What is the value of Brocade Support?

Author: Jackie Grobstein

When ordering Brocade equipment, you may question if the accompanying support option is worth purchasing. Murphy ’s Law suggests that buying support will pay in the long run. However, your boss may not agree to spend the extra money based on theory; so here are some facts about Brocade support: Continue reading

Microsoft Licensing Audits

Author: Dave Norwood

Over the past few months I’ve been getting more and more calls from my clients about Microsoft requesting an audit of their licensing. The title of the email is usually something like “Microsoft Software Asset Management Review”. I would like to share my experiences with these audits, I think you’ll find this helpful when/if you get one of these requests. Continue reading

Heartbleed Vulnerability

As you have heard, the Heartbleed Vulnerability (CVE-2014-0160) “is a serious vulnerability in the popular OpenSSL cryptographic software library. This weakness allows stealing the information protected, under normal conditions, by the SSL/TLS encryption used to secure the Internet. SSL/TLS provides communication security and privacy over the Internet for applications such as web, email, instant messaging (IM) and some virtual private networks (VPNs). Continue reading

Top 3 Reasons to Purchase Support/ Service Contracts

Author: Jackie Grobstein

If you are purchasing network products such as servers, firewalls, routers, SANs, switches, etc., you should consider adding a support contract. Continue reading

What do Network Admins Really Need to Know About 802.11ac Wireless?

By: Dustin Baker, Senior Systems Engineer at Trusted Network Solutions

Wireless history, if 802.11a was a two lane back road, 802.11b/g was a two-lane highway, 802.11n was a freeway, then 802.11ac is the Autobahn. 802.11ac has the ability to offer 1.3 gigabit per second wireless data speeds and potentially take away the need for wired workstation networks. This is exciting news for the technology industry, but we need look a little deeper before removing all of our network cable. Continue reading

Using the OSI Model as a Troubleshooting Model

By Russell Lindsay, VP of Engineering, Trusted Network Solutions

One of the first things we learn when we started working in the field of computer networking, is the OSI model.  The OSI model is used to describe how data should pass across a network.  It is broken up into 7 layers, starting with layer 1 as the lowest layer and moving up to layer 7.  The 7 layers are labelled, starting with layer 1 at the bottom, 1-Physical, 2-Data Link, 3-Network, 4-Transport, 5-Session, 6-Presentation, and 7-Application. Continue reading

End of Support On Key Microsoft Solutions

Author: Dave Norwood

As of April 8, 2014, Microsoft will no longer be offering critical updates or support for Windows XP, Office 2003, and Exchange Server 2003. If you haven’t upgraded, you may want to start thinking about it. Continue reading

Support End Date Tracking

Author: Jackie Grobstein

Ever have equipment crash and find yourself  searching for the support contract — only to find that your support expired two months ago?  Trusted Network Solutions’ clients  don’t have this problem.  Continue reading

Wireless Assessments

Author: Dave Norwood

In the past people have had old-school wireless site surveys done.  These include a really fat report, inches and inches thick… which costs thousands and thousands of dollars.  It would show in-depth heat maps, channel maps, interference maps, photographs of where they should install access points, and many other documents (many of them “fluff” in my opinion). Continue reading