Increasing organizational agility in service-oriented computing
Why a SOA methodology should include service-oriented analysis
Increasing SOA ROI and maximizing automated solutions
Service-oriented architecture design best practices
Goals of SOA: Integration and interoperability
How to stay profitable in the reseller business
How to help customers reap the benefits of 802.11n
How to prepare for network penetration testing services
How do electrical load, server cooling affect server virtualization?
What are best practices for virtual server migration?
What upstream/downstream services are in use?
Do you have any concerns about carbon footprint?
How do you connect storage to a virtual blade server?
What CPU platforms are being used?
Do you have AC or DC power?
Which databases underpin the applications to be virtualized?
How many data centers are you planning to virtualize, and where?
How to use fresh-air ventilation in blade server virtualization?
What are your power and cooling capacities?
What operating systems are being used?
What about low-latency applications running on virtual blades?
Are there any application interdependencies?
What are the consolidation ratios for virtual blade servers?
What are your disaster recovery needs?
What are your system availability goals?
How does server storage space affect blade server virtualization?
What are your server consolidation policies?
How does blade server virtualization bring energy savings?
What are the range of applications to be virtualized?
What are the different types of virtual file storage?
Channel Checklist: How to align IT assessments with business needs
How to install a wireless LAN for businesses
Introduction to network centralization and decentralization
Conclusions about network centralization and decentralization
Case studies in network centralization and decentralization
Best candidates for network decentralization
Guiding principles of network centralization and decentralization
The best candidates for network centralization
Network penetration tools
Managed Objects Partner Program Checklist
Unified threat management (UTM)
Top five Linux Ask the Experts questions
Setting up WLANs: Good for clients, good for business
Encryption software vendors
Channel Explained: Hosted email archiving
Blade server virtualization PDF download
Storage blade server PDF download
Security on blade servers PDF download
Linux on blade servers PDF download
Blade server technologies PDF download
Selling blade servers PDF download
Writing an IT service-level agreement
Norman Partner Program Checklist
PGP Partner Program Checklist
McAfee Partner Program Checklist
Symantec Partner Program Checklist
Abaca Partner Program Checklist
Installing a guest operating system session
Planning your implementation of Hyper-V
Launching a Hyper-V guest session
Modifying guest session configuration settings
Deploying and using Windows virtualization: Introduction
Installation of the Microsoft Hyper-V server role
Understanding Microsoft's virtualization strategy
Using snapshots of guest operating system sessions
Becoming familiar with the Hyper-V administrative console
Tumbleweed Partner Program Checklist
ZL Technologies Partner Program Checklist
Certicom Partner Program Checklist
Check Point Partner Program Checklist
Centennial Software Partner Program Checklist
How should snapshot overhead be determined?
How should RAID configuration be determined?
Data deduplication's impact for customers
What tools can determine a customer's data growth rate?
Which is the right fit for my customer: NAS, FC SAN or iSCSI SAN?
How does thin provisioning impact capacity planning?
How does a customer's data backup method impact capacity planning?
How do I choose the right drive for my customer?
Introduction to the benefits of NAC
Ingrian Partner Program Checklist
Storagepipe Solutions Partner Program Checklist
Business impact analysis for business continuity: BIA for small business
Business impact analysis for business continuity: Understanding IT impact
Business impact analysis data points
Business impact analysis for business continuity: Preparing the BIA report
Business impact analysis for business continuity: Data collection methodologies
Business impact analysis for business continuity: Gathering data
Business impact analysis for business continuity: Determining the impact
Business impact analysis for business continuity: Upstream and downstream losses
Business impact analysis for business continuity: Understanding impact criticality
Business impact analysis for business continuity: Identifying business functions
Business impact analysis for business continuity: Recovery time requirements
Making the most of your market development funds
How to choose a vendor partner program
Business impact analysis for business continuity: Introduction
Business impact analysis for business continuity: Overview
NetApp Partner Program Checklist
Pervasive Partner Program Checklist
How can VARs provide value to clients through lead management?