Category: Computer & Networking Services
Endpoint Security
An endpoint is a type of communication device that connects to the network. Back then there are desktops, laptops, and handheld devices such as iPad, or cellphone. These devices can be simply protected by installing anti-virus software that scans for the signature-base of the virus and destroys it. Now, as the technology world evolves, endpoints include the…
NETWORK SECURITY
Understanding the vulnerability of being attack online by cyber threats is very important nowadays. As the world runs through networking, sadly say, there are trained IT people that work to disrupt, damage, and destroy data just to gain information and money they can use for themselves. As simple as clicking an email can allow them to get into…
THE INTERNET, TECHNOLOGY, AND BUSINESS CHANGES
The Internet has been very interesting. From the DOT COM to the DOT COM bust, technology have been changing superfast. Then come the search engine and ecommerce. Then VOIP, SD WAN, now cloud-based servers, software, services, and software as a service. We use to judge a company credibility by the nice fancy office that they…
REPLACING AP WITH A ROUTER
A service was called to troubleshoot an AP issue. The AP device is no longer functional. The customer wasn’t interested in purchasing a new one but instead handed us a Linksys Wifi Router to replace the AP. We went ahead and assign the router IP with an unused static IP in their network. We were…
RESET ROUTER TO FACTORY DEFAULT, DON’T BE SO FAST TO DO IT.
We get a few call a month from customer and or potential customer asking us to come help them with their down network. Typically, either their internet is down, their network is down, or both. We have notice from asking customer questions, that the ISP (internet service provider), always ask them to reset the router…
IT JOURNEY
It’s been a journey for me in the IT industry. I’ve got started in the IT industry during the dot com era. It was 1998, 2 years after I’ve graduated high school. I was living in New Orleans at the time. I had little or no computer skills and no college degree. I ran into…
Network Security – when is it sufficient?
I had a customer asked me when is network security sufficient? That’s a tough and broad question, I thought. I really didn’t have a direct easy answer to this. It really depends on what kind of business you are in, what kind of information you are trying to protect. Depending on the business, I’m pretty…
Google fiber jack move
Google has started fiber installation in South Austin. Over the past few months, we been getting quite a bit of calls from google customers requesting that we help them moved the fiber jack. It kind of shock me that google won’t service such requests. I’m guessing they are so busy with build out, it’s hard…
Cameras, access point, cat 5e data cabling….
Last week, we had a call potential customer call that needed help finishing off a cabling job that another vendor started, but did not finish. We then schedule a meeting for a site survey to see what was going on. When we came on site, we had notice that none of the cables were terminated…