Latest Post

New service: Extended support

New service: Extended support

Introducing: extended support.   In popular demand we have added a new service to our primary IT Services. We have been requested by quite a few if we could provide white-labeled support, using their ticket systems, chat systems, etc. After some consideration we...

New website released

New website released

The new website from 2020 has been released.   We are extremely proud of our new website. With great focus on design and content for any sized screen we feel we accomplished our goals. We did postpone the release of our new back-end system, and will continue to...

New website & new projects in 2016

New website & new projects in 2016

Introduction It has been a while since my last update Key4ce hasn’t been sitting still in all those months, we are working hard on releasing several new projects and some major version releases for existing projects. New key4ce.com website in March Key4ce osTicket...

NOC & Maintenance

View All

No Results Found

The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.

Business Insights

View All

Keep Servers Running With Infrastructure Tools

Keep Servers Running With Infrastructure Tools

Infrastructure, in the context of IT servers, is simply organized server support. It refers to how the servers are physically, logically, and/or functionally grouped together and includes the tools (mostly provided by vendors and occasionally custom-made by the system...

IT Efficiency Through Converged Infrastructure

IT Efficiency Through Converged Infrastructure

The idea of converged infrastructure revolves around forming a single optimized IT package by putting together several components to meet present-day business needs. According to HP, converged infrastructure meets these needs “by bringing storage, servers, networking,...

Systems Can Be Attacked Via NTP Flaws

Systems Can Be Attacked Via NTP Flaws

At least three serious vulnerabilities in the Network Time Protocol (NTP) have been uncovered by security researchers at Google in 2014. This is quite serious because of the sheer number of computers that may potentially be targets of DDoS (click here to read earlier...

Who Needs an Intrusion Detection System?

Who Needs an Intrusion Detection System?

Intrusion detection systems (also called ID systems and IDS) have been, and are still constantly being developed in response to past and present attacks on many high-profile websites and networks, including those of Sony, eBay, Yahoo Mail, Google, Apple iCloud, UPS,...

Software Releases

View All

No Results Found

The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.

No Results Found

The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.

We are a dynamic business consulting firm and Managed Service Provider (MSP). Our mission is to help companies successfully navigate the ever-evolving world of technology.