Archive
What are the factors that determine which one to choose between Software as a service and on-premises? Am having a serious challenge in choosing between software as a service (SaaS) and on-premises for my IT dept. how best can I integrate my existing software with software as a service? What are the pros and cons of the two?
Read moreHow best can office 365 be secure efficiently and authentication methods are maintained? Now that the workplace is virtually mobile, securing mobile devices across many networks is increasingly difficult to achieve. What are the advance security options to use in office 365? What tricks and tips are available? How best can two factor authentications be set up?
Read moreWhat are the migration models to use in case of Software as a Service platform change? I am planning of changing the Software as a Service platform am currently using due to the fact that the platform is not giving me what I really need. What are the various data migration model that must be in place before attempting this task?
Read moreWhy is my laptop not seeing most devices after I restore the computer to its factory setting? My computer was malfunctioning due to the problem of malware that affect the NIC card. I later restore the computer to its factory setting to clear the malware, but after the restore, the computer stop to see most of my devices. What can I do after downloading many divers for these devices?
Read moreWhy is my computer complaining that I have to defragment my disk after I just defragment the disk? I recently defragment a disk on my computer because of the disk fragmentation, now after the disk was defragmented; the computer started complaining that I need o defragment the disk again. What could be the problem? N:B: the disk is 50% full.
Read moreWhy are some users in their workstations having access to some files and applications that was not in the set up in their user profile? Recent investigation in our IT dept reveal that some users were have access to some files that was not in the privilege giving to them. The current privileges restrict them from some files yet they have access to those files.
Read moreWhy is my TeamViewer remote access control software not working after upgrade? I recently upgrade my TeamViewer remote access software to version 10 from version 9.0.32494, but to my surprise, the remote access software stop from working. I have checked the network and it seem to be okay. How can I fix this problem?
Read moreWhich of these security strategies: Biometric, certificates, non text passwords and signatures would best keep confidential and sensitive information safe? With increasing security breaches, threats and sophistication on the part of the attackers, which among these four (Biometric, certificates, non text passwords and signatures) should be used for organization protection?
Read moreWhat effects will leap server has on Ubuntu server with Network Time Protocol daemon (NTPd)? Now that Linux is planning of adding leap seconds to its server in coming months, what are the implications for Linux server? How best can user prepare for this anticipated addition? How worried should user of NTPd be?
Read moreWhat authentication method can an organization implement to best fit it worker who are highly mobile? Nowadays that Microsoft active directory is sometimes ineffective, can combining cloud identity management with authentication services improve the overall effectiveness of Microsoft active directory? If cloud identity management is combined with authentication services, how simplified can security policy of an organization be?
Read more