April 20, 2026

Making the most of Lab work


 One of the biggest challenges technical staff face is trying to get the 'ok' to do lab work.  And in managements defense, (and from I've observed in my career,) staff rarely properly document why they need lab time and what the benefits are.

Management imagine technicians tossing paper balls into the trash can, gaming and generally goofing off during this time. I should know because I was in management and have actually seen this exact scenario play out. It only takes one time to ruin for everyone asking after you.

Do yourself and your boss a favor and try to take a more organized approach to requesting and reporting on your lab work.

For example, I was told that we will be using an entirely new router for new installs, as well as replacing any that fail in the field.

My response to my boss/client was "Great, who is going figure out the new configuration? He said "What do you mean?". I explained that the new router has an entirely new interface and operating system, so we need to take some time to figure out how to configure it the same way as our standard config.  Then we need to test how it integrates with our management system as well as test all the functionality that the help desk and support staff currently relies on to do their job effectively.

I then suggested that I will provide an outline and game plan for the new router configuration and testing along with an approximate timeline. I finished with offering a deliverable of the new configuration, a list of the functionality tested and a 30 minute hands on class for the staff, so they know how to work on the new equipment and point out anything I missed. The session also fosters collaboration and everyone gets a chance to contribute. The last thing people want is to see a new piece of hardware with no training, documentation and little feedback from people who support it.

His response was, "Go for it!".  

The point of the story is that when you want to propose something to anyone, is to treat it as a sales pitch and clearly outline 'why, how long and the deliverables'.  Most managers are happy to see someone take any proactive initiative, but they become impressed when you document and sell it professionally.



If you haven't yet, put your name in for the next $25 amazon gift card giveaway




April 17, 2026

Now for a little fun.. lovemytool is alive!!

 

Now for a little fun lovemytool is alive!!

Big news in the lab, folks: the legendary LoveMyTool name is back in action! After years of living under the slightly more buttoned-up banner of The Tech Firm Blog, we’ve decided it was time to bring back a name with a little more personality… and let’s be honest, a lot more attitude. Because nothing says “serious technical insights” quite like a name that also sounds like it belongs on a novelty coffee mug.

This revival wouldn’t have happened without the generosity of Tim O’Neil, who kindly handed over the lovemytool.com name so it could live again. That means if you punch in www.lovemytool.com , you’ll land right here at https://thetechfirmblog.blogspot.com great content, same questionable humor, just with a name that feels like it’s wearing a Hawaiian shirt instead of a suit and tie.

For longtime readers, this is a bit of a homecoming. The original LoveMyTool blog built its reputation on mixing solid technical know-how with a wink and a nudge, and plenty of you have made it clear that the name was half the fun. So consider this the best of both worlds: the same blog you’ve been reading, now rebranded with a name that reminds us not to take ourselves too seriously—even when we’re deep in packet captures or arguing with firmware. Welcome back to LoveMyTool

Yes, I missed it too.

April 16, 2026

What Caused the Microsoft Developer Account Lockout?

 The Microsoft developer account lockout incident described in the article highlights how several major open-source security tools—including VeraCrypt, WireGuard, and Windscribe—were suddenly cut off from distributing updates to Windows users. According to the report, developers found their accounts suspended without warning, preventing them from signing drivers or releasing patches. Because Windows requires signed drivers for installation, this effectively froze updates for tens of millions of users, leaving them potentially exposed to unpatched vulnerabilities. ([Aardwolf Security][1])

What Caused the Microsoft Developer Account Lockout?

The root cause appears tied to Microsoft’s Windows Hardware Program and its mandatory identity verification requirements. Developers were expected to submit government-issued identification within a set timeframe, but several affected maintainers they never received proper notification—or even completed verification without regaining access. 

April 15, 2026

How to Solve the Four Most Common Problems with PoE++ Devices (Julio Petrovitch)


In 2018, the IEEE 802.3bt (PoE++) standard for Power Over Ethernet was approved. It offered more power, allowing devices like high-powered security cameras to be run on PoE. Which is great – until the installer uses the wrong cable to connect a camera and can’t figure out why it won’t power on.

Having multiple standards makes troubleshooting PoE issues more complicated. For example, many field technicians or network engineers don’t realize that upgrading to new pan-tilt-zoom cameras or to Wi-Fi 7 access points with multiple radios will require a PoE upgrade as well. As offices and warehouses deploy more smart devices that need PoE++, testing becomes more important. This article will explain the PoE++ standard, best practices in PoE deployment and testing, and how to solve several common problems.

What is the PoE++ Standard?

April 14, 2026

ATM Jackpot for Hackers: Inside the $3.6M Bitcoin Depot Breach

The recent breach of Bitcoin Depot highlights yet another reminder that in the world of cryptocurrency, the weakest link often isn’t the blockchain—it’s everything around it. According to the report, attackers infiltrated the company’s internal IT systems on March 23, 2026, and managed to steal over 50 Bitcoin, valued at roughly $3.6 million. U.S. Securities and Exchange Commission filings revealed the hackers gained access to sensitive credentials tied to digital asset settlement accounts, allowing them to transfer funds before the breach was contained. (BleepingComputer)

Popular post in the past 30 days