- Note: Products that are reviewed (hardware or software) are personally owned or freeware that appear in this blog.
Top 50 Higher-Ed Blogs 2016
Hits | SV (NI)
- 2,787,704 visits
Steve’s FavoritesMicrosoft Answers -
Ask Questions-Get Answers
ARS Technica' Blog
Bill Mullins' Blog
Brickhouse Labs is committed to learning, teaching and deploying all things technology. Coolest Gadgets
What's On My PC
Security Blogs The Hacker News Naked Security Threat Post Krebs on Security Tao Security Uncommon Sense Security Dark Reading
The Windows Club
Category Archives: Organizations
Attached are guides on creating a roaming profile with Windows 7 and Server 2008 r2. (Thanks to Mr. Ledlow for creating these) Guides are in PDF Step One Create a User on the Domain Step Two Creating a Folder on … Continue reading
How can you tie your cloud storage services together? It’s actually easy if you use MultCloud. MultCloud ties together all of the most popular cloud storage services so you can upload files to multiple sites through a single … Continue reading
150 FREE Microsoft eBooks – largest collection ever Thanks to Jonathan for remembering to email me the latest Microsoft Blog link about free ebooks. EBoooks link Given the amount my readers enjoy these posts and these free resources, I am … Continue reading
From Infoworld – Microsoft confirms it’s dropping Windows 8.1 support. Here’s how this works – If you have Windows 8.1, You must update to Windows 8.1 Update (Yes, someone named it Windows 8.1 Update). This will insure you … Continue reading
An unnecessary path to tech: A Bachelor’s degree. An excellent article on education and technical careers from Computerworld. TCAT Shelbyville”s CIT program has a 98% retention and 92%+ placement. Is a degree worth the money? Yes, after you start … Continue reading
Outdated software contains security flaws which cybercriminals can use as avenues to infiltrate the corporate network. The dangers of using outdated software.
The Microsoft Surface Pro has proven to be versatile in the workplace. Mr. Arnold our Industrial Maintenance instructor uses the Microsoft Surface Pro to connect to nearly a hundred PLCs, motors, robots and other industrial components. So why is this … Continue reading
The Asus RT-AC66U Router continues to lead the pack with firmware downloads with improvements through enhanced features and security. Last night Jay messaged me with details on one of their features that provides a dual WAN option with fail-over features. … Continue reading
While the number of incidents data loss incidents in 2012 is almost by a third bigger that that for 2013, the number of records exposed in 2013 breaches has reached a record 823 million. 800M exposed records make 2013 record … Continue reading
420,000+ ATMs need to be upgraded soon… Businessweek Neowin Thanks to Bill Mullins blog
William Merritt, a student in the CIT program recently certified as a CompTIA Healthcare IT Technician. The CIT program is introducing CompTIA’s Healthcare IT Technician and is merging the certification into the existing curriculum. The certification will be the eleventh … Continue reading
In order to stress test our Moodle installation on IIS7.5 with PHP 5.6.3 we used the following – Installed Moodle, PHP, Opcache (included in PHP and MySQL with Microsoft web installer. (We later upgraded the PHP version from here) Downloaded PHP … Continue reading
Check to see if your Adobe email was leaked during a recent breach. Change passwords on any account including on Adobe. Never use the same password for different websites. http://adobe.cynic.al/
The life of a file… 8:00 a.m. The executive secretary begins writing a credit memo for several clients. The file has sensitive data. 8:15 a.m. The file is saved to the documents folder on the secretary’s desktop. The … Continue reading
Need a good wireless printer for your home or office? Samsung has a line of wireless printers that can’t be beat. We are always asked if there is a printer that supports tablets, smartphones, and computers. The SCX-3405w series … Continue reading
2012 Interview with Steve Mallard – TechTarget’s SearchCIO-Midmarket The biggest thing is IT consumerization. It’s consuming the time and the challenge of learning in all areas of IT, because the IT professionals have to adapt. Those students who bring their devices … Continue reading
“Online and offline, in IT departments and across organizations, the bring your own device (BYOD) debate is raging….For midsize businesses, there is a new way to spell risk: BYOD.
Should we live in fear and distrust or should we be cautious and diligent with the protection of our data? We worry about American companies taking away our privacy and tracking our every move. What should we really worry … Continue reading
The tight IT jobs market and desire for more control over tech projects has many companies insourcing projects and growing internal staff. via Now hiring: companies move away from outsourcing to control their IT destiny.
WASHINGTON, D.C. — The U.S. Department of Homeland Security’s Federal Emergency Management Agency (FEMA) and the Federal Communications Commission (FCC) will conduct the first nationwide test of the Emergency Alert System (EAS). The nationwide test will occur on Wednesday, November … Continue reading