Featured Blog

Yottabytes: Storage and Disaster Recovery by Sharon Fisher

member Blog

A blog for users, storage solution providers -- including value-added resellers (VARs), systems integrators, managed service providers (MSPs) and consultants -- about data storage hardware and software products and services, backup/archiving products and services, disaster recovery, storage area networks (SANs) and network-attached storage (NAS).


Another Judge Tells Microsoft, ‘All Your Data Are Belong to Us’

August 12, 2014 - Another judge has told Microsoft that it must release data stored on one of its servers to a U.S. government agency, even though the data in question is outside the U.S., setting the stage for a massive worldwide confrontation on just who has the right to have access to data where. The agency is unnamed,...... READ MORE


  • Hello world!


    Welcome to IT Knowledge Exchange. This is an example of your first blog post. You’ll need to delete this example blog post and the attached example comment before your blog goes live. Let me know if you have any questions. Thanks. (Michael)…READ MORE

    Jaygarmon0 pointsBadges:
  • Microsoft Live Chat - November 12, 2009


    Join IT Knowledge Exchange for a LIVE chat hosted by Microsoft Exchange and Unified Communication experts Ed Banti and Yesim Koman. Sign up for a reminder today and join our chat LIVE on November 12th from 11AM EST to 2PM EST.

    The experts will be available to discuss Exchange and Unified Communi…READ MORE

    Byrony0 pointsBadges:
  • Survival Mode


    Over the holidays, the college kids trooped home, looked around, and wondered what had changed. At least mine did. She asked if I was working more hours and why we focused on more personal, less expensive gifts. There was the unspoken question of what had happened to my career path…had I taken …READ MORE

    MarkHolt115 pointsBadges:
  • Are You Kidding Me? And You're Shocked, WHY?


    The United State Military chose to not encrypt the video images sent from drone aircraft.  They are surprised that enemy fighters would intercept the images, to avoid being surprised themselves.

    And we’re all shocked and incredulous. Why?  We should expect these kinds of security shortcuts.  …READ MORE

    Tdudeguy0 pointsBadges:
  • Hello world!


    Welcome to IT Knowledge Exchange. This is an example of your first blog post. You’ll need to delete this example blog post and the attached example comment before your blog goes live. Let me know if you have any questions. Thanks. (Michael)…READ MORE

    iSeries0 pointsBadges:
  • TWO_TASK... an oldie but a goodie...


    TWO_TASK is a very useful but often forgotten environment variable. We actually just used it again the other day and we’re always scratching our head saying “ok, I remember there is this variable we can set to do that… umm… it’s… hmm, let me google and I’ll get right back to you.”

    Because i…READ MORE

    Richard Evans0 pointsBadges:
  • Google Live Chat – Get expert advice on Google Apps


    The Google Apps Live Chat will take place on July 28, 2009 from 1PM ET to 3PM ET. Join us for this live chat to get your pressing Google Apps questions answered by the product experts. Don’t miss the chance to chat with peers from more than 1.75 million businesses that use Google Apps to save time…READ MORE

    MaxMcD0 pointsBadges:
  • Application Launching -- Softly Please


    There have been a number of posts made commenting about a recent post on 37 Signals blog about “Why it’s wise to launch softly”.  I always love to see my thoughts in print by others, or to see approaches that I believe in being touted as “good” methods.  Such is the post I refer to, I could have w…READ MORE

    SJC65 pointsBadges:
  • YouTube Says, Downloading Your Own Videos is Legal


    Based on dozens of incoming posts about “Now Download Your YouTube Videos Legally” for last two days, I’m so confused at the first sight. Since these Flash videos on YouTube are not streaming via Real Time Messaging Protocol like Hulu, we’re always downloading these videos into our browser cache whe…READ MORE

    WPeterson0 pointsBadges:
  • Windows Batch File to Backup Internet Explorer Favorites


    Here is a quick batch file I wrote to copy Microsoft Internet Explorer Favorites to another location. Fill in the BACKUPPATH variable and stick it in a Group Policy logon (or logoff) script to make sure that users have a backup of the bookmarks.


    Dave Raffo4,335 pointsBadges:
  • Are we ready for a multi-task ID card? SAS 70


    Recently I received my credit card statement and interest rate had increased to 35%. This was not the Christmas present I was expecting. I am so glad Congress has enacted new rules to prevent this type of customer service from happening to you.
    As the government continues to provide bailo…READ MORE

    SAS70ExPERT125 pointsBadges:
  • Useful spam fighting technique


    Not a spam filter or any other server/client based tool but a simple temp email address generator that can help you keeping the real mailbox clean of spam!

    Check MeltMail and see how in a simple click you can create a temp email address that you can use for “note really important” things….READ MORE

    alessandro.panzetta9,725 pointsBadges:
  • HP QuickTest Pro 10 Beta: Antediluvian


    Mondays are frequently “One of Those Days”, where I start off by questioning myself over and over “Why did I get into this business of test automation? What was I thinking??” Then I hear the dire financial news, look at my personal slice of the national debt, and realize that it’s too late in my lif…READ MORE

    Sentinel62715 pointsBadges:
  • Technology Can't Solve Everything


    Last week there was quite an uproar over an Ad Agency HR executive accidentally sending out an e-mail to their entire staff divulging news of upcoming layoffs. It’s an excellent example of how an honest mistake can cause a tremendous amount of pain, but it’s also an excellent example of how techno…READ MORE

    JohnWilder0 pointsBadges:
  • Blog


    dspilka0 pointsBadges:
  • The Hello World Collection


    The Hello World Collection
    “Hello World” is the first program one usually writes when learning a new programming language. The first Hello World program appeared in chapter 1.1 of the first edition of Kernighan & Ritchie’s original book about C, “The C Programming Language”, in 1978 and read …READ MORE

    Rami220 pointsBadges:
  • Securing your E-mail address in a contact form


    All too often, I see easy ways to exploit a websites contact form. They have it so that everything is posted to the submit form in plain text. While this may be ok, if you’re not posting any of this to a database, it’s still not good practice.
    I usually tend to do it as such:

    My contact form:

    Jonsjava225 pointsBadges:
  • Microsoft Exchange Hub Transport Role


    The hub transport server role handles all e-mail flow inside the organisation, applies journaling policies, and delivers messages to the recipient’s mailbox. This role is similar to the bridgehead server in an Exchange 2000/2003 organisation. In fact it originally was called the Bridgehead Role …READ MORE

    B00M3R1,190 pointsBadges:
  • Database Development Process


    Planning – The first thing to consider in the development cycle. One must think of what system to make and the importance of it as to function within the organization based on the business strategies, the needs of the system, the possible information to consider.
    Analysis – We breakdown those i…READ MORE

    Rhianajay130 pointsBadges:
  • Risk versus Reward


    ITBusinessEdge has an interesting take on the increasing struggle between freedom of expression and command-and-control when using Enterprise 2.0 tools.  Discussed in the article is a blog post by Andrew McAfee:
    “McAfee notes that E2 tools take some of the control out of the hands of companies:

    Adam Steinberg0 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: