Available from the Digital Library:

Newsletter

Email Address:

Subscribe





Ask the Expert

Have a question for our resident expert? .

Realtime Communities

Realtime eBooks


Download this Shortcut Guide Now!
The Shortcut Guide to Network Management for the Mid-Market

Author: Greg Shields


Successfully managing a computer network means keeping straight dozens or hundreds of network devices. And, unfortunately, too many network administrators don't have the time or the experience to implement processes to monitor and automate network management. The Shortcut Guide to Network Management for the Mid-Market, specifically written for SMB and mid-market businesses, outlines real-world technologies, processes, and guiding steps necessary to transform your network operations from reactive to proactive. Click here to learn more.


Download this Definitive Guide Now!
The Definitive Guide to Windows Server 2003 Terminal Services - Updated Edition

Author: Greyson Mitchem


The Definitive Guide to Windows Server 2003 Terminal Services - Updated Edition covers the new features and enhancements in WS2K3 Terminal Services and the new features included in Service Pack 1. It also includes best practices for configuring and managing Terminal Services with an eye to the new techniques available to systems administrators in WS2K3. Because of Remote Desktop Protocol (RDP) 5.2, Active Directory Service Interfaces (ADSI) access to Terminal Services attributes of user objects, new Group Policy Object (GPO) controls, and Session Directory, there exists the ability to use native Terminal Services as an enterprise-class solution for providing users with Terminal Services-based desktops. Click here to learn more.
Realtime Resource Library
Featured Resources
Sponsored by: Blue Lane
Securing Virtualized Infrastructure:
From Static Security to Virtual Shields

Data centers have undergone tremendous transformation in the past five years. Virtualization has changed the architecture for servers, storage and networks. IT organizations are using management and provisioning automation to reduce operational cost, and increase responsiveness to business demands. But security is becoming more and more challenging. While virtualization has impacted every part of IT, security lags. As a result, most security products today do not easily support a virtualized infrastructure. Next generation security products are emerging however. Implemented as virtual software appliances or as virtual shields, they can provide security in a pool of virtual servers, regardless of operating system or application. Data center architects and security architects need to carefully choose security products that support -- and not subvert -- their data center virtualization strategies.

Most Active Posts

Recent Posts

Greg Shields' Bio:

Greg Shields is a Principal Consultant with 3t Systems in Denver, Colorado. With more than 10 years of experience in information technology, Greg has developed extensive experience in systems administration, engineering, and architecture specializing in Microsoft, Citrix, and VMware technologies. Greg is a Contributing Editor for both Redmond Magazine and Microsoft Certified Professional Magazine, authoring two regular columns along with numerous feature articles, webcasts, and white papers. He is known for his abilities to relate highly technical concepts with a drive towards fulfilling business needs. Greg is also a highly sought-after instructor and speaker, teaching system and network troubleshooting curriculum for TechMentor Events, a twice-annual IT conference, and producing computer-based training curriculum for CBT Nuggets on numerous topics. Greg is a triple Microsoft Certified Systems Engineer (MCSE) with security specialization and a Certified Citrix Enterprise Administrator (CCEA).