IT Administration

6K

Solutions

8K

Contributors

IT Administration is the processes and best practices for programming and development, and incorporates methodologies for managing activities and projects. Common methodologies include waterfall, prototyping, iterative and incremental development, spiral development, rapid application development, extreme programming and various types of agile methodology. The life-cycle "model" is a more general term for a category of methodologies, and a software development "process" a more specific term to refer to a specific process chosen by a specific organization.

Share tech news, updates, or what's on your mind.

Sign up to Post

One of my clients brought up a question regarding becoming properly NIST 800-171 certified.

He had heard that in order to use cloud services one of the points of concern was ensuring that they were all hosted in datacenters in the US and not abroad. Apparently Office 365 Business has some parameters that allow you to ensure this is the case.

1) Anyone remember or know of this requirement?
2) And is there a way to specify in Office 365 to ensure its US based?

Thanks.
0
Fundamentals of JavaScript
LVL 12
Fundamentals of JavaScript

Learn the fundamentals of the popular programming language JavaScript so that you can explore the realm of web development.

Dear Experts

We are solution implementer like crm application and even server hosting for those companies who require us to host and maintain servers. Recently few of clients are mentioning about soc2 compliance. Can you please help me understand with respect to solution implementation point of view what does soc2 compliance means and how does it help our business, thanks in advance.
0
Does anyone has any data for acceptable acoustic decibel inside the server room, and in the regular office?
0
I would like to resurrect an old question since it is about four years old. I am looking for a good network system inventory tool that doesn't break the bank. I really like the PDQ inventory tool however the $500 /year price mark makes it difficult for a small 20 user firm like us. I could probably swallow half that.
I have looked into the original post at: https://www.experts-exchange.com/questions/28570579/Best-and-Free-tool-for-Network-PC's-hardware-software-inventory.html
and the Spiceworks doesn't seem to work for us for some reason.
Are there any other suggestions that are newer products?
0
Can someone recommend noise cancelling headphones for the server room?  Should be compatible with Android USB-C.  
I used aviation-grade noise cancelling headphones long time ago.  Forgot the model.  And that was a landline in my cage.  
Thanks.
0
Hi guys, non-technical question here.
 Does anyone have any format or an example for the new hire justification.  Instead of asking management "hey can I hire someone to help me, I am working 12 hrs per day"
Maybe someone has previous example or a set format showing the following things or similar:

1) Justify why you need help.
2) Explain your current situation, hours and work load
3) Tell how a new hire/resource will benefit the company, for example, improved revenue by 5%, completion of projects 25% faster, improved customer satisfaction rating, etc.
4) Justify the cost and how the proceeds will offset that person.
5) Show the long term strategy of this person and how this person fits into the organization
6) Show your new role on you being the manager and how this will free up your time for more strategic goals
7) Finally, show how this new hire aligns with company strategy and direction and how your department will be able to meet or exceed those goals.

Appreciate any help/advice.
0
Hi Experts,
the print screen key stopped working on my pc.
any suggestion?
preferably something that does not require restarting my pc...
thanks in advance.
fyi- I'm connected remotely thru gotomypc, however pass special keys to host is checked off.
0
In ubuntu 16:
it's added a wrong file in /etc/sudores.d/ folder.
I can't do sudo form any user. I can't do any thing.
How can I remove this file from folder sudores.d.
can I remove file if I login in as recover mode?

HELP
0
Can you see if reasonable to have 2-post rack this way?  Attached.  Any other pros/cons please?  Designing server room/lab.

 rm33
0
Hi Experts,

I have been approached by a group of 8 companies to provide for them an information exchange portal. Here they would store files, documents and posts, organized by category and sub category, and a bulletin board with latest news and events posted by the users.

The companies indicated that SharePoint wont’t work because the each have their own domain, and they need this solution to be independent from any of them. They also want to restrict each company to 3 users, and if another company wants to join, the admin of 3 other companies need to approve.

My question is - would this be a development project (I'm a PHP developer); or a sourcing project, where there is something pre-made that can be adjusted? What would a  bull park cost be for this?

Thank you.
0
Webinar: Miercom Evaluates Wi-Fi Security
Webinar: Miercom Evaluates Wi-Fi Security

It's not just about Wi-Fi connectivity anymore. A wireless security breach can cost your business large amounts of time, trouble, and expense. Plus, hear first-hand from Miercom how WatchGuard's Wi-Fi security stacks up against the competition in our upcoming webinar!

Hi All

I would like to install 2 following apps , the following products will become SCCM applications.

Microsoft Visio 2016 (VLK/enterprise licence /perpetual)
Microsoft Project 2016 (VLK/enterprise licence /perpetual)

these packages must be compatible with the click to run deployment of office 365.

Please advise me how to accomplish this

Thanks in advance
0
I have a user who is running WIN 7 IE 11.  From time-to-time when they browse to a website that requires them to supply their domain credentials the dialogue box that generates contains credentials from a previous user and they must always select "Use another account".  I've reviewed Windows Credentials Manager but that doesn't contain the account to remove.  What we've noticed is that there's no Windows profile for the previous user.  Its as if they remotely accessed the PC (possibly someone from the local Helpdesk), supplied their credentials, and now IE has them cached somewhere - I'm just not sure where.

