Paul Kirvan Independent IT consultant/auditor Search Storage What is a CompactFlash card (CF card)? 18 Jul 2024 Search Storage JEDEC 16 Jul 2024 Search Storage mirror site 16 Jul 2024 Search Disaster Recovery 13 reasons your disaster recovery plan failed 11 Jul 2024 Search Storage RRAM or ReRAM (resistive random access memory) 10 Jul 2024 Search Networking Cloud networking sustainability strategies yield benefits 02 Jul 2024 Search Disaster Recovery The 4 phases of emergency management 26 Jun 2024 Search Networking A work-from-home reimbursement policy for network tech 25 Jun 2024 Search CIO Top cloud compliance standards and how to use them 24 Jun 2024 Search Storage SATA Express (SATAe) 20 Jun 2024 Search Security privacy impact assessment (PIA) 12 Jun 2024 Search Storage 3D XPoint 10 Jun 2024 Search Storage hybrid hard drive (HHD) 10 Jun 2024 Search Security How to conduct an API risk assessment and improve security 07 Jun 2024 Search Security How to write a useful cybersecurity incident report 05 Jun 2024 Search Storage software-defined storage (SDS) 03 Jun 2024 Search Storage Advanced Host Controller Interface (AHCI) 29 May 2024 Search Storage SAS SSD (Serial-Attached SCSI solid-state drive) 28 May 2024 Search Storage TLC flash (triple-level cell flash) 23 May 2024 Search Storage parallel file system 23 May 2024 Search Storage Best practices for completing a storage migration plan 20 May 2024 Search Disaster Recovery Disaster recovery in healthcare: Free plan template and overview 20 May 2024 Sustainability and ESG ESG audit vs. green IT audit: How are they different? 15 May 2024 Search Disaster Recovery ISO/TS 22317 (International Organization for Standardization Technical Standard 22317) 13 May 2024 Search Security How to create a cloud security policy, step by step 13 May 2024 Search Data Backup Develop a backup KPI to improve performance 02 May 2024 Search Security remote access 01 May 2024 Search Security Federal Information Security Modernization Act (FISMA) 01 May 2024 Search Storage business impact analysis (BIA) 23 Apr 2024 Search Networking networking (computer) 23 Apr 2024 Sustainability and ESG Green IT audit: What it is and how to prepare 22 Apr 2024 Sustainability and ESG A green IT assessment: Why it's important, what to include 19 Apr 2024 Search Data Center power cycling 18 Apr 2024 Search CIO IT budget 18 Apr 2024 Search Data Center building management system 17 Apr 2024 Search Security Pros and cons of 7 breach and attack simulation tools 12 Apr 2024 Search Storage How storage migration tools can help enterprises 10 Apr 2024 Search Enterprise Desktop patch catalog 05 Apr 2024 Search Storage 9 top cloud storage security issues and how to contain them 05 Apr 2024 Search Storage Best practices for cloud storage optimization vs. repatriation 01 Apr 2024 Search Data Backup 11 core elements of a successful data protection strategy 28 Mar 2024 Search Networking How to handle environmental regulations and green networking 28 Mar 2024 Search Data Center data center services 28 Mar 2024 Search Disaster Recovery change control 27 Mar 2024 Search Storage RAID 3 (redundant array of independent disks 3) 27 Mar 2024 Search CIO IT project management 26 Mar 2024 Search CIO chief financial officer (CFO) 22 Mar 2024 Search Security Data protection impact assessment template and tips 22 Mar 2024 Search CIO chief strategy officer (CSO) 22 Mar 2024 Search Data Backup removable media 20 Mar 2024 Search ERP warehouse management system (WMS) 19 Mar 2024 Search Storage RAID 50 (RAID 5+0) 19 Mar 2024 Search Data Backup off-site backup 19 Mar 2024 Search Software Quality low-code and no-code development platforms 15 Mar 2024 Search ITChannel service-level agreement (SLA) 15 Mar 2024 Search ERP transportation management system (TMS) 15 Mar 2024 Search CIO Practical strategies for shadow IT management 14 Mar 2024 Search Security How to craft a generative AI security policy that works 14 Mar 2024 Search CIO 17 potential costs of shadow IT 13 Mar 2024 Search ERP supplier relationship management (SRM) 13 Mar 2024 Search Storage How can AI help cloud storage security? 07 Mar 2024 Search Storage storage security 07 Mar 2024 Search Cloud Computing cloud audit 04 Mar 2024 Search Storage RPO vs. RTO: Key differences explained with examples, tips 01 Mar 2024 Search Data Backup Optimize data protection as a service with these essential tips 22 Feb 2024 Search Disaster Recovery Free business continuity testing template for IT pros 21 Feb 2024 Search ITOperations hypervisor 20 Feb 2024 Search Networking A network compliance checklist for remote work 20 Feb 2024 Search Networking firewall as a service (FWaaS) 15 Feb 2024 Search Security How to conduct a social engineering penetration test 13 Feb 2024 Search ITChannel RMM software (remote monitoring and management software) 13 Feb 2024 Search CIO 8 dangers of shadow IT and how to manage them 06 Feb 2024 WhatIs API gateway (application programming interface gateway) 06 Feb 2024 Search Security communications security (COMSEC) 02 Feb 2024 Search Security security operations center (SOC) 31 Jan 2024 Search Disaster Recovery What is the link between sustainability and business continuity? 23 Jan 2024 Search Security Top incident response service providers, vendors and software 23 Jan 2024 Search Storage Why object storage for AI makes sense 18 Jan 2024 Search Security How to conduct incident response tabletop exercises 17 Jan 2024 Search Data Backup hybrid backup 17 Jan 2024 Search Data Center configuration management database (CMDB) 03 Jan 2024 Search Data Center colocation (colo) 03 Jan 2024 Search Storage Fibre Channel over Ethernet (FCoE) 02 Jan 2024 Search Data Backup data protection management (DPM) 02 Jan 2024 Search Disaster Recovery The emerging role of the chief resilience officer in BCDR 21 Dec 2023 Search Software Quality citizen development 06 Dec 2023 WhatIs greenhouse gas 04 Dec 2023 Search Disaster Recovery High availability and resiliency: A DR strategy needs both 30 Nov 2023 WhatIs wiretapping 30 Nov 2023 WhatIs endpoint device 29 Nov 2023 Search Disaster Recovery Build and maintain digital resilience for a stronger DR program 29 Nov 2023 WhatIs data sovereignty 28 Nov 2023 SearchWindows Server client-server network 03 Nov 2023 Search Mobile Computing Wi-Fi (802.11x standard) 03 Nov 2023 WhatIs end of life (EOL) 01 Nov 2023 Search Security ISO 27002 (International Organization for Standardization 27002) 30 Oct 2023 Search Security Top 12 IT security frameworks and standards explained 27 Oct 2023 Search Security How to create a company password policy, with template 26 Oct 2023 Search Storage 10 data storage questions for enterprises to ask 23 Oct 2023 Search Security soft token 20 Oct 2023 1 2 3 4 5 6