Updated: 9 Annoying People on Your Commute

As some of you may know, I’ve recently taken a position at a software company in downtown Seattle.  This has changed my once serene commute into one of frustration against some of my fellow commuters. This isn’t really a technology related post; it’s just me venting on my website about goofballs that I see daily my journey to Seattle.… Read More »

SCOM: Recipient Address Not Valid

System Center Operations Manager (SCOM) is a great tool for monitoring your infrastructure. Configured correctly, it can let you know when things go awry, and even take action to fix the problem. But what happens when it stops speaking to you?

Hardening Windows Server

This guide is intended to provide basic systems administration instruction for hardening “out-of-the-box” installations of Windows Server.  Even though current versions of Windows Server provides a better security model than previous versions of Windows servers, the attack surface area can be reduced further.

Having fun with a Phish

As a part of running a website, I am always amused at the attempts made by scammers to part me from my money.  Here is one of the more humorous messages.

SaaS/IaaS – Why or Why Not

IT organizations are exploring methods to migrate applications from internal data centers to external infrastructure as a service (IaaS). Thinking about it?