP),...
Whenever you're building and maintaining infrastructure for your company or an open-source project, you're probably using Amazon Web Services (AWS).
Dan Franciscus | | IT Insights
Vagrant provides a solution for creating disposable and consistent environments, all within a single configuration file.
Cyber risk leads to financial risk, but cybersecurity is still often thought of as a technical rather than a business problem.
Increased use of cloud applications and other developments are transforming WAN implementations, improving security in the process.
Jeff Edwards | | Security
Just last week, we were looking back at the most significant hacks and attacks of 2017, and wondering what lay ahead for 2018. Well, wonder no more.
Remember the corporate accounting scandals that took out Enron, Arthur Andersen and WorldCom? They all ended with prison sentences, layoffs, and billions of investor dollars lost forever.
In the Python world, PyCharm is designed to be the integrated development environment (IDE) necessary for any successful coding project.
Most of us have had a few weeks now to let it all sink in and maybe even get a second or third viewing of Star Wars: The Last Jedi.
The PowerShell AST essentially breaks down the code into a hierarchical tree with each element representing a part of the tree, making the scripts self aware.
Dan Franciscus | | IT Insights
Puppet is one solution that is trying its best to make sure Windows engineers and admins have the tools necessary to manage effectively. Here's how to use it.
CCleaner has been used by IT professionals and users alike for cleaning up temporary files and the Windows registry. But is cleaning the Windows registry useful?
When you think of PowerShell, what comes to mind? Scripts? Probably. Of course, one of PowerShell's core focuses is about scripting; the other is a great shell.
Security information and event management (SIEM) software provides a way to track, integrate, and analyze the vast amount of log data that comes from an organization’s applications and network hardware. Its original value came from compliance reporting, but it is...
Need to keep an eye on your IIS web server app pools? Here's a guide on getting started with PowerShell.
Dan Franciscus | | IT Insights
If you’re managing servers and aren’t using an infrastructure-as-code solution such as Puppet, Ansible or Chef, be warned: you should be.
PowerShell 5.x is soon being replaced. Once the official version of PowerShell Core 6.0 is deployed into production, we can get more details about the future.
This infographic is a great place to start getting acquainted with the 7 principles of data protection and what they mean for data in transit.
Let's stay in touch! Register to receive our blog updates.
Let's stay in touch! Register to receive our blog updates.