Networking

SDN, NFV, and a host of other cutting-edge technologies are hitting your network faster than you can say Ethernet Fabric. But which are truly critical?

  • Wi-Fi RFP Template

    Tools & Templates // Feb 2017 // provided by Aerohive Networks

    Armed with knowledge of different options and having evaluated different vendors. The next step is to issue a request for proposal (RFP) to your selected vendors. Use this template to: Request vendor information Understand hardware, software and network management offerings Go beyond just products - what training and support ...

    Download Now
  • System monitoring policy

    Tools & Templates // Nov 2016 // provided by Tech Pro Research

    This policy defines what systems and services to monitor, establishes how they will be monitored, and determines how support staff will be notified of problems that require escalation or remediation. From the policy: Summary Maximum uptime is often a priority goal for company systems and services in ...

    View This Now
  • New client audit checklist

    Tools & Templates // Sep 2016 // provided by Tech Pro Research

    This checklist provides a method for auditing and documenting a client site and assembling an inventory of systems and software, as well as giving you a framework for developing recommendations, applying costs to them, and storing all that information in one file. Tracking client contact details, circuit information, network equipment, ...

    View This Now
  • Windows administrator’s PowerShell script kit

    Tools & Templates // Aug 2016 // provided by Tech Pro Research

    The Windows GUI is the traditional way to perform administrative tasks, but scripting offers faster and more versatile methods that can help further your technical skills. This download includes 21 publicly available PowerShell scripts, along with a document explaining each one, to help you up your scripting game and administer ...

    View This Now
  • Web server configuration and management policy

    Tools & Templates // Jul 2016 // provided by Tech Pro Research

    This policy provides guidelines for the effective and secure configuration and management of web servers, regardless of platform. You can use it as-is or customize it to fit the needs of your organization. From the policy: Summary A company web page often represents the public face of the organization and ...

    View This Now
  • Job description: Wireless network engineer

    Tools & Templates // May 2016 // provided by Tech Pro Research

    Your company is going wireless with plans to connect remote employees, make use of mobile apps and streamline your work environment. But what about those traditionally difficult-to-solve issues, such as security and reliability? What you are going to need is a wireless network engineer, a job that is growing increasingly ...

    View This Now
  • Power checklist: Managing and troubleshooting Linux user accounts

    Tools & Templates // Apr 2016 // provided by Tech Pro Research

    This checklist offers management guidelines and solutions to problems you’re likely to run into with Linux user accounts. You can print the list or use it in electronic form.

    View This Now
  • Software automation policy guidelines

    Tools & Templates // Apr 2016 // provided by Tech Pro Research

    Software automation policies are system-defined, or administrator-defined, sets of rules that govern the execution of automated actions. Examples of automated actions include running a report using the parameters that were obtained from the policy, sending an alert to the administrator, and executing a command or running a task on managed ...

    View This Now
  • Virtualization policy

    Tools & Templates // Dec 2015 // provided by Tech Pro Research

    Virtualization allows companies to run applications, operating systems and even networks in a sort of logical “sandbox” which eliminates the need for much physical hardware. While the virtual hosts themselves are physical, they may be located on-site or in the cloud at someone else’s data center. The virtualized resources act ...

    View This Now
  • Network Security Policy

    Tools & Templates // Dec 2015 // provided by Tech Pro Research

    Any given company’s network is made up of devices which transmit and store information. This can include internal and external systems either company-owned or leased/rented/subscribed to.In order to protect company data and reputation, it is essential to ensure the network is secured from unauthorized access, data loss, malware infestations and ...

    View This Now