Last week in the Interlude of our graphic novel, we met Matt. Poor Matt. He made the unfortunate mistake of not having Tachyon installed. This week, meet James Davies. James is quite the character dressed in quite the get-up. What’s Mr. Holmes…er…I mean, Mr. Davies up to?
Whenever you throw a party and invite tons of people, you never know who exactly will show up— or what will happen for that matter. As was the case this Monday when we threw our first ever 1E Twitter Party. If you didn’t have a chance to join in, you can go to Twitter and use
The MVP community is vast and varied. With so many experts, it’s nearly impossible for you to not bump into one from time to time. But these experts are also super busy— from conferences and speaking engagements to authoring books and traveling the world, getting a piece of their time might not always be easy.
Last week in chapter five of our graphic novel, we watched as Jason and his team created a Product Pack in two minutes. A customer was helped and the Product Pack was added to the Tachyon Exchange for other people to use. But something felt uneasy…
The question of how to manage systems in a multi-forest Active Directory (AD) infrastructure using System Center Configuration Manager (ConfigMgr) comes up quite often in online forums and at customers; this post will summarize and detail the answers I’ve given (over and over again). The Really Short Answer It doesn’t matter, and ConfigMgr doesn’t care.
Oops, your files have been encrypted. The red screen signaling a cyber attack that emerged on over 400,000 devices all over the world aptly named WannaCry changed the face of IT security forever. We polled 400 IT professionals asking them about their experiences post-WannaCry to get a sense for how these teams responded to the
We’ve seen many recent news stories about data theft, destruction, and security breaches in some of the world’s most high profile private companies and public sector bodies. Almost certainly all of these organizations have invested significantly in Security Tools to stop unauthorized ingress into their networks and information systems. So why has this investment been
Last week in chapter three of our graphic novel, Sumir unleashed Tachyon into the world. All was well! Until… Something terrible has happened. There’s been an outbreak of malware. But Sumir knows exactly what to do…
Patch management – Fixing the holes where the rain gets in Would you choose to live in a house with a leaky roof and not bother to fix the holes? (There’s a Beatles tune stuck in my head now) Of course, you wouldn’t. So why don’t you keep all your computers up to date with