Networking technologies have continued to advance over the years. New technologies continue to replace previous de facto standards and enable previously unforeseen capabilities. What we
The following was originally published in BCUG|NAVUG Magazine and is reprinted here with permission. Unique and United, They Stand... Toyota Material Handling, USA is a
Brad Lutgen was featured in a BizTimes Milwaukee article about emerging technology. Brad Lutgen is the partner in charge of the firm’s cybersecurity division. He
I previously wrote about reviewing Office 365 accounts that you suspect being compromised using the Audit Log. This is useful when you are doing remediation
Fifteen years ago, if you had Active Directory, it was very likely you also had a WSUS (Windows Server Update Services) server as well. WSUS
Dealing with account breaches is never an enjoyable activity. It typically gets even more sour when you can only get limited information on what happened.
Imagine this scenario that System Administrators are more commonly being faced with: An end user forwards along an e-mail inquiring about its legitimacy. The e-mail
When setting up a Windows 2016 RDS (Remote Desktop Server), there are a few GPO (Group Policy Object) settings I commonly define for all deployments.
In many NetSuite environments, the administrator and developer are different people with very different jobs. While the administrator needs to have complete access to NetSuite
Nowadays, you can use your smart phone to lock your front door from anywhere. And that door can have a doorbell that lets you see
Enterprise Connect 2019 is in full swing this week, with Microsoft providing a keynote speech. Their big focus was on Microsoft Teams, and the tech