Last Updated on 24 Sept. 2015, Total: 269 Articles and Tutorials
This topic provides an overview of the elements and issues involved in Networking and the basics needed before setting up any type of network.
The different types of network connections, basic networking terminology, network hardware, and network setups are all discussed in this section.
To ensure that systems are available for requests when called upon, you have to plan for the failure of those same resources that are being requested. Hard drives have MTBF (mean time between failure), viruses go undetected, name it… disaster can happen. The only way to keep systems ‘available’ to those who request them is to deploy those systems in... Read More
In this article, we will discuss what every Microsoft Windows Administrator and Engineer should think about when trying to manage their environments in the scope of planning for Disaster Recovery and Business Continuity. In this article we will cover many of the details administrators and engineers need to know about planning Disaster Recovery (DRP) for Windows Systems, as well as... Read More
In this series of articles, we will cover all that you will need to consider when planning to deploy a new server farm. A server farm is just lingo used to describe a grouping of servers that you use within you Local Area Network (LAN), usually tied to a high speed backbone if designed properly. In this article set we... Read More
Welcome to part two of how to plan your server farm and other tips to consider when building Windows Server 2003 systems to serve your network users. Deploying a server can be a chore, especially when it comes to planning. There are many things to consider. In this article we will look at how to verify your plan, and then... Read More
This article series demonstrates ways of using PowerShell to manage and monitor storage hardware and the file system... Read More
This article continues the discussion of PowerShell storage monitoring by taking a look at how storage monitoring might be automated. In this article I will discuss the required steps and then begin showing you how to implement those steps... Read More
This article continues the discussion by examining techniques for monitoring storage health... Read More
This article continues the discussion of using PowerShell to evaluate storage health by beginning to build a script for storage health reporting... Read More
If you have mobile users in your organization, then implementing security can be especially challenging. You must secure the users’ laptops in such a way that if the laptops were lost or stolen that sensitive data would not be compromised. One way of accomplishing this task is by using the Encrypting File System (EFS). In this article, I will explain... Read More