AMD RADEON PRO WX 3100 Integration Notes

We’re in the process of custom building an Intel Xeon Processor E-2278G series workstation. The graphics card that’s being installed is the AMD RADEON PRO WX 3100. The system will be driving three monitors with two across the bottom and one above middle to them. When getting ready to install […]

Microsoft and Partners: Just whose customers are they anyway?

Tweet that started everything: Andrew Solmssen Tweet My snarky comment on the above: [QUOTE] They are not the Partner’s customer they are Microsoft’s customer and they belong all in the cloud. The Ask Me Anything debacle that never got posted was where I heard the first part from the horse’s […]

Veeam: Manage the SQL Instance Memory Limit

One of our standalone Hyper-V hosts was experiencing performance issues with the Remote Desktop Session Host that provides the company’s primary user environment. The main application running on the session host can be a bit finicky so we ran the gamut troubleshooting within the guest OS. The performance drags were […]

IMPORTANT: SonicWALL Vulnerability Patch for Remote Management

We don’t receive a lot of these kinds of messages from SonicWALL so when it came in it was treated with much suspicion. The message can be found here: SonicWALL Security Advisory Announcement Below is a quote with all of the tracking stuff removed from the URLs. July 19, 2019A […]

Office 365 and Azure Security Audit & Setup Checkup

We’re in the process of digging in to the methodology for securing our Office 365 (O365) and Azure resources. One of the things we are doing is building an on-boarding checklist for setting up O365 and Azure tenants as we sign them up. The first place to start is the […]

Security: Client E-mail Warning for Current Malware Campaigns

The first place in any “security strategy” should be to train the human. Most malware infections today are caused by a user clicking through when they should not have. The posters below give a very clear set of workflows for an infection. Excellent posters via MALWARE-TRAFFIC-ANALYSIS.NET Note the STEP IN […]

Awarded Microsoft Most Valued Professional (MVP) for 2019-2020!

With our Canadian day off on July 1st things have been quite brisk getting things done prior to and post holiday. Microsoft Announcement E-mail It is very humbling to receive this award. Thank you to Microsoft for the renewal. The last few years have been challenging (blog post on my […]

I want to get started in IT in a Cloud First World. What do I do?

The following were drawn up during a mentoring session this morning. How do I start? The first thing we need to do is get the business essentials in place. A business identity and a professional presentation are very important. An @Hotmail.Com address, or other such generic e-mail services, is definitely […]

AMD’s Game Changer: EPYC Rome and S2D

A conversation on the S2D Slack channel brought about a realization that we are on the cusp of one of the bigger technology shifts in the CPU industry in a very long time. Since Intel incorporated Core into their Intel Xeon line many, many years ago where we saw a […]