Managing VMware Servers from System Center Virtual Machine Manager 2012 SP1
This article describes the new secure communications model and the process required to connect VMware systems to System Center Virtual Machine Manager 2012 SP1.
This article describes the new secure communications model and the process required to connect VMware systems to System Center Virtual Machine Manager 2012 SP1.
In this article the author will cover recent events that have exposed millions of users due to lack of planning and contingency.
In this article the author discusses why organizations move to the cloud and what security measures are required for safe cloud computing.
Networking doesn’t have to be expensive or complex. There are fewer network devices in the datacenter. Now, the network is in the software. Let me explain.
This article (part two) will focus on the final three principles of good information handling. These principles will cover the obligations on organisations for processing and storing data.
This article (part one) will focus on the first four principles of good information handling.
In this article the author tests out VMware’s Wavemaker – part of their total Cloud Computing “Platform as a Service (PaaS)” solution.
This article is the last in the series on using Hyper-V to build a private cloud. The article focuses primarily on troubleshooting virtual machine deployment issues, but also briefly addresses security.
This article covers major concerns that companies have when data is stored and processed in the cloud, and things that can be done to better protect against the threat vector.
This article continues the discussion of private cloud creation. It explains how to review user’s infrastructure and service requests. It also demonstrates the process that end users will use to create virtual machines once their requests have been approved.