Featured Blog

Jeff Cutler's Keys to Security by Jeff Cutler
The blog for anyone who’s trying to put security into perspective; and the destination for anyone to learn some methods for better securing data and understanding the security landscape.


Creating and keeping a safe password system

April 16, 2014 - On the heels of Heartbleed, folks are up in arms about getting a new workflow when it pertains to passwords. The old ones aren’t strong enough or have been compromised. The new ones are too hard to remember. Switching dozens of accounts and creating a new password for each is difficult. In fact, an Examiner.com...... READ MORE

California Government Officials Get Gigantic Open Records Loophole
Posted in Yottabytes: Storage and Disaster Recovery by Sharon Fisher on 2014-04-21 00:55:27

Okay, this is really bad.

A California court, the Sixth District Court of Appeal, has ruled that email messages and other forms of electronic communication about public business are not subject to the state’s Public Records Act as long as they’re conducted on a private computer or device.


Rodrigo Jardon: Mexico Based Photographer: A Straight Talk On His Projects
Posted in Quality Assurance and Project Management by Jaideep Khanduja on 2014-04-20 20:19:21

Recently I interacted with a professional photographer from Mexico City and while learning about his work I could sense that they have a similar (if not same!) kind of Project Management activities to manage their project assignments. Their projects also vary in size thereby earmarking the duration …READ MORE

Refresh Adventures Show It's NOT the "Same as Backup"
Posted in Windows Enterprise Desktop by Ed Tittel on 2014-04-16 09:36:26

As I’ve observed many times in this blog over the years, I’m a hopeless tinkerer. This even applies to my production system when the whim strikes and time permits. My current production machine features the following collection of components (among others): an Asus P8X68-V Pro Gen3 motherboard, an i…READ MORE

Subnets and prefixes
Posted in PowerShell for Windows Admins by Richard Siddaway on 2014-04-19 07:52:08

Sounds a bit like an old time role playing game but is actually a useful piece of knowledge.

You can define a subnet mask in 2 ways. Either use the full mask e.g. or define the number of bits in the mask e.gg 21 which is known as the prefixlength in the PowerShell networking cmdlets…READ MORE

INE announced their detailed CCIE Routing and Switching version 5 blue print
Posted in Network technologies and trends by Yasir Irfan on 2014-04-19 08:03:44

As we all aware that the last day for CCIE Routing and Switching v4 Lab exam happens to be on 3rd of June 2014. Even those who want to book the CCIE Routing and Switching v4 Lab exam before June 4, 2014 they all ran out of luck as all the seats are full. This gives us the hope to look forward for CC…READ MORE

Recommended reading from mrdenny for April 18, 2014
Posted in SQL Server with Mr. Denny by Denny Cherry on 2014-04-19 04:20:28

This week I’ve found some great things for you to read. These are a few of my favorites that I’ve found this week.

TechEd Europe 2013 videos online
Retail Stores Plan Elaborate Ways To Track You
Buffer Pool Extension to SSDs in SQL Server 2014
The SQLAndy Rules for Storing Credit C…READ MORE

The Annual Performance Appraisal
Posted in Information Technology Management with a Purpose by S R Balasubramanian on 2014-04-18 10:24:41

As we start with the new financial year in April, two of our main obligations come to fore. One is seeking approval for the annual budget already presented and the other one is the year end appraisal of our staff members. While the former is important for working out our plans for the year, th…READ MORE

For Security Reasons, Perhaps We Should All Work Together in Offices
Posted in Cheap Computing by Robin "Roblimo" Miller on 2014-04-13 19:41:50

A basic problem with working in “the cloud” is that we are sharing our work over the Internet, where the very act of sending and receiving data makes us vulnerable to security breaches such as HeartBleed. Since the cost of a data breach can be huge (ask anyone who works at Target), it is obviously a…READ MORE

Dropbox & DMCA
Posted in I.T. Security and Linux Administration by Eric Hansen on 2014-03-31 07:39:17

An article was posted recently about Dropbox and its relation to DMCA.  In short, if you share a file publicly, and its been flagged as a violation to DMCA (either under your account or another’s), it will be blocked from the share.  So far this doesn’t mean its deleted from your account, just tha…READ MORE

Creating and keeping a safe password system
Posted in Jeff Cutler's Keys to Security by Jeff Cutler on 2014-04-16 11:52:19

On the heels of Heartbleed, folks are up in arms about getting a new workflow when it pertains to passwords. The old ones aren’t strong enough or have been compromised. The new ones are too hard to remember. Switching dozens of accounts and creating a new password for each is difficult.


