Top 10 Chief Data Officers to Follow on Twitter

Will 2015 be the year of the Chief Data Officer (CDO)? It’s a question that’s coming up more and more often. Whether the CIOs are becoming overwhelmed with IT demands, or organizations are recognizing the value in their data, CDOs have a key role to play in data governance initiatives. A CDO’s mission is “to bring order…

FREE-ways-to-learn-IT-Security

Free Ways to Learn about IT Security

Technology startups have built a name for themselves, and the Labor Department slots tech jobs among the fastest growing this decade.1 New graduates, tech enthusiasts, and many others are working toward a position with an information technology company as a software developer, system administrator, or IT Manager. One aspect of IT not to be overlooked…

health-insurance-and-wearable

What if Fitness Wearables Affected Our Health Insurance Rates?

Fitness wearables have been very popular, but sadly not very sticky. After 3-4 months, consumers tend to put them in a drawer and never wear them again. Many companies in this space think the solution might be to increase the value of the data that these fitness wearables collect. For instance, companies like FitBit started…

Someone deleted my file. How can I find out who?

If you’ve ever been tasked with recovering a lost file or folder and had to explain exactly what happened (Who moved or deleted it? When did it happen? Why?), you know how annoyingly time-consuming it can be. And sometimes you simply don’t have any good answers. All you can do is restore from backup. How…

Going Back To SQL Server 2008 In Order To Move Ahead

Last year, Microsoft ended its support for SQL 2008/R2. Customers with an enterprise agreement are still supported, but it’s a good idea to start planning your upgrade. Upgrading your production SQL Servers without a detailed plan of attack can be risky and result in a messy, time-consuming weekend (or two). The very first step is…

The Journey to File Permission Perfection  

More devices than ever. More platforms to choose from. An expanding universe of data choices that can be both exciting and confusing at the same time. Tablets, phablets, laptops, iOS, Android, Windows, UNIX/Linux file servers, and NAS devices. Add SharePoint, Dropbox, Google Drive, and LinkedIn to the mix. These are all awesome platforms for allowing…

Ticket_booth_at_Jenkinson's_Boardwalk_Amusement_Park

Microsoft Fixes Kerberos Silver Ticket Vulnerability

The Kerberos Golden Ticket already had a mythic status in the hacking world even before this summer’s Black Hat conference rolled around. In theory, a hacker could create a universal authentication ticket and lurk forever in an organization’s IT system.  The how-to-accomplish part, though, was always a little murky. At the conference a lot of…

tidy room

Feng Shui Fabulous

Happy New Year! One way to celebrate 2015 with fresh, new energy is to implement Feng Shui. Feng Shui is a popular practice in many Asian households to balance the energies of a space: promoting health, wealth and good luck. An important element of Feng Shui is to get rid of clutter. Clutter creates confusion,…

What Is Group Policy?

One of the most indispensable features of Active Directory is Group Policy. Group Policy is a feature that allows you to centralize user and computer settings throughout a network. For example, if you have 1,000 PCs and you don’t want to spend an eternity manually configuring the shutdown/logoff/restart options in the “Start” menu, you can…

Alex Is Smarter Than a Hacker [Contest]

We had a strong feeling that our Metadata Era readers were up to our hashing challenge. And they certainly came through. After reviewing many solutions, our judges have chosen Alex Bessonov of New Jersey as the contest winter. And his victory came just in the nick of time: his son’s Nexus 7 had recently stopped…