IT Trenches:

CIO


June 17, 2008  2:05 PM

Did you see this? – Online e-book library



Posted by: Troy Tate
administration, awareness, CIO, Database, DataCenter, DataManagement, Development, Exchange, howto, IT education, LAN, Linux, Metrics, Microsoft Windows, Mobile, network analysis, Networking, Oracle, Performance, research, SAP, Security, SQL Server, Storage, Virtualization, WAN, web, website

Check out this digital online library for IT professionals. Bet you can't read just one! Thanks for your time. Let’s be good network citizens together & practice safe networking!

June 3, 2008  1:26 PM

Troubleshooting humor for the day – engineer, systems analyst & programmer



Posted by: Troy Tate
administration, CIO, forensics, humor, research, troubleshooting

Quick Stop

A computer engineer, a systems analyst, and a programmer were driving down a mountain when the brakes failed. They screamed down the mountain, gaining speed, and finally managed to grind to a halt, more by luck than anything else, just inches from a thousand foot drop to...


May 31, 2008  2:28 AM

Did you see this? – Noticebored – Infosec Awareness Education



Posted by: Troy Tate
anti-virus, antivirus, awareness, blogging, botnet, Data security, forensics, honeynet, honeypot, humor, IT education, malware, Metrics, Monitoring, online identity, Policy, policy enforcement, research, Security, wiki

Noticebored is a great resource for information security awareness. The blogs are timely and cover a great spectrum of topics with regards to this important...


May 23, 2008  7:58 PM

Did you see this? – Security Primer for the non-technical



Posted by: Troy Tate
anti-virus, antivirus, awareness, botnet, Data security, IT education, malware, Monitoring, online identity, Policy, policy enforcement, Security, tools

This is a shout-out to fellow blogger Martin McKeay. His Security Primer for the non-technical is a blog worth sharing with friends, family and co-workers. Hence, I am sharing this with you...


May 21, 2008  1:18 PM

Cutting IT corners is not cutting IT



Posted by: Troy Tate
administration, anti-virus, antivirus, CIO, Data security, DataCenter, DataManagement, malware, Mobile, Network Admission Control, Performance, Policy, policy enforcement, reporting, Security, tools

How often does this happen to you? A user is going to travel to another company location and they want to checkout a laptop for the journey. However, they tell you the morning of the travel rather than in advance. So you do not have time to check out the device and ensure that it is really in good...


May 13, 2008  4:06 PM

To be done: an acquisition/merger checklist



Posted by: Troy Tate
anti-virus, antivirus, CIO, DataCenter, DataManagement, email, howto, LAN, malware, Metrics, Microsoft Windows, Monitoring, Networking, reporting, research, Security, tools, WAN

An acquisition or merger is not a frequent event for my organization. However, it seems like in the past year or so we have worked on a number of these activities. So, it seems like it may be time to create a formalized checklist for the IT department items that need to be addressed during an...


May 9, 2008  6:20 PM

Did you see this? – a live honeynet



Posted by: Troy Tate
anti-virus, antivirus, botnet, CIO, Data security, DataManagement, forensics, honeynet, honeypot, howto, malware, Monitoring, research, Sandbox, Security, SQL Server

I just came across the Shadowserver Foundation. According to their mission:

The Shadowserver Foundation is an all volunteer watchdog group of security professionals that gather, track, and...


May 2, 2008  6:26 PM

Did you see this? – Gideon’s INFOSEC list



Posted by: Troy Tate
CIO, Data security, DataManagement, NIST, Security

This site is dedicated to increasing security awareness among the general population and the technology community. The Basic Security section is focused on the average person. The...


April 29, 2008  5:11 PM

I can’t get no technical (support) satisfaction



Posted by: Troy Tate
CIO, DataCenter, Linux, Microsoft Windows, Monitoring, Networking, Security, tools, troubleshooting

My apologies to the Rolling Stones for munging their classic song. How many times have you encountered a situation in your organization where something needs to be done yet either IT is not able or willing to...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: