Blog Feed

Understanding the Meltdown Attack

Posted on January 5

Image

This month, security researchers released a whitepaper describing the Meltdown attack, which allows anyone to read the full physical memory of a system by exploiting a vulnerability in Intel processors. If that sounds bad, that’s because it is. It means that if you’re running workloads on a public cloud provider, and you don’t have a […]


3 Ways to Increase Your IT Earnings in 2018

Posted on December 31

Image

As 2018 draws near, companies go into hiring mode, and people come and go, which often leaves a lot of open positions. If you qualify to fill one of the more in-demand positions, you can often negotiate a higher salary. My biggest salary jumps have always come in the first quarter of the year. To […]


4 Inconvenient but Effective Security Measures

Posted on October 4

Image

Security usually requires sacrificing convenience (or money). So naturally, we tend to get away with as little security as possible. But if you’re a glutton for punishment, here are 4 very inconvenient but highly effective measures you can take right now to protect yourself from theĀ  evils lurking on the interwebs. Disable JavaScript Yeah, I […]


Free Resources

Free Resources

Whitepapers Shorten Your To-Do List in 5 Minutes Citrix PowerShell XenApp Reporting Script – Reports on key health information for online XenApp servers (server name, load evaluator, load, uptime) and user sessions (username, applications, logon time, state, server name, and client version) XenApp Reboot Script for Citrix Provisioning Services – Reboot Script for Citrix Provisioned […]

Newsroom

Newsroom

News outlets and other publicationsĀ I’ve been quoted in