The Real Reason Apple Users Are Treated Like Second-Class Citizens

(With apologies to Jeff Foxworthy) You might be an Apple user if…

  • You get blank stares from your IT department when you ask for SUS assistance
  • Your company help desk constantly “escalates” through at least four technicians before you get to someone who can actually solve your problem
  • You have to manually provision and update your own devices
  • You have to reformat Word documents so they are readable by your peers
  • You are stuck with aging devices because it’s too difficult to move your environment to something new
  • You’ve ever heard the words,

> Read More

Endpoint Management and Security – More Effective as Partners than Adversaries (Part 1 of 2)

The primary function of enterprise IT management is to empower end users with access to technology resources that will boost their productivity and job performance. However, this focus is at odds with the core precepts of IT security which are adopted to minimize the exposure of enterprise systems, applications, and data. I recall that in a number of IT operations management adventures throughout my career, > Read More

HEAT Software 1:1 iPad Education Program

Tips on Getting the Most Out of Your 1:1 iPad Education Program

There is no greater investment we can make in the future than to prepare our children to successfully navigate the challenges of tomorrow. Of course, predicting the workforce requirements of the future is a bit like trying to capture a fly with a cargo net—just when you think you have it, > Read More

Top 5 Reasons IT Administrators Are Working Too Hard Managing Endpoints


IT administration is a thankless job. Let’s face it—the only time admins gain any recognition is when something goes wrong. In fact, the most successful IT administrators proactively manage very stable environments where very few failures and performance degradations occur. Unfortunately, though, this is rarely the case, and it is far more common for admins to get stuck in the break/fix cycle of reactive “firefighting” > Read More

2015 On Record Pace with Release of September Patch Tuesday

In today’s Patch Tuesday, Microsoft released 12 security bulletins, five of which are critical. With this month’s patch load, we can count 105 updates
released so far this year which is only one update short of the total number of bulletins released back in 2013. We have already far-exceeded last year’s
total of 85. The reason for such a significant increase in updates this year could be attributed to a variety of factors such as the launch of Windows 10
and other new Microsoft products but regardless of the reason, > Read More

Patch Tuesday Still Alive and Well – And Offering Something for Everyone

Despite the launch of Windows 10 and all the talk about mandatory updates, today is still Patch Tuesday. And this month, everyone should pay attention. Microsoft shared a vulnerability smorgasbord today – offering a little something for everyone. From office and browser applications to desktops and servers, Microsoft covered them all with 14 bulletins. > Read More

Windows 10 – Cause for Confusion

As of August 1, ComputerWorld reported Windows 10 global usage had climbed to 2.5%. Not too shabby for the OS that was launched just three days earlier on July 29. Those numbers easily beat early adoption rates for Windows 8.1 but, I wonder how those users are faring? A quick read of headlines shows a lot ofheadaches ranging from overall privacy concerns to unwanted update files being delivered to networked machines still running Windows 7 or 8.1. > Read More

ICYMI – Emergency patch has silver lining for Microsoft

Last week, Microsoft issued an emergency patch in response to a critical flaw discovered by Google’s Project Zero and FireEye. While critical flaws rarely have a silver lining, there’s a big one for Microsoft here. An emergency patch just a week after July’s Patch Tuesday is the perfect outlier for Windows Update for Business (WUB) and 24/7 patching, > Read More

Are You Effectively Tracking your IT Assets?

It’s no secret that IT assets are incredibly valuable components of the corporate enterprise; yet, while many understand why acquiring these assets is essential, the value of effective asset lifecycle tracking often goes unrecognized. The reality is that corporate IT assets should never be “ignored” once deployed; rather, they must be understood and actively managed throughout their use. > Read More