• Unveiling the Power of Open Source Software

    Unveiling the Power of Open Source Software

    Freedom, Flexibility, and Innovation In today’s software landscape, encountering robust applications without a hefty price tag can raise eyebrows. However, open source software (OSS) presents a compelling alternative, offering not just cost savings but also a unique set of advantages. Open source software flips the traditional model on its head. Instead of hiding source code,…

  • Web Development Unveiled

    Web Development Unveiled

    The internal workings of web development are like a fascinating, complex engine with many interconnected parts. Let’s dive into the gears and pistons of this digital machine: Front-End: This is the flashy storefront, the part users interact with directly. It’s built using: Back-End: Sometimes referred to as the content repository or administration panel, is the…

  • Who Owns Your Domain Name?

    Who Owns Your Domain Name?

    Your domain name is your web address, or the part after the @ in your email address. Our domain is gartnertechnology.com. Who owns your domain name anyway? Sounds like a pretty simple question, doesn’t it? Technically, the question is “Who holds the rights to your domain name?” According to Google: A registrant is the registered…

  • Microsoft 365 Support

    Microsoft 365 Support

    This is a message that I received from a support tech at Microsoft after getting a complex issue quickly solved. These folks are very responsive. When initiated through the 365 admin portal, the support response is rarely more than 20 minutes, either by phone call, or email. My choice. Thank you for all your time…

  • Delete your digital footprint

    Delete your digital footprint

    Redact is a great app to clean up your digital detritus. It’s free for personal use and supports 40, or so platforms including facebook, twitter, discord, twitch, etc. Check the full list here.

  • A Simple way to Find Your Windows Server 2019 Product Key

    A Simple way to Find Your Windows Server 2019 Product Key

    Server product keys, like most other OS product keys can typically be found on a label affixed to the chassis of the device in question. Occasionally, we may need access to these product keys when physical access to the device is not practical. For example, I recently needed the product key for a server that…

  • Outlook 365 Shared Contacts in Address Book – Solved

    Outlook 365 Shared Contacts in Address Book – Solved

    One of our clients wants a company wide contact list through Microsoft 365. It makes sense that this shared contact list would show up in the Outlook Address Book, but apparently, this is not how Outlook works. First, I followed this guide:  https://docs.microsoft.com/en-us/outlook/troubleshoot/calendaring/how-to-share-calendar-and-contacts… and the group and calendar show up in Outlook right away, as expected, but…

  • Unifi USG DHCP Timeout/Failure – Solved

    Unifi USG DHCP Timeout/Failure – Solved

    I’ve recently had an issue with one of the UniFi installations that I manage. The internet speed was upgraded so I made some optimizations to the network to better utilize the potential increase in bandwidth. Prior to completing my tweaks, all wireless clients suddenly could no longer get an IP address from the USG DHCP…

  • Microsoft Surface Pro 3 Dead Zone Fixed!

    Microsoft Surface Pro 3 Dead Zone Fixed!

    We bought a Surface Pro 3 a few years back when it was new. After about 13 months – right after the warranty expired – a dead zone developed on the touch screen in which touch by hand or pen/stylus would not function. This was the approximately top 1/3 of the screen. After much searching…

  • 6 Things You Can Do Now To Secure Your Online Information

    6 Things You Can Do Now To Secure Your Online Information

    The types of data breaches that happen regularly are not typically affected by how secure our login passwords/procedures are. When point-of-sale systems are breached, my login has no bearing on how companies store and secure personally identifiable information. I believe that the security of financial data has a fundamental infrastructure problem that needs to be…

Got any book recommendations?