• Cisco's new Partner Plus program rewards SMB partners

    Cisco announced its new Partner Plus program at the Cisco Partner Summit 2012, offering incentives to partners that win business in the SMB market.

  • keyword stuffing

    Keyword stuffing is the practice of inserting a large number of keywords into Web page content and meta tags in the attempt to artificially increase the page's ranking in search results.

  • HP and Oracle dealings head 2010 Channel Marker blogs

    Channel Marker readers kept a close eye on HP's 3Par deal and the fallout from Mark Hurd's exit in 2010. Top blogs also included Oracle's hardware ventures.

  • proxy hacking

    Proxy hacking, also known as proxy hijacking, is an attack technique designed to supplant an authentic Web page in a search engine's index and search results pages. An attacker may use proxy hackin...

IT Channel Resources

Email Alerts

Register now to receive SearchITChannel.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Fibre Channel over Ethernet (FCoE) implementation

    Your customers are going to start asking about Fibre Channel over Ethernet, if they haven't done so already. Use this tutorial to find out how to develop FCoE expertise, determine which customers are good candidates for it, guide those customers towa... 

  • Modifying the list of prospective networking partners

    Learn how to apply the selection criteria you developed for screening prospective networking partners to evaluate candidate scores and further narrow down your list. 

  • Eight steps to reducing compliance risks

    Get one risk management tool provider's take on the top three corporate ethics and compliance issues facing major companies today. 

  • keyword stuffing

    Keyword stuffing is the practice of inserting a large number of keywords into Web page content and meta tags in the attempt to artificially increase the page's ranking in search results. 

  • proxy hacking

    Proxy hacking, also known as proxy hijacking, is an attack technique designed to supplant an authentic Web page in a search engine's index and search results pages. An attacker may use proxy hacking to gain an advantage over a competitor or, ultimate... 

  • managed network security services

    Managed network security services are third-party service providers, solution providers or value-added resellers that can be hired to outsource tasks or processes related to network security. 

  • sales certification

    A sales certification is a designation given to a channel professional once he or she has gained an amount of expertise that a vendor considers necessary to sell a given product. 

  • partner specialization

    A partner specialization is a designation achieved when a value-added reseller, integrator or solution provider has demonstrated a particular expertise specified by its vendor. 

  • full and open competition

    With respect to a contract action, "full and open" competition means that all responsible sources are permitted to compete. 

  • Defense Contract Management Agency (DCMA)

    The Defense Contract Management Agency is the government agency that overseas administration of origin inspection contracts, dispatches quality assurance reports and audits/monitors subcontracting plans. 

  • Defense Acquisition Regulatory Council (DARC)

    The Defense Acquisition Regulatory Council (DARC) is a group composed of representatives from each Military department, the Defense Logistics Agency, and the National Aeronautics and Space Administration... (Continued) 

  • administrator code

    In government contracting, an administrator code (AC), like a buyer code (BC), is a code assigned to each Post Award Administrator. It is generally referenced on the cover sheet of the award. 

  • U.S. Navy purchasing abbreviations and acronyms

    U.S. Navy purchasing abbreviations and acronyms 

  • See more Definitions on IT Channel Resources
  • Cisco Partner Summit 2012: Partner Plus program rewards SMB partners

    Cisco announced its new Partner Plus program at the Cisco Partner Summit 2012, offering incentives to partners that win business in the SMB market. 

  • keyword stuffing

    Keyword stuffing is the practice of inserting a large number of keywords into Web page content and meta tags in the attempt to artificially increase the page's ranking in search results. 

  • Top five Channel Marker blog posts for 2010

    Channel Marker readers kept a close eye on HP's 3Par deal and the fallout from Mark Hurd's exit in 2010. Top blogs also included Oracle's hardware ventures. 

  • 'Captain America' tops list of geek movies to watch in 2011

    IT and comic book geeks pick their most anticipated movies for the upcoming year. 

  • Network change and configuration management morphs for the cloud

    Solution providers offering network change and configuration management services must now offer NCCM for the cloud, which means mapping components and implementing planned change in a very dynamic environment 

  • proxy hacking

    Proxy hacking, also known as proxy hijacking, is an attack technique designed to supplant an authentic Web page in a search engine's index and search results pages. An attacker may use proxy hacking to gain an advantage over a competitor or, ultimate... 

  • managed network security services

    Managed network security services are third-party service providers, solution providers or value-added resellers that can be hired to outsource tasks or processes related to network security. 

  • sales certification

    A sales certification is a designation given to a channel professional once he or she has gained an amount of expertise that a vendor considers necessary to sell a given product. 

  • partner specialization

    A partner specialization is a designation achieved when a value-added reseller, integrator or solution provider has demonstrated a particular expertise specified by its vendor. 

  • How to perform storage capacity planning in a virtualized server environment

    Find out the steps to storage capacity planning in a virtualized server environment, including factoring in storage efficiency techniques to be used in the virtual environment and planning for growth. 

  • See more All on IT Channel Resources