Thought Leadership

Managing Your Technology Through End-of-Life

August 31, 2022

As with all things related to technology, change and evolution are inevitable.  End of Life (EOL) is part of a typical technology lifecycle and means an application, platform, or hardware will no longer be supported by its manufacturer. No more patching or security, no more updated versions. Choosing to continue to use an application, platform, or hardware once it has reached its end of life can result in compliance issues, increased operational costs, and, as mentioned above, security [...]

Say Goodbye to On-Prem Domain Controllers with Azure AD Native Join for AVD

June 28, 2022

Azure Virtual Desktop (AVD) is once again pushing the boundaries of virtual desktop technology. The long-awaited Azure Active Directory (Azure AD) native join capability will address a significant gap in the product offering.  Azure AD native join will allow users to fully manage their virtual environment without any need for extending existing or creating new legacy Active Directory infrastructure in the cloud.  Now, this might sound like a bunch of unintelligible tech [...]

Closing The Homework Gap with Tech-Focused Education Funding Programs 

May 24, 2022

Technology has become an integral part of education, especially in the years since the start of the pandemic. As more schools begin taking advantage of online learning, the more important access to good technology has become. The problem is that tech can be extremely expensive, and schools are often underfunded. The best way for schools to circumvent this problem is by applying for tech-focused education funding programs such as E-Rate and the Emergency Connectivity Fund (ECF). These go [...]

GadellNet Honored as one of Indiana’s Healthiest Employers

January 14, 2021

In late December, GadellNet Consulting Services was named an Indiana Healthiest Employer Honoree, in company’s ranging from 2-499 employees.  We had the additional distinction of being the only Managed Service Provider honored in this category.   The [...]

How to Boost You WiFi While Working From Home

December 11, 2020

There is no doubt your WiFi has been put through the paces over the last few months. Due to COVID-19 you’re likely working from home, maybe your partner or spouse is, as well. You have kids trying to complete eLearning courses, play video games, and chat with friends. With all this extra strain, your internet may be slower than you’d like, leading to frustrating losses in productivity. Boosting your WiFi speed on your laptop and making sure your WiFi is reaching all parts of your house can [...]

What to Look for in a Managed Service Provider

December 2, 2020

When you’ve decided to outsource some or all your business-critical IT functions, the real work begins. Finding the right partner for your organization isn’t easy. There isn’t a one-size-fits-all provider who can be considered “the best” and right for every organization. Different MSPs will be better partners for you than others. Sorting through these providers will take time, but we’ve come up with seven key details t [...]

Selecting a Chromebook

August 12, 2020

It’s August, and more schools are heading back into session with every passing week. For many children, “in session” means actively working online at least some portion of every week. If you are a parent of a 1:1 school system, you’re likely receiving directions from your child’s school about the device your child will use, and there’s a 60% chance that device will be a Chromebook.  If your school isn’t providing a device, or you’re interested to purchase a Chromebo [...]

Cyber Threat Hunting: Tricks and Tools You Need

June 23, 2020

A lot of cybersecurity processes are reactive. Indicators of Compromise (IOCs), for instance, interpret clues that could lead an organization to uncover threatening activity that is already in progress or has already compromised a system. This and other types of security monitoring are important for a holistic cybersecurity plan, but threat hunting is a different approach. What is Cyber Threat Hunting? Cyber threat hunting is when IT professionals proactively look for weaknesses that could allo [...]

Data Integrity: What It Is + Best Practices for Businesses

June 15, 2020

What is Data Integrity? Data integrity, in this environment, refers to the state of your data. Is it clean? Is it corrupt?  To be more clear, our data integrity definition is the accuracy, consistency, and reliability of data stored in databases, data warehouses, data marts, or any of your internal data storage locations, such as a CRM. But what does that really mean? Well, data integrity is all about your data being correct and reliable no matter where it's stored and no matter how long you [...]

Five Web Meeting Etiquette Tips

May 27, 2020

Web meetings, and especially video calls, are an excellent substitute for in-person meetings. When distance or quarantine keep you apart, hopping on a video call feels like the next best thing. What’s different is that it feels much more casual and therefore, the rules of the road may feel a bit unclear. No one was ever taught web meeting etiquette.   To help you get the most out of your web meetings while feeling confident and comfortable, we have five important web me [...]