Step-By-Step: How to Clean Install Windows 10


One question that is frequently asked both in person and online as of late is as follows: “How do I perform a clean install of Windows 10 when upgrading from Windows 7 or Windows 8?”

Data Center Optimization: How to Do More Without More Money

Data Center Knowledge

DCIM How to… Manage Power and CoolingOperating efficiently and effectively in the land of "more" without more money means optimization at all levels: hardware, software, and even policies and procedures. Read More.

Trending Sources

How to Prevent DRUPS-Related Data Center Outages

Data Center Knowledge

If you're deploying DRUPS, here's what to watch for. How to… Manage Power and Cooling UptimeDRUPS systems were implicated in several high-profile outages recently. Read More.

How To Solve The Digital Dilemma

Forrester IT

Transformers are more likely to succeed because they recognize their customers' expectations are evolving. The executives in these companies redesign their business to evolve alongside the expectations of their customers.

How To 120

Windows 10 Tips: How to Delay or Defer Windows Updates


Reason being, it allows us at CANITPRO.NET to listen to the IT professional audience in attendance speak their minds about Windows.( Step-By-Step WSUS Anthony Bartolo How to delay Windows 10 updates Service Branch System Center 2012 Windows 10 Windows Update how-to

How To ‘Refactor’ Monolithic Applications into Microservices

Data Center Knowledge

Monoliths put business logic into the core of the application, implemented by modules that define services, domain objects and events. Read More. Industry Perspectives

Data Center Strategy: Tips for Better Capacity Planning

Data Center Knowledge

Here's how to make smarter capacity planning decisions Read More. How to… Manage Uptime

How To Make Your Business Process Management (BPM) Mobile Friendly

The Accidental Successful CIO

In this mobile age, your business processes need to be mobile friendly Image Credit: Milica Sekulic. In a nutshell, it’s how your company does business. The arrival of everyday mobile devices has had a major impact on how firms perform their business processes.

Mobile 102

How to Turn Big Data Into a Competitive Advantage


When it blasted on the scene, businesses jumped at the chance to use a massive amount of data to gauge what their customers wanted and needed, tailoring their services to offer the perfect experience. Businesses need to do more than use big data – they need to leverage all its benefits in ways no one else can. How can you turn big data into a competitive advantage? TECH ROUNDUP: Toshiba Dives to 35-Year Low ( Rick Delgado.

How to conduct an IoT pen test

Network World

Penetration testing was much like taking a battering ram to the door of the fortress. Keep pounding away and maybe find a secret backdoor to enter through. With the flurry of Internet of Things devices, is it harder to conduct a pen test with that many devices and end points? To read this article in full or to leave a comment, please click hereBut what happens if pieces of the network are outside of the fortress?

How to eliminate insider threats

Network World

Insider threats are a major security problem Image by Thinkstock For years, the primary security objective has been to protect the perimeter—the focus on keeping outsiders from gaining access and doing harm. To read this article in full or to leave a comment, please click here

IBM 31

The Right Questions to Ask About Data Center Strategy

Data Center Knowledge

Data Center World Featured How to Data center customers often don’t ask some of the most important questions. Here's what they are. Read More.

How to Survive a Cloud Meltdown

Data Center Knowledge

It’s all about redundancy, but there are many ways to do it, and it won’t be cheap. Read More. Amazon Cloud Computing Data Center Strategies Downtime Featured

CIOs Need To Know How To Deal With IP Issues

The Accidental Successful CIO

As CIOs we tend to focus on the immediate problems that are in front of us. Every CIO needs his or her IT department to be creative. Intellectual property is considered to be things like patents, trademarks, copyrights, and trade secrets.

Step-By-Step: Setting up Active Directory in Windows Server 2016


This post will detail how to install active directory on Windows Server 2016. Before the AD install however it is important to understand what is the minimum requirement to install windows server 2016. First thing to check is IP address configuration.

Government IT: How to Prevent Ransomware from Extorting Your Organization


The cyber attacks they stage are constantly evolving, and now pose a real threat to organizations and agencies in the public sector in particular. Ransomware is a type of malware that has the potential to severely cripple a government agency. How to Prepare for Ransomware Attacks.

If Everything is a Service, Why Do We Need Data Centers?

