MSP technology services
Tips on IT service delivery approaches and features on building lines of business to meet customers' digital transformation needs.
Top Stories
-
Feature
01 Dec 2023
5 IT services industry trends on tap for 2024
The top IT services industry trends for 2024 should sound familiar, with cost optimization and guarded innovation among the trends expected for the coming year. Continue Reading
-
News
19 Sep 2023
Veeam leads funding round for SaaS backup provider Alcion
Analysts say that while both Alcion and Veeam offer Microsoft 365 backup, there is enough difference in the products and enough need in the data protection market. Continue Reading
-
Feature
30 Nov 2009
Monitoring VMware vSphere performance using alarms
Find out how to create and manage alarms using vCenter Server and learn the steps to configuring vCenter Server for email and notifications. Continue Reading
-
Feature
30 Nov 2009
Monitoring vSphere performance with vCenter Server performance graphs
vCenter Server's performance graphs provide solutions providers with detailed information on vSphere performance, including CPU, memory, disk, network and system data. Continue Reading
-
Feature
30 Nov 2009
Monitoring vSphere CPU and memory usage
Use this chapter excerpt to learn how to create real-time graphs for virtual machines, CPU consumption and memory usage. Continue Reading
-
Feature
30 Nov 2009
Monitoring vSphere performance with command-line tools
Use this chapter excerpt to learn about VMware's command-line utilities that can help solutions providers with monitoring customers' performance and resource usage. Continue Reading
-
Feature
17 Nov 2009
Setting Windows 7 environment variables
This chapter excerpt can teach you how to use Windows 7 environmental variables to locate your customers' system files and folders. Continue Reading
-
Feature
17 Nov 2009
Windows 7 command-line tools and programs
Learning how to use Windows 7 command-line tools and programs can help solutions providers perform maintenance, configuration and diagnostic tasks for customers. Continue Reading
-
Feature
11 Nov 2009
Installing and managing Hyper-V on Windows Server 2008 Server Core
Follow the necessary steps to install Hyper-V on Windows Server 2008 Server Core and learn how to remotely manage your customers' Hyper-V environments. Continue Reading
-
Feature
11 Nov 2009
Monitoring Hyper-V performance and utilizing System Center VMM
See the benefits of monitoring Hyper-V performance and utilizing System Center Virtual Machine Manager, including centralized management and organized placement of virtual machines. Continue Reading
-
Feature
12 Oct 2009
FAQ: Windows 7 hardware requirements and compatibility
Use this FAQ to learn about Windows 7 hardware requirements and notebook compatibility factors, and find out when you should recommend 32-bit vs. 64-bit architecture. Continue Reading
-
Feature
07 Oct 2009
Installing, configuring and testing a UPS for Windows 7
This chapter excerpt teaches you how to choose a UPS for multiple Windows 7 workstations and provides step-by-step processes for UPS installation, configuration and testing. Continue Reading
-
Feature
07 Oct 2009
WIndows 7 dual monitor not working? Read these tips
Use this chapter excerpt to get rules, tips and troubleshooting advice for setting up dual monitors in Windows 7 and adding a secondary display adapter. Continue Reading
-
Feature
07 Oct 2009
Adding and removing Windows 7 hardware
Use this chapter excerpt to become an expert on adding PnP and non-PnP hardware. You'll also get tips on providing drivers for hardware, troubleshooting and removing hardware. Continue Reading
-
Feature
30 Sep 2009
Key concepts for server, storage and client virtualization
This chapter excerpt explores the different aspects of IT virtualization, such as server, storage and client virtualization, and covers virtual servers and virtual data storage. Continue Reading
-
Feature
10 Sep 2009
Windows 7 virtual memory performance optimization
In order to ensure virtual memory performance optimization in Win 7, you need to consider page file customization techniques, location, size, how to split a page file and more. Continue Reading
-
Feature
10 Sep 2009
Windows 7 performance monitoring tools
Use updated tools such as Performance Monitor, Resource Monitor or Task Manager to focus on specific performance aspects and capabilities while enhancing and measuring system performance. Continue Reading
-
Feature
10 Sep 2009
Improving Windows 7 performance by optimizing the hard disk
