Call Us Today 888-507-9921

Blog

Ignite 2018!

Yes friends, its that time of year again!  IT professionals from all walks of life and all over the world will gather in Orlando, Florida next week to attend the 2018 version of ...

The Simplified Ribbon

The Outlook Ribbon contains all the options and commands you use to accomplish tasks.  You click buttons on the ribbon to create a new email, delete emails, open a new meeting request, or ...

Two-Factor Authentication, I'm safe now, right??

In the ever-changing cat and mouse game that is Cyber Security, one of the latest "Good Guy" weapons has had its weakness exposed.  Two-Factor Authentication, thought to be a major improvement, is now ...

Event ID 2158,2161 MSExchange ADAccess

Description (MSExchange ADAccess 2158 Validation): Process Microsoft.Exchange.AddressBook.Service.exe. Recipient object CN=XXX,OU=XXX,OU=XX,OU=XX,OU=XX,DC=XXX,DC=XXX,DC=XXX read from <Domain Controller> failed validation. A partially valid object will be returned.  Set event ...

Exchange 2010 EMC / Powershell WinRM error connecting

Recently I had a customer go through a routine upgrade from Exchange 2010 SP2 RTM to Exchange 2010 SP3 that I performed, and after the patching was done everything was fine until we realized management on the Exchange UM servers wasn't working. ...

How to see and print a list of all your installed programs

In this weeks tech tip, I talked about the Shell:appsfolder command and how it will give you a list of all your installed applications. Here's how to do it - right click the Start ...

Windows Shell Commands

In my last article, I talked about a quick way to see all your installed applications using the Windows shell command, Shell:appsfolder.  Shell commands have been around as long as Windows has and there ...

RST now serving Seattle and surrounding areas!

Roland Schorr & Tower is proud to announce its acquisition of KronisTek IT Solutions, a Seattle based Managed Services Company. Through this strategic partnership, we are excited to bring the same best-in-class Managed IT, Cloud, Consulting ...

CRITICAL: Processor Vulnerability called "Specdown'

By now you may have heard about two computer vulnerabilities nicknamed 'Meltdown' and 'Spectre'.  These are caused by a physical ...

A Decade of Service

It seems like only yesterday when Matti Raihala, Morris Schorr, Jeff Randall, Jon Hokama and I, with support from Hale Takazawa and many more, opened the doors on Roland Schorr & Tower. But that yesterday was October 1st, 2005 and ...

News

Blog

Social Media


RST TECH TIPS

Join our Tech Tips list to get Tips & Info about using your technology and keeping secure.