How-To

35 posts

System Builder Tips: Intel R2208WFTZSR Maintenance Free Backup Unit Integration and New RMM iKVM

We completed a custom server build yesterday. Intel R2208WFTZSR 2U dual Intel Xeon Processor Server System Dual Intel Xeon Processor 6240Y 192GB ECC RAM (12x 16GB) Intel RAID Controller and Intel RAID Maintenance Free Backup Unit (2) 240GB Intel SSD M.2 RAID 1 (2) 3.8TB Intel SSD D3-S4510 SATA RAID […]

Data Centre SSDs: No Power Loss Protection (PLP) Means No S2D Deployments

Reading this article on Serve The Home this morning: Kingston DC450R SSD Released SATA and 3.84TB Maximum. The Kingston DC450R SSD is being released with “Data Center Series” on the sticker. But, it does not have power loss protection (PLP) so how could this be? The suspicion here is that […]

Azure Web App: Site Experiencing Difficulties HTTP Errors – Fix

We started getting alerts from JetPack that our WordPress site, https://blog.mpecsinc.com, was offline. Sure enough, browsing to the site lead to a “This site is experiencing technical difficulties.” white page. Since our WordPress site is hosted in Azure, we logged on to the portal and clicked into the AppService blade […]

Business Tip: Office Lens Those Receipts

Throughout the day we can process quite a few credit card and debit transactions. Getting those receipts into our bookkeeping system can be a challenge. Enter Microsoft’s Office Lens app. Office Lens on iPhone – Co-op Albany Fuel Receipt Start the app and point it at the receipt in question. […]

Veeam: Manage the SQL Instance Memory Limit

One of our standalone Hyper-V hosts was experiencing performance issues with the Remote Desktop Session Host that provides the company’s primary user environment. The main application running on the session host can be a bit finicky so we ran the gamut troubleshooting within the guest OS. The performance drags were […]

Security: Client E-mail Warning for Current Malware Campaigns

The first place in any “security strategy” should be to train the human. Most malware infections today are caused by a user clicking through when they should not have. The posters below give a very clear set of workflows for an infection. Excellent posters via MALWARE-TRAFFIC-ANALYSIS.NET Note the STEP IN […]