As part of our ongoing support for our customers, we provide both formal and informal training around the services and products we implement. From a few recent experiences, I wanted to share some overall suggestions on how to plan and present a successful training session on technical topics. Over a series of blogs, I will share some of the planning and content suggestions that have worked well in the past.
Beringer Associates Technology Blog
Category : Information Technology
As part of our ongoing support for our customers, we provide both formal and informal training around the services and products we implement. From a few recent experiences, I wanted to share some overall suggestions on how to plan and present a successful training session on technical topics. Over a series of blogs, I will share some of the planning and content suggestions that have worked well in the past. This blog will focus on some pre-planning and introduction to your audience.
Are you having issues with your Wi-Fi? Are you using an average wireless access point (WAP) from a large department store? Have you considered that your WAP is the issue? Upgrading your WAP to a corporate wireless access system with Ruckus Wireless can get the complete coverage that you need.
A complex password is your front line of defense against your work or personal accounts being compromised by a cyber intrusion. The stronger this front line is the less likely you are of becoming a victim of a cyber-attack. Per the FBI’s website the threat of cyber-attacks is incredibly serious and growing. Cyber intrusions are also becoming more commonplace, more dangerous, and more sophisticated.
We recently discovered an issue with Outlook classifying legitimate Emails as junk. Valid emails from clients as well as emails from within our organization were being sent to our junk folder. Mail is classified as Junk in Exchange Online and within the Outlook client separately. We had the Junk Filtering in Outlook disabled before this problem started so for our case we knew it was an issue with Junk Filtering in Exchange Online.
The secure link between the PC and the Directory is broken due to a disruption in the presentation of credentials. If the PC presents the wrong password, the authentication is denied. Each Windows-based computer maintains a machine account password history containing the current and previous passwords used for the account. When two computers attempt to authenticate with each other and a change to the current password is not yet received, Windows then relies on the previous password.
Managing disk space can sometimes be a challenge. Even more so if you’re using a tablet device. Fortunately, Windows 10 has a great tool to help manage hard drive space called Storage. Storage allows you to manage disk space as well as tweak data settings…
Beringer is striving to create real value in our customers’ CRM systems. We enjoy developing creative solutions to limitations in CRM. I recently had a design challenge to send out notification emails to a Team in CRM. This currently is not possible using the Standard Workflow Send Email Step since Teams are not able to be set as an ActivityParty. So, how do we extend Standard Workflow functionality? I knew to turn to a custom plugin to accomplish my task.
This post will serve to help resolve the ever so famous “Phantom Printer.” For those who are unfamiliar with the “Phantom Printer,” this is referred to when your printer is installed on your device and can be chosen from the drop down list of printer properties, but does not appear in the Devices & Printers location. It has no effect on the printing itself, and does not cause any issues besides the obvious visual of “Where is this printer device if not in the Devices & Printers location?”