About Kristin Southerland

This author has not yet filled in any details.
So far Kristin Southerland has created 38 blog entries.

The Fast File Transfer Protocol by Aspera


Does It Actually Work and How Fast Is It... Really? An Aspera Review. Having been in the IT business since dirt, I have seen the latest and greatest technology promotions come and go.  Like many of you, I have suffered all the slide presentations only to find the product rarely works as smoothly out-of-the-box [...]

The Fast File Transfer Protocol by Aspera2017-10-10T15:46:32-05:00

How to Block Installation of Google Chrome


You’ve set up your infrastructure to provide the most productive work environment possible for your users.  You adhered to company management and IT policies and created a system to control access to the Internet for the company’s and user’s protection.  Then you discover someone found a way to bypass those controls.  Welcome to today’s [...]

How to Block Installation of Google Chrome2017-10-10T15:49:56-05:00

3 Great Blogs to Follow for Information System Security


Technology is wonderful!  I love to explore new gadgets and applications to see what they can do.  My initial reaction to a new device is frequently, "cool new toy!"  Sometimes they don't even have to do anything useful to capture my attention.  That's the fun part of my job.  The challenge is when new technology [...]

3 Great Blogs to Follow for Information System Security2017-10-10T15:51:12-05:00

Should You Move to the Cloud?


Everyone's saying "Move to the cloud!" but how do you know if it's the right move for your business? In the simplest terms, cloud computing means storing and accessing data and programs over the Internet on someone else’s computers. It's a major change from the traditional method of providing technology services and there are many variables involved. Your [...]

Should You Move to the Cloud?2017-05-09T16:38:56-05:00

9 .Net Terms Your Developer Wants You To Know


What exactly is .Net and what are the terms associated with it? With the demand for .Net development steadily increasing, many professionals may find themselves either hiring a .Net developer or working with one on a project. Either way, knowing some of the basic terminologies will improve communications and help move the project along. Lee [...]

9 .Net Terms Your Developer Wants You To Know2017-04-19T12:06:45-05:00

Backup Strategy


A backup strategy is the most critical part of IT operations that is consistently overlooked or ignored. Your IT consultant or internal department should take the time to build a backup strategy focused around customer business needs, whether that is local, cloud or hybrid. Types of Backups for a Backup Strategy Block Level (Ex: [...]

Backup Strategy2017-04-18T15:18:03-05:00



In 2008, a surprising practical application of electronic currency came into use. This week, we look at what is now known as the Bitcoin; how it works and what it might mean to online economic development. The Internet has grown, and commercialization has brought in worldwide participation. An open exchange of ideas and business models [...]




Back in January of 2016, the food chain Wendy's made the news for a Point of Sale (PoS) data breach. As the details have slowly emerged, it has revealed several good and bad points about the way American retailer payments systems are changing. Not surprising to many, the US has the oldest and most [...]

EMV Lag2017-05-10T14:11:37-05:00
Call Now Button