When it comes to which server operating system is better, you know the score: Redhat for security, Windows Server for easier all-around operation.
On Aug. 18, Jeffrey Snover finally got his wish. It was a wish that we in the PowerShell community knew was eventually coming judging from his tongue-in-cheek responses when asked about it for many months. Windows PowerShell was renamed simply to PowerShell because...
Aaron Kelly | | Security
We've grown accustomed to hearing about cyber security failures at large enterprises like Target. But security threats and breaches are not just limited to the Fortune 500s of the world. Businesses of all shapes and sizes are vulnerable to cyber security threats and data...
Andy Morris | | Security
Continental Automotive is one of the world's leading automotive suppliers, employing over 215,000 people in 55 countries. With five divisions and a global network, Continental has a lot of data to transfer between several thousand internal and external customers,...
Mark Underwood | | IT Insights
By now, most IT professionals have dipped their toes in the solid-state drive (SSD) vs. hard disk drive (HDD) waters, but may not have had time to sort out the different types of SSDs used in their machines.
Aaron Kelly | | Security
There are quite a few routes you can take when it comes to a file transfer solution and the type of encryption to use, but say you are an SMB with very limited budget. How are you going to protect your data when you don’t have the money that an enterprise has access to?...
SMB cloud adoption has trailed behind enterprise rates for some time. Whether due to inadequate resources, overbearing security requirements or a simple misunderstanding of the technology, the small and midsize market has only recently begun to make significant cloud...
IT audit procedures run the gamut from internal to market-specific. Whether it's healthcare's HIPAA or the credit-card industry's PCI, you have to know the compliance audit's goals. These rarely include a fully functional missile defense system to protect against...
Michael O'Dwyer | | IT Insights
E-discovery refers to the disclosure of information in electronic or digital formats as part of litigation, government investigations or requests that relate to the freedom of information act. The National Law Review notes that, in recent years, issues related to...
As we use PowerShell Toolmaking to automate more tasks, most of us eventually find ourselves reinventing the wheel. We write a script to do task X, another to do task Y, then task Z comes around. A few weeks go by and we begrudgingly write another script to do task X...
In early June, the news broke that the Angler exploit kit was no longer the method of choice for malware delivery, especially ransomware. According to SC Magazine, attackers have now switched to the Neutrino exploit kit, perhaps in an effort to avoid detection.
Joe Hewitson | | Security
In the modern business world, applications are the vehicles for getting stuff done. This has become even more apparent as mobile technology enables us to be more productive in more places than ever before. But despite all the buzz about security in the mobile world,...
Today marks the 17th annual Systems Administration Appreciation Day, or Sysadmin Day as it’s more often called.
Before the days of PowerShell Test-NetConnection, we had many different command-line tools we could choose from to troubleshoot various network connectivity issues. We had ping for testing ICMP echoes and replies; tracert to see where our packets might be getting...
Mark Underwood | | IT Insights
Artificial intelligence (AI) is on a roll. There's more AI technology and innovation coming into our everyday lives than ever before. It's happening through developments spurred on by 800 pound tech gorillas like Amazon and IBM, and big brands in transportation like Uber...
Adam Bertram | | Automation | File Transfer | Security
You shouldn't have to babysit all of the file copies; scheduled tasks is perfect for automating this job.
Advanced technology has become an integral part of society — according to Pew Research, 67 percent of U.S. adults have broadband internet access at home, while 13 percent have tossed traditional connections and exclusively use mobile devices. But the evolution of...
The Dark Web. You've heard the term. It pops up in mainstream news stories about illegal goods, stolen identities and credit card fraud. It's a kind of digital boogeyman for ordinary users and IT pros alike, making it easy to mistake fear for facts and hype for helpful...
Let's stay in touch! Register to receive our blog updates.
Let's stay in touch! Register to receive our blog updates.