Welcome to the newest and coolest place to get Active Directory solutions and tips. I’m Derek Melber, here to provide you with the most relevant,...
Search results for: 7 problem management
Guest blog: Upheaval in the service desk space
This is a guest post by Peter Dorfman. Help desk software is now a free download! The wheels turn slowly in the enterprise software business....
IT Security and Auditing Framework – A Glass Half Full or Half Empty?
Log Management, Compliance Reporting and SIEM Corporate islands with no connectivity to the external world and/or employees seeking permission to share company critical information with...
The Burn-Proof CIO: 5 Tactics For Surviving The Red-Hot Tech Sector
Technology is on fire. Technology-related sectors may have single-handedly pulled the economy back from the brink of disaster. A recent report by Ibis World reveals...
Will passwords become obsolete soon?
Will passwords soon become a thing of the past? Have they already become obsolete? This is perhaps one of the most prominent topics under discussion...
PCI DSS 3.0: Shifting focus on daily review of ‘security-relevant’ logs to identify suspicious activities [Part-3]
Ever since the release of the PCI DSS version 3.0 change highlights by the PCI Security Standards Council (PCI SSC), stakeholders of payment card industry and security analysts have been busy...
Why IT Dollars Will Go Further on Google’s Floating Data Center
Is Google preparing another “moon shot”? The barge discovered in the San Francisco Bay this week hints at it, and rampant speculation has Google building...
Where the cloud touches down: Simplifying DCIM
In most data centers, DCIM rests on shaky ground: manual record keeping and scattered documentation. Data center managers maintain–and wade through–wikis, spreadsheets, text files, and...
This Week’s Five: SysAdmins are not humans, seriously!
Your network is safe, your computer is working, and your printer is running. Why? Because you’ve a great sysadmin who is keeping your business up...