Tag: stumble-it

Privileged password management: Protection alone is not sufficient

Privileged password management has now emerged a key aspect of IT management. With ever-increasing number of privileged identities in shared environment, protecting the administrative passwords is absolutely essential, but that alone is not sufficient

Success Story: DeviceExpert helps leading IT service provider for retailers centrally manage network device configurations

The IT department of Bovertis B.V , a leading IT service provider for retail companies in The Netherlands, specializing in airport retail development and IT support, is tasked with managing a large number of network devices, mostly switches and routers from different device vendors. Their customers have retail stores all over the world, which need connectivity with each other and with the Head Quarters.

Desktop Central

We are all familiar that Java provides separate executables for Windows x86 and 64-bit operating systems. While it is possible to install and use an x86 executable on Windows 64-bit operating systems, it is impossible to install these executables silently using the system account due to a bug in Java.

It’s raining iPads

What’s with the recent display of so much love in the form of iPads towards prospects. Recently, I came across at least 3 big brands giving away iPads to prospects and customers, asking them to enter a competition. Of course, there is a fine print involved! Agreed, iPad2 is awesome! But, when an awesome “free” giveaway (iPad2 in this case) is given to you on purchase of a product, you might want to consider the free-give-away theory. 1.

Get real-time control on device configuration changes using DeviceExpert

Enterprises depend on network availability for business continuity. In heterogeneous networks, administrators face numerous challenges in properly managing the device configurations, carrying out changes, ensuring compliance to regulations, and in minimizing network downtime triggered by human errors. Particularly, faulty or unauthorized configuration changes often wreak havoc to the business continuity. Hence detecting changes and having complete control is a crucial task.