Microsoft might not win mobile front end, but has a good shot at back-end management
Posted in View From Above by Ron Miller on 2014-04-15 10:54:44

The new version of Windows Phone OS, 8.1, was released yesterday to the developer community and early reviews say it’s enterprise friendly, but is that enough in an age when people are choosing their own devices?

It may very well be as Simon Bisson wrote on CITEworld (where I’m also a contributor…READ MORE

#NoEstimates Go Portfolio!
Posted in Uncharted Waters by Matt Heusser on 2014-04-14 15:19:14

Earlier in the week I introduced the idea of #NoEstimates, suggesting that estimates are not essential on technical projects and it could be possible to run projects without them. For example: early in my own career, I was assigned to a business unit for three months of work. The specific scope of …READ MORE

Finding a clear path through consistency
Posted in Working alongside SAP Business Suite by Clinton Jones on 2014-03-31 12:13:17

Traveling abroad brings with it a series of experiences that can be both frustrating and surprising. This weekend past I had the opportunity to visit one of the lands of the Vikings, Norway. Although I only stayed in Oslo I did have the opportunity to travel on the three principal local public trans…READ MORE

A Last Hurrah: It's Been a Good Run, But...
Posted in IT Career JumpStart by Ed Tittel on 2014-03-31 20:22:06

Dear Readers:

It’s been my great pleasure and privilege to have worked on this blog since August 4, 2008. Over that period, I’ve posted 782 times here (including this post) for an average of 11.5 posts per month. Considering that my target was 12 posts per month, but that life (and vacations) hav…READ MORE

Many companies fail to learn lessons even after suffering a data breach
Posted in The Security Detail by Tony Bradley on 2013-04-29 12:33:27

Experian Data Breach Resolution and the Ponemon Institute today released a new study that finds that, despite the majority of companies experiencing or anticipating significant cost and business disruption due to a material data breach, they still struggle to take the proper measures to mitigate…READ MORE

Configuring EtherChannel - Part 2
Posted in Can you hear me now? Tales from a Cisco voice instructor by Dave Bateman on 2013-03-31 11:04:49

In last post we discussed what EtherChannel is and how it might be used. In this post we will look at the configuration of EtherChannel. The configuration of EtherChannel on Cisco switches is fairly simple. In order for EtherChannel to funtion properly, you must ensure that all link are the same typ…READ MORE

Get a good deal on a great read with Amazon's new Kindle Countdown Deals program
Posted in Tech Strategy Trends by Tony Bradley on 2013-10-31 11:08:01

If you are in the market for a bargain on a new book to consume your idle time, Amazon has a new service that might help you out. Amazon launched Kindle Countdown Deals today, which allows publishers to offer Kindle-exclusive titles with limited-time promotional pricing.

With the Kindle Count…READ MORE

Yes I am still here
Posted in SBS 2003 and beyond by Roger Crawford on 2014-04-10 11:34:06

Wow it is funny how life changes get in the way of life it seems like. I was sitting here this morning going I haven’t posted anything in a long while as I have been tied up with work and not got a lot done on this for a while. A lot has changed since I posted last, my old company sold to someone ne…READ MORE

Fear and Loathing in Cloudvegas
Posted in From Silos to Services: Cloud Computing for the Enterprise by Brian Gracely on 2014-04-06 16:23:54

[A better title might be, "How to Drive Yourself Crazy Thinking About Your Career in Tech"]

I wasn’t around when the horse and buggy era ended, but sometimes I feel like I’m having the same conversations that the blacksmiths, saddle makers and stable sweeps had back in the early 1900s. Fast forwa…READ MORE

Want a Free Gantt Chart App?
Posted in Beyond Excel: VBA and Database Manipulation by Craig Hatmaker on 2013-08-30 07:17:18

Introducing a new approach to Gantt Charts in XL – BabyGantt.xls

There are quite a few XL based Gantt Charts out there.  They fall into 2 main categories: Bar Charts and Conditional Formatting.

Bar Charts
This type creates a stacked bar chart with the first series being the duration from p…READ MORE

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: