Is offsite LAN access a realistic possibility in M&A?
When an acquisition day 1 happens, that is typically the first opportunity a WAN circuit can be requested. The typical lead time we have experienced is around 6-9 weeks based on the business vendor and...
View ArticleInside IT: The Evolving Role of IT
It’s the essence of this podcast series – the change of IT’s place in the organization, and the role IT plays in relation to all the business units in the company. In this episode we wanted to turn to...
View ArticleInside IT: The Evolving Role of IT
It’s the essence of this podcast series – the change of IT’s place in the organization, and the role IT plays in relation to all the business units in the company. In this episode we wanted to turn to...
View ArticleInside IT: Evaluating a Bring-Your-Own Stiepend
Consumerization is a big trend in the enterprise. Intel is at the forefront of this trend, with an extensive BYO program. Tens of thousands of employee-owned smart phones and tablets are now in use by...
View ArticleInside IT: Evaluating a Bring-Your-Own Stiepend
Consumerization is a big trend in the enterprise. Intel is at the forefront of this trend, with an extensive BYO program. Tens of thousands of employee-owned smart phones and tablets are now in use by...
View ArticleMilitary job transitioning, 18 years later
When you're in the military, there are many things that identify who and what you are. These vary from rank and rate, to insignia and duty station. This is not much different than life in the civilian...
View ArticleMilitary job transitioning, 18 years later
When you're in the military, there are many things that identify who and what you are. These vary from rank and rate, to insignia and duty station. This is not much different than life in the civilian...
View ArticleHP DC7700 Intel Q965/Q963 Drivers for Winows 8
I have a client that is looking to upgrade their office workstations from Winows 7 to Windows 8 and has asked me to look into this for them, they have given us 3 systems to test, and although the...
View ArticleDX79SR – windows could not clean disk 0 , unattended deployment Windows 7
System builder here and we've secured a great deal selling a number of DX79SR based systems to a local engineering firm that needs 64 GB PC's at a lower price than something Xeon based;...
View ArticleCyber security Hunter teams are the next advancement in network defense
Hunter teams are emerging as a new tool in the world of cyber defense. Computer security continues to improve and evolve of overtime. One of the latest practices gaining momentum is the use of cyber...
View ArticleWhat makes some communities click, while others struggle to take off?
“How vain it is to sit down to write when you have not stood up to live.” ― Henry David Thoreau What makes some communities click, while others struggle to take off?All things remaining constant...
View ArticleAV is Not Dead
Recent stories in the news imply Anti-Virus (AV) is dead. A longtime staple of security managers and consumers, AV and more broadly, anti-malware products are a pillar of the security industry. Could...
View ArticleInside IT: Self-Service Business Intelligence
You could say that Business Intelligence is the collective knowledge of an enterprise. How intelligent a particular business is depends on a lot of factors, but the ability to make sense of a vast...
View ArticleInside IT: Developing a Hybrid Cloud
More and more, Intel is offering consumer-facing web services, like the AppUp store. That creates new challenges – consumers expect web services to be always available, and demand for services can...
View ArticleIntel Goes with Windows 8
After evaluating Microsoft Windows 8, we have chosen Windows8 on Intel Architecture as the standard operating system for Ultrabooks and tablets in our enterprise environment. We are excited to use...
View ArticleWhat is the Optimal Messaging System for the Enterprise Environment?
ITIn today’s world it looks like the answer to the question is very clear, but it’s not. Using messaging systems in the enterprise environment is not like sending hundreds of SMS between friends. In...
View ArticleThe confounding world of information security terms, from Access to Zone of...
Communication is incredibly important in the security industry. We must work together, be it small teams, across organizations, or beyond boarders throughout the industry, government, supporting...
View ArticleScripting for a non-coder (How to start)
As non-coders it can be a difficult process to automate routine tasks. What things can we do as non-coders to allow us to automate our jobs as well as growing our skills in the automating process?...
View Article2012 Crackdown on Hackers and Cyber Criminals
A number of high profile takedowns, arrests, and prosecutions have occurred throughout the year. As I predicted for 2012, we have witnessed a tremendous amount of pressure towards the people behind...
View ArticleInside IT: Re-Imagining Intel’s Web Experience
The role of a corporate web site has evolved. It’s no longer just a static source of information. It’s the place where a company creates and maintains a relationship with the world of customers,...
View Article