Paul Kirvan Independent IT consultant/auditor Search Customer Experience What is quality of experience (QoE or QoX)? 13 Mar 2025 Search Content Management What is taxonomy in computing? 13 Mar 2025 Search Storage What is RAID (redundant array of independent disks)? 13 Mar 2025 Search CIO What is ICT (information and communications technology)? 13 Mar 2025 Search Storage Explore software-defined storage pros and cons 13 Mar 2025 Search Content Management What is a web development framework (WDF)? 13 Mar 2025 Search Storage What are optical disks and how do they work? 11 Mar 2025 Search Content Management What are social media metrics? 11 Mar 2025 Search Disaster Recovery How to assess pandemic risk in 2025 10 Mar 2025 Search Data Backup 7 data sanitization techniques for better data protection 07 Mar 2025 Search Security SEC cybersecurity disclosure rules, with checklist 07 Mar 2025 Search Data Center What is a green data center? 06 Mar 2025 Search Security How to create a data security policy, with template 06 Mar 2025 Search Mobile Computing iPad 05 Mar 2025 Search Storage How to prepare a data storage budget, with free template 05 Mar 2025 WhatIs What is a word in computing architecture? 03 Mar 2025 Search ERP What to include in an RFP for an OMS, with template 28 Feb 2025 Search Storage Compare software-defined storage vs. storage virtualization 28 Feb 2025 Search Security What is the NSA and how does it work? 28 Feb 2025 Search Data Center How much energy do data centers consume? 26 Feb 2025 WhatIs What is red teaming? 24 Feb 2025 Search Disaster Recovery How to manage and mitigate reputational risk 21 Feb 2025 WhatIs What is open source and how does it work? 19 Feb 2025 Search Storage What is personal cloud storage (PCS)? 19 Feb 2025 Search Security What are social engineering attacks? 18 Feb 2025 Search Customer Experience What is high-touch customer service? 12 Feb 2025 WhatIs What is information security management system (ISMS)? 11 Feb 2025 WhatIs What is a supercomputer? 11 Feb 2025 WhatIs What is a motherboard? 10 Feb 2025 WhatIs What is ISO 27001? 10 Feb 2025 Search CIO What is an IT project manager? 06 Feb 2025 Search Disaster Recovery People-centered business continuity is critical in the age of AI 06 Feb 2025 Search Security Comparing top identity and access management certifications 05 Feb 2025 Search Disaster Recovery How to assess and manage geopolitical risk 03 Feb 2025 Search Storage Understand your storage infrastructure management 23 Dec 2024 Search Disaster Recovery Free network disaster recovery plan template and guide 12 Dec 2024 Search Storage 10 data storage issues and how to overcome them 05 Dec 2024 Search CIO How to create an IT succession plan for key tech roles 26 Nov 2024 Search Security U.S. data privacy protection laws: 2025 guide 21 Nov 2024 Search Storage Tips to reduce the environmental impact of data storage 21 Nov 2024 Search Customer Experience What is speech recognition? 20 Nov 2024 WhatIs What is a server? 20 Nov 2024 WhatIs What are spreadsheets and how do they work? 19 Nov 2024 WhatIs What is acceptable use policy (AUP)? 18 Nov 2024 Search Software Quality What is a Waterfall model? Definition and guide 15 Nov 2024 Search Storage 8 ways enterprises can enhance object storage security 14 Nov 2024 Search Security SIEM vs. SOAR vs. XDR: Evaluate the key differences 12 Nov 2024 Search Security EDR vs. XDR vs. MDR: Key differences and benefits 12 Nov 2024 Search Storage Data retention and destruction policy template: Free download 12 Nov 2024 Search Networking How to navigate the network vendor selection process 01 Nov 2024 Search Security What is unified threat management (UTM)? 01 Nov 2024 Search Networking Is cloud-based network management right for your business? 28 Oct 2024 Search Security What is two-factor authentication (2FA)? 28 Oct 2024 Search Security EDR vs. EPP: How are they different and which is right for you? 24 Oct 2024 Search CIO What is a learning management system (LMS)? 22 Oct 2024 Search Disaster Recovery 6 disaster recovery site requirements for businesses 21 Oct 2024 Search Content Management What is information rights management (IRM)? 17 Oct 2024 Search Content Management What is records management? 17 Oct 2024 Search Security How to build an incident response plan, with examples, template 16 Oct 2024 Search Customer Experience What is Salesforce Service Cloud? 15 Oct 2024 WhatIs What is a command prompt? 15 Oct 2024 WhatIs What is threat intelligence? 10 Oct 2024 Search Security What is extended detection and response (XDR)? 10 Oct 2024 Search Security How to use security as code to achieve DevSecOps 07 Oct 2024 Search Content Management What is a records retention schedule? 27 Sep 2024 Search Security How to prepare a system security plan, with template 23 Sep 2024 Search Disaster Recovery Use network fault monitoring to prevent malfunctions 20 Sep 2024 Search Data Management What is corporate performance management (CPM)? 18 Sep 2024 Search Security What is email spam and how to fight it? 18 Sep 2024 Search Customer Experience What is actionable intelligence? 16 Sep 2024 Search App Architecture What is a software stack? 11 Sep 2024 Search CIO What is data storytelling? 09 Sep 2024 Search Customer Experience What is multichannel marketing? 06 Sep 2024 Search AWS What is AWS? Ultimate guide to Amazon Web Services 05 Sep 2024 Search Content Management What is digital experience (DX)? 05 Sep 2024 Search Disaster Recovery Example disaster recovery plan for small businesses 19 Aug 2024 Search Unified Communications What is telephony? 06 Aug 2024 Search Networking Tips to provide network support for remote workers 05 Aug 2024 Search Customer Experience What is a 360-degree customer view? 05 Aug 2024 Search Storage What is a partition in computers? 01 Aug 2024 Search Storage What is an embedded MultiMediaCard (eMMC)? 31 Jul 2024 Search Disaster Recovery 8 communications basics the CrowdStrike outage highlights 31 Jul 2024 Search Storage What is an NVDIMM (non-volatile dual in-line memory module)? 31 Jul 2024 Search Data Center What is green computing? 31 Jul 2024 Search Networking What is network scanning? How to, types and best practices 29 Jul 2024 Search Disaster Recovery Should you use open source for enterprise disaster recovery? 29 Jul 2024 Search Software Quality What is no-code? Everything you need to know 29 Jul 2024 Search Storage What is NVMe over Fibre Channel (NVMe over FC)? Definition and Guide 26 Jul 2024 WhatIs What is data lifecycle? 25 Jul 2024 Search Storage What is ZFS? 22 Jul 2024 Search Storage What is SSD RAID (solid-state drive RAID)? 19 Jul 2024 Search Storage What is a CompactFlash card (CF card)? 18 Jul 2024 Search Storage mirror site 16 Jul 2024 Search Storage JEDEC 16 Jul 2024 Search Disaster Recovery 13 reasons your disaster recovery plan failed 11 Jul 2024 Search Storage RRAM or ReRAM (resistive random access memory) 10 Jul 2024 Search Networking Cloud networking sustainability strategies yield benefits 02 Jul 2024 Search Disaster Recovery The 4 phases of emergency management 26 Jun 2024 Search Networking A work-from-home reimbursement policy for network tech 25 Jun 2024 Search CIO Top cloud compliance standards and how to use them 24 Jun 2024 1 2 3 4 5 6