Comments Off on The Value of Data

The Value of Data

For many years I worked in large corporations that had large application databases. These databases held logs of tracking data, product data, etc. I have yet to see a company use this type of data to its full potential. Most day to day business applications contain data that can tell you how much products cost … Continued

Comments Off on Email Filtering and Management

Email Filtering and Management

Managing email has grown into a daily challenge for most professionals. While a “fun new” technology in the past, it has evolved into a necessary form of communication for most people in the business world. Similar to postal mail, email has a plague of unwanted messages targeting users on a regular basis.  Postini (listed below) … Continued

Comments Off on What’s Wrong with Microsoft/Yahoo -vs- Google?

What’s Wrong with Microsoft/Yahoo -vs- Google?

Very few new innovations! OK, so we’ve all heard the recent news. Microsoft wants Yahoo, Yahoo wants more money, Microsoft doesn’t want Yahoo, Microsoft’s going to take Yahoo, yadda yadda yadda. So, what’s all the hub bub, and why do we care? Honestly, I don’t. These companies are all about being the best, being the … Continued

Comments Off on Internet Based Backups – Finally Competitive Pricing

Internet Based Backups – Finally Competitive Pricing

Back in 1996 at the Internet Company I worked at, we had a customer that was developing backup software that would transfer your encrypted backups to a server on the Internet. Slow, expensive, and not user friendly. In 2008 however, our options are far better! There are many companies offering this for personal and business … Continued

Comments Off on Getting rid of old computers

Getting rid of old computers

An article posted describes yet another example of how important it is to pay attention to the disposing of old computers and computer peripherals.… A phrase has even been coined to describe new methods for obtaining information that can be used for identity theft and other criminal activities: “Dumpster Diving” Everything we use for … Continued

Comments Off on Mac and AD integration saga

Mac and AD integration saga

Well, I got real familiar with the mac today (Mac OS 10.4.11).  I set out to follow the instructions laid out by Eriq Neal and posted at under the heading “Connecting a Macintosh to an SBS 2003 Server via SMB (2007)”.  And I ran into some very unexpected behavior.  On Phase II, step 21, the documentation … Continued

Comments Off on Content Management Systems

Content Management Systems

Traditionally all websites are maintained and managed by web design professionals.  The path is the business person identifies a need, notifies the web developer, the web developer makes the change, verifies the change with the business person, once approved the web developer published the change to the Internet.  The whole process can even involve more … Continued

Comments Off on End User’s iPhone Experience

End User’s iPhone Experience

On November 14th, 2007 I ordered a new iPhone.  Within 24 hours I began checking online to see the shipment status.  Each day my hopes of a speedy delivery were smoldered.  On November 21st, I looked another time online to see that my iPhone was finally in transit but it was coming all the way … Continued

Comments Off on Microsoft Outlook – The Best Thing Since Sliced Bread – or – An Evil Plot to Addict Us!

Microsoft Outlook – The Best Thing Since Sliced Bread – or – An Evil Plot to Addict Us!

Outlook is by far the most common PIM (Personal Information Manager) program on the market today.  We use it to email, store our contacts, calendar, notes, tasks, and much more.  I first used a version of Outlook in 1996, and have grown to love, and hate it. Why would this be?  Microsoft has our best interests in … Continued

Comments Off on It’s A Virtualization World

It’s A Virtualization World

There’s been a lot of hype in IT and business circles, and deservedly so, around ‘virtualization’. Virtualization uses software to mask the underlying server-based hardware resources and results in a many-fold increase in utilization of server hardware. Instead of running a single workload per physical machine, multiple workloads are able to function together across one … Continued