menu3c 01 menu4c 08 menu4c 08

 

Lantec-GSA-vector-fileTVA-95220 Final TVA-95220-Converted

  

Facebook Icon   Twitter Icon  LinkedIn Icon


 

LANtec blog
Top 15 Tips Beginners Should Know About SQL Server PDF Print E-mail
Written by Josh W. - Senior Development Architect at Sparkhound   
Tuesday, 29 July 2014 00:00

We are excited to see a number of people from the technical community sharing their knowledge and ideas! This week we are featuring a blog post by Josh W., Senior Development Architect at Sparkhound!

SQL Server

 

 

Top 15 Tips Beginners Should Know About SQL Server

 

  1. It's "See-quell", not "Ess Kew Ell".  (That's an easy one.)
  2. For each database, it's either SIMPLE recovery model or FULL recovery model + regular Transaction Log Backups.  These are the only two options.
  3. Don't shrink a database file unless it's an emergency.  The file grew to its current size for a reason. (Unless, of course, you forgot Lesson #2.)
  4. Shrinking a database on a schedule is about the rookiest mistake you can make, as is enabling the "AutoShrink" feature.  Never!
  5. Database Autogrowth events are unpredictable performance drains on a database. Proactively look out for database files that are experience autogrowth events, and manual grow those files yourself instead.

Continue reading here...

Last Updated on Tuesday, 29 July 2014 08:50
 
LANtec Lagniappe PDF Print E-mail
Written by Administrator   
Wednesday, 16 July 2014 09:51

LANtec Lagniappe

We had not one, but TWO Employees of the Month for June!

Learn all about them here!

Mechelle RoberthonMechelle Roberthon

How long have you been with LANtec? 2 months and 6 days

Any pets? Goodness NO! I’m afraid of all animals L

What is your “go-to” song? “Let Me Win” by Chrisette Michele

What is your favorite feel good food? Baked chocolate chip cookies

What is one thing you can’t live without? God/Jesus

What were you doing the last time you had a really great laugh? Making fun of the way a celebrity pronounced bridesmaids

What is one thing on your bucket list? Visit New York City!

Tell us something that people may be surprised to know about you. I played the cello for 3 years and I miss it!

What do you enjoy the most about working at LANtec? Teaching something new and refreshing to the students who come to class. When they can use what is being taught I know I have done my duty J

 

Cheryl WilliamsCheryl

How long have you been with LANtec? Just over 3 years.

Any pets? 3 dogs: chihuahua, minpin, and a lab mix

 What is your “go-to” song?  Walking on Sunshine, by Katrina and the Waves always makes me smile.

What is your favorite feel good food? Chocolate!

What is one thing you can’t live without?  Family

What were you doing the last time you had a really great laugh?  Chatting with my mom on the phone. I love to laugh!

What is one thing on your bucket list?  See my ancestral castle in Scotland.

Tell us something that people may be surprised to know about you.  I was very shy growing up; my first speech in school was a disaster, I spoke no louder than a whisper.

What do you enjoy the most about working at LANtec?  The people! Students and coworkers alike.

 

Last Updated on Wednesday, 16 July 2014 10:05
 
TechEd North America 2014 PDF Print E-mail
Written by LANtec Instrcutors   
Wednesday, 11 June 2014 08:57

TechEd North America, Houston TX – May 11-16, 2014teched-2014-microsoft-logo

TechEd North America is an annual Microsoft conference that provides technical education, product evaluation, and community resources to IT Professionals. The brightest and most skilled technology professions meet to increase their technical expertise through deep hands-on technical learning, sharing of best practices and interaction with Microsoft and a variety of industry experts and their peers.

LANtec sent two of our Microsoft Certified Trainers, Cheryl Williams and Cyndi Cunningham, to gain insight and learn about new products and resources to ensure our staff stays up-to-date with the cutting-edge technology they are tasked with teaching. The following is a little insight from each of their experiences throughout the event.

Cheryl Williams

CherylThe conference had something for everyone with an interest in technology. The keynote session focused on the move to the “cloud” and Microsoft’s Azure platform, used for everything from big data to video games. Once the keynote session wrapped up, breakout sessions and hands on labs filled the remainder of the week.

Attending the conference reignited a fire for learning about new technologies, while building on my current knowledge, especially of Excel and SQL Server. I also have a renewed respect for the certification process and Microsoft Certified Trainers (MCT) especially. Meeting a few of my fellow MCTs was inspiring; it was great to connect with others that share the passion not only for technology, but helping others understand it.  I also took the opportunity to attend 2 exam prep courses on SQL Server 2012, led by one of the test writers, which gave me more insight into what is really covered in the exams. This first-hand knowledge will assist LANtec clients who are pursuing Microsoft certifications post-training.