Examining hard disk specifications, including speed and seek time, or learning to enable write caching or disable compression can help you achieve optimal Windows 7 performance. Continue Reading
-
Feature
10 Sep 2009
Optimizing Windows 7 application performance
Reading these application performance optimization tips will help you launch and install applications efficiently while optimizing Windows 7 to run programs more effectively. Continue Reading
-
Feature
24 Aug 2009
Common SaaS problems that occur after implementation
There are still a few problems you can run into after implementing Software as a Service and this list can help you prepare clients for connection or software application issues. Continue Reading
-
Feature
24 Aug 2009
Top 10 SaaS implementation considerations
Once you go through this list of the top 10 considerations for implementing Software as a Service (SaaS), you will be ready to tackle SaaS implementation head on. These tasks are meant to ensure that there are no surprises in the implementation process. Continue Reading
-
Feature
15 Jul 2009
Configuring virtual networking for Microsoft Hyper-V
In this chapter excerpt from "MCTS: Windows Server Virtualization Configuration Study Guide: (Exam 70-652)," you'll learn about the various tools that can help with virtual networking configuration tasks. Continue Reading
-
Tip
19 Apr 2009
Network security monitoring using transaction data
Using transaction data -- or application-specific traffic data -- in network security monitoring can give you a new line of defense. Continue Reading
-
Tip
23 Feb 2009
Router and switch upgrades: Five reasons your customer should invest
Mid recession, customers are avoiding investment in even basic router and switch upgrades, but one surefire way to convince them is long-term savings that will outweigh investment. Continue Reading
-
Feature
17 Feb 2009
Virtual desktop infrastructure: Five tips for improving virtual desktop performance
Implementing virtual desktop infrastructure means that you have to switch emphasis from a client's local processing power to server processing power and network connectivity. Learn how to improve desktop performance and prevent errors before they occur. Continue Reading
-
Feature
02 Feb 2009
Thin clients vs. thick clients for desktop virtualization
Find out when you should recommend thin clients or PCs (aka thick clients) to your desktop virtualization customers. Continue Reading
-
Feature
29 Dec 2008
VMware ESX essentials: Fibre Channel and iSCSI
This section of our chapter excerpt on storage from the book "VMware ESX Essentials in the Virtual Data Center" explains the differences between Fibre Channel and iSCSI as well as the configurations a client is able to use when working with VMware ESX. Continue Reading
-
Feature
19 Dec 2008
Network virtualization explained
Virtualization has moved beyond just server and storage capacities and now encompasses the network as well. Learn about network virtualization considerations to understand before deployment, some major opportunities in network virtualization for solution providers and how to take advantage of these opportunities. Continue Reading
-
Tip
01 Dec 2008
VMware ESX essentials: Virtual Machine File System
This section of our chapter excerpt on storage from the book "VMware ESX Essentials in the Virtual Data Center" explains the difference between direct- and network-attached storage and how to configure a client's network file system devices. Continue Reading
-
Feature
01 Dec 2008
Key considerations in developing a storage area network design
The best storage area network design for your customers will take into consideration a number of critical issues: uptime needs, scalability, security and disaster recovery. Find out how each of these factors will influence storage area network design choices. Continue Reading
-
Feature
01 Dec 2008
Implement access control systems successfully in your organization
Access control is an important step toward mitigating an organization's security risks. Learn the importance of an access control system and how to implement it successfully. Continue Reading
-
Tip
23 Nov 2008
Best practices for securing domain controllers at the branch office
Companies that implement domain controllers at branch offices face a number of challenges, security-related and otherwise. Follow these best practices to keep branch-office domain controllers secure and effective. Continue Reading
-
Feature
21 Nov 2008
Strategies for disaster recovery contingency planning
Create strategic disaster recovery plans for your clients and protect them from data loss if a disaster should strike. This feature article introduces the second installment of our Disaster Recovery Hot Spot Tutorial Continue Reading
