IT Trenches:

Mobile

1

August 21, 2008  8:08 PM

IT Equipment search & seizure at the US borders



Posted by: Troy Tate
administration, awareness, blog, CIO, data loss, Data security, DataManagement, design, forensics, government, intellectual property, internet, IT education, Mobile, Monitoring, Networking, online identity, Policy, policy enforcement, reporting, research, risk, Security, WAN

I have recently been hearing some rumblings about this issue. I work for a firm with international locations and have travelled out of the country myself. So, this is a personal issue. What I am referring to is the situation described in this article by David Jonas of The Transnational:

August 18, 2008  7:11 PM

Did you see this? – Boot CD tutorial



Posted by: Troy Tate
administration, antivirus, bootcd, DataCenter, DataManagement, diagnostics, forensics, howto, Microsoft, Microsoft Windows, Mobile, Monitoring, packet capture, Performance, recovery, research, risk, Security, tools, troubleshooting

How often have you needed to recover a Windows system or use some type of boot disk? It's not easy to create a bootdisk in the current versions of Windows (XP or Vista). There's still a need for this capability. One source of how-to information can be found on the


June 17, 2008  2:33 PM

Did you see this? – can MY browser do this?



Posted by: Troy Tate
Browsers, DataCenter, diagnostics, Linux, Metrics, Microsoft Windows, Mobile, Networking, Performance, reporting, tools, web, website, WWW

Here's a great website for testing your browser functionality and understanding the different features of each application. Thanks for your time. Let’s be good network citizens together & practice safe...


June 17, 2008  2:05 PM

Did you see this? – Online e-book library



Posted by: Troy Tate
administration, awareness, CIO, Database, DataCenter, DataManagement, Development, Exchange, howto, IT education, LAN, Linux, Metrics, Microsoft Windows, Mobile, network analysis, Networking, Oracle, Performance, research, SAP, Security, SQL Server, Storage, Virtualization, WAN, web, website

Check out this digital online library for IT professionals. Bet you can't read just one! Thanks for your time. Let’s be good network citizens together & practice safe networking!


May 21, 2008  1:18 PM

Cutting IT corners is not cutting IT



Posted by: Troy Tate
administration, anti-virus, antivirus, CIO, Data security, DataCenter, DataManagement, malware, Mobile, Network Admission Control, Performance, Policy, policy enforcement, reporting, Security, tools

How often does this happen to you? A user is going to travel to another company location and they want to checkout a laptop for the journey. However, they tell you the morning of the travel rather than in advance. So you do not have time to check out the device and ensure that it is really in good...


1

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: