Features
Features
-
Windows task manager: Viewing Windows 7 processes and applications
If applications or processes in a customer's Windows 7 operating system aren't responding, you can use the task manager to view, end and restart them. Continue Reading
-
How to save Perfmon data using Windows 7 performance monitor
There is a great deal of performance data to sort through in Windows 7, but the performance monitor uses data collector sets to allow you to view and analyze collected data. Continue Reading
-
Windows 7 administrative tools: Creating shortcuts
Windows 7 administrative tools such as the iSCSI Initiator may be under your radar, but you can use them to help customers more easily manage everyday tasks. Continue Reading
-
HA cluster configuration: Requirements and steps
Consider these requirements and settings, such as admission control, prior to a HA cluster configuration and use the HA restart priority and isolation response post-configuration. Continue Reading
-
Using Microsoft Cluster Services for virtual machine clustering
Microsoft Cluster Services are useful for the different virtual machine (VM) clustering scenarios that are available, such as cluster in a box, and help with cluster node creation. Continue Reading
-
Windows 7 compatibility: Solving Hardware, software issues
Windows 7 compatibility has improved over previous Windows versions, especially when it comes to finding and installing hardware easily, and overcoming software incompatibilities. Continue Reading
-
Windows server backup in Windows Server 2008 R2
Take a look at the best practices for Windows server backup in Windows Server 2008 R2, including configuring backup settings and performing system state and bare-metal backups. Continue Reading
-
How to restore system state backup in Windows Server 2008 R2
Use this chapter excerpt to find out how to perform a bare-metal recovery and system state recovery in Windows Server 2008 R2, including how to use Windows system recovery tools. Continue Reading
-
SAS-2: Benefits and drawbacks of the newest Serial Attached SCSI version
Learn about the latest version of Serial Attached SCSI, SAS-2, including which segment of the market it holds advantages for, how it compares with Fibre Channel and SATA, and its key drawbacks. Continue Reading
-
VCenter Server installation requirements
Properly preparing for a vCenter Server installation involves identifying hardware, operating system, database and networking requirements before implementation. Continue Reading
-
Exchange Server 2010 requirements: Hardware, Active Directory
You should know the hardware and Active Directory requirements for Exchange Server 2010 before deployment, including the memory needed and global catalog server placement. Continue Reading
-
Exchange Server 2010 server roles, prerequisites, high availability
When installing Exchange Server 2010, you need to have an understanding of server roles, prerequisites and high availability, which are all key topics in this chapter excerpt. Continue Reading
-
PowerShell commands in Windows Server 2008 R2
Use this chapter excerpt to learn about PowerShell commands for Windows Server 2008 R2, as well as other PowerShell uses, features, enhancements and command types. Continue Reading
-
Using PowerShell ISE and alias cmdlets
This chapter excerpt details what PowerShell ISE can offer solutions providers, including command and script panes, and how to use alias cmdlets to administer new aliases. Continue Reading
-
PowerShell remoting in Windows Server 2008 R2
Learn the best methods to enabling PowerShell remoting in Windows Server 2008 R2, including using cmdlets or the Server Manager to configure PowerShell remoting. Continue Reading
-
Adding Remote Desktop Services and RemoteApp programs
There are factors that solutions providers need to consider when adding Remote Desktop Services, such as which role services to use, and steps to follow to add RemoteApp programs. Continue Reading
-
Using Remote Desktop Services Manager, RDS CAL
Solutions providers can use the Remote Desktop Services Manager and its tab options to view user information and get expert advice on identifying and adding a RDS CAL. Continue Reading
-
Remote Desktop Services: Server and client requirements
In this article, you'll learn about Remote Desktop Services server and client requirements and how to retrieve information on the RDS server using the Performance Monitor tool. Continue Reading
-
Using Windows PowerShell scripts for task automation
Solutions providers will find that executing Windows PowerShell scripts for task automation will make jobs, such as creating virtual machines or consolidating old servers, easier. Continue Reading