-
Feature
11 Nov 2008
Network design documentation
Inadequate network documentation can lead to a multitude of problems for solution providers. Learn the importance of network documentation and what network design documentation a solution provider needs from customers. Continue Reading
-
Feature
27 Oct 2008
Network design considerations checklist for providers
There are many network design considerations that every solution provider should take into account before embarking on a network design project. Knowing these trends and caveats will help you make the best network design planning and network design choices for your customer. Continue Reading
-
Tip
19 Oct 2008
OS virtualization vs. hypervisor: Why you should offer both
As server virtualization fever sweeps through the industry, make sure you're prepared for the eventual rise of OS virtualization. Learn about the benefits of OS virtualization and prepare to offer OS virtualization along with the hypervisor model to maximize virtualization potential. Continue Reading
-
Feature
09 Oct 2008
Configuring privilege levels
This section of the chapter excerpt focuses on supporting multiple administrative levels of router configuration. Continue Reading
-
Feature
07 Oct 2008
Channel Explained: Voice over Internet Protocol (VoIP)
VoIP has emerged as a convenient, reliable and cost-effective network option for businesses of all sizes. In this Channel Explained you'll learn how VoIP works, what to consider before deploying it in a company, and how to take advantage of the multitude of channel opportunities available for this technology. Continue Reading
-
Feature
30 Aug 2008
Top 5 data migration tools
Today's unprecedented rate of data growth means there's big opportunity for integrators around data migration services. Learn which tools are the best in five different categories. Continue Reading
-
Feature
27 Aug 2008
Validated firewalls
Firewalls need to be checked and validated to ensure proper function before they are put into production. This section of the chapter excerpt will deal with validating and maintaining firewalls. Continue Reading
-
Feature
18 Aug 2008
Securing Windows Server 2008: Installing and turning on BitLocker
Aaron Tiensivu covers steps for installing and turning on BitLocker in Windows Server 2008 in this chapter excerpt. Continue Reading
-
Feature
17 Jul 2008
System Recovery and Diagnostic Tricks: Vista Recovery: Advanced Boot Options, WinRE and WinPE
Vista's Advanced Boot Options, the Windows Recovery Environment Platform, WinRE and WinPE are all covered in this chapter excerpt from "Tricks of the Microsoft Windows Vista Masters." Learn about these options before choosing CompletePC backup. Continue Reading
-
Feature
16 Jul 2008
Network IDS/IPS vendors
Before deciding on a network intrusion detection or intrusion prevention system (IDS/IPS), check out this Partner Program Directory. Use these checklists to compare partner programs of network IDS/IPS vendors. Continue Reading
-
Feature
14 Jul 2008
Top five data storage compression methods
Data storage compression can eliminate the many redundancies of stored data and cut storage costs. Learn the top five methods of lossless and transparent storage compression. Continue Reading
-
Feature
14 Jul 2008
iPod Forensics
Read about how to conduct forensic investigations with data retrieved from an iPod. Continue Reading
-
Tutorial
30 Jun 2008
How to install a certificate on a Windows Vista client
Learn how to install a certificate onto a Windows Vista client after downloading the certificate from the enterprise certificate authority. Continue Reading
-
Tip
23 Jun 2008
Troubleshooting 802.1x missing supplicant problems, part 1
Learn how to diagnose and solve 802.1x missing supplicant problems. Continue Reading
-
Feature
17 Jun 2008
Cisco Unified Communications Manager review quiz
This section provides review questions on the material covered in the previous sections of the chapter excerpt. Continue Reading
-
Feature
09 Jun 2008
Cisco Unified Communications Manager licensing
This section of the chapter excerpt focuses on the certification and licensing opportunities of Cisco Unified Communications Manager. Continue Reading
-
Feature
09 Jun 2008
Cisco Unified Communications Manager - Hardware, Software and Clustering
This chapter excerpt covers the compatible hardware and software for Cisco Unified Communications Manager, as well as its clustering capabilities. Continue Reading
-
Feature
29 May 2008
Five questions to ask in a data deduplication project
