IT Administration

6K

Solutions

40

Articles & Videos

7K

Contributors

IT Administration is the processes and best practices for programming and development, and incorporates methodologies for managing activities and projects. Common methodologies include waterfall, prototyping, iterative and incremental development, spiral development, rapid application development, extreme programming and various types of agile methodology. The life-cycle "model" is a more general term for a category of methodologies, and a software development "process" a more specific term to refer to a specific process chosen by a specific organization.

Refine results

Hi All,

Can anyone here please share some steps and procedures in how to deploy Windows 10 (Win10_1607_EnglishInternational_x64.iso) to my new bunch of HP laptops ?

ISO file name: …

718 views
PRTG Network Monitor: Intuitive Network Monitoring
PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

LAND OF THE WALKING DEAD ZONE

Why pager replacement is still an issue

OnPage has what some might call a “hate/hate” relationship with pagers. Not much room for love. As we see it, pagers are an antiquated bit of technology. …

049 views

Hi,
 I am auditing membership of the administrator groups and notice that is a server (A DC) that is a member of the administrator's group. you know why someone would want to do this? I am thinking …

640 views

Hi

We have a generic web app which is just 1 app in IIS web server, but our different customers use their own domain name

these are 3 examples of what this could look like (these are just made …

132 views

I'm looking to create a base image for a company and then clone it on the other workstation in the company. Never did it, please advise tips tools and best practices Thank you

437 views

Hi all,

In an effort to lock down permissions on a network folder, I chose to deny read access to the Everyone group. Now, no one can access the folder at all. What can I do to undo this change, …

943 views

I want to enable some of my staff to create users in AD as well as recipient mailboxes in exchange. However I don't want them to have the ability to delete the recipient mailbox. How can I protect the…

242 views

Dear Experts

We have around 5000 application forms filled and each application form of 20 pages, now we have implemented CRM software application but each physical application entering in the CRM …

241 views


Note: This is the second blog post in a series on email clearinghouses …

062 views

Learn how ViaSat reduced average response times for IT incidents from 10 minutes to 30 seconds.

082 views
Netscaler Common Configuration How To guides
Netscaler Common Configuration How To guides

If you use NetScaler you will want to see these guides. The NetScaler How To Guides show administrators how to get NetScaler up and configured by providing instructions for common scenarios and some not so common ones.

Scenario: Your operations manager has discovered an anomaly in your security system. The business will start to suffer within 15 minutes if it is a major IT incident. What should she do? We have 6 …

057 views

There's a better way to communicate time sensitive or critical info.

081 views

Both MMF (multi-mode fiber) and SMF (single-mode fiber) are types of optical fiber that can aid in communication applications. These thin strands of silica or glass will allow communication to occur …

0251 views

One of the most frustrating experiences a help desk technician will ever encounter is when a customer comes to them with a solution of their own invention and expects the tech to implement it. This …

1308 views

When log file has entry like:
2016-11-29      07:03:09        GET     0000LYQd5e_40cf-8f13-678b5949683d-008dc810   0:298790:1      /integration/worklistapp/Login  302    357
which type of logformat …

17119 views

You may have a outside contractor who comes in once a week or seasonal to do some work in your office but you only want to give him access to the programs and files he needs and keep privet all other documents and programs, can you do this on a local computer or only in a server environment?

1205 views

As the titles says, I'm trying to get my AD RMS deployment to work with my Mac users in my environment.  First let me explain my setup.  I've deployed a Federated Server (FS) for another application …

6239 views

I have written a group policy on our Windows Server 2012r2 to map a network drive and create a shortcut on the desktop. The policy is set to apply to all users within the groups I have created which …

590 views

HI - a general question on software licensing.

Main company owns the building and the business profits go to it etc, but they have a separate company running the day to day running of the business.…

455 views
Optimizing Cloud Backup for Low Bandwidth
Optimizing Cloud Backup for Low Bandwidth

With cloud storage prices going down a growing number of SMBs start to use it for backup storage. Unfortunately, business data volume rarely fits the average Internet speed. This article provides an overview of main Internet speed challenges and reveals backup best practices.

Lab:
User: RUS\UserName (russia.lab.com)
Workstation: EUR\WS (europe.lab.com)
Remote workstation: TST\WS (test.local)
Remote polling servers: TST\remoteSRV[1..10]
NO: Firewalls, Antiviruses

372 views

Hello mighty advisers, please help me once more.
Is there anything better than WSUS to push out patches? Is there an inexpensive yet fully automated solution for Windows as well as Java,  adobe …

372 views

Hi,

i activated in my gpo the point "only allow certain applications". there are inserted a few apps (winword, explorer, cmd). But i need a script running at logon (not at startup). So if i …

259 views

I have a very restricted computer on which only a few applications are allowed. Batch and the cmd shell is of course prohibited. How can I still run a cleaning-batch when logging off by using the gpo …

377 views

Hi,

we have a single pc without any domain. It is used only for browsing the web. This computer should auto logoff after 5 minutes of inactivity. Open documents should be discarded and some files …

365 views

Hi,

we want to set up a new windows 10 machine for guests. It shold be possible to print, open Documents (word, excel, powerpoint and pdf) and browse. the guests should not be able to change …

269 views
Show more content
201506-LO-Top-001

TOP EXPERTS

view all

RELATED TOPICS view all topics

  1. Windows Server 2008
    (82,632)
  2. Active Directory
    (73,213)
  3. Windows Server 2003
    (128,563)
  4. Windows 7
    (45,042)
  5. MS Legacy OS
    (55,077)
  6. Consulting
    (1,934)
  7. MS Server OS
    (55,338)
  8. Server Hardware
    (26,297)
  9. Exchange
    (196,587)
  10. Windows OS
    (101,328)