Image Resources
Beekeeper 5.2.0 Release Notes
The latest version of our Beekeeper patching automation software for System Center brings great new features like parallel patching, SQL Availability Group compatibility, daily scheduling, and more.
Image Resources
Best Computers for Hosted Desktops | Green House Data Blog
The main computer options for hosted desktops include standard PCs, thin client devices, zero client devices and mobile phones. Which is best for you?
Image Resources
Best Practices for Cloud Penetration Testing | Green House Data Blog
Whether you are outsourcing your cloud penetration testing or doing it in-house, read about the best practices for planning and communication.
Image Resources
Beekeeper Patch Automation: Checking Exchange DAG health before a patch cycle
Before using Beekeeper for your patching cycle for Exchange DAGs, you should make sure the servers are healthy and ready to be patched.  We have developed a script to assist you.
Image Resources
Beekeeper Patch Automation 5.1.0 Release Notes
We're releasing version 5.1.0 of our Beekeeper patching automation software this week. Let's take a look at the new features available to make your patch workflow even more efficient.
Image Resources
Beekeeper Patch Automation: Powershell Validation Mneumonics and Recovery Actions
Beekeeper, our proprietary patching automation tool, can be integrated with Powershell scripts for customized patching validation and recovery options.
Image Resources
Before Going Serverless, Be Aware of Limitations
Serverless Functions as a Service are an emerging way to build, maintain, and deliver IT systems, but they do have limitations due both to the nature of serverless and how it is currently implemented by cloud service providers.
Image Resources
Beginner's Guide to VMWare Terms
If you’ve thought about moving into the cloud or adding a hybrid cloud, here’s a list of phrases to be familiar with regarding VMware’s terminology.
Image Resources
Be Prepared for a Breach with a Cloud Forensics Protocol
Cloud environments complicate digital forensics. Preparation can reduce cloud security breach investigation costs and speed up the recovery process.