News

/News

New Offering: Windows Server 2012 Hyper-V Replica Hosting

Microsoft has added a lot of compelling features to Hyper-V in Server 2012, which makes it very competitive with VMWare's (industry standard) vSphere product.  Ars Technica provided a good general writeup of the third generation [...]

By | November 14th, 2012|Disaster Recovery, Private Cloud|

IE 9 is the most secure browser all of a sudden?

Internet Explorer got a black eye last week from a widely exploited zero-day vulnerability, but a recent NSS report shows that IE 9 does a better job of blocking malware than the other major browsers. [...]

By | September 29th, 2012|Desktop Support, Security|

Yahoo Hacked, Change Your Password and Get a Damn Password Manager

As you might have heard, Yahoo.com was recently hacked and over 450,000 passwords were exposed: http://www.infoworld.com. Here are some steps you can take to try to protect yourself: Change your Yahoo password ASAP. Never use the [...]

By | July 12th, 2012|Security|

The MSP Model is Basically a Commodity Play

Who wants to be a commodity? I have struggled with the MSP model since it came out and have considered writing about it for some time.  Today, I realized why we aren't an MSP.  It's [...]

By | August 26th, 2011|Uncategorized|

Google Apps Transition

So if you don't know about Google Apps, you really should read up on it. For the purposes of this post, let's just say that Google Apps gives companies or individuals the ability to [...]

By | April 21st, 2011|Google|

Mobile Device Management

The explosive popularity of mobile email devices like smartphones and iPads can lead to security problems if not managed properly. In the corporate world, we want at the very least to be able to enforce [...]

By | April 14th, 2011|Email, Mobile, Security|

FaceTime on the iPad 2 is Pretty Compelling

I received my iPad 2 today and yes, yes, as any of the thousands of online reviews will tell you, it is thinner and lighter. The cameras are crap, the smart cover is cool and [...]

By | March 28th, 2011|Apple, Mobile|

Hardware based full drive encryption

I have been researching hardware-based SSD Full Drive Encryption (FDE) lately and here are some bullet points to consider: What is it? FDE is a way to protect data on laptops in case of loss [...]

By | March 19th, 2011|Security|

Mac OS Not All It’s Cracked Up To Be

Given my recent concerns about security, I have pushed myself and my associates to switch to the Mac OS for our desktop systems (hey, Google did it!). Aside from the standard problems all Windows users [...]

By | March 9th, 2011|Uncategorized|

Used Office Furniture in Berkeley

Gret was finally complaining about her horrid office chair, so we went looking for a local place with used office furniture.  We wanted a greener option than buying new furniture.  Also, we wanted to avoid [...]

By | February 21st, 2011|Uncategorized|