ALI Blog

Executive and Technical Blogs

  • Home
    Home This is where you can find all the blog posts throughout the site.
  • Categories
    Categories Displays a list of categories from this blog.
  • Login
    Login Login form
Recent blog posts

Posted by on in Technical

On January 3rd, 2018, Google and MITRE released reports on three separate security vulnerabilities that affect nearly every Intel, AMD, and ARM processor on the market, referred to in the press as “Meltdown” and “Spectre”.

Posted by on in Technical

Brice R. Stevens, ALI Help Desk Support

Have you encountered a problem with your Outlook Web Access not working after a recent update to Microsoft Exchange? Our Help Desk has a tech tip on how to solve this common issue.

Ready to stop worrying that your data is backed up and accessible when you need it?  We have some exciting data backup and disaster recovery services now available!

Posted by on in Executive

Curious about why some are making the switch?  We profile a recent client migration to show the benefits that have been typical.

Hits: 12378

Posted by on in Technical

Does the backside of your server rack look like storage for a waterfall of cables? Keeping cables under control can be a major task, but it should be a high priority.

Hits: 16094

Almost all computer users know a few desktop shortcuts such as:

Hits: 16118

Sender Policy Framework or SPF is an email validation system that allows receiving systems to verify the sending organization. What does this mean in simple terms? Less Spam. Seventy percent of all email currently is spam.

Hits: 14232
Sending Files by Email: Why it's a Bad Idea

Do you use your email as a filing cabinet? Email makes sending files around the world very simple. This convenience also makes it very tempting to send large files through email. Most email systems have size limits restricting the total file size of a single email.

Tagged in: Best Practices Email
Hits: 18301

Video is quickly being adopted into many organizations across the globe to facilitate more dynamic business processes.  Our region will be no exception.

To help organizations in the region learn more about how video is already re-inventing the Justice process, we are excited to have an opportunity to host  Judge M. Boyd Patterson, Jr. (ret.), Senior Judicial Advisor for Cisco Systems' Connected Justice initiative.

Hits: 12319

Posted by on in Technical

CTO Thoughts on the HP-Aruba Acquisition:

This morning HP silenced the rumors and announced its acquisition of wireless provider Aruba Networks for $2.7 Billion.  

That’s a hefty price tag and potentially a big change in the industry.  Certainly one that has everybody talking this morning.

 I’ve been following Aruba’s shopping out for a while, and I have some thoughts about how this may play out.


Posted by on in Executive

January is a tough month. Definately one of those glass half full situations. For some it's the tsunami of projects that got backed up during the holidays, and for others, it is a fresh start and a time to look forward.

We’ve been advocating Filr as a great solution for organizations who need the file sharing capabilities of a cloud service like Dropbox, but want all the security features of your network file system.  Now Filr has introduced even more features!


Posted by on in Technical

By now many of you have become familiar with a new IT systems vulnerability nicknamed "Shellshock".

With the wave of systems breaches and vulnerability exploits making the headlines during the past 9 months, it is understandable that there is concern about what the Shellshock vulnerability might mean to your IT systems. We wanted to give you our update on this latest vulnerability and what we are seeing so far.

(Updated with Citrix info 10/13)

Is your organization in the academic field?  Did you know ALI staffs academic specialists with years of experience managing IT infrastructure, staffing & instructional technology?

Posted by on in Technical

The world of malware has coughed up a new and nasty threat to your valuable data: holding it hostage and ransoming it.

Don’t believe it? Meet Cryptolocker a member of the malware clan that ransoms your hard drive data.


After 24 years, change is inevitable.

Posted by on in Technical

To our valued customers,

Part of our strategy at ALI is to inform you of critical and potentially meaningful events as they directly relate to your systems and infrastructure. Below are direct details going through each aspect of the HeartBleed bug and what we’re doing for our clients who are potentially vulnerable.

The leader in file and print is back with a big statement and the release of FILR.  FILR provides enterprise level mobile file-access and secure file sharing for today's busy professionals.

Posted by on in Technical

Security breaches happen – to just about every organization. That’s an ugly truth.  Unfortunately, data security breaches are becoming an increasingly routine occurrence. Yet, the majority of these breaches don’t come from outside hackers and malware – they come from poor security practices that are very avoidable.

Hits: 10038
Starting this fall, Windows Server 2012 R2 Data Center edition pricing is going to rise by 28% more than previous version.  So the question is, are the extra features worth it?
Hits: 14179