Tips
Tips
-
VMware's standard and distributed virtual switches: What resellers need to know
Understanding VMware's standard and distributed virtual switches is an important step for resellers planning to offer their customers network virtualization services and VMware virtual switches. Get a reseller-level explanation of the vSphere ... Continue Reading
-
NERC CIP training: Understanding 'critical cyber asset identification'
To pass Critical Infrastructure Protection standards, utilities must ensure that all critical assets and cyber assets are both properly identified and protected. Ernie Hayden explains how to get the process done right the first time. Continue Reading
-
Social networking security still a gray area for some customers
While there are many companies today that have embraced the use of social networking sites, there are still some that are skeptical. No matter how customers view social networking, there are some inherent security issues that need to be addressed. ... Continue Reading
-
Traffic Talk: Testing Snort with Metasploit
Are your customers' network security solutions working as expected? Learn about testing Snort with Metasploit in this detailed tip from Richard Bejtlich, complete with code examples and step-by-step instructions. Continue Reading
-
Using Cisco Nexus 1000V to help network managers and VMware admins
With network virtualization becoming more common across enterprise networks, the roles of server managers and network managers begin to collide and cause conflict. In this tip, solution providers will learn about helping server managers and network ... Continue Reading
-
Creating a virtual machine and VM configuration in VMware vSphere
In VMware vSphere, creating a virtual machine is pretty easy. By selecting the correct VM configuration and virtual hardware options, solutions providers can really benefit. Continue Reading
-
Virtual systems and server resource management best practices
The recommended utilization rates and virtual system management tools outlined in this tip will help you with server resource management and optimization. Continue Reading
-
Need-to-know mobile device authentication methods
Mark Diodati reviews how VARs, consultants and systems integrators can help customers implement SMS one-time passwords and other authentication methods that use mobile devices. Continue Reading
-
Comparing Hyper-V R2, vSphere and XenServer 5.5 pros and cons
Comparing the pros and cons of Hyper-V R2, vSphere and XenServer 5.5 will not only help you recommend the right product, it'll also help you to optimize their virtual environments. Continue Reading
-
Installing Citrix XenServer 5.5 and XenCenter
Solutions providers that are looking for alternatives to Microsoft Hyper-V R2 and VMware ESX or vSphere will find that installing Citrix's XenServer 5.5 is a painless process. Continue Reading
-
Top three Windows 7 system monitoring tools
When troubleshooting a Windows 7 system, it isn't always easy to diagnose problems. These system monitoring tools make it a relatively painless process. Continue Reading
-
Manage Windows 7 hardware with Device Manager
Updating driver components and troubleshooting dicey devices gets easier with Windows 7 Device Manager, which helps solutions providers manage hardware, processors and disk drives. Continue Reading
-
New SQL Server 2008 R2 editions, features and licensing
Become an expert on the features, functions, pricing and licensing models of the four new SQL Server 2008 R2 editions. Continue Reading
-
Best practices for EMR storage services
If you're interested in getting in on the burgeoning market around EMR storage services, find out the four areas in which you cannot afford to fall short, for successful EMR storage services. Continue Reading
-
How to use user-agent strings as a network monitoring tool
User-agent strings, elements of HTTP headers, can be used as a network monitoring tool to reveal information about client networks without affecting network performance or privacy. Learn more in this tip by Richard Bejtlich. Continue Reading
-
Microsoft Management Console Remote Server Administration Tools
The Remote Server Administration Tools in Microsoft's Management Console helps VARs create customized Windows platform services to suit their customers' needs. Continue Reading
-
Configuring Microsoft Management Console in Windows 7
Using the Microsoft Management Console in Win 7 has certain benefits, including error notifications and help with administrative tasks. Continue Reading
-
Offering fixed mobile convergence services benefits WLAN solution providers
Offering fixed mobile convergence (FMC) services can help wireless LAN solution providers add considerable value by helping customers reduce total cost of operation, improve reliability and increase business productivity. Continue Reading
-
Steps to FCoE readiness
FCoE-compliant products are shipping, and there are problems in the data center that could be solved by the technology. Find out what steps to take to get your company and your customers ready for FCoE and what projects are good candidates for it. Continue Reading
-
Citrix XenServer 5.5 hardware requirements
Finding out the Citrix XenServer 5.5 hardware requirements before you begin implementation can save your customers' money on additional hardware purchases. Continue Reading
