Author: John Waldron

  • Top 5 Funniest Help-Desk & SysAdmin Stories

    Top 5 Funniest Help-Desk & SysAdmin Stories

    “Have you tried turning it off and on again?” Anybody who has ever worked in an IT support role will have uttered these immortal words at least once. Actually, let’s face it, they will have uttered them hundreds of times. So, well known is this response that it was a catchphrase in the brilliant UK […]

  • Top 10 Computer Geek T-Shirts

    Top 10 Computer Geek T-Shirts

    Ok, we’re not holding back on this one. This blog post will not help you understand what the top priorities for IT in 2015 are. It will not be considering the future of data centers, how to use Amazon Web Services, or the cost of downtime. We will not be celebrating the world’s top women […]

  • Top 5 Best TV Shows for Geeks

    Top 5 Best TV Shows for Geeks

    See that screen over there? No, not that one that you spend all day every day staring into; writing blogs, surfing the web or playing games on; the other one. You may be thinking, “Why would I be interested in that old passive box? What could it possibly offer me, when I could be spending […]

  • SSL And Beyond, Part 3: Securing the Future

    SSL And Beyond, Part 3: Securing the Future

    In our previous installment, we considered how the various kinds of SSL certificate are deemed compatible with a range of web browsers, applications, and operating environments. To conclude this series, we’ll look at how SSL and TLS may be deployed in the future, and the spread of SSL/TLS-based encryption into the mainstream. Why Should SSL […]

  • SSL And Beyond, Part 2: Compatibility & Deployment Across the Board

    SSL And Beyond, Part 2: Compatibility & Deployment Across the Board

    In our first installment we discussed the origins and development of the Secure Sockets Layer (SSL) protocol and considered its role in providing secure internet connections through encryption and the use of digital certificates. In this article, we’ll go further into the use case to discuss how applications are deemed compatible with SSL, and how […]

  • SSL and Beyond, Part 1: History, and Development

    SSL and Beyond, Part 1: History, and Development

    Online communications and e-commerce are fast replacing more traditional methods. So there’s a real need for data to be moved around through secure channels. That’s where protocols like the Secure Sockets Layer or SSL have a part to play. This series will consider the evolution of SSL, its current deployment, and options for the future. […]

  • 3 Things We Won’t Have to Do in the Future

    3 Things We Won’t Have to Do in the Future

    Once upon a time, portable calculators were thought to be futuristic contraptions that would never, ever find their way into the mainstream. But by the end of the 70s, every kid in school had one – and every kid in school has had one ever since. Yes, now there is absolutely no need to do […]

  • Your Google Plus Presence: Part 2 – Increasing Your Audience.

    Your Google Plus Presence: Part 2 – Increasing Your Audience.

    In part one we discussed page optimization and the ins and outs of Google Plus posting; how often you should post and how to construct posts that are engaging. In part two we will look at the various methods you can employ to ensure that your audience rises rapidly with quality contacts who will engage […]

  • How to Increase your Google+ Presence : Part 1 – Posting

    How to Increase your Google+ Presence : Part 1 – Posting

    Our blog post this week is a guest post from John Waldron at markITwrite. This will be a 2 part series giving tips and tricks to making the most of your Google+ account. Since a large part of the G+ community is comprised of techie type folks, we thought this might come in handy for […]

  • Top Priorities for IT in 2015

    Top Priorities for IT in 2015

    As organizations continue the trend of transforming physical processes and business models into digital ones, it’s worth having a look at those issues that will vex or focus the minds of IT divisions and Chief Information Officers (CIOs) in the coming year. Broad Strategic Moves Every year in the US, the National Association of State […]