Category: How To

  • How to Prepare Your Staff for Hybrid Cloud

    How to Prepare Your Staff for Hybrid Cloud

    By Des Nnochiri   Budgetary constraints are often a key factor in determining how an organization sets up its IT infrastructure. The hybrid cloud typically leads to cost savings of between 5% and 30% for enterprises that make the transition. Besides the monetary aspects, performance benefits and easier administration also inspire many organizations to consider […]

  • How to Move on from Windows 7

    How to Move on from Windows 7

    Despite the appearance of new and supposedly improved versions of its operating system, Microsoft’s Windows 7 is proving to be a tenacious and popular environment, both for individual and corporate users. 2019 estimates suggest a third of Windows consumers are still clinging to version 7.   Nevertheless, the company has signaled its intentions to withhold […]

  • Computing Memory Usage According to Task Manager

    Computing Memory Usage According to Task Manager

    When you look at Task Manager, it’s hard to compare it to any counter you see in Performance Monitor. The reason is there are many ways to discuss memory usage and it’s cousin free memory. If you think about it, you really don’t want your computer to have free memory laying around. That would represent […]

  • How to Choose a Linux Distro for Your Server

    How to Choose a Linux Distro for Your Server

    By Des Nnochiri   Whether it’s for network and system administration, database management, web services, or other business functions, chances are you’ll need robust servers as part of your IT infrastructure armory. Traditionally, a server running a Linux operating system has been the preferred option for enterprise use. But which Linux distribution (or distro) is […]

  • Ping and the Windows DNS Cache

    Ping and the Windows DNS Cache

    We’ve been chasing an issue lately and learned a few things, so we thought we’d document them for posterity.   When you use the Windows ping command line utility, you give it an IP address or host name, it resolves the host name if needed, pings the address, and gives you the results. Simple, right? […]

  • Windows 10 Optimization Tips: Stability & Downsizing

    Windows 10 Optimization Tips: Stability & Downsizing

    By Des Nnochiri   In the first installment of this two-part guide, we considered various ways of improving the performance of Windows 10. To conclude, we’ll be looking at methods for downsizing your Windows 10 installation to promote stability and increase your levels of security and privacy.   Disabling Notifications   The Windows 10 Action […]

  • Using OneDrive in Windows 10

    Using OneDrive in Windows 10

    By Des Nnochiri   For Windows 10 users, Microsoft’s OneDrive cloud storage can add critical backup, sync, and file-sharing capabilities to personal desktops or business networks. In this guide, we offer some recommendations on getting the most out of the service.   OneDrive Basics   A built-in component of Windows 10, OneDrive can back up […]

  • How to Strengthen Security on Windows 10 Networks

    How to Strengthen Security on Windows 10 Networks

    By Des Nnochiri   The Windows 10 operating system has had a reputation for poor design and lax practices on information privacy and security for some time. It’s debatable exactly how bad the OS actually is or isn’t in this regard. In this article, we’ll be exploring some methodologies and best practices for hardening the […]

  • Almost Free Remote Support / Remote Access Tool

    Almost Free Remote Support / Remote Access Tool

    Executive Summary: Practically unlimited remote desktop support / remote access for a one time cost of $125!   Just install the remote agent and you can access devices at the remote agent’s site.  It just works!   Really?  Sounds like a scam?  No, we’ve had this underappreciated feature for years.  Time to get the word out […]

  • Best Practices for Configuring Linux Containers

    Best Practices for Configuring Linux Containers

    By Des Nnochiri   Within a Linux network or development system, launching a limited set of applications or services (often known as microservices) in a self-sustaining container or sandboxed environment is sometimes necessary. A container enables administrators to decouple a specific set of software applications from the operating system and have them run within a […]