-
How to deploy NetFlow v5 and v9 probes and analyzers
Session data from NetFlow is useful for network intrusion detection and collecting network security monitoring data on your customers' networks. It's Cisco's preferred method for providing session data, although the open source community provides ... Continue Reading
-
Efficient storage provisioning: Capex and opex savings
Find out how efficient storage provisioning techniques through the use of storage virtualization, thin provisioning and storage domains can cut capital expenses (capex) and operating expenses (opex) for customers. Continue Reading
-
Getting to know the NERC CIP standards
Recently imposed security regulations on the electric grid have electric utilities scrambling to become compliant. Solution providers can offer a valuable service to these utilities by becoming familiar with the North American Electric Reliability ... Continue Reading
-
Social media security policies: Helping customers understand the threats
In this edition of Patrolling the Channel, Daniel P. Wallace, a Detroit, MI-based information security consultant, discusses how security solution providers can assist customers with secure social media use. Learn how to craft a social media ... Continue Reading
-
Optimizing SQL Server 2008 performance
This tip details the key areas that solutions providers should focus on when implementing SQL Server 2008, including memory capacity, storage configuration and disk alignment. Continue Reading
-
How to resell cloud storage services
Find out what the two main options are for resellers who want to get involved in cloud storage services but don't want the risk and cost involved with developing their own services. Continue Reading
-
How to become a cloud storage services provider
Find out what steps to take to become a cloud storage services provider, including making decisions around business scope and infrastructure, whether via a turnkey system or a build-your-own approach. Continue Reading
-
Backup design: Source-side considerations
Proper backup design involves a lot more than just the backup target. Find out how the backup source, the network connection, backup software and the backup server impact backup design. Continue Reading
-
FCoE: How to prepare customers for it
Find out which customers are better suited for Fibre Channel over Ethernet (FCoE) and how you should prepare them for the specification, now that it's been ratified. Continue Reading
-
Analyzing data in a virtualized server environment
You may know the basics of a green data center, but this chapter excerpt provides actual data that compares a virtualized server environment with a regular server environment. Continue Reading
-
How to manage EMC, NetApp arrays with Perl scripting
The more pieces of hardware you have, the more complicated managing them becomes. Find out how one consultant simplifies management of EMC Symmetrix DMX and NetApp arrays using Perl scripting. Continue Reading
-
Web application firewalls: How they can help protect customers
Web application firewall appliances and software are becoming a vital part of any customers' network security. There are many ways in which a Web application firewall can assist in protecting your customers' environments. Learn how Web application ... Continue Reading
-
Comparing I/O virtualization and virtual I/O benefits
How do you differentiate between virtual I/O and I/O virtualization? In this tip, Greg Schulz details what each method can contribute to server performance and infrastructure and also compares their distinct qualities. Continue Reading
-
Automating SUSE Linux Enterprise Server 11 installation
Automating installation of SUSE Linux Enterprise Server 11 is easy if you know how to maneuver the AutoYaST tool. Get two methods for creating an AutoYaST configuration file. Continue Reading
-
Managing and optimizing the Microsoft Hyper-V server
In this chapter excerpt from "MCTS: Windows Server Virtualization Configuration Study Guide: (Exam 70-652)," you'll learn how to understand the configuration tools and techniques for Hyper-V and get an overview of System Center Virtual Machine ... Continue Reading
-
New features in Windows Server 2008 R2
There are quite a few notable new features in Windows Server 2008 R2, including support for only 64-bit processors and the inclusion of Hyper-V R2. Continue Reading
-
New features in Microsoft Exchange Server 2010
Microsoft's beta of Exchange Server 2010 has new features that address connectivity, disaster recovery, compliance and other issues, according to two experts. Continue Reading
-
Wireshark 1.2 tutorial: Open source network analyzer's new features
Wireshark, the open source network analyzer, is useful for network solution providers or consultants who troubleshoot business networks. Find out about new features of Wireshark 1.2 in this tutorial. Continue Reading
-
How to solve out-of-space problems on NetApp replicated volumes
Running out of space on a NetApp replicated volume is a dicey situation to be in. Find out how one solution provider solved the problem for his customer, using a lot of trial and error. Continue Reading
-
Top five virtual desktop environment management issues
Find out how to overcome the top five virtualization management issues in your virtual desktop environment. Continue Reading
-
