Tech Zone

Introduction to permissions, Part 4: Troubleshooting permissions and best practices

In the last part of our Permissions series, we’ll look at troubleshooting permissions and some best practices.

Continue reading

57 technical terms that all true geeks should know

Every culture and trade has its own secret language known only to the initiates, but in today’s post we’re going to look at 57 of the oddest/strangest/most obscure terms we use in what, to us, is everyday language.

Continue reading

Security 101 – physical security

Your staff travelling with company IT resources should be aware of their surroundings and take basic precautions to safeguard the equipment and data in their care. Here are some of these basic physical security best practices.

Continue reading

Two steps forward and one step back: Why do tech companies always break some key functionality in their new and improved devices?

Why do brand new models of tech devices or entirely new versions of software so often seem to take two steps forward and then one step back, removing important features or even adding serious problems that weren’t in the previous versions

Continue reading

You have the right to remain silent online

Some say there’s no longer such a thing as privacy, and to an extent, that’s true. But there are still ways to minimize the chance that the information that’s “out there” will end up hurting you.

Continue reading

What comes next? Technology predictions for 2015

We in the tech industry are especially prone to getting out our crystal balls (the fancy new ones with the high powered embedded processors and the OLED displays) and taking a peek at what magical and revolutionary gadgets and technologies these 12 months might bring.

Continue reading

The exam nearly every employee will fail

We put together 10 easy questions and the answers we suspect most users would give – to the horror of the any sysadmin tasked with correcting the papers.

Continue reading

21 New Year’s resolutions for every sysadmin

As 2014 comes to a close, many people start to think about their resolutions for the New Year. We’ve compiled this list of resolutions every sysadmin should make, and keep.

Continue reading

2014 – The technology year in review

As 2014 draws to a close, we wanted to take a look back at the top 26 news stories, developments, and trends in technology for the year.

Continue reading

The 26 worst security threats of 2014

As 2014 draws to a close, let’s take a look back at the 26 worst security threats of 2014.

Continue reading

Find us on Facebook

Follow us on Twitter