Author: Des Nnorchiri

  • Responsible Data Governance

    Data governance is a high-sounding term which describes what’s essentially a fundamental process: Effectively managing the information that resides within, and flows in or out of an organization.   It’s perhaps because the concept is couched in such ominous terms that IT managers and users have a difficult time understanding, interpreting, and applying data governance […]

  • Making Sure Your Cloud Storage Is GDPR-Compliant

    It’s now just a couple of months until the European Union (EU) brings its General Data Protection Regulation (GDPR) into effect. As of May 25, 2018, this body of rules will bring the most wide-ranging and stringent set of internet privacy laws ever formulated into the forefront of global business.   Designed to safeguard the […]

  • Enterprise File Synchronization and Sharing (EFSS)

    Enterprise File Synchronization and Sharing (EFSS)

    As institutions and business organizations strive for the ideal of “digital transformation” – the optimizing of internal operations and increase in productivity through the adoption of technology and the elimination of analog processes – the need has grown for documents and files to be made available on demand, to whoever requires them.     Policies […]

  • Power Admin on the Radio!

    Power Admin on the Radio!

    Doug from Power Admin was invited onto the popular “Dave the IT Guy” radio show yesterday.  It was a great conversation and we’re glad we got to participate.   You can listen to the show directly by clicking here.   Read more about Dave the IT Guy and his rich experiences in the IT sector.   […]

  • Some SD-WAN Security Tips

    Some SD-WAN Security Tips

    The traditional reliance on in-house data centers gave organizations the advantage of being able to monitor and manage access to the internet from a centralized location – and to implement security policies and controls which emanated from a single point.   With the evolution of technology and a shift in traditional working patterns, enterprise networks […]

  • Intent-Based Networking

    Intent-Based Networking

    The software-defined approach to network management and implementation relies on the creation of an abstraction layer, to provide a virtual overlay on the physical infrastructure of servers, switches, routers, and wireless access points.   Historically, the creation and management of these virtual network layers has been accomplished through a combination of virtual Local Area Networks […]

  • Best Practices For Change Management

    Best Practices For Change Management

    Making any kind of alteration to the way an organization runs its affairs is a process that’s fraught with the potential for risks and complications. Not only may the proposed modifications not have the desired effect, they may also meet with resistance or outright opposition from the very people required to put them in place, […]

  • Comparisons of Azure vs Amazon AWS

    Comparisons of Azure vs Amazon AWS

    Given the advantages offered in expanded infrastructure, increased computing power and data storage capacity, flexibility, time-saving, and decreased management and maintenance overheads, it’s easy to understand why growing numbers of enterprises are committing their resources to some form of cloud-based service or platform.   Mention the words “cloud platform” in a commercial context, and two […]

  • A Breakdown of the Various Kinds of Windows 10/2016, and the Upgrade ‘Rings’

    A Breakdown of the Various Kinds of Windows 10/2016, and the Upgrade ‘Rings’

    With a significant number of users worldwide still clinging tenaciously to their installations of Windows 7 – and smaller number holding onto the markedly less popular Windows 8.x variants – Microsoft’s dream of a smooth and global transition to its latest desktop and network operating systems has yet to become a reality.   But improvements […]

  • A Windows Authentication Primer

    A Windows Authentication Primer

    Authentication. It sounds easy enough, in principle: You have a system, a procedure which anyone that tries to gain access to it has to follow, and a set of checks to ensure that recognized users are actually who they claim to be. But every system has its individual quirks – commercial operating systems, especially.   […]