Top five virtual desktop infrastructure management problems
The demand for desktop virtualization and virtual desktop infrastructure is on the rise. Find out how to address common issues and improve customers' virtual desktop environments. Continue Reading
-
Managing Linux clients with System Center Operations Manager 2007 R2
System Center Operations Manager (SCOM) 2007 R2 lets you manage Unix and Linux machines, as well as Windows servers and desktops, through a single console. Find out how to import the Unix/Linux management packs and deploy SCOM. Continue Reading
-
Microsoft Office SharePoint compliance and security concerns
Find out which SharePoint compliance and security concerns are covered under specific U.S. laws and regulations. Continue Reading
-
Troubleshooting a failed SQL Server 2008 installation
Learn about the various tools and methods for troubleshooting a failed SQL Server 2008 installation. Continue Reading
-
VARs: How to become a managed services provider
On the road to becoming a managed services provider, VARs find they have options ranging from building their own systems to reselling services from distributors and vendors. Which is right for you? Continue Reading
-
Reducing power consumption with green IT solutions
Good for bottom lines and for the environs, green IT is not a hard sell to clients that need help putting green IT strategies and solutions into practice. Continue Reading
-
Step-by-step: How to size a virtual tape library (VTL)
A lot of factors go in to selecting the right size virtual tape library (VTL) for customers, such as the initial backup data set, daily change rate, retention period and data reduction rates from deduplication and compression. Follow our ... Continue Reading
-
Testing LAN switch interoperability: A series of best practices
Ensuring LAN switch interoperability is crucial when extending existing LANs or building new ones. The Tolly Group compiled a list of functions that must be tested to ensure true interoperability. Continue Reading
-
XenServer installation and deployment guidelines
Learn about best practices for XenServer installation and deployment in areas such as media and server hardware, storage and network configurations. Continue Reading
-
Remote vulnerability scanning: Process, roles and responsibilities
During hard times, it's important to go the extra mile to accommodate anything your customer may need. Rounding out your security offerings can make you invaluable to customers. Consider offering options such as vulnerability scans, pen testing and ... Continue Reading
-
Network security monitoring using transaction data
Using transaction data -- or application-specific traffic data -- in network security monitoring can give you a new line of defense. Continue Reading
-
Data breach prevention techniques: Helping customers avoid data breaches
Several serious data breaches have been highlighted in the news lately, making data loss prevention a hot topic for security managers and solution providers alike. Allen Zuk explains how data breaches occur and what you can do to better protect your... Continue Reading
-
How to perform a network security audit for customers
David Jacobs describes how to perform a network security audit for customers. Learn what you need to look for when at the customer site, and how to express the importance of a security audit to your customers. Continue Reading
-
VMware storage protocol decision: Why not NFS?
Choosing the right storage protocol for VMware isn't a no-brainer, even though the file-based nature of NAS/NFS might make it seem so. Find out what the key considerations should be when guiding customers toward a storage protocol. Continue Reading
-
Resource utilization projects add value to server virtualization
Learn how to use the findings of server virtualization health checks to sell resource utilization projects to your customers. Continue Reading
-
Storage RFP: Selection process mistakes and best practices
Learn from the mistakes made by vendors and resellers in the recent selection process for $2 million in storage equipment. Find out where the storage RFP and selection process went bad for the losers and what best practices the winner followed. Continue Reading
-
Router and switch upgrades: Five reasons your customer should invest
Mid recession, customers are avoiding investment in even basic router and switch upgrades, but one surefire way to convince them is long-term savings that will outweigh investment. Continue Reading
-
Evaluating VMware alternatives for server virtualization software
Learn how VMware alternatives may help your customers meet their server virtualization software needs. Continue Reading
-
The top five data theft protection tools for solution providers
Find out what five products top the list of the best tools for helping customers handle data theft protection, whether the data is in transit or at rest. Continue Reading
-
Daemonlogger for packet capture and redirection
Daemonlogger, a packet capture tool by Marty Roesch, has two features that prove helpful to security solution providers. Learn what those features are in this edition of Traffic Talk. Continue Reading
-
Native management tools for VDI: VMware vs. Citrix and Microsoft
Compare the native management tools of VMware vs. Citrix and Microsoft in the first of a two-part series on desktop and application virtualization management tools. Continue Reading