-
New virtual machine management using VMM, PowerShell
Use this chapter excerpt to get tips for new virtual machine management, including how to add a managed host to Virtual Machine Manager by using PowerShell scripts. Continue Reading
-
Virtual machine migration via Windows PowerShell scripts
These Windows PowerShell scripts will help solutions providers to ensure that the process for both single and multiple virtual machine migrations will be completed quickly. Continue Reading
-
VSphere virtual machine migration tools: vCenter converter
Using virtual machine migration tools such as vCenter Converter will make converting customers' virtual machines to vSphere a smooth process for solutions providers. Continue Reading
-
IT systems management: The production acceptance process
This chapter excerpt on IT systems management explains how solutions providers can benefit from production acceptance and details the steps to effective implementation. Continue Reading
-
Windows 7 system monitoring: Resource Monitor, Performance Monitor
Help your customers get a handle on PC resource usage and bottlenecks with two built-in Windows 7 system monitoring tools: Resource Monitor and Performance Monitor. Continue Reading
-
Windows 7 system diagnostic reports: Using Performance Monitor
Using the Performance Monitor, solutions providers can view Windows 7 system diagnostic reports to resolve performance issues and prevent problems before they occur. Continue Reading
-
Troubleshooting Windows 7 hardware and performance issues
Solutions providers need to be aware of the top methods for troubleshooting Windows 7 hardware and performance issues, including how to properly deal with error messages. Continue Reading
-
Troubleshooting Windows 7 errors
Use this FAQ when troubleshooting Windows 7 to get answers to commonly asked questions on Windows 7 errors and dealing with hardware problems. Continue Reading
-
Resolving a Windows 7 crash or freeze
This FAQ helps solutions providers give users the best assistance when Windows 7 issues arise, such as the Blue Screen of Death (BSOD), crashes and random freezes. Continue Reading
-
Choosing between kernel virtualization methods
Take a look at the different kernel virtualization methods presented in this chapter, including the pros and cons of shared kernel virtualization and the OpenVZ kernel. Continue Reading
-
FAQ: Windows 7 system maintenance tools
Our expert answers commonly asked questions about maintaining Windows 7 using Remote Assistance, determining which maintenance tools are most useful and how often they should run. Continue Reading
-
Performing an automated Ubuntu install using preseeding
When performing an automated Ubuntu install, preseeding is an integral part of the process. Learn the different variables and settings necessary for a basic preseed configuration. Continue Reading
-
Understanding run-level scripts in Fedora 11 and RHEL
Solutions providers can use run-level scripts in Fedora 11 and Red Hat Enterprise Linux (RHEL) to start certain services and execute various commands. Continue Reading
-
Monitoring VMware vSphere performance using alarms
Find out how to create and manage alarms using vCenter Server and learn the steps to configuring vCenter Server for email and notifications. Continue Reading
-
Monitoring vSphere performance with command-line tools
Use this chapter excerpt to learn about VMware's command-line utilities that can help solutions providers with monitoring customers' performance and resource usage. Continue Reading
-
Monitoring vSphere performance with vCenter Server performance graphs
vCenter Server's performance graphs provide solutions providers with detailed information on vSphere performance, including CPU, memory, disk, network and system data. Continue Reading
-
Monitoring vSphere CPU and memory usage
Use this chapter excerpt to learn how to create real-time graphs for virtual machines, CPU consumption and memory usage. Continue Reading
-
Windows 7 command-line tools and programs
Learning how to use Windows 7 command-line tools and programs can help solutions providers perform maintenance, configuration and diagnostic tasks for customers. Continue Reading
-
Setting Windows 7 environment variables
This chapter excerpt can teach you how to use Windows 7 environmental variables to locate your customers' system files and folders. Continue Reading
-
Monitoring Hyper-V performance and utilizing System Center VMM
See the benefits of monitoring Hyper-V performance and utilizing System Center Virtual Machine Manager, including centralized management and organized placement of virtual machines. Continue Reading
