IT Administration

6K

Solutions

42

Articles & Videos

7K

Contributors

IT Administration is the processes and best practices for programming and development, and incorporates methodologies for managing activities and projects. Common methodologies include waterfall, prototyping, iterative and incremental development, spiral development, rapid application development, extreme programming and various types of agile methodology. The life-cycle "model" is a more general term for a category of methodologies, and a software development "process" a more specific term to refer to a specific process chosen by a specific organization.

Related Topics

  1. Windows Server 2008
  2. Active Directory
  3. Windows Server 2003
  4. Windows 7
  5. Microsoft Legacy OS
  6. Consulting
  7. Microsoft Server OS
  8. Server Hardware
  9. Exchange
  10. Windows OS
Refine results

Have a workstation that runs at its maximum with CPU as wall is it running low in memory, before I add memory I want to ensure that there is no other problem.
Seams to be clean of any type of virus

830 views
Free Tool: ZipGrep
Free Tool: ZipGrep

ZipGrep is a utility that can list and search zip (.war, .ear, .jar, etc) archives for text patterns, without the need to extract the archive's contents.

One of a set of tools we're offering as a way to say thank you for being a part of the community.

IT certifications are a concrete representation of continual learning on the part of the candidate.  Continual learning is necessary for the long term success of an IT professional, but are IT certifications the right path for you?

028 views

Hi I have been setting up a build lab on Hyper V creating a standard task sequence with MDT 8443 and Windows 1607 on a server 2016 (dc01, mdt and wsus) infrastructure, everything apart from the …

1344 views

Are client relationship the only driver of a successful MSP? While important, client relationships are only one component. Learn how else MSPs can broaden their horizon and differentiate themselves.

033 views

When using File Screening in Windows 2012 R2, if users have existing exe or jpg in folders that are part of the file screening policy, what happens to those files? Are they in violation or is it only …

114 views

Hi,

How to trace usernames in the network by their IP Address or Hostnames?

332 views

Dear Experts

We have approx 11 projects each of the project has 5 to 7 sales users, presently all the calls are directly landing to the sales users as every project is announced with one DID number…

231 views

People,

What would be your suggestion as the task to do for the first 90 days as a System Administrator in the new company you joined ?

Thanks in advance.

845 views

I have a small LAN which consists of a cable modem connected to a Juniper-NS5GT firewall, connected to a HP ProCurve1810G - 24 GE switch which then is connected to various PCs and wireless devices.  I…

27150 views

How to restrict windows installation.But allow some specific .exe installation.How do this.If you have any method know about this.please share to me.

1138 views
Resolve Critical IT Incidents Fast
Resolve Critical IT Incidents Fast

If your data, services or processes become compromised, your organization can suffer damage in just minutes and how fast you communicate during a major IT incident is everything. Learn how to immediately identify incidents & best practices to resolve them quickly and effectively.

I want to have helpdesk and project management portal  or website that I can show on 75 inch tv.

Any suggestions

452 views

I took over a company where all users knew the admin user name and password
The problem is thy install/down on their workstations all kind of viruses.
I've seen on the Internet ways to change the …

1391 views

If I enable Disk Quota function in Windows 2012 R2 (not FSRM), & I select a specific existing user to limit their data quota to a specific amount, what happens to their existing data that they own on …

697 views

Hi All,

Can anyone here please share some steps and procedures in how to deploy Windows 10 (Win10_1607_EnglishInternational_x64.iso) to my new bunch of HP laptops ?

ISO file name: …

775 views
LAND OF THE WALKING DEAD ZONE

Why pager replacement is still an issue

OnPage has what some might call a “hate/hate” relationship with pagers. Not much room for love. As we see it, pagers are an antiquated bit of technology. …

0109 views

Hi,
 I am auditing membership of the administrator groups and notice that is a server (A DC) that is a member of the administrator's group. you know why someone would want to do this? I am thinking …

677 views

Hi

We have a generic web app which is just 1 app in IIS web server, but our different customers use their own domain name

these are 3 examples of what this could look like (these are just made …

150 views

I'm looking to create a base image for a company and then clone it on the other workstation in the company. Never did it, please advise tips tools and best practices Thank you

456 views

Hi all,

In an effort to lock down permissions on a network folder, I chose to deny read access to the Everyone group. Now, no one can access the folder at all. What can I do to undo this change, …

991 views
PRTG Network Monitor: Intuitive Network Monitoring
PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

I want to enable some of my staff to create users in AD as well as recipient mailboxes in exchange. However I don't want them to have the ability to delete the recipient mailbox. How can I protect the…

266 views

Dear Experts

We have around 5000 application forms filled and each application form of 20 pages, now we have implemented CRM software application but each physical application entering in the CRM …

260 views


Note: This is the second blog post in a series on email clearinghouses …

085 views

Learn how ViaSat reduced average response times for IT incidents from 10 minutes to 30 seconds.

0122 views

Scenario: Your operations manager has discovered an anomaly in your security system. The business will start to suffer within 15 minutes if it is a major IT incident. What should she do? We have 6 …

086 views

There's a better way to communicate time sensitive or critical info.

0121 views
Show more content
201506-LO-Top-001

IT Administration

6K

Solutions

42

Articles & Videos

7K

Contributors

IT Administration is the processes and best practices for programming and development, and incorporates methodologies for managing activities and projects. Common methodologies include waterfall, prototyping, iterative and incremental development, spiral development, rapid application development, extreme programming and various types of agile methodology. The life-cycle "model" is a more general term for a category of methodologies, and a software development "process" a more specific term to refer to a specific process chosen by a specific organization.

Related Topics

  1. Windows Server 2008
  2. Active Directory
  3. Windows Server 2003
  4. Windows 7
  5. Microsoft Legacy OS
  6. Consulting