About Robert...
I have been in the IT industry since 1993 focusing mainly on networking. Though I got an early start as an amateur computer enthusiast and wrote my first database app at age 12, I started my professional career working in the MIS department of one of the largest liquor distributors in the northeast. I started out there as a systems operator on the company’s two mainframe systems. From there I moved into PC support, and help design and implement the company’s first client-server network… This was back in the days of Win NT 3.51 when I worked on my first migration to Windows NT 4.0 server.
From there I went on to work with Novell 3.x and 4.x along with Windows domains and Microsft's brand new Active Directory. Working my way up from technician to specialist, to an administrator, and eventually all the way up to Sr. Engineer. I spent many years working for MSPs/consulting firms, 9 of which I owned and operated my own firm.
Over the years, I have worked with (at an expert level) various versions of Windows client and server operating systems (including Windows 11 and Windows Server 2019); various virtualization technologies (Hyper-V, VMware, etc.); MS-SQL server 6.5- 2014 R2; Exchange 4-2019, and much more. Over the years I have built a lot of experience around the Microsoft Azure and Microsoft 365 cloud environments.
I am now CTO at Infused Innovations where our team is focusing on helping clients build a Secure Intelligent Workplace through InfoSec (Zero Trusts Framework), Modern Workplace, and Business Intelligence.
I have been heavily involved in the IT user group community, including serving as president of the board of Boston User Groups, Inc., and president of IT-Pro User Group. In 2017/2018 Microsoft awarded me the Microsoft MVP (Most Valuable Professional) Award, with a focus of Microsoft Azure cloud, for my efforts in the IT community.
I am in a constant state of learning about new products, and new versions of products. Many of which we end up implementing in lab environments and sometimes for our clients. I have a very broad range of expertise and experience. It is my goal to share some of this experience on this blog to help enrich the IT community.
Most commented posts
- Importing & Exporting Hyper-V VMs in Windows Server 2012 R2 — 11 comments
- How To Split an Internet Connection Between Two or More Computers — 6 comments
- Windows Server 2012 Feature: Share Nothing Live Migration in Hyper-V — 6 comments
- A Real IP Phone System "On The Cheap" — 5 comments
- What printers work best with a Windows Remote Desktop Server? — 4 comments
Author's posts
IT Pro Tech Update 2012
On Wednesday May 2nd 2012, the IT-Pro User Group is hosting Tech Update 2012 an all day FREE event. Come join us for this FREE event and discover the next phase of Information Technology as we discuss Windows 8 in the business environment, Virtualization, Security, Interoperability, and Systems Management. Here is your chance to learn what the impact of Windows 8 server and desktop will have and how you can leverage them to your advantage. We all know that Virtualization is huge but are you sure your virtual machines are secure enough? Will Windows 8 make a difference in the Virtual world? How does virtualization in the cloud work? Come learn the answers to these questions and more from some of the top experts in these fields.
This is a multi-session, multi-track event so it will draw a crowd of the right people. These are primarily IT Professionals in southern New England that are interested in advancing their knowledge and use of system management, virtualization, and cloud computing in an effort to know how to move their companies forward.
Open Wi-Fi and power will be available at seats.
Event Type: Tech Fest
Location:
1408 Division Rd.
East Greenwich, RI, 02818
Best for: Developer and IT Pro and Public Sector and Student.
Permanent link to this article: https://www.robertborges.us/2012/04/uncategorized/tech-update-2012-free-event-on-wednesday-may-2-2012/
Answer: Probably not. Most home networks are not secure to begin with. To add wireless A/B/G/N on top of that, you’re really asking for trouble. Fear not, for here are a few things you can do to lock down your environment, and keep out snooping eyes. Continue reading
Permanent link to this article: https://www.robertborges.us/2012/04/it-security/is-your-home-wi-fi-secure/
On many occasions I have had people ask me “Where can I learn about Microsoft’s product X”, or “Is there anywhere I can go to get free training”. Well, here is a list of just a few of the resources Microsoft provides to us all so we can get educated and try out many software titles before making an investment. Continue reading
Permanent link to this article: https://www.robertborges.us/2012/04/learning-resources/learning-tools-resources-from-microsoft-2/
In Parts 1 and 2 I discussed securing your network perimeter and server environment. But as I said in the beginning, IT security is like an onion. Let’s take a look at the 3rd layer of that onion… securing your end-user environment. Again, this is not meant to be a complete list, but instead a starting point to help you think through your own IT security strategy. Continue reading
Permanent link to this article: https://www.robertborges.us/2012/04/it-security/it-security-is-like-an-onion-it-security-basics-part-3-end-user-security/
In Part 1 I discussed securing your network perimeter. But as I said in the beginning, IT security is like an onion. Let’s take a look at the next layer of that onion… securing your server environment. Again, this is not meant to be a complete list, but instead a starting point to help you think through your own IT security strategy. Continue reading
Permanent link to this article: https://www.robertborges.us/2012/03/it-security/it-security-is-like-an-onion-it-security-basics-part-2-server-security/
In this day and age, every organization should have a good firewall at the perimeter of their network. There are firewalls all over the spectrum and many good options for businesses small and large. For small businesses there are great firewall units designed for the SMB market from companies like Cisco, Sonicwall, and Astaro. For medium to enterprise size organizations, or if you just want that extra capacity, there are some really fantastic devices from Cisco, Fortinet, and Astaro that should give you the functionality and flexibility you need. Regardless of the manufacturer, there are key components which are critical to your network’s security. Continue reading
Permanent link to this article: https://www.robertborges.us/2012/03/it-security/it-security-is-like-an-onion-it-security-basics-part-1-perimeter-security/
In many ways, IT security is like an onion comprised of many layers. As you work through each layer new layers are revealed. This blog series is not meant to be a complete list, but instead a starting point to help you think through your own IT security strategy. Long gone are the days where antivirus software alone is enough security! This is a 3 part series outlining Perimeter Security, Server Security, and End-User (client) Security.