When scoping out a customer's data deduplication project, there are five key questions to explore with your customers to determine the best approach to take. Learn what questions you should ask and why they're important. Continue Reading
-
Feature
02 May 2008
Predicting data storage growth
If your customers have deep pockets, predicting data storage growth is a relatively easy chore using storage resource management (SRM) tools. But for smaller companies with equally small budgets, you'll need to be more creative. Learn the techniques for assessing historical growth to help customers get optimum use out of their storage resources. Continue Reading
-
Tip
28 Apr 2008
How to extend your client's wireless access point range
Some WLAN installations require multiple access points. But before you go that route and install more WLAN access points, use these steps to determine how you can extend the wireless access point range of the current devices. Continue Reading
-
Tip
21 Apr 2008
How to configure wireless access points
A crucial part of any WLAN installation is configuring wireless access points. Learn which configuration options -- such as IP address, transmit power and beacon interval -- are best for your customers. Continue Reading
-
Feature
16 Apr 2008
The benefits of storage capacity planning
Storage capacity planning services can save your customers money and bring other benefits by balancing their storage utilization and growth rates with their tolerance for upgrade interruptions and storage architecture. Continue Reading
-
Answer
16 Apr 2008
What are the top reasons for network upgrades?
Learn why performance, reliability and security are the three most important reasons for recommending a network upgrade to your clients. Continue Reading
-
Feature
11 Apr 2008
The best networking products as chosen by customers
Choosing networking products for your line card can be a challenge. We recommend you begin by considering the hardware and software businesses like best. Here you'll find the top three networking products as chosen by SearchNetworking.com readers in 12 categories, including network firewalls, applications and network management and network monitoring. Continue Reading
-
Feature
09 Apr 2008
The benefits of application virtualization
Application virtualization can bring benefits to your customers such as ease of maintenance and greater portability. It comes after server virtualization and can be the right solution when desktop virtualization is overkill. Continue Reading
-
Tip
01 Apr 2008
Network session data analysis with Snort and Argus
This edition of Snort Report departs from the standard format to introduce Argus, a session data collecting tool that can work alongside Snort. Learn how session data can complement Snort's alert data for network session analysis Continue Reading
-
Feature
28 Feb 2008
What is the client's IT budget for the network design project?
While all clients have expectations for their network design projects, not all have allocated the money needed to accomplish their objectives. Learn why asking about IT budget will help you and your customers get more clarity about what can and can't be accomplished in terms of a network design project. Continue Reading
-
Tip
25 Feb 2008
Introduction to network centralization and decentralization
Network centralization is an attempt to improve efficiency by taking advantage of potential economies of scale. Decentralization is an attempt to improve speed and flexibility by reorganizing networks to increase local control and execution of a service. Neither is always better, and neither is always possible in the purest sense. Learn when to opt for decentralized networks and when to choose centralized networks. Continue Reading
-
Feature
15 Feb 2008
Conclusions about network centralization and decentralization
Network centralization and network decentralization are about making changes. When making such pervasive changes, experts recommend that you consider these guiding principles: know what specific problem you are solving; understand your motivation for making the change; centralize as much as makes sense for today; recognize that as in rolling out any new service, it requires careful planning; and, most important, listen to the customers. Test your knowledge with several questions about what you've read. Continue Reading
-
Feature
03 Feb 2008
Becoming familiar with the Hyper-V administrative console
This excerpt from "Windows Server 2008 Unleashed" provides a quick guide on navigating the Hyper-V administrative console and the virtual server settings available to be configured. Continue Reading
