ADS BY GOOGLE
From the Blogosphere

If a massive herd of elephants were charging at you from 20 meters away, would taking a small step forwards or backwards improve your safety? NO! In many situations it seems that is how companies are approaching mobile strategies. They are staring massive marketplace transformation i...
Government laws and industry regulations in the United States and around the world mandate protection of sensitive data. Data must be secure when at rest, during transactions and when it transverses network connections. Each industry has specific regulations, which are commonly used in...
Before coming to Canada I worked for British Telecom in the UK, so I was very familiar with Nortel, they were one of the main vendors we worked with for incorporating into large telco solutions. So watching them go under made me think it would be the equivalent to seeing BT go down in...
We want to take this time to talk about Cloud-based Disaster Recovery Solutions. Getting it out of the way, Solar VPS offers our clients with Cloud based disaster recovery services which provide: 20GB to 200GB Backup Capacity Full Server Backups New Data Backed Up Incrementally Backups...
In traditional networks, MAC addresses are inserted into tables using standard learning techniques. When packets arrive, if the source MAC address is not known, it is added to the MAC forwarding table for that VLAN with the ingress interface as its destination. If the destination is u...
These days, users are growing more and more accustomed to expecting that they can accomplish productive work from anywhere, at any time, and on any device. As a result, IT professionals are increasingly faced with the challenge of balancing convenience with security, in an effort to pr...
Faced with competitive pressures demanding increased IT agility, Line-of-Business (LOB) managers have been increasingly relying on virtualized infrastructures to accelerate deployment of critical application workloads. Server virtualization has rapidly become the default platform for m...
With the new Windows Server 2012 R2 Essentials Server we really added many features to make this an even more rounded server. The Essential server also provides a ton of flexibly for deployment and functionality. We even included the popular client computer backup from Windows Home se...
Perhaps somewhat lost in a ridiculously hyper week of datacenter announcements last week was this article from some of the network minds at VMware. The article describes a division of flow types in datacenter environments (they probably exist elsewhere too but probably less pronounced)...
Back for Part 3 of the “Building a Hybrid Cloud” series, Keith Mayer and myself chat about and demo the latest networking enhancements made in Windows Server 2012 R2. Keith really shows you how Windows Server 2012 R2 offers networks for your virtualization hosts but also your virtual ...
In my last blog, I speculated about some of the opportunities that could arise from the implementation and subsequent evolution of SDN and NFV across virtual carrier networks. With companies like Google well-advanced in the implementation of an SDN control plane to manage its flow of b...
Consider the possibility that a small innocuous code change could go undetected, promoted through Development & QA, and then have catastrophic effects on performance once it reaches production. The environmental variants need to be minimized and closely monitored to prevent the anomalo...
Bill Gates has become the latest technology leader to voice his opinion against Internet being a cure to all the world’s ills. Eric Levenson writes the Microsoft founder and philanthropist acknowledges the role information technology has in society but sought to put it in context in a...
I've just had the opportunity to preview my good friend Melvin Greer's newest effort, "21st Century Leadership: Harnessing Innovation, Accelerating Business Success". Now in pre-release, this book highlights the compelling linkage between internet scale technology, advance business mod...
Moving your data storage to the cloud is a smart move as there is an explosion of data day by day and systems are struggling to store all that data effectively and securely. Cloud computing has proven not only to be cost effective but also frees the businesses to concentrate on the da...
Perhaps it is tied to the number of press releases, product or staffing announcements including who has joined the organization along with added coverage of it? Maybe its based on how many articles, videos or some other content and coverage that helps to show traction and momentum? O...
I am fascinated by the notion of the physical world converging with the digital world and the benefits that become possible as a result. Not in the context of a humanoid weeding my garden, although that would be nice, but in the context of making better business decisions based on mor...
A cloud security take on an old riddle: analyze risks, identify needs, develop priorities, deploy scalable model, and leave room for dessert. Security is big. It encompasses a great many definitions, confronts a great many issues and is addressed through a great many solutions using a...
Are you dealing with an explosion of devices connecting to your organization? Trying to maintain your organizations compliance and security is critical. Especially with users located all around the world across multiple platforms and devices. In Kevin Remde's post this week he ta...
The vast majority of schema management today is handled through the generation, review, and execution of SQL scripts. These scripts can be tiny or huge; they can encapsulate the creation and relationships of several objects or they can describe a one-time alteration to a single object...
