Our Blog

5 Resolutions for Your IoT Security Strategy

A new year has arrived, and with it comes the opportunity to make all kinds of transformations to help your business. No matter how you navigated the dangerous threat landscape during the past years, it’s time for all of us in operational technology (OT) security to make firm decisions to do or not do something for the safety of our business and environment. This year, we will see more breaches where bad…

5 Step Process to Set & Achieve Your Sales Goals

Take your goal setting beyond the SMART framework by taking these three extra steps Now that it’s 2019, sellers, managers and leaders are busy setting goals for the year. Many tackle this with the SMART (specific, measurable, achievable, relevant andtime-bound) goal framework. Good start, but not good enough. And SMART can also lead sellers down paths that don’t help. Actually, achieving your sales goals requires taking it to the next step. Step 1: Set meaningful goals. People don’t achieve goals unless the goals…

Why You Need to Prepare for Windows 7 End of Life

  On January 14th 2020 Microsoft will end support for the Windows 7 Operating System. This is known in tech terms as end-of-life for the software. What does this mean and how should businesses prepare for Windows 7 End of Life?  What Does The End of Support Mean?     End of support doesn’t mean that Windows 7 will just stop working in January 2020 . However end of support means…

Five Reasons to Outsource Your IT Support

It’s undeniable that we live in an age where data is the new currency. Everything is connected to some sort of data management mechanism and delivered to a specific audience, whether that’s a group of specific web users or customers looking for a specific product. Increasingly, how we manage that data, or information, can drastically affect our business for better or worse. The future of in-house IT The reality is…

Digital infrastructure Trends for 2019

Trend 1: Extracting value from data is becoming imperative The rise of the Internet of Things (IoT), analytics, artificial intelligence, and data science is changing forever how clients derive value from data. Data accessibility is becoming an important driver of infrastructure decisions, with data architecture now the essential prerequisite to infrastructure architecture, because the value of the data opens up new business opportunities and differentiates the digital enterprise. Enterprises are…

New Merchandise 2019

Our new merchandise for 2019 has arrived… who wants some? Looking to grow your business, improve your IT systems or increase efficiency? We help companies solve business problems & build for the future J700 Group Limited is ideally placed to advise, support and deliver all your IT requirements, with over 24 years experience, we have the knowledge and skills to support your business at the highest level. We want to…

What is cloud computing?

Simply put, cloud computing is the delivery of computing services – servers, storage, databases, networking, software, analytics, intelligence and more – over the Internet (“the cloud”) to offer faster innovation, flexible resources and economies of scale. You typically only pay for cloud services you use, helping lower your operating costs, run your infrastructure more efficiently and scale as your business needs change. Top benefits of cloud computing Cloud computing is…

J700 Group Our new 0800 number

We are pleased to announce that you can now contact us for free on our new 0800 freephone number, call us today to discuss how we can improve your business IT and help you company grow, call us on 0800 7723 700 J700 Group Limited is ideally placed to advise, support and deliver all your IT requirements,   We have over  24 years experience and have the knowledge and skills…

“Already Used” status in VMware Horizon View

When linked-clone desktops are not cleanly logged off and the “Refresh on logoff” policy is used, VMware Horizon View marks the desktop as “Already used” and blocks other users from accessing the machine. This “Already Used” state is a default VMware security feature which prevents other users from accessing the previous user’s data and allows a VMware Horizon View administrator to investigate potential problems with the desktop. The VMware Horizon View desktop can also go into the “Already…

Configuring Time Settings on Domain Controllers

Active Directory relies on accurate time settings on all member servers, Domain Controllers, and domain-joined workstations. When time settings are misconfigured, multiple critical Active Directory services such as replication and Kerberos authentication will fail bringing the entire Active Directory infrastructure to its knees. 1. In Active Directory, we use the Windows Time service for clock synchronization: W32Time 2. All member machines synchronizes with any Domain Controller 3. In a domain,…