My next step was to review the registry and see what pops up.

Any thoughts?
0
Using netstat I can use commands like this to find out how many ports are in use
netstat -a -n | find /c "4455"


What i need is a cmd to list all in use ports, and their count
i.e.
port 4455: 1800 connections
port 4456: 100 connections
etc

either a cmd or a windows app is fine

What are my options?
0
I do not have access to the SCCM server ... only the Windows 7 clients. How to fix software center "Waiting to install"? This is a common problem on many clients, but not all.
I have tried:
foreach($i in gwmi -Namespace root/ccm/policy/machine/actualconfig -Class ccm_softwaredistribution -Filter "ADV_AdvertisementID='CS123456'"){$i.delete()}

Open in new window

This only seems to address the applications that were waiting, not the updates.
0
Please provide me with guides on using System Center Configuration Manager 2016 (SCCM)  to deploy software such as Chrome, Acrobat Reader, & 7-Zip to clients.
0
trying to reach to the companyname.com, using ping companyname.com

This domain is hosted by goddady.com

it was hosted my email myname@companyname.com
now I can send but cannot receive any more.  bouncing back..
Cannot resolve using nslookup either.
email hosted outlook.office365.com

The error is "Domain unavailable"
The domain is not expired (it expires in 2019)
however non-pingable and cannot resolve..
What could be an issue?  Please help troubleshoot..
0
Linux admin supporting Macs.  I have a good Linux helpdesk candidate that will be require to support Macs in the future as well.  Would that be a huge knowledge curve for a good Linux admin to support Macs?  He claims almost 0% mac knowledge.
I know Linux guys very intuitive supporting Networking stuff (Cisco, etc.)  Not sure about Mac OS tho.
0
When taking on a new account, how do you transfer 365 from one MSP to another or do i need to migrate the accounts? Customer does not control the 365 account.
0
Dear Experts

installing SAP ERP on-premise or on cloud recommended, if we go for on-premise what would be best way for business continuity  and recovery, is it recommended interbranch for DR and recovery or cloud please suggest the best recommended.
0
Challenges in Government Cyber Security
Challenges in Government Cyber Security

Has cyber security been a challenge in your government organization? Are you looking to improve your government's network security? Learn more about how to improve your government organization's security by viewing our on-demand webinar!

Hi,

Anyone can advice still can't retrieve user software & inventory report even though the agent is pushed down with status of client is installed and activity client is active.

See attached screenshot.
noreport.jpg
0
Besides the obvious of value of keeping staff up to date and happy, the added value is one that is not as obvious.
2
Hello I have configured my PDC server as an NTP server to sync its time to NTP.org  zone servers and apply throw GPO but my clients in domain didn't sync their time with PDC when I run w32 time query status in client Pc it gives me error although I have give access of NTP.org  URL access to my PDC throw Sophps XG firewall please help
0
Anyone has any experience with these flat CAT6 cables?  Are they god enough for users' desks?  
https://www.amazon.com/Cat-Ethernet-Cable-Black-Pack/dp/B01IQWGKXE/ref=sr_1_5?ie=UTF8&qid=1529696113&sr=8-5&keywords=ethernet+cable+5ft+flat
0
Looking for a small business IT consultant to fill in for me when I am away on vacation or attending seminars.  I have a small client base of 6 small businesses that may need attention while I am out of town.  I currently use Projent remote support for this need.  However, should there be a need for an onsite visit they do not have local availability since they are based in California and all my clients are located in Hampton Roads, Virginia.

Even though Projent support is great, the fact they cannot offer onsite support if needed to could a major issue.

I also tried working with another local IT consultant that is also a one man shop, and we scheduled all the days I would be gone so he could cover for me during my absence.  I then contacted him to remind him to cover for me since I was going to be out of the country, and he stated he could not help even though we discussed it prior and agreed on everything.  I even was going to cover for him as well.

Let's just say this experience was horrible.  I am trying to avoid that this year.

I also contacted other IT support companies within the area, they either would not be able to assist but were willing to take the client.  Another thing that concerns me is if the person or company decides to try and solicit  their services over mine therefore taking my client.  I do have a non compete clause that should minimize this sort of situation, but its not fool proof.  Any suggestions...
0
Hi Anyone,

My boss want me to define all the users (about 20,000 domain member) which member of group (about few 1000 groups) we've in our enterprise domain to come with a accurate user domain permission matrix.

What should I do as I'm very new to the enterprise domain network and not very good in writing script like using powershell or never work in the enterprise network before.

What is the best suggestion for me in order to complete within 1 days as my boss requirement.

Anyone can help.

Tks.

Lucky
Access-Matrix-v2.xlsx
0

IT Administration

6K

Solutions

8K

Contributors

IT Administration is the processes and best practices for programming and development, and incorporates methodologies for managing activities and projects. Common methodologies include waterfall, prototyping, iterative and incremental development, spiral development, rapid application development, extreme programming and various types of agile methodology. The life-cycle "model" is a more general term for a category of methodologies, and a software development "process" a more specific term to refer to a specific process chosen by a specific organization.