Resources - Page 29
Voice of the (Socially Distanced) Vendor: Episode 7
Check in on the news you need to know from Calyptix, EZ VPN, and Stratus Technologies in Joel Zaidspiner’s latest collection of candid vendor chats.
10 Questions for Your Outsourced NOC Provider
A lot is at stake when it comes to NOC, especially around security measures, business continuity, and networkmanagement. You simply can’t afford to hire a provider that doesn’t adhere to the right NOC practices. In thisdocument, we outline the ten important questions MSPs should ask prospective NOC service providers to besure a large chunk of their business goes in ‘able hands’.
Simply complete the form below to read the full white paper.
ChannelPro Weekly Podcast: Episode #157 – The New M&A (Mongrels & Animals)
You think M&As were hard before? Try the new kind involving bears and elk. Matt, Rich, and guest host Bruce McCully, chief security officer of MSSP Galactic Advisors, discuss that topic and others this week with Linda Rose of M&A consultancy RoseBiz.
The Drivers and Benefits of Edge Computing
Internet use is trending towards bandwidth-intensive content and an increasing number of attached “things”. At the same time, mobile telecom networks and data networks are converging into a cloud computing architecture. To support needs today and tomorrow, computing power and storage is being inserted out on the network edge in order to lower data transport time and increase availability. Edge computing brings bandwidth-intensive content and latency-sensitive applications closer to the user or data source.
Essential Guidance on DCIM for Edge Computing Infrastructure
The lack of staff or “lights out” nature of many loc al IT and mobile edge computing (MEC) sites makes operations & maintenance a challenge. This struggle worsens as the number of sites increase. How do you maintain IT resiliency in a c ost-effective way under these conditions? In this paper find out more on essential DCIM functions for small, unmanned edge computing sites and attributes of next-generation DCIM solutions best optimized for that type of environment.
A Practical Guide to Data Center Design and Planning
In today’s world of being “on” 24/7, data centers are at the core of business and viewed as the way to create competitive differentiation. As data centers continue to expand and evolve, a flexible design approach will help grow business quickly without excessive capital outlay or overbuilding. Data center reference design tools will help you avoid many of the common pitfalls and with adaptable, modular options it’s possible to future-proof your data center while meeting your current business goals (and budget).
11 Types of Phishing Attacks
Phishing has evolved from a single technique into many highly specialized tactics, each adapted to specific types of targets and technologies. Boiled down, all these tactics exist for the same purpose – to swipe confidential information from an unsuspecting target in order to extract something of value. But knowing about the hugely diverse set of today’s phishing tactics can help ordinary people, home and business internet users alike, to be more prepared for the inevitable instance when they become the target.
Carbonite Migrate EOS: Simplifying Complex Projects
With both Microsoft Windows Server 2008/2008 R2 and SQL Server 2008/2008 R2 approaching their end of support (EOS) dates. For most businesses, the risks of running outdated applications narrows the decision down to two choices: upgrading on-premises or re-hosting in the cloud. Either way, large quantities of data will have to be migrated from one system to another. Find out more in these eBook how both paths can be simplified by using CarboniteÆ Migrate to facilitate the move.
ChannelPro Weekly Podcast: Episode #156 – Shoe Booties Required
Can’t be too safe out there these days, people. Mask those shoes! Then sit back and enjoy this week’s show, in which Matt, Rich, and guest host Carrie Simpson, of MSP marketing service Managed Sales Pros, discuss CompTIA’s new security threat intelligence sharing group, ChannelPro‘s 2020 Readers’ Choice Awards, and the tricks of the trade for rolling trucks to client sites safely in the era of COVID-19.
ChannelPro 5 Minute Roundup for the Week of August 3rd, 2020
Erick and Rich applaud the launch of CompTIA’s security threat intelligence sharing group, urge MSPs to resist “quarantine fatigue”, and discuss a U.K. citizen who wore a face mask in public as required, but used it to cover a different part of his anatomy.