After my last Blog entry, Brian P. labeled me as an “Early Adopter.” I see myself as more of a “Futurist.”
Early Adopter, Futurist. Tomato, tomahto. Let’s call the whole blog off!
What’s the difference, and why should you care? The key difference is that I don’t care about the technology; I care about the Big Picture.
Let’s look at the multi-touch Smartphone. Specifically, let’s talk about Apple.
Let me start off by stating that I’m not a marketing person. I have no desire to be a marketing person and in fact, I personally can’t stand sales and marketing in general! Now all that said, I’m a complete social media junkie. I’ve got accounts with Facebook, Twitter, LinkedIn and Foursquare and I’m sure when the next cool thing comes out, I’ll probably jump on that bandwagon too! What I’ve learned about these sites is that while most of them are for personal use, business owners can and should take advantage of the tremendous reach of these sites.
Let’s take a brief look at each of these tools and how some businesses are taking advantage of them.
If you are running a Microsoft Exchange environment and have been for a while, you have probably at some point had to run an offline defrag of the Exchange database. This operation is particularly critical with database growth, or with frequent deletion and creation of mailboxes. It is also prescribed by Microsoft to fix certain issues that an Exchange database can experience. However, almost all Exchange databases require this maintenance at some point in their life cycle.
What is an Offline Defrag?
Essentially, an offline defrag creates a new database and copies all records and tables from the old database into the new file. It then deletes the original database file, renames the new database and then copies it into the original database’s location. One of the main reasons for doing this is
Beginning on Tuesday, July 13th, 2010, Thrive Networks became aware of an email attack on Salesforce.com users. Those affected first received an email with the subject of “Salesforce: Unauthorized access” and contained a link for the user to reset their password.
These emails are not from Salesforce.com or the Salesforce Systems team. An outside attacker is attempting to compromise the recipients PC by tricking them into clicking a link that will download a malicious file named “salesforce.exe”.
If you have received this email, you are advised to delete the message immediately. If you believe your computer has been compromised, immediately disconnect from your networks and run an anti-virus or anti-spyware application. In addition, have your administrator change the password for your local machine as well as to your Salesforce.com User Account.
Steps to Protect Yourself
There are several things you can do to protect yourself against Salesforce Phishing and Malware attacks in the future:
- Use caution when clicking on links in emails that link to Salesforce.com. Just because the message may say “Click here to Login to Salesforce.com” doesn’t actually mean the link points to www.salesforce.com/login.jsp
- You should always login to SF in one of the following ways
Looking for more information on “How to Protect Yourself from Spyware”? Michael Gray, Thrive’s Director of Network Operations, has some helpful advice. Click here to read more.
In the news recently there has been talk of the new price war between Amazon’s “Kindle” and the Barnes & Noble “Nook”. It’s always interesting how fast pricing on technology products drop based on competition and/or innovation. I suspect the pricing on the “Kindle” and the “Nook” will drop even further by the holiday season because ultimately these products are just vehicles for Amazon and Barnes & Noble to sell more of their core product…..books.
This is just one of the differences between products and services.
I love gear, Top Quality Gear. It don’t care what it is, as long as it solid. A 1970 Oldsmobile 442 W-30, an 18-volt cordless Impact Driver, The White Album, the iPad, Japanese cutlery, Band of Brothers Blu-ray edition and LOST. I don’t just like quality, I’m addicted to it. If it’s not quality, I don’t want it.
This brings me to today’s point: Solid State Drives, or SSD. What is SSD? Is SSD ready? How good is it? Is it worth the money? All very important questions, so let’s see if we can answer them.
Staples Network Services’ Senior Network Engineer, Eric Thompson, was selected as a featured contributor for PC World magazine’s ‘Tech Audit’ series. The ‘Tech Audit’ series provides hands-on technology expertise from some of America’s top IT professionals. Each week, PC World showcases serious tech makeovers performed by independent IT companies for actual businesses.
In the June 2010 edition, Eric Thompson outlines how he