tech blog header

Free Whitepaper

Follow Us

Your email:

Blog Topics

Cloud Computing, Exchange 2013

Current Articles | RSS Feed RSS Feed

Office 2013 Comes With IT Security Challenges

 
Microsoft Office 2013

Internal IT security personnel at SMBs may have their work cut out for them when it comes to integrating the newest version of Microsoft Office into existing security procedures.  According to Microsoft, Office 2013 represents a significant departure from the traditional IT risk management paradigm.  According to the company's recently released security overview of the product, Office 2013 presents companies with "a fundamental change from computer-centered identity and authentication to user-centered identity and authentication.  This shift enables content, resources, most recently used lists, settings, links to communities, and personalization to roam seamlessly with users as they move from desktop, to tablet, to smartphone, or to a shared or public computer."

2 Reasons Microsoft Office 2013 May Be a Good IT Solution for SMBs

 
Microsoft Office 2013

Software giant Microsoft regularly launches new IT solutions that assist small and medium businesses to operate more efficiently.  In keeping with that tradition, the Washington-based company has just released a preview of the next generation of their workplace productivity suite: Office 2013.  It will continue to have the ‘ribbon’ interface, which displaced the drop-down menu interface used in all Office releases after Office 2003.  Although business productivity experts and other experts have only recently begun to analyze the benefits that Office 2013 may offer SMBs, some have already singled out two key features as worthy of note.

Microsoft Moves to Cloud Computing Through Latest Office 365

 
Cloud Computing with Microsoft Office 365

Microsoft has introduced the latest versions of Office 365 in their attempt to move people to cloud computing. You might think that a company who has dominated the desktop so completely over the years would be looking to further consolidate that position. Some had even thought that their latest version of the productivity suite would be somehow streamlined and simplified in how it was delivered. This was prompted by the introduction of the Metro interface in Windows 8. Surely, some have said, Office would not be allowed to be presented as a legacy application. Well, the answer is that it seems to be somewhere in the middle, and this raises interesting questions about Microsoft’s strategies for traditional computers and touch-based computing.

Plesk Panel Troubles Demonstrate Importance of Managed Security

 
Plesk Panel IT Security

The most widely used virtualization software in the world is VMware, but other platforms do exist.  One maker of such software, a firm called Parallels, is currently in an unenviable position: looking into claims that its flagship 'Plesk Panel' program lacks sufficient IT security.  Plesk Panel is not itself a virtualization platform, but it rather an administrative tool that helps website managers administer Web hosting servers and perform other tasks related to the management of a website.

PowerPoint-Based IT Security Breaches Suggest Need for DLP Software

 
Data Loss Prevention

Any business that conducts part of its operations online must pay careful attention to IT security issues.  This is especially true for companies that deal with any form of personally identifiable information, which encompasses both medical records and financial details relating to a specific individual.  As New York's Memorial Sloan-Kettering Cancer Center has recently learned, however, that data can appear in surprising places.  When IT security is not robust enough, some of this ‘stealth data’ can end up being inadvertently released to the public.

The Varied Uses of Virtualization: Sandboxes

 
Microsoft Virtualization Sandbox

Even small businesses are now seriously beginning to consider the benefits of virtualization because of its ability to improve productivity even as it reduces costs.  IT solutions that incorporate virtualization can be used in a variety of different ways to achieve these ends.

VMware's vFabric Extends Functionality to Meet Virtualization Needs

 
VMware vFabric Suite

One of the most important players when it comes to virtualization technologies is VMware.  As of lately, the company is attempting something new with an update to its vFabric application.  The idea behind vFabric is to allow virtualization customers to make better use of the VMware cloud stack.  The prior version of the VMware suite lacked some capabilities, which turned out to be core functionality for some customers; among these was a database system.

How Virtualization Can Fit Your Business

 
Cost Effectiveness of Virtualization

Virtualization is a computing term that refers to the creation of a virtual solution to a problem rather than a ‘real’ or physical solution. For all intents and purposes, the virtual idea could have the same look, but not feel, of the physical alternative. A touch screen key pad as compared to a physical QWERTY keyboard is a great example of this.

4 New Features in Microsoft's Virtual Machine Manager 2012

 
Microsoft Virtual Machine Manager 2012

Microsoft has recently released Virtual Machine Manager (VMM) as part of System Center 2012.  This tool, positioned as a single, unified management system for virtualized environments, lacks support for outdated versions of Microsoft's virtualization platform but supports all versions of Hyper-V that coordinate with Windows Server 2008 R2 and Windows Server 2008 with Service Pack 2.  It also functions in cooperation with systems using Hyper-V Server 2008 R2.

IT Services Alert: Avira Anti-Virus Upgrade Termed ‘Catastrophic’

 
Anti-Virus Alert

The German anti-virus firm Avira recently issued a new service pack for its main program.  Unfortunately, the upgrade to the software caused serious complications on a large number of computers running versions of the Windows Microsoft operating system.  The worst cases, some of the computers were rendered almost completely inoperable as they attempted , in seeking to block malicious executable files. Instead, they ended up banning nearly all executable files.  After the upgrade was deployed, some machines were not even able to boot up into a normal operating mode.

All Posts