Scenario: a mission-critical application is having performance issues during peak business hours. App developers blame the storage. The storage team blames the network. The network admin blames the infrastructure. The…
Introduction I’m going to look at the basic steps required for setting up an Office 365 tenant. There are a few ways you can purchase Office 365. There’s the good…
Forty-eight percent of students currently use a computer in school, while 42% use a smartphone, according to a recent report by Cambridge International. These technologies provide students with the ability…
In a recent episode of a popular tech podcast, I heard the hosts say, “If you can’t automate, you and your career are going to get left behind.” Some form…
Nearly every market in today’s business landscape is saturated, making it every organization’s top goal to create products and provide services rivaling competitors. To help ensure success, businesses must provide…
The Continuous Diagnostics and Mitigation (CDM) Program, issued by the Department of Homeland Security (DHS), goes a long way toward helping agencies identify and prioritize risks and secure vulnerable endpoints.…
The U.S. Army is undergoing a major technology shift affecting how soldiers prepare for battle. Core to the Army’s modernization effort is the implementation of a Synthetic Training Environment (STE)…
Migrating to the cloud is smart but it’s not always easy. It can be a complicated process requiring a substantial investment of time and resources. Yet the benefits make the…
It’s time to stop seeing IT as just a black hole to throw money towards and instead, give back to the business. Often, the lack of proper measurement and standardization…
At the beginning of October, we attended it-sa for the second time. it-sa, which has been taking place in beautiful Nuremberg over the last ten years, has grown from a…