Data Center Knowledge

How to What are the duties of the data center manager in an everything-as-a-service world? Read More.

How to simplify IT integration

Computer Weekly

Pressure on IT is mounting and point-to-point integration does not scale. Opening up APIs is one of the approaches now being considered

The Data Center of the Future and Cloud Disaster Recovery

Data Center Knowledge

Cloud How to Disaster recovery and business continuity -- no longer a cumbersome duo. Read More.

how to be a good open source community member


A friend of mine who is a very talented writer recently became intrigued with open source and asked me to help her to understand how to be a good open source community member. Is there any other profession where highly skilled professionals donate their free time to give their work away for free? Many spend long hours at their day jobs, just to spend their nights and weekends doing the same thing. They will be very open to helping

CIOs Need To Know How To Build Bridges

The Accidental Successful CIO

You’ll need a bridge to move from providing a service to being a partnerbr /> Image Credit: JOHN LLOYD. That’s not what an IT department should be limited to doing. Instead, you should be a true business partner to the rest of the business.

Teaching Drones to Aid Search and Rescue Efforts via Cognitive Services


InDro Robotics, a drone operating outfit based in Salt Spring Island British Columbia, recently connected with our team at Microsoft to explore how they could better enable their drones for search and rescue efforts.

How to make your employees care about cybersecurity: 10 tips

Tech Republic Security

Here's some expert advice on how to make cybersecurity training more effective and protect your business People are the largest security vulnerability in any organization.

How to Remove Malware Tips


This malicious software is designed for the purpose of gaining access to your computer and often damage a computer without the owner knowing. Malware creation has become popular in recent times due to the the lure of money that can be made through organized Internet crime.

How to handle detractors to digital transformation

Social, Agile and Transformation

It takes a lot of effort to align an organization to a digital strategy and digital transformation program. They are disruptive programs that aim to drive growth through new products and customer experiences and not everyone in the front office is going to want a new direction. They also require changes to the underlying business processes by advancing customer service capabilities, cio digital transformation leadership organizational change

Digital Customer Experience ROI: (How To) Show Me The Money

Forrester IT

Forrester's clients frequently ask us how to build the business case for customer journey mapping, particularly for digital experiences and digital products. Now that I've taken on Forrester's digital business and transformation playbook, I've been thinking a lot about the benefits of journey mapping, which I believe is the front end to any transformation initiative. But I have been developing a framework to measure the impact of better customer experiences.

Step-By-Step: Enabling Advanced Security Audit Policy via DS Access


Should changes or unauthorized access happen within your AD environment, would you have enough information to answer questions such as what has changed? As you know the computer security threats are changing every day, sometime the default event logs may not help to answer above questions.

What is a NOC, and How It Improves Data Center Availability

Data Center Knowledge

Here are some important points to consider. Featured How to Should you invest in a NOC? If so, do you build one in-house, or outsource? Read More.

How To Hold On To Your Best IT Workers

The Accidental Successful CIO

Hiring the best workers is just the start, now you have to get them to stay Image Credit: Matt McGee. I guess if you take the time to think about it, being the person with the CIO job is a lot like being the coach of a football team. How You Can Prevent The Best From Leaving.

How to lock down your security system

Network World

There are many steps a business can take to help better protect their physical security systems from cyber threats. To read this article in full or to leave a comment, please click here

How to Choose the Ultimate ERP Vendor

IT Toolbox

This software provide you with real-time insights into your sales, manufacturing and production processes so you can improve your day-to-day operations. Here's how to select the best ERP vendor for your business. Enterprise resource planning (ERP) software helps your business outrank your rivals. Choosing the right ERP vendor, however, can be a challenge. Where do you start? What should you ask?

How to respond to a cyber attack

Network World

Preparing and responding to a cyberattack Image by Thinkstock Cybersecurity incidents continue to grow in both volume and sophistication, with 64 percent more security incidents reported in 2015 than in 2014, according to a June 2016 report by the Ponemon Institute.

Government IT: How to Prepare for the New Administration


Once the dust of the race settles and the newly elected president is ensconced in the White House (pictured), she or he will have to switch from campaigning to governing, fast. Chart 1: Shift in approach to administration change Source: CEB analysis.