If you're wondering whether to use a software- or hardware-based network vulnerability scanner, take a look at your budget and network deployment.
We built a data center several years ago and are refreshing the IT equipment in it. Should I worry about how big and heavy my new cabinets will be for the existing structure?
The Open-IX data center certification aims at resiliency through self-declared certification and an annual renewal process, rather than proprietary oversight.
Software defined is a term used to describe a wide variety of products, but it’s often used to catch your attention rather than describe a product’s function
Certain Hyper-V default configurations should be changed for better performance before using the servers in a production environment.
There are plenty of different actions you can do with Microsoft Hyper-V Replica, but only a handful are available in both primary and replica VMs.
VMware's NSX network virtualization product offers advanced security measures the company is calling micro-segmentation to extend protection of the data center all the way down to the hypervisor kernel. Will it replace VMware vCloud Networking & Security over time?
VMware's Duncan Epping talks about the advantages of a virtual storage appliance, how VSAN works when an SSD drive breaks and more.
In virtualization's evolution from servers to the cloud, VMware has several offerings for managing resources in virtual data centers.
IBM customers will have a new way to deliver desktops and make sense of mobile analytics, but questions about its appeal remain.
Recent Windows licensing changes don't make it any easier for small shops to do DaaS because there's still no SPLA for the desktop OS and multi-tenancy is a no-no.
You can't really make the cloud more secure, but you can take some steps to make hosting desktops and applications in the cloud a little less scary, such as picking the right provider and crafting a favorable SLA.
Using multiple Exchange and network security controls can help many organizations protect against potential data breaches.
Does Exchange have built-in support for archiving and stubbing, or are third-party tools the only options we have to do this?
Customized claim rules can be an important way to help your organization handle and enforce its Office 365 access policies.