‘New Normal’ courtesy of Covid-19
About data center as a service (DCaaS)
About SDDC (software-defined data center)
Application Maintenance on Production Systems
Application-aware storage
Archiving and tape backup
Artificial intelligence, automation and robotics
Backing up VMware host servers and guest OSes
Backup and Archival Tools
Backup and recovery software
Batting for Tech in the Covid-19 Times
Best practices for data center operations
business continuity plan (BCP)
Business Continuity Planning
Business continuity planning
business impact analysis (BIA)
Capacity planning for virtualization
Cloud application migration
Cloud architecture design
Cloud architecture design and planning
Cloud computing for business
Cloud computing standards and compliance
cloud NAS (cloud network attached storage)
Cloud pricing and cost optimization
Cloud Security Management and Cloud Operations Security
cloud SLA (cloud service-level agreement)
Cloud storage management and standards
Collaboration Applications for Unified Communications
Collaboration software and productivity software
Collaborative Applications
Colocation, hosting and outsourcing management
Colocation, hosting and outsourcing management
Computer Memory Nomenclature
computer room air handler (CRAH)
Computer Storage Hardware
Contract negotiations and legal issues
Converged Infrastructure Management
Converged Infrastructure Systems
Covid-19 Global Responses
COVID-19: Organization Mitigation Responses
CRC-4 (Cyclic Redundancy Check 4)
Creating and upgrading VMware servers and VMs
Customer Premises Equipment (CPE)
Customer relationship management (CRM)
Cybersecurity risk assessment and management
Data center architecture for VMware ESX and ESXi
data center bridging (DCB)
Data center budget and culture
Data center capacity Planning
Data center design and facilities
Data center hardware and strategy
Data Center Hardware Terminology
Data center ops, monitoring and management
Data Center Outsourcing (DCO)
Data center server infrastructure and OSes
Data center storage and networking
Data center systems management
Data center systems management
Data Centre Hardware Equipment Technical Resources
Data protection, backup and archiving
Data reduction and deduplication
Data security strategies and governance
Data security technology and strategy
Data storage backup tools
Data storage backup tools
Data storage compliance and regulations
Datacenter Hardware Trends
Datacenter Hardware Vendors' Release News
Datacenter Infrastructure News
Datacentre Capacity Planning
Datacentre cooling infrastructure
Datacentre disaster recovery and security
Datacentre energy efficiency and green IT
Datacentre performance troubleshooting, monitoring and optimisation
Datacentre systems management
delay-tolerant network (DTN)
Digital business transformation
Digital business transformation and innovation
Disaster recovery planning - management
Disaster recovery storage
Disaster recovery, failover and high availability for virtual servers
Email and messaging threats
EMC Network Storage Systems
Enterprise data storage strategies
Enterprise Desktop Management
Enterprise identity and access management
Enterprise infrastructure management
Enterprise Software Development
Essential Technical Terminology you need to know
Exchange Online administration and implementation
Expert Advise and Opinion
FCAPS (fault, configuration, accounting, performance and security)
Flash storage for applications
Hackers and cybercrime prevention
How-Tos and Other Useful Tips and Tricks
Human Relations Managemwnt
HVAC (heating, ventilation and air conditioning)
Hyper-Converged Infrastructure Management
Hyper-Converged Vendors and Products
Identity and access management
Improving server management with virtualization
Industry News and Expert Advice
Information security certifications, training and jobs
Information security certifications, training and jobs
Information security certifications, training and jobs
Information security incident response
Information security policies, procedures and guidelines
Information security program management
Information security threats
Information technology governance
Infrastructure & Architecture
Infrastructure in the Data Centre
Infrastructure-as-a-Service (IaaS)
IT applications, infrastructure and operations
IT Asset Management (ITAM)
IT compliance and governance strategies
IT Designations-roles and responsibilities
IT efficiency and sustainability
IT infrastructure management and planning
IT infrastructure management and planning
IT spending and budgeting
IT systems management and monitoring
Leadership and strategic planning
Legacy Data Center Systems
LTO-6 (Linear Tape-Open 6)
man-in-the-middle attack (MitM)
man-in-the-middle attacks (MitM)
Managing cloud infrastructure
Messaging and collaboration
Microsoft Hyper-V and Virtual Server
Microsoft Office and Office 365
Microsoft Windows Azure Active Directory (Windows Azure AD)
Mobile and wireless network technology
MRAM (magnetoresistive random access memory)
MSP business transformation
Network application performance
Network Attached Storage (NAS)
Network device security: Appliances, firewalls and switches
Network management and monitoring
Network management software and network analytics
Network Penetration Testing
Network protocols and standards
Open source virtualization
P2V, V2V and V2P migration
Password management and policy
Platform-as-a-Service (PaaS)
Principle of least privilege (POLP)
Public cloud and other cloud deployment models
Read-intensive SSD (read-intensive solid-state drive)
Regulatory compliance for MSPs
Research Results and Trends
Return on Investment (ROI)
Risk assessments, metrics and frameworks
Risk Management Strategies
route summarization (route aggregation)
SAN switch (storage area network switch)
SAN Technology and Arrays
SAN technology and arrays
SAS SSD (Serial-Attached SCSI solid-state drive)
Scalable Processor Architecture (SPARC)
SDN and other network strategies
Security awareness training and insider threats
Security training and jobs
Server hardware and virtualization
Server virtualization hypervisors and management
Server virtualization infrastructure and architecture
Server virtualization management tools and practices
SIEM, log management and big data security analytics
SIEM, log management and big data security analytics
Simple definitions to know
Small business disaster recovery
Small Business Technologies
SOAR (security orchestration, automation and response)
Software Asset Management (SAM)
Software-as-a-Service (SaaS)
SQL and Exchange Resources
Storage architecture and strategy
Storage fabric, switches and networks
Storage management and analytics
Supply Chain Management (SCM) Resources
Tape backup and tape libraries
Tech Acronyms and Initialisms
Tech Partner's Curated Content
Tekmart Enterprise Hardware Tips
Tekmart Support: Storage Systems' Implementation Tutorials
Telecoms networks and broadband communications
The difference(s) between...
Travelling Techie Quick Reads-Timeless!
Trends: Datacenter Hardware and Solutions
Two-factor and multifactor authentication strategies
Type 2 hypervisor (hosted hypervisor)
Unforeen Unpredictable Must Adapt Scenarios
Unified Communications Architecture and Service Models
Uninterruptible Power Supply (UPS)
UPS Sizing-Data center Design
UPS Systems in the Data Center
Virtual Desktop Infrastructure
Virtual desktop infrastructure and architecture
Virtual desktop management
Virtual machine monitoring, troubleshooting and alerting
Virtual Storage Area Network (VSAN)
virtualization sprawl (VM sprawl)
VMware ESX and ESXi administration
Voice and unified communications
Voice of the customer (VOC)
Volume Shadow Copy Service-based backup
Web application and API security best practices
Web authentication and access control
Web Browsers and Applications
whaling attack (whaling phishing)
WHY??: Explanations on data center hardware
Windows 10 troubleshooting
Windows client management
Windows Server OS and management
Windows Server storage management
Windows Server Troubleshooting
Wireless Network Security
WMS (Warehouse Management System) and ERP (Enterprise Resource Planning) systems
Zero-trust model (zero trust network)