Virtual Servers, Real Savings
Virtualization is a great way for businesses to save money and expand computing power.
Special virtualization software allows one physical computer to run multiple virtual computers, each using its own, and possibly different, operating system. Although all data and applications are held on one machine, virtualization software isolates each system from the others. Shared hardware resources are dynamically allocated to each virtual machine based on need.
One client moved the files and functions of five old servers to one new server. Five virtual machines now share the processor, RAM, hard disk, and network controller of one physical machine.
*The company did not have to go through the ordeal of migrating to a new server. The software that might not have worked with a newer operating system could still be used.
*The amount of RAM and CPU capacity was increased as if they had purchased new machines.
*Additional benefits are now only one server draws power and just one warranty is needed, reducing energy and support costs significantly.
In addition to streamlining server management and cutting costs, virtualization reduces space requirements.
|
SurePath Quarterly Education Series
Take a break and join us for lunch...
and learn something new!
November 15: Power Point with Panache
*Start with basics, enhance with formatting
*Themes and Styles
*Animation vs. transitions
February 21, 2012: Write Ways with Word
Flyer Registration Form
|
More Texting Codes for Seniors...
Take a guess at what these texting abbreviations mean.
BTW GHA OMMR TTYL
Answers at bottom of the page.
|
40,000 Tobin Service Tickets
The 40,000 service ticket was created on Friday September 23 at 10:15am. Congratulations to Eric from DeTech for the closest guess and winning the Amazon gift card. Congrats to our own Andy Durst for making the closest staff guess.
|
Computer Privacy Rights?
The Fourth Amendment to the Constitution protects against unreasonable search and seizure, but does it protect your computer privacy? When can law enforcement or employers access phones and computers if they suspect wrongdoing?
To get the lowdown, visit http://www.eff.org/wp/know-your-rights. The site features the "Know Your Rights Whitepaper" authored by The Electronic Frontier Foundation, a watchdog organization.
Here are some highlights:
1. Police may search your computer, cell phone, or another device if:
ˇYou give them permission or they have a warrant that specifically references the device to be searched; or
ˇThey have probable cause to believe there is incriminating evidence on the computer under immediate threat of destruction. (Note: This applies even if another person is the subject of an investigation and evidence related to that person's activities may be on your equipment.)
2. Another person can give consent for a search of your property if police believe this person has control over the item.
3. You need not help police with a search, but you should not interfere physically or try to destroy evidence.
4. Personal computers, phones, and portable devices can be searched and taken without a warrant at border crossings. (Note: International airports may be considered borders though far from an actual border.)
5. Work computers shared with co-workers have fewer guarantees of privacy than ones used by individuals.
6. Employers may grant permission for searches without warrants and may search a work computer or office "as long as the search is for a non-investigative, work-related matter."
It is best to consult an attorney before speaking to law enforcement officials if you have any doubts about sharing information. Anything you say can be used against you.
|
Power Point TIP:
A good way to add interest to a presentation is drawing, highlighting, or writing on a slide while you're speaking.
PowerPoint offers several marking tools that are easy to access and use:
1. Right click with the slide on the screen; and
2. Select Ballpoint Pen, Felt Tip Pen, or Highlighter from the Pointer Options list.
Ink color may be changed to contrast with the background.
Once marks are made, an eraser tool becomes available to either remove small portions or clear all recent additions.
|
Just a Bit of Humor...
More Similarities between Dogs and Computers:
End undesirable behavior:
Dogs: hit dog with rolled up newspaper
Computers: hit control-alt-delete
Way to mess with their heads:
Dogs: peanut butter on roof of their mouth
Computers: peanut butter in the CD-ROM drive
Widely ignored government mandate:
Dogs: leash law
Computers: Communications Decency Act
|
Tesxting Codes answers
BTW = Bring the wheelchair GHA = Got heartburn again
OMMR = On my massage recliner TTYL = Talk to you louder
________________________________________________________
We sincerely hope you appreciate our service as much as we appreciate your business!
Please mention Tobin Solutions to people who might benefit from our services. Give us a potential client's name, and we'll make the contact.
The best compliment is a referral!
|