When it comes to getting work done in regards to computer services, you are either going to have to try and do it all yourself or you’re going to want to outsource it. Outsourcing can be hit or miss depending on whom you hire to help you out, and it becomes evident when you start to look … Continue reading Thinking of Outsourcing your IT department? Some Pros and Cons
MoreWhen it comes to getting gifts for those the tech crowd, you’re going to have a lot of choices to explore. The tech world is full of individuals that buy themselves everything, and are usually already on top of a lot of different gifts, toys, and different things that make it somewhat difficult to find … Continue reading 5 Christmas Gift ideas for IT People
MoreCompany Intranets are becoming more widely used, Single-Sign-on (SSO) integration is key for successful adoption. In this tutorial, we’ll show you how you can enable Single Sign-On on a Bitnami Alfresco Virtual Machine, to give it more of a SharePoint behaviour. File Needed: Download: Share-Config-Custom.xml Basic Assumptions for this configuration: Domain Controller Type: … Continue reading Bitnami Alfresco 4.0 Active Directory Single Sign-On Setup
MoreWe are looking for outgoing, fun, energetic people to join our team. Current positions available are: Client Relations Manager Technical Support Specialists If you fit the bill, please feel free to contact us at careers@it-solutions.ca!
MoreThe average cost annually for a VDI deployment is $300-$400 per user. In comparison, the annual cost for desktop management without a Virtual Desktop Infrastructure is almost $1000 per user! With a hosted VDI solution, desktop management is a thing of the past. Virtual desktops are accessible from anywhere, and is always synced no matter … Continue reading Can running a Virtual Desktop Infrastructure save you money?
MoreIs your wireless network secure? Many wireless networks are completely unprotected making your network vulnerable to unwanted attacks. What encryption method should I use? WPA2 – Wi-Fi Protected Access II is a security protocol developed by the Wi-Fi Alliance to secure wireless computer networks. Passwords Whenever you setup a new wireless router, always ensures that … Continue reading Securing your Wireless Network
More