-
Feature
27 Jan 2008
Business impact analysis for business continuity: BIA for small business
Read this example of business impact analysis (BIA) for a small business from "Business Continuity & Disaster Recovery for IT Professionals" to make the process more tangible. Continue Reading
-
Feature
27 Jan 2008
Business impact analysis for business continuity: Preparing the BIA report
This excerpt from "Business Continuity & Disaster Recovery for IT Professionals" outlines some crucial features to be included in a BIA report. Continue Reading
-
Feature
26 Jan 2008
Business impact analysis for business continuity: Data collection methodologies
For business impact analysis (BIA) collect data through interviews and questionnaires. This excerpt from "Business Continuity & Disaster Recovery for IT Professionals" discusses various data collection methodologies and how to carry them out. Continue Reading
-
Feature
26 Jan 2008
Business impact analysis for business continuity: Determining the impact
This excerpt from "Business Continuity & Disaster Recovery for IT Professionals" lists some specific impacts disasters have on business. Continue Reading
-
Feature
25 Jan 2008
Business impact analysis for business continuity: Understanding impact criticality
When it comes to business functions, develop a rating scale to identify your customers' mission-critical functions. This excerpt from "Business Continuity and Disaster Recovery for IT Professionals" outlines a business function rating system with four criticality categories: critical, essential, necessary and desirable. Continue Reading
-
Feature
25 Jan 2008
Business impact analysis for business continuity: Recovery time requirements
Use business impact analysis (BIA) to define recovery time requirement terms and looks at how those elements interact. Continue Reading
-
Feature
25 Jan 2008
Business impact analysis for business continuity: Identifying business functions
This excerpt from "Business Continuity & Disaster Recovery for IT Professionals" walks you through common business functions and encourages you to assess those functionalities that are not covered and include them in your BIA. Continue Reading
-
Feature
25 Jan 2008
Business impact analysis for business continuity: Upstream and downstream losses
Learn to mitigate indirect impacts that disasters can have on businesses. In this excerpt from "Business Continuity and Disaster Recovery for IT Professionals," the author discusses upstream and downstream losses. Continue Reading
-
Tip
15 Jan 2008
Channel Checklist: Top five tools for troubleshooting a WLAN
Customers with WLAN connectivity problems are quick to place blame on airwaves. Service providers know the problem may run deeper. These five WLAN tools will help you investigate the problem and find the real culprit. Continue Reading
-
Feature
02 Jan 2008
Limitations of server virtualization
Server virtualization has many perks but keep its limitations in mind. This excerpt from "Advanced Server Virtualization" gives examples of when server virtualization is not the best practice. Continue Reading
-
Tip
02 Jan 2008
Snort frequently asked questions
Snort users are asking about its capabilities. These frequently asked questions about Snort discuss what the open source security tool can do and the right ways to use Snort. Continue Reading
-
Feature
07 Nov 2007
When should orgnizations use ASIC-based network firewalls?
Even though ASIC-based network firewalls are often much faster than their software-only counterparts, learn why deploying them within some network environments is a bad idea. Continue Reading
-
Feature
05 Nov 2007
What are the disadvantages of iSCSI?
Deploying iSCSI in mission-critical situations isn't a risk-free proposition. Customers may have to cope with higher latency and performance issues in mixed networks after an iSCSI implementation. Continue Reading
-
Tip
03 Oct 2007
Use Netstat to determine which ports to open on a Windows firewall
When troubleshooting a Windows XP firewall, the solution is often simply opening the right firewall port. But what port should you open? This tip walks you through using Netstat to identify which firewall port an application uses. Continue Reading
-
Tutorial
27 Sep 2007
Choosing a processor: Multi-core and 64-bit considerations
Multi-core, 64-bit or 32-bit processor -- what's best for your client's shop? This guide gives channel professionals the information they need to help clients choose a processor. Continue Reading
-
Answer
13 Sep 2007
What are the network security risks of streaming video?
