Blog returning soon

•02/05/2010 • Leave a Comment

This blog will be returning to full operation later this year, with new ideas and concepts, as well as more technology news.


Child Deaths due to Falling televisions…?

•12/17/2009 • Leave a Comment

A recent article, which I decided garnered mention here, even though it is not directly related to Information Technology per se, talks about the subject of children being injured or killed after heavy furniture, in this case, older television sets, fell on top of them.

The full article can be found by clicking: InsideTech Article Link but an astonishing number of child injuries and deaths occurred from 1990 – 2007, where the death / injury rate, starting in 1990 at about 19 per 100,000, increased each year to about 23 per 100,000 in 2007, peaking at about 26 per 100,000 in 2004.

Something to think about for those that have kids in homes with older CRT sets.

Cloud Computing

•11/21/2009 • Leave a Comment

I recently participated in a web – based seminar on what’s commonly referred to as ‘Cloud Computing’

For those who do not know what ‘Cloud Computing’ is, it refers to a style of computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet – Software as a Service (SaaS) or Platform as a Service (PaaS)

When someone uses the terms ‘Cloud Computing’ or ‘Cloud Networking’, where they say the word ‘Cloud’, it is in inference to computer or networking operations via the internet.

In either case, as a result of my participation in that seminar, I was contacted by Apparent Networks in Wellsley, MA and have been asked to prototype one of their network monitoring apps and document my findings, and will post my findings here as soon as I have completed the work.

Key ITSM Strategies in the Current Economy

•10/21/2009 • Leave a Comment

Every company who has implemented or is considering the implementation of IT Service Management Practices has to stop to consider not only their current technology infrastructure but also now their current QoS levels provided to their customer base – What does that really mean for companies as far as the ‘belt – tightening’ they have to do?

Top of their game…

•10/05/2009 • Leave a Comment

If anyone has noticed recently, either by looking at the home page or by doing other research, Dell is now at the top of their game in the Computer market, at least for systems that do what the buyers want them to do…not only because of all their systems that have won awards, including some from their AlienWare brand, but also they are now getting into the security end of Information Technology, introducing their own forensic data recovery apps for use by law enforcement agencies…

But has anyone noticed that Dell has only been in business for 25 years, and Michael Dell started his company in a garage? So what does it take to be the best in such a short time? Hard work is obviously one thing, but I’d like input from those of you who would like to chime in on your ideas…

My apologies for not being able to post…

•10/05/2009 • Leave a Comment

For those of you who like the postings I have put up here so far, though admittedly few and far between, if you took the time to read or, even better, post a comment here, thank you for your continued support of my blog here…

Hopefully, over time, this blog will continue to grow and flourish, and, gather followers…

Once again, thank you for your support…

Cost Cutting Concept from Juniper Networks

•10/05/2009 • Leave a Comment

I recently attended a Live Webinar hosted by Network World Magazine, in co-operation with Gartner Research, AdmitOne Security and Smith & Nephew and they had some very interesting ideas about the utilization of Authentication Tools, specifically built by Juniper Networks, utilizing SSL technology on VPN networks.

They presented some very straightforward information on exactly how this could be achieved…the problem is finding ways to cut the costs traditionally associated with this type of authentication…anyone who understands this issue also understands that the need for such authentication at the lowest possible cost, both from a dollar standpoint and a standpoint of what could happen if any breach of security occurs.

But what does it really mean for a company’s “wallet” in the end?