CIO Solutions to add Alert Logic solutions to its line of Managed Security Services HOUSTON – August 15, 2012 – Alert Logic, a leader in delivering on-demand Security-as-a-Service, announced that CIO Solutions will integrate Alert Logic’s Web Security Manager into its current suite of managed security services. CIO Solutions will be able to provide enterprise… Read more »
Category: Archives
CIO Solutions brings Strategic Incentives into their Private Cloud Santa Barbara – July 12, 2012 – CIO Solutions is enabling and empowering businesses in the Tri-County area with their innovative and flexible Private Cloud service offering. Focusing on efficiency and client-specific needs, CIO has designed a unique Private Cloud environment for Santa Barbara based Strategic… Read more »
When we started implementing Microsoft DPM we went through a series of headaches as we tried to get it working continually and consistently. We went through a number of online resources as well as conversations with other geeks who had successfully used DPM. Overall it was a huge pain and I wished one resource would… Read more »
The term “jailbreak” has worked its way into urban vernacular, but the definition has become somewhat lost in translation. In short, to “jailbreak,” or “root” a device is to gain the ability to modify protected system files. The process was dubbed “jailbreaking” shortly after the release of the original iPhone, as many consumers felt that… Read more »
March 12. 2012 – Santa Barbara – CIO was honored to present La Colina student, George Hutchinson, with the CIO Award for Excellence in Computer Engineering for his project titled “Soduku.exe” which also won Best in Fair (Junior High), Best in Division and a Gold Medal. Hutchinson used different heuristics to find out the fastest,… Read more »
Password Security By: Burt Ribet, Sr. Engineer There are four basic encryption authentication protocols that Microsoft uses: Lan Manager (LM), NT Lan Manager (NTLMv1), NTLMv2, and Kerberos. LM was Microsoft’s first attempt at an encryption/authentication. LM has a maximum of 14 characters and is case insensitive. It uses DES for encryption. NTLMv1 was introduced in… Read more »
CIO Solutions has partnered with Community West Bank to install the ShoreTel VoIP phone system for their seven California locations. July 27, 2011 – Santa Barbara – CIO Solutions, the Tri-County leader in IT management, has successfully implemented the ShoreTel VoIP phone solution for Santa Barbara based financial institution, Community West Bank. The installation was… Read more »
How do I check my voicemail? From your Shoretel phone, it’s as simple as pressing the voicemail button and entering your password. From within the Call Manager software, you can access a visual inbox by left clicking the orange Shoretel icon to open the context menu, and mousing over the Windows tab. Once expanded, there… Read more »
To headset or not to headset…. (and if so, what kind do I want?) by Michael Biancone I have used a telephone headset for over 15 years now, and simply cannot imagine having to pick up a receiver in order to field and make telephone calls all day long. I have always used “Plantronics” brand… Read more »
Trunk Options – An Overiew By: Chase Christian When implementing a VoIP system, you have a few choices when it comes to deciding on your voice trunks. Trunks are your connections to the public telephone network, and they’re what allows you to receive inbound calls and make external calls. Your company will need plenty of… Read more »