Paul Kirvan Independent IT consultant/auditor Search Networking operational support system (OSS) 12 May 2023 WhatIs standardization 09 May 2023 Search Disaster Recovery 10 game-changing disaster recovery trends 09 May 2023 Search Data Backup What are best practices for backup cloud repatriation? 08 May 2023 WhatIs serial communications interface (SCI) 05 May 2023 Search Disaster Recovery 10 disaster recovery questions to ask in 2023 and beyond 28 Apr 2023 Search Disaster Recovery 12 business continuity trends to keep an eye on 28 Apr 2023 Search Networking fax 28 Apr 2023 WhatIs reliability, availability and serviceability (RAS) 27 Apr 2023 Cloud Computing Cloud Foundry 25 Apr 2023 Search Networking collision in networking 24 Apr 2023 Search ITOperations systems operator (sysop) 24 Apr 2023 Search Data Center Energy Star 24 Apr 2023 Search Networking baseband 21 Apr 2023 Search Storage What are 5 top cloud data storage risks? 21 Apr 2023 Search Networking broadband 20 Apr 2023 Search Security How to prepare for a cybersecurity audit 19 Apr 2023 Search Data Center LEED (Leadership in Energy and Environmental Design) 19 Apr 2023 Cloud Computing TOSCA (Topology and Orchestration Specification for Cloud Applications) 17 Apr 2023 Cloud Computing Red Hat OpenShift 17 Apr 2023 Mobile Computing smartphone 17 Apr 2023 Search Storage What the new LTO roadmap means for tape storage 14 Apr 2023 Search ERP prototype 13 Apr 2023 Search Data Center mainframe (big iron) 12 Apr 2023 Search Security How to use a CASB to manage shadow IT 12 Apr 2023 WhatIs operational-level agreement (OLA) 11 Apr 2023 Cloud Computing Azure Migrate 11 Apr 2023 WhatIs HDTV (high-definition television) 11 Apr 2023 WhatIs word (in computing) 11 Apr 2023 Search Customer Experience Oracle Customer Experience Cloud (Oracle CX Cloud) 11 Apr 2023 Cloud Computing Azure Container Instances (ACI) 10 Apr 2023 Search CIO Agile Manifesto 06 Apr 2023 WhatIs control system 31 Mar 2023 WhatIs pounds per square inch (PSI) 30 Mar 2023 WhatIs microtrend 29 Mar 2023 WhatIs reliability of computers 28 Mar 2023 WhatIs electrostatic discharge (ESD) 27 Mar 2023 WhatIs triage in IT 27 Mar 2023 WhatIs RISC (reduced instruction set computer) 24 Mar 2023 WhatIs forensic image 23 Mar 2023 WhatIs project constraint 23 Mar 2023 Search Storage How to optimize data storage governance 28 Feb 2023 WhatIs vCard 27 Feb 2023 WhatIs employee productivity 27 Feb 2023 WhatIs memory dump 24 Feb 2023 WhatIs superconductivity 24 Feb 2023 WhatIs controller (computing) 24 Feb 2023 Search Data Backup What are the pros and cons of cloud backup? 06 Feb 2023 Search Storage How can users securely access Google Cloud Storage? 03 Feb 2023 Search Disaster Recovery Fine-tune a social media emergency plan with ISO 22329:2021 31 Jan 2023 Search Security How to select a security analytics platform, plus vendor options 20 Jan 2023 Search Networking green networking 18 Jan 2023 Search Disaster Recovery Developing an emergency communications plan: A template for business continuity professionals 18 Jan 2023 Search Disaster Recovery Why BCDR teams should consider EMP disaster recovery plans 29 Dec 2022 WhatIs stateless app 16 Dec 2022 WhatIs thyristor 16 Dec 2022 Search Networking Ensure network resilience in a network disaster recovery plan 09 Dec 2022 WhatIs vector 07 Dec 2022 WhatIs widget 16 Nov 2022 Search Storage A comparison of distributed file systems 09 Nov 2022 Search Security Types of vulnerability scanning and when to use each 08 Nov 2022 Search Security How to build a shadow IT policy to reduce risks, with template 08 Nov 2022 Search Disaster Recovery Where do business continuity plans fit in a ransomware attack? 01 Nov 2022 Search Data Backup The ins and outs of unstructured data protection 31 Oct 2022 Search Disaster Recovery Create a flood business continuity plan to stay afloat 27 Oct 2022 Search Data Backup 5 unstructured data backup challenges and how to handle them 26 Oct 2022 Search Storage cloud NAS (cloud network attached storage) 24 Oct 2022 WhatIs polarity 18 Oct 2022 Search Security An overview of the CISA Zero Trust Maturity Model 12 Oct 2022 Search Security How to conduct a cybersecurity audit based on zero trust 11 Oct 2022 Search Networking What to include in a network disaster recovery plan checklist 04 Oct 2022 WhatIs adiabatic cooling 03 Oct 2022 WhatIs logical implication 30 Sep 2022 WhatIs table 30 Sep 2022 WhatIs synchronous/asynchronous API 29 Sep 2022 WhatIs memory management unit (MMU) 29 Sep 2022 WhatIs hue, saturation and brightness 27 Sep 2022 Search Security 10 PCI DSS best practices to weigh as new standard rolls out 27 Sep 2022 Search Disaster Recovery Use ISO 22320:2018 to prepare an incident management plan 23 Sep 2022 WhatIs watt-hour (Wh) 22 Sep 2022 WhatIs cluster 19 Sep 2022 Search Networking Tips to prepare for a network disaster recovery audit 13 Sep 2022 WhatIs CAVE (Cave Automatic Virtual Environment) 13 Sep 2022 WhatIs scale-out storage 12 Sep 2022 Search Storage Tips to achieve compliance with GDPR in cloud storage 08 Sep 2022 WhatIs customer demographics 01 Sep 2022 WhatIs plotter 01 Sep 2022 Search Disaster Recovery Use ISO/TS 22317:2021 to shape your business impact analysis 31 Aug 2022 WhatIs apparent power 31 Aug 2022 Search Storage NAS vs. server: Which storage option should you choose? 29 Aug 2022 Search Storage Explore software-defined storage pros and cons 26 Aug 2022 Search Security PCI DSS v4.0 is coming, here's how to prepare to comply 24 Aug 2022 WhatIs critical path method (CPM) 23 Aug 2022 Search Security 8 secure file transfer services for the enterprise 19 Aug 2022 WhatIs GPS coordinates 18 Aug 2022 Search Storage Compare software-defined storage vs. storage virtualization 16 Aug 2022 Search Disaster Recovery Free disaster recovery budget template to justify BCDR spending 15 Aug 2022 Search Storage Differences in scale-up vs. scale-out storage 02 Aug 2022 Search Disaster Recovery Use recovery level objective to fine-tune BCDR response 29 Jul 2022 Search Security How to create a data security policy, with template 21 Jul 2022 1 2 3 4 5 6