One of the tracks that had plenty of attention was the data platform and business intelligence. Microsoft’s Business Intelligence suite of products gives every user in an organization the power of data. BI solutions are available in many forms; an existing SQL Server, SharePoint, Excel, or even a subscription to Power BI for Office 365.A user can take their enterprise data combined with external data from a marketplace for comprehensive analysis. For example, a small umbrella making company can use their own sales data combined with historical weather reports to decide when production needs to be increased. BI solutions display in many ways; Power View creates interactive dashboards and reports, Power Map shows geospatial data on a 3D map, Power Pivot creates a sophisticated Data Model right in Excel. I plan to use a couple of the pieces I picked up in my BI class deliveries.

Cyndi Cunningham

CyndiTechEd was such an amazing experience. There was so much information to take in at the conference and so many sessions to choose from. The sessions offered us an insight into different ways to use the applications we teach. I attended sessions on PowerShell, Windows Server 2012, SharePoint 2013, BI for PowerPivot for Excel and even one on Yammer, which is a really nice free Social Networking tool for work-related conversations. The knowledge I gained while digesting all the information discussed was invaluable!

It really was a fabulous experience overall.  The connections we made and the conversations we had with other certified trainers, MCPs and even vendors was something I didn’t anticipate and a somewhat nice surprise. So glad we attended!

Last Updated on Wednesday, 11 June 2014 09:22
 
Ransomware: Tips & Tricks PDF Print E-mail
Written by Eric Barker   
Thursday, 05 June 2014 11:45

Ransomware: Tips & Tricks

 ransom

If you haven’t already heard, there’s a new breed of malware called RansomWare (CryptoLocker, CryptoDefense) – which infect your computer, encrypt your files, and then direct you to a website pay to decrypt them. A timer is set at this point, and if you don’t pay before it expires, you either can’t get your files back or it increases the price. The price can be anywhere from $300 on up!

 

 

How does Malware get on a computer? Typically:

 

Bogus email with an attachment which tries to convince the user to open.

Never open an attachment directly from an email. Always save the attachment first, then open it from the file system. Your anti-virus will scan the file as soon as its saved and quarantine it if necessary.

 

Browsing the web and clicking the wrong link or button.

Keep your eyes open, think before you click, and refrain from personal browsing while at work. Our firewalls at the edge of our network and the Internet does a decent job of protecting here, as well as the TrendMicro AV installed on each computer, but we as Users still have a part to play.

 

Introducing files from an external source (USB thumb drive or CD/DVD). 

Many organizations do not even allow removable devices and media to touch their computers because of this threat. We don’t want to have get to that level of scrutiny, but be save with your thumb drives. Scan and clean them often, Instructors especially.

Here are some simple (but frequently ignored) safe computing practices to consider when opening emails and file attachments, in general:

 Always check who the email sender is. 

If the email is supposedly coming from a bank, verify with your bank if the received message is legitimate. If from a personal contact, confirm if they sent the message. Do not rely solely on trust by virtue of relationship, as your friend or family member may be a victim of spammers as well.

 Double-check the content of the message.

There are obvious factual errors or discrepancies that you can spot: a claim from a bank or a friend that they have received something from you? Try to go to your recently sent items to double-check their claim. Such spammed messages can also use other social engineering lures to persuade users to open the message.

 Refrain from clicking links in email.

In general, clicking on links in email should be avoided. It is safer to visit any site mentioned in email directly. If you haveto click on a link in email, make sure your browser uses web reputation to check the link, or use free services such asTrend Micro Site Safety Center.

 Always ensure your software is up-to-date.

Currently there are no known CryptoLocker that exploits vulnerabilities to spread, but it can’t be ruled out in the future. Regularly updating installed software provides another layer of security against many attacks, however.

 Backup important data

Unfortunately, there is no known tool to decrypt the files encrypted by CryptoLocker. One good safe computing practice is to ensure you have accurate back-ups of your files. The 3-2-1 principle should be in play: three copies, two different media, one separate location. Windows has a feature calledVolume Shadow Copythat allows you to restore files to their previous state, and is enabled by default 

Last Updated on Tuesday, 10 June 2014 10:49
 
«StartPrev123456NextEnd»

Page 1 of 6
 
 
Baton Rouge
11512 Lake Sherwood Ave N
Baton Rouge, LA 70816
(225) 293-0656 phone
(225) 293-0657 fax
click for map and directions
 
Lafayette
900 E. St. Mary Blvd
Suite #209
Lafayette, LA 70503
(337) 233-2016 phone
(337) 261-2361 fax
click for map and directions
 
 Join our team
feed-image Subscribe to our RSS Feeds