The UltraTech Zone

Integrating Life, Technology and Business with Andrew S. Baker...
Welcome to The UltraTech Zone Sign in | Join | Help
in
Home My Blog Forums Photos Resume Reading List External News Knowledgebase Consulting Mailing Lists Other Links

Browse by Tags

All Tags » 2013   (RSS)
  • Looking forward to Windows Server 2012 R2

    I was just reading the ComputerWorld article on some upcoming features of Windows Server 2012 R2, and I see some really intriguing improvements: In Windows Server 2012 R2, the PowerShell command-line scripting language introduces a feature called Desired State Configuration, or DSC. It uses a declarative syntax to define a configuration for a ...
    Posted to Talking Out Loud with ASB (Weblog) by Logik! on June 27, 2013
  • A look at Microsoft’s SIR v14

    So…. I finally had a chance to finish reading the latest full edition of Microsoft’s latest Security Intelligence Report. There’s a lot of really good info in the report. The executive summary also does a good job of highlighting key points.  That said, I had a couple of observations of my own that others might find interesting.   ...
    Posted to Talking Out Loud with ASB (Weblog) by Logik! on May 8, 2013
  • Dueling Business Mindsets

    If there is one lesson that technologists need to understand in order to be successful, it’s that business is ultimately more about people than about process or technology.  At the end of the day, how people think, behave and operate will have be the greatest influence on the success of any organization. With that said, it has been my ...
    Posted to Talking Out Loud with ASB (Weblog) by Logik! on April 30, 2013
  • Enhancing My WLAN with a Meraki MR12

    I finally got a chance to deploy a Meraki MR12 wireless access point. These are some sweet devices.  I wasn’t that happy with the PoE brick that it comes with for power, but getting it setup has been quite pleasant. As an enterprise device, it supports all sorts of options for authentication, including RADIUS authentication, and LDAP. I ...
    Posted to Talking Out Loud with ASB (Weblog) by Logik! on April 5, 2013
  • Wise Security Investment Approaches

    A holistic approach to information security needs to address a corporate strategy for buying or building solutions. Such a strategy will have an impact on how a company looks at staffing and technology investments. There are two basic ways to look at major investments of information technology and information security: you can buy or you can ...
    Posted to Talking Out Loud with ASB (Weblog) by Logik! on February 28, 2013
  • Lessons from the Book of Job

    James 5:11 KJV Behold, we count them happy which endure. Ye have heard of the patience of Job, and have seen the end of the Lord; that the Lord is very pitiful, and of tender mercy.   There are many lessons that we can learn from the various Bible stories that have been given us, some of which we only review superficially. Today, I’d ...
    Posted to Studying the Word of God (Weblog) by ASB on February 28, 2013
  • Making Time for Down Time in Ministry

    Mark 6:7-32 KJV (7)  And He called unto Him the twelve, and began to send them forth by two and two; and gave them power over unclean spirits; (8)  And commanded them that they should take nothing for their journey, save a staff only; no scrip, no bread, no money in their purse: (9)  But be shod with sandals; and ...
    Posted to Studying the Word of God (Weblog) by ASB on January 31, 2013
  • The Futility of Blaming IT

    In recent years, it has become popular sport to blame information technology (IT) departments and IT leaders for failures – real or imagined – which adversely impact business operations.  Even some technology trade journals seem unable to get through a single issue without finding some point upon which to lambast a CTO or CIO for not ...
    Posted to Talking Out Loud with ASB (Weblog) by Logik! on January 21, 2013
  • Reading Between the Lines of Breach Notifications

    Back in September 2012, I wrote two articles for Point2Security on how to effectively handle breach notifications: The Who of Post-Breach Communication Post-Breach Communication: The Importance of How & When Sadly, to many organizations are doing something entirely different when it comes to post-breach notifications. I like to take ...
    Posted to Talking Out Loud with ASB (Weblog) by Logik! on January 18, 2013
  • Get Real with Information Security

    In 2012, the writers of malware and the attackers of networks were very busy, using both social engineering and increased technical sophistication to fuel an increased number of attacks. Not incidentally, mobile devices just flew off the shelves this year, with predictions that over 122 million tablets and some 717 million smartphones will have ...
    Posted to Talking Out Loud with ASB (Weblog) by Logik! on December 31, 2012
  • Learning the Lessons of History

    Esther 3:5-10 KJV (5) And when Haman saw that Mordecai bowed not, nor did him reverence, then was Haman full of wrath. … (8) And Haman said unto king Ahasuerus, There is a certain people scattered abroad and dispersed among the people in all the provinces of thy kingdom; and their laws are diverse from all people; neither ...
    Posted to Studying the Word of God (Weblog) by ASB on December 31, 2012
Powered by Community Server (Personal Edition), by Telligent Systems