Because users are often unpredictable, admins like to restrict how much control and access they have on their devices. However, when deploying a new set of devices, the significant question of “How much control or freedom should we give the users?” doesn’t seem to get enough consideration. For some network administrators, and for some end users, this question may seem to have a simple answer, but once you’re considering hundreds of different devices, and/or hundreds of different users, it becomes a big, complex conundrum. It is a matter of serious consequence for your system and network security, as well as device usability and user satisfaction.
So, the week before last Apple released its new iPhone, along with an update to its IOS operating system. On the same day, Mr Chief finally, after months of trial and error, worked out how to get Apple Push Notifications to work from within the House’s network. And now, I’m going to give you the information he would have loved to have had at the start of all this trouble. Continue Reading
So, you want to browse a new website or use a new online tool, but first you need to sign up. Seems simple enough, use the same username as last time, same password…Ah, your password. Passwords are becoming evermore critical secret of modern life, as everything moves online and your password/s unlock it all. Everyone knows it’s best practice to keep every password unique, and litter them with special characters and a mixture of capitals and numbers, but very few of us do. Why? Because it’s too hard. But I’ve got a few tips to try and make it all a bit easier.
So, this is my first blog post. Hi, and welcome to Nitemice’s Blog. Over the course of this year, I plan on blogging once a week, meaning by the end of the year I should have at least 52 of these. But before I go into all that, I should tell you a bit more about myself. Continue Reading