What do you need to know about Windows Server 2012 which is on its way? The anticipated release is between Q3 2012 and early 2013. Microsoft has shared many of…
Configuration Manager – Unknown Host One of the things I like about System Center Configuration Manager’s OS Deployment is that once a Task Sequence is working as expected, it continues…
The Importance of Selling IT to YOUR Company As IT individuals, we all understand the importance of having the right IT tools in place to help our organizations. “Streamlining Business…
Research in Motion Research in Motion (RIM), the maker of Blackberry devices, once dominated the corporate smartphone market. They were able to offer convenience to users in the form of…
Top Five Benefits of Managed IT Services Computer systems form an integral part of most businesses these days which is why managed IT services are becoming an increasingly popular solution…
How I use Microsoft Lync I have been using Microsoft Lync and its predecessors OCS and OCS R2 for several years now. Initially a collegue of mine stepped into my…
Selling Office 365 Working for an IT consulting firm who specializes in the Microsoft space, we tend to sell many of the MSFT apps and technologies….primarily in the SMB market….
Just Because it’s Not Broken Doesn’t Mean it Can’t be ‘Fixed’ I love it when a client uses the old adage ‘it’s not broken …” to which I finish the…
Outlook Anywhere & Continuous Login Prompts So, you’ve deployed Exchange 2010, secured it with Microsoft Forefront Threat Management Gateway (TMG) and want to take advantage of Outlook Anywhere. After enabling…
Protecting Layer 2 Using Cisco Best Practices The Data Link layer (Layer 2 of the OSI model) is used to transfer data between network entities with interoperability and interconnectivity to…