East of Eden

The latest in Windows 10, end user devices and services, cyber security, data center & cloud, and all things IT.

Blog Feature

End User Devices and Services | Windows 10

Top 10 Tips for IT Project Managers Migrating to Windows 10: Part 1

By: Andrew Sweeney
January 17th, 2017

Managing a Windows 10 migration can be a complicated affair. To help those just getting started, we asked our IT project management teams to provide a list of tips they would recommend to those embarking on a Windows 10 upgrade. While we didn’t include all of their recommendations, we did narrow their responses down to a top ten list of the most commonly recurring advice. Below are the experts’ first five tips with the remaining being posted in part two of this blog (check those out here). For detailed planning guidelines, check out our eBook, Planning for Windows 10 Starts Now.

Read More

Share

Blog Feature

End User Devices and Services | Windows 10

Top 10 Tips for IT Project Managers Migrating to Windows 10: Part 2

By: Andrew Sweeney
January 17th, 2017

Managing a Windows 10 migration can be a complicated affair. To help those just getting started, we asked our IT project management teams to provide a list of tips they would recommend to those embarking on a Windows 10 upgrade. While we didn’t include all of their recommendations, we did narrow their responses down to a top ten list of the most commonly recurring advice. Below are the five of the experts’ top tips with the remaining being posted in part one of this blog (check those out here).

Read More

Share

Planning for Windows 10 Starts Now

Planning for Windows 10 Starts Now

Develop a transition strategy for a successful Windows 10 upgrade, and make this migration your best.

Blog Feature

End User Devices and Services

Secure Boot: Stop Rootkits Dead in Their Tracks by Converting from BIOS to UEFI

By: Andy Sherman
October 25th, 2016

As outlined in our previous article, Windows 10 Security, The Good, The Bad, and The Ugly, there are several exciting new security features in Windows 10 Enterprise, such as Device Guard and Credentials Guard, that leverage features of more recent hardware. In order to take full advantage of all that Windows 10 Enterprise has to offer, you will probably need to convert a lot of existing boot drives from BIOS to UEFI, and when you do that, you will also want to enable the Secure Boot feature of your workstation hardware. Sound opaque and confusing? This article will explain what it means and talk about some strategies for making the conversion in your enterprise.

Read More

Share

Blog Feature

End User Devices and Services | Windows 10

Use Windows 10 Device Guard to Trust Your Software

By: Andy Sherman
October 17th, 2016

As we noted in our Windows 10 Security overview, one of the exciting new features of Windows 10 Enterprise is Device Guard, an operating system feature for ensuring that only trusted code runs on your systems. At its best, Device Guard uses a signature based model for trusting executables and libraries. However, in an ecosystem with as much legacy as exists in Windows, Device Guard also gives the enterprise the means to handle legacy applications as well.

Read More

Share

Blog Feature

End User Devices and Services | Windows 10

Using Spreadsheets to Run Your Windows 10 Migration is a Recipe for Disaster

By: Andrew Sweeney
September 28th, 2016

If you’ve run one of these projects before, then you already know this is true. If you haven’t, let's quickly break down the problem:

Read More

Share

Blog Feature

End User Devices and Services | Windows 10

Windows 10 Budgeting Made Easy

By: Andrew Sweeney
September 27th, 2016

Creating a Windows 10 migration budget doesn’t have to be all that difficult. While the final cost will be based on a number of variables and some in-depth analysis, the budget range can really be determined by answering these four questions:

Read More

Share

Blog Feature

End User Devices and Services | Windows 10

Reduce Windows 10 Planning Time by 30% with EMMA

By: Eden Technologies
May 12th, 2016

Microsoft’s introduction of Windows 10 in July 2015 set the clock ticking for IT organizations around the world to start mapping out their enterprise migration plans. Whether it’s from Windows 7, 8, 8.1, or an earlier version of the operating system, the process will require a significant investment of time and resources. With thousands of interdependent variables to manage, the process is complex and often difficult to manage. To ensure the process runs smoothly and efficiently requires close management and sophisticated tools.

Read More

Share

Blog Feature

End User Devices and Services | Windows 10

So You've Migrated to Windows 10. Now What?

By: Eden Technologies
April 28th, 2016

With the recent launch of Windows 10 comes a new era for keeping corporate desktop systems up-to-date. Instead of dealing with numerous complex and costly migration projects, the new process includes faster, more frequent updates that don't require an entire system refresh.

Read More

Share

Blog Feature

End User Devices and Services | Windows 10

Windows 10: What the New OS Holds in Store

By: Eden Technologies
March 17th, 2016

With Windows 10, Microsoft is providing a bridge to the past while, at the same time, offering a path to the future with the introduction of the singular OS designed to support a multitude of devices. This represents a course correction for the company as Windows 8 was largely shunned by corporate IT organizations. The problem was that Windows 8 was so different from Windows 7 that it required significant employee training and support. Also, many IT organizations were experiencing “upgrade fatigue” after their deployment in Windows 7. As a consequence, adoption of Windows 8 and Windows 8.1 at the enterprise level has been relatively weak. Estimates of Windows 8 market share in the enterprise market hover in the single digits, while Windows 8.1 is in the mid-teens.

Read More

Share

Blog Feature

End User Devices and Services | Cyber Security

Stagefright Vulnerability Affects 95% of Phones

By: Andy Sherman
July 28th, 2015

Vulnerability On Monday, Zimperium Inc, a maker of mobile security solutions, announced that their security researcher Joshua J Drake (@jduck), had discovered a serious vulnerability in the Stagefright library in Android that allows for arbitrary remote code execution, which could be triggered just by sending a MMS message. (Related coverage here, and here.) Stagefright is Android’s library for handling certain types of media files.

Read More

Share