J.D. Fox Micro Resource Center

The goal of this section of the J.D. Fox Micro public website is to provide a single source for current information and tools for business managers and users of IT products and services to enhance value and protect systems and data.

So many articles, blog posts, and tutorials you'll find on other sites were published long ago and never updated, and now have incorrect information. Sometimes it's hard to know whether you can rely on some tutorials you might find that don't show their publication date, even on a major hardware or software vendor's website, because they seem to apply to current products but still might be years old and now wrong.

All content in the J.D. Fox Micro Resource Center is reviewed regularly for accuracy and relevancy. The last full review was completed on July 8, 2015. You can read all the articles as if they were current, because they all are. There is no old information to be found here, and no dead or irrelevant links.

Feel free to contact J.D. Fox Micro with any feedback.

Featured Articles:

Password Pandemonium
Taking control of your passwords

Password Complexity and Expiration
Understanding why passwords have complexity requirements and expiration dates, how you should configure such policies on your own systems, and what you should do with accounts on partners' or third-party websites

Bad Password Practices
Do your users have bad habits when it comes to password security? Does your business culture encourage this? If you're not sure, read this article.

Browse all articles All articles

Information Technology Glossary

A comprehensive, informative, and fascinating compilation of definitions of both general terms as well as significant people, companies, websites, and products in the IT world.