-
SQL Server 2008 hardware and software requirements
Solutions providers can use this chapter excerpt to learn about the various hardware and software requirements for SQL Server 2008 in 32-bit and 64-bit environments. Continue Reading
-
Installing and managing Hyper-V on Windows Server 2008 Server Core
Follow the necessary steps to install Hyper-V on Windows Server 2008 Server Core and learn how to remotely manage your customers' Hyper-V environments. Continue Reading
-
FAQ: Windows 7 hardware requirements and compatibility
Use this FAQ to learn about Windows 7 hardware requirements and notebook compatibility factors, and find out when you should recommend 32-bit vs. 64-bit architecture. Continue Reading
-
Installing, configuring and testing a UPS for Windows 7
This chapter excerpt teaches you how to choose a UPS for multiple Windows 7 workstations and provides step-by-step processes for UPS installation, configuration and testing. Continue Reading
-
Adding and removing Windows 7 hardware
Use this chapter excerpt to become an expert on adding PnP and non-PnP hardware. You'll also get tips on providing drivers for hardware, troubleshooting and removing hardware. Continue Reading
-
WIndows 7 dual monitor not working? Read these tips
Use this chapter excerpt to get rules, tips and troubleshooting advice for setting up dual monitors in Windows 7 and adding a secondary display adapter. Continue Reading
-
Key concepts for server, storage and client virtualization
This chapter excerpt explores the different aspects of IT virtualization, such as server, storage and client virtualization, and covers virtual servers and virtual data storage. Continue Reading
-
Improving Windows 7 performance by optimizing the hard disk
Examining hard disk specifications, including speed and seek time, or learning to enable write caching or disable compression can help you achieve optimal Windows 7 performance. Continue Reading
-
Optimizing Windows 7 application performance
Reading these application performance optimization tips will help you launch and install applications efficiently while optimizing Windows 7 to run programs more effectively. Continue Reading
-
Windows 7 performance monitoring tools
Use updated tools such as Performance Monitor, Resource Monitor or Task Manager to focus on specific performance aspects and capabilities while enhancing and measuring system performance. Continue Reading
-
Windows 7 virtual memory performance optimization
In order to ensure virtual memory performance optimization in Win 7, you need to consider page file customization techniques, location, size, how to split a page file and more. Continue Reading
-
Top 10 SaaS implementation considerations
Once you go through this list of the top 10 considerations for implementing Software as a Service (SaaS), you will be ready to tackle SaaS implementation head on. These tasks are meant to ensure that there are no surprises in the implementation ... Continue Reading
-
Common SaaS problems that occur after implementation
There are still a few problems you can run into after implementing Software as a Service and this list can help you prepare clients for connection or software application issues. Continue Reading
-
Configuring virtual networking for Microsoft Hyper-V
In this chapter excerpt from "MCTS: Windows Server Virtualization Configuration Study Guide: (Exam 70-652)," you'll learn about the various tools that can help with virtual networking configuration tasks. Continue Reading
-
Using the Ubuntu Linux system monitor tool
Learn how to use the Ubuntu Linux system monitor tool with this chapter excerpt from "Ubuntu Linux Secrets." Continue Reading
-
Ubuntu Linux installation and hard drive setup guide
Learn how to set up a client's hard drive for proper Ubuntu Linux installation with this chapter excerpt. Continue Reading
-
Virtual desktop infrastructure: Five tips for improving virtual desktop performance
Implementing virtual desktop infrastructure means that you have to switch emphasis from a client's local processing power to server processing power and network connectivity. Learn how to improve desktop performance and prevent errors before they ... Continue Reading
-
Ten steps for smooth desktop virtualization deployment
Pulling off a successful desktop virtualization deployment project means you have to first understand which virtualization method is best for your client. This 10-step plan addresses common mistakes that are made in desktop virtualization deployment... Continue Reading
-
Thin clients vs. thick clients for desktop virtualization
