Category Archives: Tech Tips


June 13, 2017
Author: Jeremiah Plaskett

Cisco Live 2017 – Prepare Like A Pro!

Cisco Live 2017 - Prepare Like A Pro!

There’s only a couple of weeks remaining before Cisco Live 2017 #CLUS, once again hosted in beautiful Las Vegas, Nevada!  Here are some things to know before you go! Dates: June 25th – 29 2017 Location: Mandalay Bay Convention Center Programs: IT Management Program, Cisco Empowered Women’s Network Program, Partner Days, DevNet, World of Solutions, Keynotes, Conference Sessions, Attendee Meals and Main Registration MGM Grand.  Programs:  Testing Center, Labs & Technical Seminars, Attendee Meals and Satellite Registration Cisco has a lot of new things in store for this year,…


February 12, 2015
Author: Aaron Harned

Automatically launching Java Web Start applets on Mac

Automatically launching Java Web Start applets on Mac

It’s no secret that there have been some issues within the last few years between the folks at Apple, and the folks at Oracle, who now own the rights to the Java language and software engines. Due to several security concerns, Apple, along with several other developers, have adjusted their approach to running Java apps and applets in order to protect consumers from potentially-dangerous code being run on their machines. On paper, this sounds like a good strategy to ensure the safety of user information. But what if…


January 19, 2015
Author: James Willard

Meraki – “Low Power Mode”

Meraki - "Low Power Mode"

As the Meraki product line gets more engrained into enterprise networks its going to touch Cisco switching that uses the proprietary CDP (Cisco Discovery Protocol) layer 2 broadcast identification protocol. CDP is very useful when trying to identify what device is plugged in where. CDP has an industry counterpart, called LLDP (Link Layer Discovery Protocol). These protocols basically do the same thing, only one is made for everyone and the other is specific to Cisco only. Meraki, having been acquired by Cisco back in 2012 is still integrating…


December 29, 2014
Author: Rob Patmore

Meraki Systems Manager Agent – Windows 7 Installation Failures

Meraki Systems Manager Agent - Windows 7 Installation Failures

In some cases it appears that when attempting to install the Meraki Systems Manager Agent (MerakiPCCAgent.msi) in Windows people have experienced the following error: There is a problem with this Windows Installer package. A program run as part of the setup did not finish as expected. Contact your support personnel or package vendor. Just before this error is observed, there is a brief period that some text is flashed up on a command-line window but quickly vanishes before it can be read (which as usual is quite helpful)….


November 9, 2014
Author: James Willard

XConnect over IPSEC

XConnect, or L2TPv3 is a great way to extend a layer 2 broadcast network over a WAN connection to another site. It works great when you need to do things like MDNS or AirPlay, or anything else that requires a broadcast style protocol to function. With corporations and other entities, its apparent that encryption is a very important tool to ensure that communication over the open internet is secure to protect that confidential and proprietary information. L2TPv3 or Xconnect doesn’t help secure the traffic. So a solution needs…


October 21, 2014
Author: James Willard

Getting your Custom HTML to work in Mac Mail for Yosemite

Say that you are working in Outlook for Mac 2011 and you want to leverage the new features within the new Mail app that comes with OS X Yosemite and say that one of the things that needs to happen is getting your custom, rich, HTML signature to move over with it. Well let me be the one to tell you its not impossible! It does however take about 5 minutes to make it work. First and foremost, rich text signatures only apply to rich text emails. To…


July 24, 2014
Author: James Willard

Manually Create an Apple Fusion Drive on Mountain Lion/Mavericks/Yosemite

Manually Create an Apple Fusion Drive on Mountain Lion/Mavericks/Yosemite

UPDATE 12/26/14: As of 10.10.1 and above this process will not work. The workaround is to boot to a USB boot disk that has Mavericks on it and run the commands from there. If you try to use 10.10.1 and above, you will see a very generic error when trying to create a logical group with 2 or more drives. Apple has created their own form of a hybrid storage that works surprisingly well, its called the fusion drive. This can be done with non-retina macbook pro’s, Mac-Mini’s,…


June 19, 2014
Author: Levi Kraner

Problem Steps Recorder – The Handiest Tool You Didn’t Know You Had!

Problem Steps Recorder - The Handiest Tool You Didn't Know You Had!

Think about the most recent error message you’ve received on your work computer. Was it something you had to contact your company’s I.T. Department for? Did they ask you a bunch of technical questions that you had a hard time explaining? What about error messages that you couldn’t quite remember? If so, you might rest a bit easier knowing that Microsoft created a special tool just for situations like this; The Problem Steps Recorder (PSR).


May 6, 2014
Author: Aaron Harned

Understanding OSX Permissions

Understanding OSX Permissions

The Macintosh OSX platform is based on Unix, and thus, the POSIX permissions model. With OSX, you can augment these permissions with Access Control Lists (ACLs), which allow for more granularity (very similar to Windows-based permissions), however troubleshooting them can sometimes be a pain. POSIX Permissions Unix/Linux systems utilize a relatively basic structure for permissions. Each object, be it a file or folder, has 9 bits of metadata used in determining who or what has the ability to access it. This field is broken into three 3-bit sections;…


March 22, 2014
Author: Jeremiah Plaskett

ANI-Based Call Routing in Cisco Unified Communications Manager using SIP

ANI-Based Call Routing in Cisco Unified Communications Manager using SIP

Some clients will request that their IP telephony system have the capability to block inbound calls into their organization, or to route these calls to a specific destination, solely based on the “Caller-ID” being sent by the caller.  For example, if the Caller-ID or ANI (Automatic Number Identification) is that of a specific customer, then they may want to direct that call from that customer’s home number to a dedicated support representative, IVR, or Voice Message System.  Another scenario is maybe the caller is malicious, or keeps prank…