Do you know how TV ratings work? Companies like Neilson create a sample audience, identify who watches what, and then use the data to estimate total viewership. Well, here at Devolutions we have a sim...
We all know that when it comes to logs, it’s important to keep track of every little thing – like error messages, warnings, and so on. But that raises the question: where are you supposed to store all...
The famous 19th century poet Henry Wadsworth Longfellow once said: “Look not mournfully into the past, it comes not back again. Wisely improve the present, it is thine. Go forth to meet the shadowy fu...
Some myths in life are harmless, or even charming and helpful — like Santa Claus and the Tooth Fairy (sorry if we’re shattering anyone’s fantasies with this revelation). But some myths in life are dan...
If you monitor several Microsoft Windows Servers and workstations via Remote Desktop Manager, then you know that switching between consoles is time-consuming and tedious. Well my dear friends, I have ...
Learn how installing spyware presents a massive security risk that extends far beyond a privacy nightmare – and how to protect yourself and your business. A jealous spouse reads his wife’s text messag...
Over the past 3 decades, we’ve watched information technology radically transform the workplace. It has changed how we view business processes and given us an appreciation of the far-reaching efficien...
During the early stages of Remote Desktop Manager’s development, focus was set on click-next-to-continue deployment and ease of use. We can all agree that the IT field has changed drastically these pa...
You know the old saying, “If it ain’t broke, don’t fix it”? Well, here at Devolutions we disagree with that advice. Even if a feature works the way it’s supposed to, we know there’s always room for im...
Recently, we looked at the differences between data breaches and data hacks. We also highlighted some similarities between them, most notably that in the aftermath of a security incident (accidental o...
An estimated 81% of hacking-related data breaches are due to weak passwords, which have one or more of these characteristics: ,Composed only of numbers ,Composed only of letters ,Too short ,Uses a p...
Some things in life have meaningful similarities, but they are not the same — to my fellow GOT fans out there, do you really know the difference between a white walker and a wight? Or the difference b...
As you may have discovered, current Privileged Access Management (PAM) solutions in the marketplace are typically quite expensive, and therefore unaffordable for most small and midsize businesses (SMB...
Companies are migrating business functions to the cloud with increasing regularity. This means the security of consumer and operational data is paramount. Business leaders and IT professionals have a ...
You know that feeling when you really want something, but you have to wait, and wait, and wait some more? That drives me crazy! Ask anyone who knows me, and they’ll tell you that patience is NOT one o...
Over the years, the term “geek” has totally changed its image. Once upon a time, it was a massive insult to be branded a geek. Basically, it was like being called a nerd but without the high IQ. But t...
As you hopefully know, one of the guiding principles here at Devolutions is to help as many IT pros around the world control IT chaos. That’s why we are proud to continue improving Remote Desktop Mana...