Each month our team of expert editors addresses the changing role of IT by helping savvy
technology professionals navigate both the technical and cultural challenges wrought by
vendor-hype, user-demands, and technology requirements.
VM performance management, Capacity planning, Provisioning and configuration, Monitoring and troubleshooting virtual machines, P2V, V2V and V2P migration
Security management, Server virtualization compliance and governance
VMware virtualization, VMware management tools, VMware conference coverage, Microsoft virtualization, VMware administration and how-tos, Microsoft Hyper-V management, Citrix XenServer, Open source virtualization, Emerging platforms, Vendor selection
Servers and virtualization, Network virtualization, Virtualized clusters and high-performance computing, Cloud computing architecture, Cloud computing infrastructure, Application virtualization, Using virtual machine appliances, Virtualization how-tos and learning guides, Networking for Server Virtualization
Backup and disaster recovery, Virtual server backup and storage
Desktop virtualization, Lab, test and development, Cloud computing and virtualization strategies, Data center consolidation, Backup, disaster recovery and business continuity
Server consolidation and improved resource utilization, Green data center: Reducing power consumption with virtualization, Reducing IT costs with server virtualization, Improving server management with virtualization
Virtualization costs, licensing and support issues, Virtualization security and patch management, Downtime and data loss in virtualized environments, Preventing virtual machine sprawl
RAID 5 and RAID 6 are two types of erasure coding. The former protects data with basic parity, while the latter builds in a second layer of parity for even greater protection.
Thanks to their overwhelming popularity, the HTML5-based ESXi Embedded Host Client and vSphere Client have made the transition from flings to features.
VMware Storage I/O Control uses vSphere APIs for I/O Filtering to quickly establish and apply IOPS limits to VMs that regularly access your data store.
It's a hybrid cloud world, and Microsoft wants to get in while the getting's good. With its Azure Stack offering, Microsoft wants to ease hybrid cloud integration frustrations.
The domain join process typically works without issue. But when a device can't connect to Active Directory, the administrator must seek the culprit from the usual suspects.
Any business can experience data failure. What matters most is how you prepare for a quick recovery. Azure Site Recovery uses the Microsoft cloud when your data center goes dark.
While a VPN is useful for multicloud networks, IT teams still need to be careful to avoid high traffic charges, as applications move from one provider to another.
Admins need monitoring tools to keep their fingers on the pulse of a public cloud deployment. Learn how Google Stackdriver stacks up to other tools and how it can apply to AWS as well.
Public cloud management tools have come a long way, but cost containment and governance will be the next big hurdles for cloud admins to jump.
Licensing Office 365 for VDI is a complicated process, which often leaves IT admins twisted. Use this quiz to refresh on the key aspects of a successful deployment.
VDI shops can use Microsoft's built-in RDP client to connect users to remote desktops and apps, but some third-party options provide extra features that can really help.
Virtual desktops change the traditional licensing game. Office 365 typically allows for five device installs, but the rules are different in an Office 365 VDI deployment.
Distributed data center architectures increase IT resiliency compared to traditional single-site models, with networking, data integrity and other factors all playing critical roles.
The latest threat to server security could be the firmware. That's the emphasis of at least one server-maker, hoping to help users thwart new attacks -- and spark server demand.
Admins can use vSphere permissions to assign VM controls to different IT groups within their enterprise. Follow the networking example below to get started.