Blog

Two-Factor Authentication, I'm safe now, right??

In the ever-changing cat and mouse game that is Cyber Security, one of the latest "Good Guy" weapons has had its weakness exposed.  Two-Factor Authentication, thought to be a major improvement, is now ...

How to see and print a list of all your installed programs

In this weeks tech tip, I talked about the Shell:appsfolder command and how it will give you a list of all your installed applications. Here's how to do it - right click the Start ...

Windows Shell Commands

In my last article, I talked about a quick way to see all your installed applications using the Windows shell command, Shell:appsfolder.  Shell commands have been around as long as Windows has and there ...

RST now serving Seattle and surrounding areas!

Roland Schorr & Tower is proud to announce its acquisition of KronisTek IT Solutions, a Seattle based Managed Services Company. Through this strategic partnership, we are excited to bring the same best-in-class Managed IT, Cloud, Consulting ...

CRITICAL: Processor Vulnerability called "Specdown'

By now you may have heard about two computer vulnerabilities nicknamed 'Meltdown' and 'Spectre'.  These are caused by a physical ...

A Decade of Service

It seems like only yesterday when Matti Raihala, Morris Schorr, Jeff Randall, Jon Hokama and I, with support from Hale Takazawa and many more, opened the doors on Roland Schorr & Tower. But that yesterday was October 1st, 2005 and ...

Add additional SIP domains to an already deployed Environment

I have been asked this question many times so I felt it was time to document it so others could benefit, this process is becoming more common as Lync gains traction in the marketplace. While it's quite common and a ...

Transfer Calls from an Inter. Response Group to Exch UM

I was recently doing a Lync deployment for a customer and they had some very complex Auto Attendant requirements so we decided to use "Interactive Response Groups". The IRG's really are a nice feature, you can specify up to two levels ...

Using Cmdlet Extension Agents

Using Cmdlet Extension Agents to cause automatic events to occur in Exchange 2010 - life just got simpler! This Blog, from ...

Wireshark Capture Tips

Wireshark Capture Tips Original Article published by Jeff Schertz Using tools like Network Monitor and Wireshark are common place when dealing with troubleshooting issues in Lync Server or when simply attempting to better understand some specific behavior. As Wireshark is ...

Contact

Honolulu Office

Seattle Office

Flagstaff Office

Astoria Office

Social Media


Newsletter

Join our Newsletter to get the latest technology news and special offers.

  • This field is for validation purposes and should be left unchanged.