MSP technology services
Tips on IT service delivery approaches and features on building lines of business to meet customers' digital transformation needs.
Top Stories
-
News
03 Jul 2025
Partners begin to target agentic AI marketplace platforms
Cloud marketplaces are emerging as key venues for adoption of AI agents. Consultants and integrators aim to offer the technology but will need to work out pricing methods. Continue Reading
By -
Feature
27 Jun 2025
MSSP automation amps managed service delivery, opens markets
MSSPs are updating and broadening their technology stacks, emphasizing automation to break security service price barriers and reach new clients in a competitive market. Continue Reading
By
-
Tutorial
30 Jun 2008
How to install a certificate on a Windows Vista client
Learn how to install a certificate onto a Windows Vista client after downloading the certificate from the enterprise certificate authority. Continue Reading
-
Feature
09 Jun 2008
Cisco Unified Communications Manager licensing
This section of the chapter excerpt focuses on the certification and licensing opportunities of Cisco Unified Communications Manager. Continue Reading
-
Feature
09 Jun 2008
Cisco Unified Communications Manager - Hardware, Software and Clustering
This chapter excerpt covers the compatible hardware and software for Cisco Unified Communications Manager, as well as its clustering capabilities. Continue Reading
-
Feature
02 May 2008
Predicting data storage growth
If your customers have deep pockets, predicting data storage growth is a relatively easy chore using storage resource management (SRM) tools. But for smaller companies with equally small budgets, you'll need to be more creative. Learn the techniques for assessing historical growth to help customers get optimum use out of their storage resources. Continue Reading
-
Tip
21 Apr 2008
How to configure wireless access points
A crucial part of any WLAN installation is configuring wireless access points. Learn which configuration options -- such as IP address, transmit power and beacon interval -- are best for your customers. Continue Reading
By- Jim Geier, Contributor
-
Tip
01 Apr 2008
Network session data analysis with Snort and Argus
This edition of Snort Report departs from the standard format to introduce Argus, a session data collecting tool that can work alongside Snort. Learn how session data can complement Snort's alert data for network session analysis Continue Reading
-
Feature
27 Jan 2008
Business impact analysis for business continuity: BIA for small business
Read this example of business impact analysis (BIA) for a small business from "Business Continuity & Disaster Recovery for IT Professionals" to make the process more tangible. Continue Reading
-
Feature
26 Jan 2008
Business impact analysis for business continuity: Data collection methodologies
For business impact analysis (BIA) collect data through interviews and questionnaires. This excerpt from "Business Continuity & Disaster Recovery for IT Professionals" discusses various data collection methodologies and how to carry them out. Continue Reading
-
Feature
25 Jan 2008
Business impact analysis for business continuity: Identifying business functions
This excerpt from "Business Continuity & Disaster Recovery for IT Professionals" walks you through common business functions and encourages you to assess those functionalities that are not covered and include them in your BIA. Continue Reading
-
Feature
25 Jan 2008
Business impact analysis for business continuity: Upstream and downstream losses
Learn to mitigate indirect impacts that disasters can have on businesses. In this excerpt from "Business Continuity and Disaster Recovery for IT Professionals," the author discusses upstream and downstream losses. Continue Reading
-
Feature
25 Jan 2008
Business impact analysis for business continuity: Recovery time requirements
Use business impact analysis (BIA) to define recovery time requirement terms and looks at how those elements interact. Continue Reading
-
Feature
25 Jan 2008
Business impact analysis for business continuity: Understanding impact criticality
When it comes to business functions, develop a rating scale to identify your customers' mission-critical functions. This excerpt from "Business Continuity and Disaster Recovery for IT Professionals" outlines a business function rating system with four criticality categories: critical, essential, necessary and desirable. Continue Reading
-
Tip
02 Jan 2008
Snort frequently asked questions
Snort users are asking about its capabilities. These frequently asked questions about Snort discuss what the open source security tool can do and the right ways to use Snort. Continue Reading
-
Tip
03 Oct 2007
Use Netstat to determine which ports to open on a Windows firewall
When troubleshooting a Windows XP firewall, the solution is often simply opening the right firewall port. But what port should you open? This tip walks you through using Netstat to identify which firewall port an application uses. Continue Reading
By -
Answer
13 Sep 2007
What are the network security risks of streaming video?
Streaming video and audio sites are frequently visited on both home computers and work computers. Learn about streaming video security risks and what to do to protect your client's network. Continue Reading
-
Feature
10 Jul 2007
Verify the CEF Forwarding Information Base table
Learn how to take a stepwise approach to troubleshooting the Cisco Express Forwarding FIB table, a critical part of any methodology for resolving Cisco IP connectivity issues. Continue Reading
-
Answer
23 May 2007
CDMA and gold code
Gold code sequences used in CDMA allow callers to better use available bandwidth with less interference. Continue Reading
By -
Feature
23 May 2007
Snort.conf output options
Snort offers functional equivalents for FAST, FULL and SYSLOG command line output modes, as shown here. Continue Reading
-
Tip
08 May 2007
ILM vs. DLM: The importance of data management
Knowing the differences between information lifecycle management (ILM) and data lifecycle management (DLM) will ultimately determine which storage offerings you bring to a client's table. Continue Reading
-
Feature
04 Apr 2007
Storage area network (SAN) risks
Storage area network (SAN) security risks manifest as easily infiltrated gaps in your customers' storage; learn where weaknesses lie in a SAN architecture as outlined in this book excerpt from "Securing Storage:A Practical Guide to SAN and NAS Security." Continue Reading
-
Feature
13 Feb 2007
Scripting creation of virtual machines in ESX shell
Scripting the creation of virtual machines using VMware power tools is simpler that you might think. This book excerpt tells you how. Continue Reading
-
Feature
11 Feb 2007
Creation of virtual machines utilizing command-line tools
Creating virtual machines for your customers is useful for them and lucrative for you. This excerpt outlines VMware ESX Server's creation and cloning tools. Continue Reading
- Answer 31 Jan 2007
- Tutorial 29 Jan 2007