Find out when you should recommend thin clients or PCs (aka thick clients) to your desktop virtualization customers. Continue Reading
-
VMware ESX essentials: Fibre Channel and iSCSI
This section of our chapter excerpt on storage from the book "VMware ESX Essentials in the Virtual Data Center" explains the differences between Fibre Channel and iSCSI as well as the configurations a client is able to use when working with VMware ... Continue Reading
-
Network virtualization explained
Virtualization has moved beyond just server and storage capacities and now encompasses the network as well. Learn about network virtualization considerations to understand before deployment, some major opportunities in network virtualization for ... Continue Reading
-
Implement access control systems successfully in your organization
Access control is an important step toward mitigating an organization's security risks. Learn the importance of an access control system and how to implement it successfully. Continue Reading
-
Key considerations in developing a storage area network design
The best storage area network design for your customers will take into consideration a number of critical issues: uptime needs, scalability, security and disaster recovery. Find out how each of these factors will influence storage area network ... Continue Reading
-
Introduction to business intelligence tools and reporting
As businesses grow and accumulate more data, the role of business intelligence reporting grows and becomes more complicated. Learn about the business intelligence tools and approaches VARs use to grow their businesses and stay ahead of the ... Continue Reading
-
Strategies for disaster recovery contingency planning
Create strategic disaster recovery plans for your clients and protect them from data loss if a disaster should strike. This feature article introduces the second installment of our Disaster Recovery Hot Spot Tutorial Continue Reading
-
Network design documentation
Inadequate network documentation can lead to a multitude of problems for solution providers. Learn the importance of network documentation and what network design documentation a solution provider needs from customers. Continue Reading
-
Network design considerations checklist for providers
There are many network design considerations that every solution provider should take into account before embarking on a network design project. Knowing these trends and caveats will help you make the best network design planning and network design ... Continue Reading
-
Configuring privilege levels
This section of the chapter excerpt focuses on supporting multiple administrative levels of router configuration. Continue Reading
-
Channel Explained: Voice over Internet Protocol (VoIP)
VoIP has emerged as a convenient, reliable and cost-effective network option for businesses of all sizes. In this Channel Explained you'll learn how VoIP works, what to consider before deploying it in a company, and how to take advantage of the ... Continue Reading
-
What should be included in a managed services agreement?
A well-written managed services agreement should provide a common understanding of the services to be performed by the managed services provider for the client. Learn why the managed services agreement is often the first step taken by MSPs, the ... Continue Reading
-
What are the 3 core deliverables of basic MSP offerings?
Developing an efficient managed services offering is essential to building loyal clientele. Learn about the three core deliverables that comprise a managed services offering. Continue Reading
-
How to write an IT service-level agreement
A service-level agreement (SLA) is a document that clearly lays out your responsibilities as a client's managed services provider. Learn how to write an SLA to protect your managed services business by avoiding confusion with customers that can lead... Continue Reading
-
Top 5 data migration tools
Today's unprecedented rate of data growth means there's big opportunity for integrators around data migration services. Learn which tools are the best in five different categories. Continue Reading
-
Validated firewalls
Firewalls need to be checked and validated to ensure proper function before they are put into production. This section of the chapter excerpt will deal with validating and maintaining firewalls. Continue Reading
-
Securing Windows Server 2008: Installing and turning on BitLocker
Aaron Tiensivu covers steps for installing and turning on BitLocker in Windows Server 2008 in this chapter excerpt. Continue Reading
-
What are federated databases?
