Notice: Undefined index: option in /var/www/html/jc.infradapt.com/plugins/system/fixfrontedit/fixfrontedit.php on line 20 - Page 72

Infradapt Blog

This is some blog description about this site

Tip of the Week: How to Dilute Pure and Unadulterated Downtime

Tip of the Week: How to Dilute Pure and Unadulterated Downtime
Strict Standards: Declaration of JParameter::loadSetupFile() should be compatible with JRegistry::loadSetupFile() in /var/www/html/jc.infradapt.com/libraries/joomla/html/parameter.php on line 512

b2ap3_thumbnail_ultra_productive_workplace_400.jpgWe talk a lot about how downtime experienced from a technology issue like a server outage can destroy your company’s productivity. Yet, we’ve not distinguished between the different types of downtime, with the worst kind being pure and unadulterated downtime. What is pure downtime and how can you dilute it?

0 Comment

Darkcoin: Bitcoin’s Anonymous, Sketchy Brother

Darkcoin: Bitcoin’s Anonymous, Sketchy Brother

b2ap3_thumbnail_darkcoin_online_currency_400.jpgCryptocurrency is a concept that goes from somewhat useful (Bitcoin) to just plain weird (Dogecoin), and now it goes a step further with the anonymous new cryptocurrency called Darkcoin. It acts similarly to Bitcoin, but its primary selling point is that Darkcoin is completely anonymous and difficult to trace.

0 Comment

Tip of the Week: How to Keep Yourself Safe while on Public WiFi

Tip of the Week: How to Keep Yourself Safe while on Public WiFi

b2ap3_thumbnail_pubic_wifi_issues_400.jpgAs a business owner, you might find yourself on the road a lot, and you likely feel the need to check your email for important updates from the home base. This becomes more difficult as you move from civilization into the vast unknown, with the only available WiFi connections found in public places. Unfortunately, public WiFi spots are notorious for being unsecured and unprotected, and it’s important to practice proper security when dealing with them.

0 Comment

Is PowerPoint the Army’s Most Dangerous Weapon?

Is PowerPoint the Army’s Most Dangerous Weapon?

b2ap3_thumbnail_army_uses_powerpoint_400.jpgWhen a soldier in the military is promoted to officer, one would assume that it's due to their ferocity and quick decision-making abilities that have been proven on the battlefield. Character traits like these are important, but to be an officer in today's military, one will need to possess one skill above all others: Microsoft PowerPoint proficiency.

0 Comment

Wouldn’t it Be Nice if Microsoft OS Upgrades Were Free?

Wouldn’t it Be Nice if Microsoft OS Upgrades Were Free?

b2ap3_thumbnail_windows_for_free_400.jpgOperating systems aren't designed to last forever. This is why new versions are released every few years or so. In the case of Microsoft, selling their latest OS has always been their bread and butter. However, with Windows 10 on the horizon, one has to wonder if Microsoft has considered offering their new OS to users as a free upgrade?

0 Comment

When Managing IT Feels Like Herding Cats [VIDEO]

When Managing IT Feels Like Herding Cats [VIDEO]

b2ap3_thumbnail_cat_herding_400.jpgCat Herding: The attempt to control or organize a class of entities which are uncontrollable or chaotic. Implies a task that is extremely difficult or impossible to do, primarily due to chaotic factors (Wikipedia). Does the humorous concept of cat herding sound like your current approach to IT management?

0 Comment

Tip of the Week: 13 Time-Saving Shortcuts for Microsoft Outlook

Tip of the Week: 13 Time-Saving Shortcuts for Microsoft Outlook

b2ap3_thumbnail_outlook_logo_400.jpgMicrosoft Outlook is a common mail solution for businesses, but it can be tricky to use without utilizing keyboard shortcuts. Just like Microsoft Word, Outlook has several key commands that can be used to jumpstart your productivity and save time, which can be better spent on other activities, like training exercises or more important tasks.

0 Comment

How to Protect Yourself from a Haunted Computer

How to Protect Yourself from a Haunted Computer

b2ap3_thumbnail_halloween_pc_haunting_400.jpgNaturally, if you saw your lamp levitate, you would believe it to be the work of a ghoul and you would cry out in terror. What then would you believe if you saw your PC’s cursor begin to move on its own? In a spooky scenario like this, your computer isn’t haunted. It’s hacked. In the real world, the latter is the scarier of the two.

0 Comment

Joomla! Debug Console

Session

Profile Information

Memory Usage

Database Queries