-
Network security monitoring: Know your network
One of the ways to keep a secure network is to know the network inside and out. Network security monitoring can be carried out in many different ways, but it always comes back to being aware of what is going on in your network. In this edition of ... Continue Reading
-
Five keys to owning server virtualization projects
To address the entire lifecycle of a customer's server virtualization project, concentrate on these five key areas: assessment, architecture, migration, training and ongoing management. Continue Reading
-
VMware ESX essentials: Virtual Machine File System
This section of our chapter excerpt on storage from the book "VMware ESX Essentials in the Virtual Data Center" explains the difference between direct- and network-attached storage and how to configure a client's network file system devices. Continue Reading
-
Best practices for securing domain controllers at the branch office
Companies that implement domain controllers at branch offices face a number of challenges, security-related and otherwise. Follow these best practices to keep branch-office domain controllers secure and effective. Continue Reading
-
Understanding Snort's Unified2 output
In this edition of the Snort Report, learn how using Snort's source code can help solution providers understand Snort's new Unified2 output. Continue Reading
-
Network security algorithms introduction
This section of our chapter excerpt on network algorithms explains three important subtasks that arise with intrusion detection and outlines tools such as Bloom filters and Aho-Corasick trees. Continue Reading
-
Customizing SharePoint with third-party applications and Web Parts
As third-party SharePoint products proliferate, learn about the different types of SharePoint add-ons and how to help clients customize their SharePoint environment. Continue Reading
-
Explaining deduplication rates and single-instance storage to clients
In order for clients to make an educated purchasing decision on a deduplication system, they need to understand the key factors that influence deduplication rates. Learn about these factors and further your understanding of single-instance storage. Continue Reading
-
Using VMware NetQueue to virtualize high-bandwidth servers
Sometimes high-bandwidth servers are left out of the virtualization picture due to I/O issues, but a new VMware queuing feature, NetQueue, alleviates these performance problems while allowing you to virtualize more servers. Continue Reading
-
Using Snort 2.8.3 to inspect HTTP traffic
Since the last Snort Report, Snort 2.8.3 has been released. In this issue, expert Richard Bejtlich discusses the best methods to learn about the new features of Snort 2.8.3 and how to use them when inspecting HTTP traffic. Continue Reading
-
OS virtualization vs. hypervisor: Why you should offer both
As server virtualization fever sweeps through the industry, make sure you're prepared for the eventual rise of OS virtualization. Learn about the benefits of OS virtualization and prepare to offer OS virtualization along with the hypervisor model ... Continue Reading
-
Data center migration quiz: Forklift vs. swing
There are two possible approaches to a data center migration: forklifting the application hardware to its new location or using a "swing" approach, with an entirely new setup at the new location. Take our quiz to find out which method makes sense ... Continue Reading
-
CCNA Security - Defending the perimeter
This section of the chapter excerpt from "CCNA Security Official Exam Certification Guide" introduces how to set up and administrate your router to defend your network perimeter. Continue Reading
-
How to troubleshoot DNS server failures
DNS server failures are one of the most critical types of malfunctions on a Windows network. Learn a basic knowledge of troubleshooting techniques and how to execute quick tests to narrow down the cause of DNS server failures. Continue Reading
-
How to resolve DNS server failures
DNS server failures can occur in your customer's environment for a number of reasons, but most often the problem is related to the client -- not the DNS server. This tip explains how to resolve DNS server problems when a workstation is incorrectly ... Continue Reading
-
Key aspects of cloud computing services
Learn about the key aspects of cloud computing services and why these services are increasing at such a fast rate. Continue Reading
-
Using Wireshark and Tshark display filters for troubleshooting
Display filters can be used to analyze different types of network traffic. In this Traffic Talk tip, Richard Bejtlich explains how to use Wireshark and Tshark display filters for security and network troubleshooting. Continue Reading
-
Three steps to a successful data center migration plan
When designing a data center migration plan, it's crucial to ensure that your client's business will be protected during the migration. Learn about the three steps to a successful data center migration plan: knowing what to migrate, upholding SLAs ... Continue Reading
-
High-availability options in SQL Server 2008
SQL Server 2008's high-availability options can address all of your customers' high-availability needs. Learn about using failover clustering, database mirroring, log shipping and replication to keep a database accessible to users. Continue Reading
