J.D. Fox Micro Resource Center
The goal of this section of the J.D. Fox Micro public website is to provide a single source for current information and tools for business managers and users of IT products and services to enhance value and protect systems and data.
So many articles, blog posts, and tutorials you'll find on other sites were published long ago and never updated, and now have incorrect information. Sometimes it's hard to know whether you can rely on some tutorials you might find that don't show their publication date, even on a major hardware or software vendor's website, because they seem to apply to current products but still might be years old and now wrong.
All content in the J.D. Fox Micro Resource Center is reviewed regularly for accuracy and relevancy. The last full review was completed on March 6, 2018. You can read all the articles as if they were current, because they all are. There is no old information to be found here, and no dead or irrelevant links.
Feel free to contact J.D. Fox Micro with any feedback.
Users sharing passwords is a common practice that leads to a tremendous number of information security breaches. Learn what to do about it.
Cloud Providers and the Safety of Your Data
Despite the maturity of cloud storage and applications, the threats of unauthorized access, accidental or malicious erasure or corruption of your data, or loss due to hardware failure, and the means by which these threats may be realized, are all still there. In fact, these can be even greater in the cloud. Read this article to learn more, and what you can do to protect yourself.
A comprehensive, informative, and fascinating compilation of definitions of both general terms as well as significant people, companies, websites, and products in the IT world.