<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=2923012&amp;fmt=gif">

Blog Categories

End of life for vSphere ESX Hypervisor 4.x and vMA 1.0/4.0

If you didn’t already know, as of August 15, 2013, VMware no longer offers the ability to download, downgrade, or generate license keys for vSphere ESX Hypervisor 4.x, and vMA 1.0/4.0. The End of Support Life date remains May 21, 2014. What does that mean for you and your infrastructure? This means that you need for move from vSphere ESX to vSphere ESXi.

Read More

Rutter and Enterasys at Chelmsford Public Schools

Recently, Rutter Networking made headlines about a wireless project that took place at the Chelmsford Public K-12 School district. Rutter and partner Enterasys teamed up to build an updated network infrastructure that would bring Chelmsford Public Schools into a 21st century learning environment. With initiatives such as BYOD, cloud, virtualization and digital curriculum in mind, having a premiere wireless infrastructure in place was a necessity.

Read More

Identity Management: The Rutter Solution

One of the common questions that arises in the IT industry today, what is Identity Management? Identity Management (IDM) is having governance or policy over who has access to what information out of your existing users.  The old way of giving users within your environment access to certain servers, files, etc. was on an as-need and individual basis. Applying governance on an individual basis meant an IT resource would manually have to provision rights for users. As technologies in companies swell, the likelihood of mistakes using a manual process would only increase with time. This is not only time consuming, but hard to manage. It also introduced points of vulnerability in guaranteeing compliance with standards such as HIPPA, Sarbanes Oxley and so on.

Read More

What is BCDR?

Read More

F1 Boston Racing + Seminar - Sept. 19th

Date: September 19th 2013

Read More

1st #RNTChat -- August 22nd at 1PM -- Mobile Device Management (MDM)

How many ‘smart’ devices do you own? A Smart Phone? A Tablet? A Laptop? An e-reader? If you’re like most people, the answer is all of the above. As devices have become smaller, versatile, and more affordable it’s not all that uncommon for people that own these devices to use them both at home and in the workplace. However, this industry trend does not come without security ramifications, having more devices increases the need for the security and management.  A lost Smart Phone or tablet could put your personal and business data at risk and expose sensitive information to unauthorized individuals.

Read More

#RNTCHAT

In the coming weeks, Rutter Networking Technologies will begin conducting a series of web chats via Twitter. These chats will provide an open forum to discuss the latest trends in IT spanning across various topics like BYOD (Bring Your Own Device), BC/DR (Business Continuity & Disaster Recovery) and MDM (Mobile Device Management) just to name a few. Never joined a Twitter Chat before? No worries, we’ve got you covered. Just follow the instructions below!

Read More

MDM (Mobile Device Management)

Mobile device management seems ideal for any business but necessary steps that need to be taken before implementing a MDM system. Mobile Device Management or MDM is the implemented policy allowing users to access various pieces of information from a mobile device that in most instances would normally be stored on desk top or in a remote server. This could range from that users e-mail, data sheets, or other applications that the company is using on a regular basis. Currently, the most commonly used devices that are used to access this information are tablets, laptops, smart phones, mobile printers, and mobile POS devices.

Read More