Last Updated on 15 July 2014, Total: 232 Articles and Tutorials
This topic provides an overview of the elements and issues involved in Networking and the basics needed before setting up any type of network.
The different types of network connections, basic networking terminology, network hardware, and network setups are all discussed in this section.
This article will cover a quite illusive protocol known as the Session Initiation Protocol (SIP), employed by the Real Time Communications (RTC) Server is a Microsoft approach in providing instant messaging (IM) and videoconferencing on both a business and informal level. In order to understand the workings of the RTC Server it is necessary to acquire knowledge of the Server’s... Read More
I like to read a lot for several reasons. First, I need to read to keep up on the latest IT technologies, tools, and practices. And second, I write a lot and a writer needs to always learn. So I thought I’d take a moment and tell you about some of the books I’m currently reading in case you want... Read More
In this article, we will discuss what every Microsoft Windows Administrator and Engineer should think about when trying to manage their environments in the scope of planning for Disaster Recovery and Business Continuity. In this article we will cover many of the details administrators and engineers need to know about planning Disaster Recovery (DRP) for Windows Systems, as well as... Read More
For several years now, there have been rumors that 64-bit computing would soon become mainstream. We may have finally reached that point, but there are some problems. The market is filled with competing 64-bit standards, each requiring their own special version of Windows. In this article, I will explain what you need to know about the various 64-bit systems that... Read More
As companies rely on applications like electronic mail and database management for core business operations, computer networking becomes increasingly more important. This tutorial helps to explain Ethernet and Fast Ethernet, which are two of the most popular technologies used in networking... Read More
If you are planning to use a Linux workstation in a Windows Network, one of the things you probably want to do is authenticate against the Windows Domain name server (s), i.e. Active Directory... Read More
Unauthorized software such as computer games decreases productivity, robs your network of resources, and jeopardizes your network’s security. However, you can preserve your network’s integrity by using software restriction policies to control what software users are and are not allowed to run... Read More
Microsoft’s soon to be released Virtual Server 2005 helps cut hardware cost by allowing you to simultaneously run multiple virtual machines on a single server. Before you consider deploying Virtual Server 2005 though, you need to understand the various caveats and implications associated with virtual machines... Read More
To ensure that systems are available for requests when called upon, you have to plan for the failure of those same resources that are being requested. Hard drives have MTBF (mean time between failure), viruses go undetected, name it… disaster can happen. The only way to keep systems ‘available’ to those who request them is to deploy those systems in... Read More
Small businesses are getting into the remote access market. No, I don’t mean that small businesses are becoming ISPs. What I do mean is that small businesses want to be able to access information stored on machines located on their small business network no matter where they go, in the same way big businesses do it... Read More