Image Resources
Keeping Your Cloud Online with VMware Fault Tolerance
For mission-critical VMs, VMware Fault Tolerance can minimize or eliminate downtime. See requirements and the difference between FT and HA.
Image Resources
Jim’s IT Tidbits: Check DNS Records with nslookup & whois
Senior Systems Engineer Jim Taylor describes how to use whois and nslookup to check DNS records.
Image Resources
Know Your Storage Constraints: IOPS and Throughput
Application performance can often hinge on storage IOPS and throughput, which rate the speed and bandwidth of the storage respectively.
Image Resources
Keep Exchange Secure: A Checklist
E-mail is an easy route for phishing, malware, and theft of confidential information. Maintain Exchange server security with this security checklist.
Image Resources
Keep Your Passwords Minty Fresh
This past weekend the forums for Mint, a Linux distribution, got hacked, serving as a reminder that you should never reuse passwords on any website.
Image Resources
Keep Your Encryption Keys on the Chain with Key Management
As data sets are updated, different encryption systems are introduced, and user access is modified, encryption key management becomes essential.
Image Resources
IT Pros Report Mobile, Cloud Concerns
The Ponemon Institute released a survey sharing an unfortunate picture on the state of mobile devices & cloud technology in highly regulated industries.
Image Resources
IT Infrastructure Management – Through a Single Pane of Glass
As an information management executive, you (and by extension, your team) need broad and deep insights into the performance and security of your data management infrastructure. This is the case whether your business applications reside on five servers