In my previous post regarding wireless security, I mentioned that a single source of authentication for users is the most ideal in a corporate environment. The advantages of using one source for authentication are vast. One of the biggest advantages is that users only...
Remote Engineers
Leveraging Group Policy to Setup Wireless Access
In my last post, I introduced Clonezilla as an easy way to deploy Windows-based workstations into a corporate environment. But once a workstation enters the corporate network, what sort of policy applies to it? What sort of actions can a user take on their...
Enterprise Storage – Do you really get what you pay for?
In my last blog post, I touched on my experience with Network Appliance filers and remote server monitoring. This week, I will be discussing alternative storage solutions, and how they measure up to one of the biggest players in the Network Attached Storage...
SPK’s vCAD Solution Increases Productivity, Security, and Savings
SPK helps a tech manufacturer to increase security and availability of its CAD systems and data by moving them to the cloud—while helping them to save $30k per year. The Client A well-known maker of power distribution units for IT racks and related equipment...