Technologies like cloud and virtualization mean IT service continuity no longer requires an extra data center or two.
Some colocation providers say the best way to prevent data center downtime is to regularly pull the plug and see what happens. (Hopefully, nothing.)
By moving to the cloud, a business can offload some responsibility for lost or stolen data, but external penetration testing in the data center remains critical.
VMware NSX could be a game changer, but IT pros won't believe it – and won't invest in it – until they can test it for themselves.
VMware's container strategy includes technologies tied to virtualization, but some, including Project Photon, have yet to see the light of day.
VMware EVO:RACK is still a work in progress that won't emerge for many months, but some details, including a new name, have been released.
VMware's vRealize Automation offering allows IT to customize the product to plug into the existing infrastructure tools.
Make sure your comprehensive security design also includes an incident policy to help react to an online security breach.
It's not a rebirth of the VMware Technology Network, but VMUG Advantage gives subscribers a trial period of a year for several VMware products.
Several IT pros from federal government agencies face the same dilemma as all IT: How to provide security and the freedom and flexibility to support a mobile workforce.
VMware's EUC GM Sanjay Poonen believes matching Citrix feature-for-feature isn't as important as having a long-term vision for IT organizations.
Teradici's PCoIP has been critical to VMware VDI, but that partnership has been in question. Teradici's CEO discusses that, protocol updates and more.
Don't let the deficiencies from applying and managing Exchange threaten your network. Implement third-party security tools to thwart breaches.
My mailbox migration from Exchange 2010 to Exchange 2013 is moving very slowly. What might be causing this and how can I speed up the process?
For a better understanding of Exchange Managed Availability, learn how to create and manage monitoring mailboxes, and how to fix a corrupted mailbox.