Federated databases are a possible solution to your customers' database search issues. This IT Channel Explained will explain what a federated database is and how it works and give you the info you need to determine whether it's a good fit for your ... Continue Reading
-
System Recovery and Diagnostic Tricks: Vista Recovery: Advanced Boot Options, WinRE and WinPE
Vista's Advanced Boot Options, the Windows Recovery Environment Platform, WinRE and WinPE are all covered in this chapter excerpt from "Tricks of the Microsoft Windows Vista Masters." Learn about these options before choosing CompletePC backup. Continue Reading
-
Network IDS/IPS vendors
Before deciding on a network intrusion detection or intrusion prevention system (IDS/IPS), check out this Partner Program Directory. Use these checklists to compare partner programs of network IDS/IPS vendors. Continue Reading
-
iPod Forensics
Read about how to conduct forensic investigations with data retrieved from an iPod. Continue Reading
-
Top five data storage compression methods
Data storage compression can eliminate the many redundancies of stored data and cut storage costs. Learn the top five methods of lossless and transparent storage compression. Continue Reading
-
The benefits of metadata and implementing a metadata management strategy
This section of the chapter excerpt will introduce and explore the basics of metadata. Continue Reading
-
Managing Data in the Data Hub
This section of the chapter excerpt deals with acquiring, rationalizing, cleansing, transforming, and loading data into the Data Hub. Continue Reading
-
Cisco Unified Communications Manager review quiz
This section provides review questions on the material covered in the previous sections of the chapter excerpt. Continue Reading
-
Cisco Unified Communications Manager - Hardware, Software and Clustering
This chapter excerpt covers the compatible hardware and software for Cisco Unified Communications Manager, as well as its clustering capabilities. Continue Reading
-
Cisco Unified Communications Manager licensing
This section of the chapter excerpt focuses on the certification and licensing opportunities of Cisco Unified Communications Manager. Continue Reading
-
Five questions to ask in a data deduplication project
When scoping out a customer's data deduplication project, there are five key questions to explore with your customers to determine the best approach to take. Learn what questions you should ask and why they're important. Continue Reading
-
What is the scope of the assessment?
Before beginning a security assessment on IT systems, service providers should discuss the scope of the assessment. Learn why it is important to decide the scope of an assessment before its execution. Continue Reading
-
What are the tangible deliverables of the security assessment?
Learn what standard deliverables are for a security site assessment and how to tailor them to the expected audience. Continue Reading
-
Advantages and disadvantages of Hyper-V
Microsoft's Hyper-V is at the release candidate stage, and some companies already have it in production use. Find out the advantages and disadvantages of the virtualization tool so you can help customers at a server virtualization decision point. Continue Reading
-
Predicting data storage growth
If your customers have deep pockets, predicting data storage growth is a relatively easy chore using storage resource management (SRM) tools. But for smaller companies with equally small budgets, you'll need to be more creative. Learn the techniques... Continue Reading
-
The benefits of storage capacity planning
Storage capacity planning services can save your customers money and bring other benefits by balancing their storage utilization and growth rates with their tolerance for upgrade interruptions and storage architecture. Continue Reading
-
The best networking products as chosen by customers
Choosing networking products for your line card can be a challenge. We recommend you begin by considering the hardware and software businesses like best. Here you'll find the top three networking products as chosen by SearchNetworking.com readers in... Continue Reading
-
The benefits of application virtualization
Application virtualization can bring benefits to your customers such as ease of maintenance and greater portability. It comes after server virtualization and can be the right solution when desktop virtualization is overkill. Continue Reading
-
Managed services contracts
Value-added resellers venturing into managed services need to consider the details of the managed services contract they provide to customers. Learn what goes into a managed services contract in this edition of Channel Explained. Continue Reading
-
Goals of SOA: Integration and interoperability
This excerpt from "SOA: Principles of Service Design" defines the term "interoperability" and describes how service orientation can benefit the process of sharing data. Continue Reading
-
Understanding service-oriented technology today
This excerpt from "SOA: Priniciples of Service Design" revisits fundamental service design elements and depicts how they work in relation to one another. Continue Reading
-
Service-oriented computing: Goals and benefits
This excerpt from "SOA: Principles of Service Design" lays out seven goals of service-oriented computing and talks about how businesses can benefit from this technology. Continue Reading
-
What is the client's IT budget for the network design project?
While all clients have expectations for their network design projects, not all have allocated the money needed to accomplish their objectives. Learn why asking about IT budget will help you and your customers get more clarity about what can and ... Continue Reading
-
Entity services and business entities explained
This excerpt from "SOA: Principles of Service Design" explains the entity service model and how it can be leveraged to automate multiple business processes. Continue Reading
-
Conclusions about network centralization and decentralization
Network centralization and network decentralization are about making changes. When making such pervasive changes, experts recommend that you consider these guiding principles: know what specific problem you are solving; understand your motivation ... Continue Reading
-
Becoming familiar with the Hyper-V administrative console
This excerpt from "Windows Server 2008 Unleashed" provides a quick guide on navigating the Hyper-V administrative console and the virtual server settings available to be configured. Continue Reading