Learning Tools For Microsoft OneNote May Be One Of The Most Disruptive Education Technologies Yet

What makes an education technology tool truly innovative?

At DSN Group, Inc., we are excited about technology that makes use of existing tools in new ways to solve a problem no one has before. Innovations like Learning Tools for OneNote combine with existing tools, such as Bing’s speech recognition and natural language processing, to make the perfect reading assistant built for dyslexic learners but extremely useful for all budding readers.

Those are the types of innovations we want to help you implement in the classroom. Contact us to learn more.

Read More

Improving Security

 I recently saw an article that said – “Want to enhance your cyber security and privacy? …here are more than 50 free tools to help you.” I love the idea of having some open-source or free tools…but what concerns me is having a need for so many tools. AV and Endpoint security SIEM Security Information…

Read More

Windows 7 – The End

We authored a blog on Win7 back in 2016…it was on end of sale of the popular OS. Arguably, one of the most popular operating systems of all time, certainly Microsoft’s most popular…or was. One that has lasted even longer than Microsoft expected…GA – generally available in October 2009, Microsoft has announced the end of…

Read More

Edge Focused/Centric World …. Security Needs.

The IT landscape always seems to be changing and advancing. It has gone from centralized to distributed and back several times. And again, seems to be transitioning from centralized environments and moving to distributed – a lot to the edge. We are moving toward a more edge-centric/focused technology environment. With IoT, Wi Fi, 5G, more…

Read More

Building a Security Culture

Why is it important? What are the risks? How do we build that culture?  The reason that IT security is important is twofold. First of all, more data is being kept electronically/digitally vs. keeping hard copies. As a result, more information is being kept in this format because it is easy. Plus, the second reason…

Read More

A Couple Steps to Improve Your Cybersecurity

Security is one of the key areas that companies are looking to improve. Ask any senior IT manager and it ranks as one of the top initiatives. Ask almost any business executive and it is also a high ranking topic. I have been on several calls with our resident security analyst and he almost always…

Read More

Lower Your Secondary Storage Costs With Scale-Out Infrastructure

If you’ve bought a new car recently, you likely did not consider the total cost of ownership as part of your selection process. You probably did not ask the dealer about the total cost of oil changes, new tires and wiper blade replacements for the next five years. If you liked the car, the price…

Read More

Protect Yourself from Ransomware

Ransomware has been around for about a decade. But it still is a concern for many CIO’s, IT managers and business executives. Ransomware is a type of malicious code/software that threatens to either publish the victim’s data or withhold access to recovering files until a Ransom is paid. The actual malicious code/software is typically delivered…

Read More

Patch Management Best Practices

In a report published by the SANS Institute reviewing IT security spending trends (2018), they rank “spending effectiveness”. The effectiveness rank of the top 5 in a list of 21 is: Access & Authentication Endpoint Security Advanced Malware prevention Wireless Security Continuous monitoring The top 5 in dollars spent are: Access & Authentication Advanced Malware…

Read More

Disaster Recovery (DR) Planning

DR planning can be a challenging task. It requires gathering and documenting information from multiple sources. But it is important and equally important to keep updated. Here are some reasons to update/create a DR Plan. Hardware and systems fail Humans make mistakes User expectations — everything works all the time The cost of downtime to…

Read More