Problem solve
Get help with specific problems with your technologies, process and projects.
Information Security Training and Certification
LTO-5 tape and LTFS position format for archiving
Get the specs on the LTO-5 tape format and learn about the implications for VARs of its support for IBM's Linear Tape File System (LTFS) media partitioning technology. Continue Reading
Your Massachusetts 201 CMR 17 checklist of security controls
In this video, John Moynihan of Minuteman Governance reviews the technical, administrative and physical security controls that organizations need and often don't have. Continue Reading
Open source Xen vs. Citrix XenServer
Our expert compares the three major open source Xen contenders with Citrix XenServer to help you determine which Xen management product is best for your customers. Continue Reading
-
Big vSphere features that don't get much attention
The Virtual Machine Communication Interface and Dynamic Voltage and Frequency Scaling are two big vSphere features that provide great benefits but are often overlooked. Continue Reading
Using SAS 2.0 as a shared-storage option for SMBs
Find out how SAS 2.0, or 6 Gbps SAS, can be used as a shared-storage option for customers that either can't afford or don't need the capabilities of a traditional entry-level SAN. Continue Reading
Hypervisor comparison: Weighing hybrid environments
Last year, a hypervisor comparison meant choosing one hypervisor to suit a particular environment. Now, solutions providers must consider the hybrid approach.Continue Reading
HIPAA, HITECH and the challenges of a 'business associate'
Kevin McDonald of Alvaka Networks talks about why his designation as a "business associate" has changed his compliance priorities, particularly with HIPAA.Continue Reading
New Exchange 2010 high-availability features
Find out how Exchange 2010 high-availability (HA) features differ greatly from Exchange 2007 HA in terms of clustering and deploying mailbox servers.Continue Reading
Up-selling Hyper-V virtualization: Justifying SCVMM 2008 R2
When offering Hyper-V virtualization services to customers, solutions providers should emphasize the importance of using SCVMM 2008 R2 as a Hyper-V virtualization management tool.Continue Reading
One-time password (OTP) token tips for a heterogeneous environment
Many stumbling blocks can torpedo your one-time password token deployment. Learn how to secure your clients' ever accelerating OTP implementations.Continue Reading
-
SCVMM 2008 R2: Configuring user access
Windows Server 2008 R2 has a built-in authorization manager console, but SCVMM 2008 R2 has greater flexibility for configuring user access across multiple Hyper-V servers.Continue Reading
How to maintain the managed network security services relationship
You've begun managed network security services. Now here are four steps to help you ensure a successful customer relationship.Continue Reading
SCVMM 2008 R2 for Microsoft Hyper-V R2 management
If your customers are looking to you to optimize Microsoft Hyper-V R2 performance, our expert recommends SCVMM 2008 R2 as your virtual monitoring software.Continue Reading
NAS server sizing and configuration factors
Find out what questions to ask customers when helping them configure a NAS server, including the number and speed of disk drives that the hardware will support, whether SSD will be used and user I/O demands.Continue Reading
Understanding network traffic is key to building a customer base
Understanding network traffic is key to meeting performance goals set by your customers. Discover the seven challenges to understanding your customer's network and how you can build a stronger customer base in the process in this tip from Richard ...Continue Reading