Streaming video and audio sites are frequently visited on both home computers and work computers. Learn about streaming video security risks and what to do to protect your client's network. Continue Reading
-
Answer
10 Sep 2007
SSID and wireless connection problems
Discover why changing your SSID number might be the answer to resolving wireless connection problems when your client's wireless network seems to be properly configured. Continue Reading
-
Tip
14 Aug 2007
How to troubleshoot five common routing errors
Troubleshooting router errors is made easier with this tip, which covers the five major routing errors -- filtering redistribution, mismatched neighbor parameters in OSPF, subnets, metrics and tweaking EIGRP metrics. Continue Reading
-
Feature
10 Jul 2007
Verify the CEF Forwarding Information Base table
Learn how to take a stepwise approach to troubleshooting the Cisco Express Forwarding FIB table, a critical part of any methodology for resolving Cisco IP connectivity issues. Continue Reading
-
Feature
10 Jul 2007
Verify the IP routing table
Verifying the Cisco IP routing table is a key part of troubleshooting Cisco Express Forwarding's network switching. Learn the necessary steps for identifying and remediating problems. Continue Reading
-
Answer
23 May 2007
CDMA and gold code
Gold code sequences used in CDMA allow callers to better use available bandwidth with less interference. Continue Reading
-
Feature
23 May 2007
Snort.conf output options
Snort offers functional equivalents for FAST, FULL and SYSLOG command line output modes, as shown here. Continue Reading
-
Feature
23 May 2007
Snort command line output modes
Snort command line output modes, as described here, are usually selected for testing purposes or demonstrations. Continue Reading
-
Tip
08 May 2007
ILM vs. DLM: The importance of data management
Knowing the differences between information lifecycle management (ILM) and data lifecycle management (DLM) will ultimately determine which storage offerings you bring to a client's table. Continue Reading
-
Feature
04 Apr 2007
Storage area network (SAN) risks
Storage area network (SAN) security risks manifest as easily infiltrated gaps in your customers' storage; learn where weaknesses lie in a SAN architecture as outlined in this book excerpt from "Securing Storage:A Practical Guide to SAN and NAS Security." Continue Reading
-
Feature
03 Apr 2007
IDS Snort rules: False positives
In this portion of the Snort Report on IDS Snort rules, Richard Bejtlich discusses how to identify and deal with false positives. Continue Reading
-
News
26 Mar 2007
Technology trends in processors and servers
Quad-core pushes, virtualization advances and licensing turmoils are just a few of the trends to consider in today's competitive server processor landscape. Blade Servers and Virtualization author Barb Goldworm presents channel considerations in servers and processors. Continue Reading
- Answer 21 Feb 2007
-
Feature
13 Feb 2007
Securing wireless access points: War driving and war walking
This portion of the Vines penetration testing tip on securing wireless access points describes war driving and war walking. Continue Reading
-
Feature
13 Feb 2007
Securing wireless access points: WLAN vulnerabilities, SSID issues, WEP weakness
This portion of the Vines penetration testing tip on securing wireless access points describes WLAN vulnerabilities, SSID issues, and WEP weakness. Continue Reading
-
Feature
13 Feb 2007
Scripting creation of virtual machines in ESX shell
Scripting the creation of virtual machines using VMware power tools is simpler that you might think. This book excerpt tells you how. Continue Reading
-
Feature
11 Feb 2007
Creation of virtual machines utilizing command-line tools
Creating virtual machines for your customers is useful for them and lucrative for you. This excerpt outlines VMware ESX Server's creation and cloning tools. Continue Reading
- Answer 31 Jan 2007
- Tutorial 29 Jan 2007
-
Feature
25 Jan 2007
Snort configuration -- snort.conf file
This portion of Snort Report helps channel professionals understand the snort.conf file. Continue Reading
-
Tip
15 Jan 2007
Formulating a scalable IP addressing plan
A scalable IP addressing plan will support your customer's network as it grows. This tip explains how to use variable-length subnet masking and route summarization to create a scalable IP addressing plan. Continue Reading