The clock is ticking. Your users have lost their data. There is only one thing on their minds: getting it back ASAP. They’re hovering around your desk, asking if it’s recovered yet. And it’s only been a few minutes. Don’t they understand you’ve got to sort through terabytes worth of files and dozens of backups? And some
During an IT service outage, time is of the essence. Your customers are breathing down your neck. Your boss and coworkers are wondering when service will resume. All eyes are on you for answers. When IT outages happen, you want things to go as smoothly as possible. That’s where a Best Practices guide can really
It’s the age old question—how much rope do you give the new guy (or girl)? If you give them full access to everything, they’ll be able to get the job done, but they may destroy your business. Too little, and their hands will be tied. From small to large businesses, it’s a question many IT
Is there something about a stray cable that makes your eyebrow twitch? Driven mad by your colleagues making a mess with fiber optic lengths, each one a greater trip-hazard than the last? Well, we’ve got the solution for you. Don’t view it as a chaotic mess. Look at it, and imagine it’s art. Sounds crazy?
One of the neat new features of Windows Server 2016 is the ability to hot add and remove memory from your Hyper-V Guests. Officially known as ‘Runtime Memory Resize‘, this trick saves you a lot of time. This feature is different from Dynamic Memory, which we’ve had since Windows Server 2012. The key difference is: Dynamic
So, you’re looking around at backup and recovery software for your Windows server. But you also know it comes with its own free backup software called Windows Server Backup. Naturally, the million dollar (or rather, no dollar) question is “why pay for third-party backup software?” Specifically, why do people buy BackupAssist when they’ve already got
Remember how we predicted in 2017 that with law enforcement unable to do anything about ransomware, vigilantes would rise up to fill the void? Well, it’s already happened. Just two days ago, cyber-vigilantes took down 10,000 underground websites on the Dark Web. Many of these sites were black markets for weapons, drugs, illegal pornography, and downloading
Imagine this—you come into work, and try and pull up some customer details from the day before. But they’re not there. You call the SysAdmin in…. and he gives you the worst news possible. All your customer details are gone. The server hardware crashed, and took the data with it. It’s last gasp may as
Whoops. A SysAdmin at a high profile Silicon Valley company went to tidy up their database—and accidentally deleted the directory instead. The employee in question belonged to $32.9 Million start-up GitLab—a virtual workplace for programmers to merge individual projects, similar to GitHub and Atlassian. The problem started when spammers were hammering the database. This lead to
Scant days before President Trump’s inauguration, the majority of Washington DC’s surveillance cameras were hacked by criminals in a massive cyber attack. The infection downed 123 of its 187 network video recorders, each controlling four cameras each. And the perpetrator’s virus and motivations aren’t hard to guess.