More On the Squid Proxy Server
This radio show describes the Squid proxy server and its various uses.
08:15
More On the Squid Proxy Server
This radio show describes the Squid proxy server and its various uses.
08:15
Linux supports IPv6 as well as IPv4. In this radio show we will discuss why IPv6 was designed,...
08:35
Apache Webservers- The Next Steps
The Apache webserver is modular, allowing the administrator to add functionality to the server....
10:02
ITIL: Roles and Responsibilities for Planning, Protection and Optimization
Discussion of what a Capacity Manager, Availability Manager, ITSCM Manager and Security Manager...
09:45
ITIL: CSI in Complementary Governance Standards, Frameworks, Models and Quality Systems
Use of CSI is not exclusive to ITIL. Improvement appears in complementary governance standards,...
10:24
A short exploration of the roles which are discussed in the CSI stage of the Lifecycle.
14:31
ITIL: ITSCM – the Importance of Testing
Consideration of the various types of testing, and the potential impact to the organization.
09:12
ITIL: Security – Awareness and Education
Consideration of the impact of education and awareness on the culture for security in the...
09:58
ITIL: Common Techniques for Improving Availability
This talk covers the common techniques such as the Expanded Incident Lifecycle, CFIA, SFA etc.
14:11
ITIL: Implementing CSI Day to Day
How to include CSI principles in commonly used processes such as Incident, Problem, Service Level...
09:30
ITIL: Capacity Management – is It Still Important?
Covering the aspects of Capacity Management and consideration of the need for Capacity Management...
10:14
A short review of the key elements of Assessment, when to carry out an assessment, how it can be...
09:20
ITIL: Kotter’s 8 Step Change Model and CSI
Brief overview of the 8 steps of Kotter’s model and how it can be used with CSI in the Service...
13:49
Planning Virtualization – Selecting the Right Type
There are several different forms of virtualization. Each one has its own characteristics. They...
16:04
Planning User State Virtualization
USV works by decoupling user data and settings , which make up the user profile, from personal...
07:37
Planning Network Access Protection
There are several specific questions to answer when designing a NAP architecture, and they can be...
15:00
Planning Active Directory Certificate Services Infrastructure
Active Directory Certificate Services (AD CS) provides a public key infrastructure (PKI) that can...
13:12
Designing File Service Infrastructure
This podcast will discuss how a well-designed file services form the basis for productive...
19:27
Why In The World Are We Doing BusinessObjects
What are "Business Objects?" Is this some new-fangled product?Will this help me tame the mass of...
10:05
Creating Queries in BusinessObjects
Business Objects uses a visual, "drag-and-drop" interface to customize requests you make to the...
08:21