Part 1, Perimeter Security will be available on Monday March 19, 2012.
Part 2, Server Security will be available the following Monday March 26, 2012.
Part 3, End-User (client) Security will be the final post of the series and will be available on Monday April 2, 2012.
Permanent link to this article: https://www.robertborges.us/2012/03/it-security/it-security-is-like-an-onion-the-basics-of-it-security-blog-series/
Forefront Online Protection for Exchange (FOPE) is one of the unsung heroes of the Microsoft Exchange world.
If you’ve been running Microsoft Exchange for your organization, chances are you’ve heard of Forefront Protection for Exchange. This is a software which sits on servers in the datacenter and monitors all incoming and outgoing email to protect against spam and malware threats (among other threats). One of the biggest concerns I hear from administrators, when considering email protection, is not feeling comfortable enough with their security experience to be responsible for something so critical as Forefront Protection for Exchange.
Continue reading
Permanent link to this article: https://www.robertborges.us/2012/03/it-security/what-is-fope-forefront-online-protection-for-exchange/
What is Cloud Computing?
There are many definitions as to what constitutes “Cloud Computing”. Some organizations say that server failover clustering is a requirement. Others say that metered services are required. At its core, cloud computing simply means that these products/services are hosted on the web and you pay for what you use (to varying degrees).
Continue reading
Permanent link to this article: https://www.robertborges.us/2012/03/cloud-computing/cloud-computing-why-go-to-the-cloud/
Few can argue that carrying a cell phone is very convenient for both us and the people trying to contact us. For many of us it is an absolute necessity to be reachable for at least part of the day regardless of whether you are in the office, home, or on the soccer field with the kids. For many years IT Pros have been forced to carry multiple devices. Some were personal devices (cell, iPod, etc…), while others were work related (work cell, PDA). Luckily, now there are some new technologies which allow us to consolidate to one or two mobile devices. Continue reading
Permanent link to this article: https://www.robertborges.us/2012/03/mobile-computing/consolidation-for-the-mobile-worker-how-many-phones-do-you-carry/
When is a computer too old? This question is getting harder and harder to answer. Traditional PC lifecycle thinking says that a PC is efficient to use up to 4 years old, and no longer cost effective to use beyond 5 years old. This is because the cost of maintaining the system is greater than the value of this old PC or laptop. Continue reading
Permanent link to this article: https://www.robertborges.us/2012/02/cloud-computing/when-is-a-computer-too-old-the-cloud-may-be-changing-how-we-think-about-this/
Microsoft has announced an update to their popular cloud storage system SkyDrive (part of the Microsoft Live.com family of free cloud services). With this update SkyDrive will essentially be part of the Windows 8 metro style interface. There will also be integration to allow access to your SkyDrive from the Windows Explorer window in Windows 8. This will make it as easy to access your SkyDrive as is your My Documents folder. Continue reading
Permanent link to this article: https://www.robertborges.us/2012/02/cloud-computing/video-microsofts-updated-skydrive-will-be-integrated-into-windows-8/
Regardless of how much time and money software companies put into writing their programs, we still have application crashes. An application crash is when a program or part of the operating system ceases to function properly. Preventing application crashes is usually difficult since the only way to permanently ensure you never get a crash again is to fix the bug in the software. We may not be able to prevent these crashes from happening but dealing with a crashed application, in Windows 7 or Windows Server 2008, is easier to deal with than many realize.
Continue reading
Permanent link to this article: https://www.robertborges.us/2012/02/windows/windows-7/closing-a-crashed-or-hung-application-with-windows-task-manager/
The Fourth Annual Virtualization Deep Dive Day is in coming soon. New date and new location this year. Bigger and Better than ever!
The Keynote for the event will be delivered by Brian Madden, world famous blogger and speaker on Desktop and Application Virtualization.
In “The Current State of the Desktop Virtualization Market”, Brian will take us beyond the hype and speak about what real enterprises are actually doing. In his role as a professional blogger (Really? You can make money doing that?) for the self-named BrianMadden.Com, a Tech Target Company, Brian travels the world speaking with both leading edge vendors and with companies that are implementing these technologies. With all of the choices on how to provision desktops and applications, what are people doing and why? Brian talks about these questions, but not just from an IT perspective, also from the view of end users.
Brian Madden Independent Industry Analyst and Blogger. He is known throughout the world as an opinionated, super technical, fiercely independent desktop virtualization expert.
Be sure to arrive early to get a good seat for this one!
Be sure to register by Feb 17th for the Early Bird Discount!
http://deepdive2012.eventbrite.com/
For more information about the Virtualization Deep Dive Day 2012 event visit the Virtualization Group Boston’s website at http://www.virtg.com/DeepDiveDay2012.
Permanent link to this article: https://www.robertborges.us/2012/02/events/deep-dive-2012-registration-is-open/
Sometimes called the Windows Bluescreen, the Windows Blue Screen of Death (BSOD) can really be quite scary. If you are getting a BSOD as soon as Windows loads, or just after you login, then there may be a startup program or service that is causing the problem. This is an issue that haunts us all from time to time. Hopefully after reading this, it will be a little less scary. This post will show you a few methods for combatting a Blue Screen of Death (BSOD). This process will work with either Windows XP, Windows Vista, or in Windows 7.
Continue reading
Permanent link to this article: https://www.robertborges.us/2012/02/windows/how-to-combat-the-feared-blue-screen-of-death-bsod/