Active Directory, AS/400, Business Intelligence, Career Development, CIO, Cisco, CRM, Data Management, Database, DataCenter, Development, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Management, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, OS, Routers, RPG, RPGLE, SAP, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
Is it bad to assign more virtual CPUs to a VM than absolutely needed? Shouldn't another vCPU lead to better performance?
Admins working in virtual environments should be careful not to let the speed and convenience of snapshots overshadow the potential threats to data integrity.
Independent backup expert Brien Posey compares copy-on-write snapshots and differencing disk snapshots in this Expert Response.
In this tutorial on snapshot backup software, learn about near-CDP and snapshots, redirect-on-write snapshots, and how to restore snapshot data.
Data center security is paramount to ensuring the safety of your employees and data. But what happens when you let a fool into your facility?
As cloud computing grows in popularity, secure encryption key management becomes more vital. Michael Cobb explains the security risk affecting cloud computing and virtualized computing and why encryption key management policies need to be included in your cloud provider's security policies.
Data encryption is showing up in tape libraries, disk drives and backup software, but the technology is hindered by the lack of a single standard for managing encryption keys.
The FreeNAS storage operating system is compatible with most major protocols and storage hardware and provides file sharing in a NAS environment.