Resources

ICG Blog

 
     

 Introducing FlightFiles - Aircraft Maintenance Tracking Made Easy

IowaComputerGurus is excited to announce the general availability of our new Web-Based Aircraft Maintenance Tracking system.  Designed to take the headache out of tracking important maintenance operations with single-engine aircraft.  The idea driven from the cumbersome tracking processes that I personally encountered when going from student pilot to aircraft owner.  I wanted the ability to quickly and easily see what needed to be done with my plane, when it needed to be done, and in a manner that was reliable.  I didn't want others using my plane to need to remember to "send a picture" of the flight log in the plane, or provide other information to me to stay on top of things.

 Adopting a Performance Focus With Software Development

Over the past few years I have given a number of talks and written multiple blog posts on the topic of performance optimization as it relates to software development.  These postings have been very technical in nature and focus greatly on the problem solving aspects of application performance.  However as I review my presentations one of the most critical aspects of application performance is actually business organization and dedication to application performance.  In this post I would like to review the common approaches that I see within development teams and easy ways for management to encourage positive change to focus more on development.

 Performance Testing Success Story: An Active Third-Party Vendor

I often talk about the importance of having well performing applications.  The reasons for my focus on performance are vast and range from the user experience, ability to handle load, Search Engine Optimization (SEO), and everything in between.  One of the most common issues that I will encounter with client sites when optimizing is that the root of their performance problem might reside with a third-party component that they have used.  Sometimes this was a component they selected, other times it was a component another consultant recommended, and even other times it was an item that was part of the framework that they were using and they did not have a choice.

 Understanding the Logistics of Moving Websites

Recently for a number of reasons I've been working with individuals that are taking a website and moving them from one hosting provider to another.  Sometimes these moves are taking the existing site as is, other times it is migrating to a "new site" at the same time.  However, after doing at least 10-12 of these in the past few months a few common points of "confusion" have come to light.  As such, due to popular request I'll lay out the basics of how to move a website from one hosting provider to another and discuss the component parts that are involved in such a move. 

 Knowing Your Website And Component Parts

Over the past few months we have seen a number of situations where we encounter customers that have had horrendous issues with their websites.  As we work to resolve issues for these customers we often find that key information that either allows us to help them, or that would have prevented then from being in the situation that they were placed in.  After seeing a number of common trends we thought it would be important to start sharing some insight on some key items that should be known by all website owners, regardless of their technical ability.

 Major IowaComputerGurus Updates

We have been busy here at IowaComputerGurus for a while as we have been heads-down working on a massive set of updates to the documents, modules, tools, and resources that we make available on this site.  In addition to a major update for our brand and visual appeal.  It is with great honor that I reveal to you the fruits of our labor from the past months!

 Segregation of Duties: DNS, Domain Registration & Hosting

Managing risk is an important subject for any business, and to continue our series of discussions around risk management strategies for web assets, I want to spend a bit of time regarding DNS and domain registrations.  In Computer Science there is a common term, Separation of Concerns, that defines architecture recommendations for software development with a focus on modularity in design.  When looking at your Domain Registrations, DNS Entries and hosting it is important to employ a similar strategy to avoid potential risks in the future.

 Managing a Disaster and Protecting Your Assets

Over the past 24 hours we have assisted a large number of customers with server disasters, mostly stemming from a series of Windows Updates that went horribly wrong.  I blogged about the main issue on my personal blog today under the title, Windows Updates, Monitoring, and ASP.NET Oops!.  If you have not yet read this article, I strongly recommend you check it out as well as continuing with this article.  By most accounts that type of an issue would be considered a disaster with sites being down and resources unavailable to perform their regular duties.  Today's excitement prompted a lot of questions regarding the concept of true disaster preparedness and what levels of protection a customer needs to ensure their assets are properly protected. 

 Balancing Need for Help and Security

It is a regular occurrence for us to receive requests from people that are experiencing extreme issues.  It could be a single site that is down, a whole server that is having problems or any combination of other issues.  While we totally understand the urgency behind each of these requests, it is amazing the types of security risks that users will put themselves into, just to get help.  In this post I will outline our "best practices" recommendation for balancing the line between security and the urgency for help.

 Securing User Passwords in DotNetNuke

If you have been paying attention to the news in recent months you have most likely heard of a few cases where user information, such as Usernames and Passwords, have been exposed from some high visibility websites. Some of the more current leaks were with Gawker and Mozilla. For those that are unfamiliar the situation is pretty simple. These sites store user login information, usernames and passwords, that allow users access to their systems. Their systems were then breached and malicious users were able to get access to the information. Why is this something that I am blogging about in relation to DotNetNuke? Well, without a bit of configuration your site could be at risk, should a malicious user get access to your system. 

Posts By Category