-
Flash-based solid-state disk vs. DRAM-based solid-state disk
The solid-state disk market isn't new, but there is a whole new group of entrants to it, with a new approach. Find out which makes the most sense for customers -- flash-based solid-state disk or DRAM-based solid-state disk -- and what the key ... Continue Reading
-
How to establish decommissioning policies and procedures
The management of end-of-life storage assets represents a relatively untouched sector of the compliance market, making it a prime service opportunity for solution providers. Learn about this field and how to establish effective decommissioning ... Continue Reading
-
Hardware lifecycle management: How to decommission storage hardware
Hardware lifecycle management has become a critical aspect of responsible storage management. Resellers must learn how to safely and securely decommission storage hardware so that customers' confidential data is not exposed. Continue Reading
-
Configuration Tips for VoWLAN Access Points
Learn how to configure VoWLAN access points. Continue Reading
-
Bridging the IT/business gap in business intelligence projects
When deploying a business intelligence project for your customers, there is often a gap between the IT department and the business department. Learn how to bridge that gap by getting the right people involved in the project and following established... Continue Reading
-
Four steps to designing a cloud storage services strategy
Resellers wondering how to respond to customer inquiries around cloud storage should consider four options: ignore it, become an agent, set up cloud services for customers or offer their own cloud storage services. Continue Reading
-
DNS troubleshooting and analysis
This first edition of Traffic Talk takes a look at the Domain Name System (DNS), the mechanism that translates IP addresses to hostnames and back, plus a slew of other functions. Learn how to identify problems with DNS records and learn more about ... Continue Reading
-
Top three best system monitoring tools
Choosing a system monitoring tool to recommend to your customers is complex, made more so by the number of products on the market. To help speed up the selection process, we chose the top three products for you to consider. Continue Reading
-
System Recovery and Diagnostic Tricks: Backup and Restore Center
This chapter excerpt from "Tricks of the Microsoft Windows Vista Masters" covers Vista's Backup and Restore Center and provides you with key information on complete system backup, how to access backup with virtual servers or PCs and how to use the ... Continue Reading
-
Backup window reduction methods
Customers struggling to meet their backup windows have a number of choices to cut their data at the source. Find out which of the three options is best suited for them. Continue Reading
-
Business intelligence consulting: Problems and solutions
The basic problem for those involved in business intelligence consulting is the need for an integrated system to manage project components such as project management, collaboration and SDLC tools. Without a technological solution to the problem, BI ... Continue Reading
-
iSCSI, FCoE or InfiniBand for storage networking?
While iSCSI is clearly emerging as the storage networking protocol of choice for SMBs, the choice for enterprises isn't so clear-cut. The decision is between Fibre Channel over Ethernet (FCoE) and InfiniBand. Learn the pros and cons of all three ... Continue Reading
-
Host-based vs. VTL vs. NAS data deduplication
Leveraging data deduplication can maximize your client's storage capabilities. Learn how to choose the right data deduplication technology to meet your client's storage needs. Continue Reading
-
Data management concerns of MDM-CDI architecture
Read about the data management concerns associated with MDM-CDI architecture. Continue Reading
-
Troubleshooting 802.1x port-based authentication systems
Learn how to most effectively troubleshoot 802.1x problems that may arise on your client's wireless network. Continue Reading
-
Troubleshooting 802.1x missing supplicant problems, part 1
Learn how to diagnose and solve 802.1x missing supplicant problems. Continue Reading
-
Troubleshooting 802.1x missing supplicant problems, part 2
Learn how to deal with peripheral devices and hubs that don't have 802.1x supplicants in this chapter excerpt of Implementing 802.1x Security Solutions by Jim Geier. Continue Reading
-
SharePoint implementation best practices
Any SharePoint implementation requires careful planning, with proper attention to infrastructure issues, the discovery stage and topology planning. Learn best practices to deliver an efficient portal that suits your customer's needs. Continue Reading
-
Making the most of selling antivirus services
Read Mike Rothman's observations on the antivirus market as it pertains to the channel and find out how selling antivirus services can provide other business opportunities. Continue Reading
-
Failover clustering, network load balancing drive high availability
Windows shops with mission-critical servers, applications and servers can use Windows Server 2008's failover clustering and network load balancing features to ensure high availability. Continue Reading