Troubleshooting VMware View 5: Examples
We're back with part 2 of this video series on troubleshooting VMware View 5! Learn from real-word examples of problem VMware View 5 desktops.
We're back with part 2 of this video series on troubleshooting VMware View 5! Learn from real-word examples of problem VMware View 5 desktops.
In this first of two video posts, learn about the most common failure points in VMware View 5 and how to troubleshoot them.
with 1 Comment by Petri IT Knowledgebase Team
In part 2 of this two-part video series, Jason Nash of TrainSignal finishes his lesson on configuring Cisco UCS Service Profile Templates. Specifically, in this post Jason covers setting up vNIC/vHBA placement policies. This relatively new feature allows you to set up policies that determine how PCI devices are ordered on system boot-up.
In this video post from TrainSignal, Cisco UCS expert Jason Nash will show you the required steps to creating a Service Profile Template in your Cisco Unified Computing System. Service Profile Templates can make it easy for you to provision many servers because it will allow you to quickly create multiple service profiles having the same basic parameters like say the number of vNICs and vHBAs.
Lisa Szpunar of TrainSignal explains basic social engineering tactics in this video lesson. Lisa eloquently explains the different techniques used to steal personal information and simple ways companies and individuals can combat these attacks.
One of Windows simplest time-saving features, the "right-click" context menu, enables you to perform an array of tasks in the context of whatever Windows object you are working with. In this article, we show you how to add "Open PowerShell" to this context menu, enabling you to open PowerShell in the context of whatever folder or object you are working with.
In this post we solve the minor but perhaps frustrating issue of having user accounts on the logon screen that are no longer needed or used. Deleting user accounts entirely may sometimes be overkill (what if the account is needed down the road). The better option is to simply remove the user account from the logon screen.
In this post we briefly discuss Cisco's newest network monitoring software. Flexible NetFlow offers a richer and deeper insight into network traffic including visibility of all Layers from 2 through 7 as well as deep packet inspection.
In this video post, Josh Stephens, Head Geek at SolarWinds, explains what NetFlow is and why all network engineers need to be using it. NetFlow offers a wide range of features that allow easy monitoring and analysis of network traffic through ordinary routers and switches.
with 1 Comment by Petri IT Knowledgebase Team
Deploying performance and fault monitoring tools to monitor and configure your infrastructure adds layers of complexity; multiple products to log into & maintain, in addition to out of control alerts. Solve the issue of application management overload with a single application containing all your performance and alert data.
A walk-through with Josh Stevens, Head Geek at SolarWinds, on configuring a Cisco router to export NetFlow data. In this video Josh covers the manual setup since there could be situations when NetFlow Configurator might not work for you, for instance, if you don't have SNMP access to your routers. Full transcript provided.
In this post, Kasia Lorenc sits down with Josh Stephens, VP of Technology at SolarWinds to learn more about what SolarWinds does, the products they currently sell and what to expect in the coming months.
Anti-virus software is a great way to protect your machines against attack. Unfortunately they can sometimes interfere with software that is running on your machine; anti-virus exclusions fix this. In this article we discuss anti virus exclusion guidelines for Microsoft products.
The following article explores the puzzling situation in which an external disk drive behaves as if it is "Read Only" but there is no indication in the Windows UI that indicates this is the case. A walk-through is provided to troubleshoot and ultimately provide a solution to this situation.
Backing up virtual machines presents different challenges than backing up physical machines. Ignoring these challenges may lead to an incomplete or even failed backup even though it may not be apparent until you try and restore the backup. This brief article goes over these important considerations and will help you make sure your VM backups are complete.