Problem solve
Get help with specific problems with your technologies, process and projects.
Regulatory Compliance Services
How partners should prepare for mergers and acquisitions
In this edition of "Patrolling the Channel," Victor Villegas of Computer Media Technologies Inc. talks about lessons learned from M&A activity and lays out the game plan that partners need when a vendor makes a big move. Continue Reading
Microsoft SQL Server 2008 R2: Adding CPU, memory on the fly
Using the Resource Governor component in Microsoft SQL Server 2008 R2, solutions providers can easily allocate CPU and memory. Continue Reading
Windows 7 system files clean-up tools
Windows 7 system files can clog up your customers' PCs and drag performance down. Luckily, tools and commands are available to help you gain more administrative control. Continue Reading
-
Wireless network connection troubleshooting for solution providers
Wireless network connection troubleshooting is a common problem for networking solution providers and their customers. In this tip, Lisa Phifer addresses some best practices for wireless network connection troubleshooting, including commonly made ... Continue Reading
How to perform storage capacity planning in a virtualized server environment
Find out the steps to storage capacity planning in a virtualized server environment, including factoring in storage efficiency techniques to be used in the virtual environment and planning for growth. Continue Reading
Virtualized infrastructure design for vSphere
When designing a virtualized infrastructure for vSphere, solutions providers must take into account customers' hardware and the various vSphere features and editions.Continue Reading
Citrix XenServer 5.5 resource pools: Requirements, creation process
This tip teaches solutions providers the benefits of using resource pools in Citrix XenServer 5.5, as well as how to create and manage the pools.Continue Reading
Targeted source code reviews reduce software security vulnerabilities
VARs and resellers currently offering software products such as static and dynamic software scan tools can further assist their clients by providing source code review services.Continue Reading
Third-party tools for Microsoft Hyper-V R2: Top 5 must-haves
Check out this list of top the five third-party tools for Microsoft Hyper-V R2 that can help solutions providers improve Hyper-V management, monitoring, backup and recovery.Continue Reading
How to plan for identity management provisioning
Read about some real-world challenges that occur when you're planning an identity provisioning overhaul.Continue Reading
-
Enterprise hard drives: Will new drive technologies relegate them to the middle tier?
Find out about the mechanical limitations of enterprise hard drive technology, how solid-state storage is pushing hard drives out of their Tier 1 position and why high-capacity SATA drives will be the dominant enterprise hard drive of the future.Continue Reading
How to prepare for emerging data protection laws
Richard Mackey of SystemExperts explains how solution providers can position their customers' technological and risk-based controls so that they are ready for future data protection laws.Continue Reading
Top three things to know about unified communications certifications
With unified communications increasing in popularity, it might be worthwhile for a networking solution provider to consider unified communications certifications. This tip outlines the top three things you should know before investing in UC ...Continue Reading
Why Windows 7 adoption exceeds Vista's numbers
Windows 7 adoption is taking off more than Vista implementations ever did. This tip tells you why customers are upgrading to the new OS and what it means for solutions providers.Continue Reading
Implementing database monitoring tools for 201 CMR 17 compliance
Adrian Lane of Securosis reviews what solution providers need to watch for when they implement database activity monitoring products and help customers achieve 201 CMR 17 compliance.Continue Reading