While certainly not the likes of having SWAT show up at my house like Krebs or even Honan’s fiasco, we’ve had some ID theft attempts occurring for the past few months…actually my wife has. It all started innocently enough at a child’s birthday party. We were invited to a now ex-frie...
With storage needs in your organizations growing exponentially over the last few years and into the future there are plenty of things you may done in the past to help keep the cost down. Chances are you bought some kind of fancy SAN, that had all the bells and whistles to help storage...
Keith Mayer and myself kick off our new multi-part series today on how you can build your hybrid cloud environment with Windows Server 2012, System Center 2012 and Windows Azure by laying down a quick overview of what we can expect for the series as well as diving into the new featur...
Enterprise software developers used to count on a level of stability and control over their environment that no longer exists when migrating to cloud platforms. As much hand-wringing is spent over how and what can be run in the cloud at all, little thought is given to the long-run cos...
Most of my friends in the US are looking forward to the new Healthcare website that allows them to select the health insurance that best suits their needs. As with any new website that has been anticipated by a lot of people, it was not a big surprise that there were glitches when mill...
A day doesn’t go by when we don’t hear about sensitive information being exposed or stolen. The culprits could be the government, professional hackers, careless employees with data on mobile devices, or internal employees with unauthorized access to data or unintentional release of dat...
Q: Windows Server 2012 R2 went to General Availability (GA) on Friday Oct 18th but without much fan fair. Where are the Launch events, were are all the free resources, where is all the information about the latest and greatest Windows Server OS? Where, Where, Where? Answer: Here! W...
If you have a slow test suite and you are asking yourself "how can I make my tests faster?" then you are asking the wrong question. Most chances are that you have bigger problems than just slow tests. The test slowness is merely the symptom; what you should really address is the cause....
It is 11 October, 2014. I am writing this in Kathmandu, capital of Nepal at the foot of the majestic Himalayas. The date is only marginally significant - it is now 2 years and seven months since I was successfully operated on for pancreatic cancer - but the location perhaps is more rev...
Recently I have been involved in a couple of projects which required both Lync EV and Exchange UM. In order to do some testing I needed to get some kind of PBX into my lab environment. After searching the internet I found a ton of information but not a single source that showed all the...
I don't read nearly as much as I should. On plane rides I tend to grab a Vince Flynn, James Patterson or David Baldacci, they are usually enough to entertain me on the way there and back. One of the more interesting books I have read in recent years that does not include murderers, spi...
Having a good support workflow in place is essential to a good business. Have a look at this case study on how you can answer your support requests quickly and thoroughly without automating every single step. Everyone in our team does support. To help our users we need to work togethe...
Performance for end-users is the metric by which most businesses judge their web applications' performance: is the responsiveness of the application an asset or a liability to the business? Studies show that users are growing more and more demanding, while average pageloads are gettin...
Around the world, market leaders in all industries have already deployed managed cloud services. Seeking to use business technology as a strategic lever to advance past their competition on multiple fronts, the senior executives at these leading companies are eager to learn about the n...
There’s been lots of buzz on the enterprise hypervisor front over the past month … In August, Microsoft announced the RTM version of Windows Server 2012 R2 and System Center 2012 R2, the latest major releases of the Windows Server and System Center families. In addition, at VMworld t...
The Internet is a dangerous place. There's a new story on Ars Technica about a corporate or government hack almost everyday. So for those interested in how an enterprise-grade secure cloud backup solution handles data encryption, here is some background on a few of the security protoco...
In the first segment of this series, we introduced some key concepts in a network centric operational strategy. In Part 2 we will explore these concepts in greater depth, add some context, and introduce some additional requirements and considerations for you to ponder. Let's now revi...
If you talk to folks in the networking industry about switching hardware, you probably don't get more than a few sentences in before you hear the words merchant silicon, typically followed closely by commodity hardware. There is some confusion in the dialogue about these topics, and I ...
I’ve been speaking with lots of IT Pros over the past several weeks about the new storage improvements in Windows Server 2012 R2, and one feature in particular has gained a ton of attention: automated Storage Tiers as part of the new Storage Spaces feature set. However, not all of us...
Synthetic monitoring (active monitoring) helps reduce key blind spots for critical applications. Don't throw the baby out with the bathwater. Synthetic monitoring (active monitoring) helps reduce key blind spots for critical applications. We just experienced a production issue on a fu...


ADS BY GOOGLE