by Theresa Miller | Apr 23, 2015 | Phoummala Schmitt, Security
We have all heard about the leaked celebrity nude photos being hacked from iCloud accounts recently. Rumors of spying by the NSA. Security breaches at major corporations such as Sony, Anthem and Home Depot. All this has brought more attention to security and privacy,...
by Theresa Miller | Apr 9, 2015 | Melissa Palmer, Virtualization, VMWare
By Melissa Palmer VMware vCenter has long been the brains of any vSphere deployment. Originally debuting as Virtual Center 1.0 to go along with ESX 2.0, the features and functionality have grown over time. With the release of vSphere 4, Virtual Center began to be...
by Theresa Miller | Mar 26, 2015 | Exchange, Exchange 2010, Phoummala Schmitt
by Phoummala Schmitt As mobile devices become the norm in the business world Exchange administrators still need to protect corporate data and email. Using Exchange’s built-in Active sync polices, administrators can control and limit access to corporate email. Even...
by Theresa Miller | Mar 24, 2015 | Exchange, Exchange 2010, Exchange Online, Theresa Miller
by Theresa Miller Recently I worked on a project where I was able to collect and analyze data to determine what companies are doing with their Exchange deployments. More specifically what is the Office 365 State of the Industry. Read here for more detail on the...
by Theresa Miller | Mar 12, 2015 | Melissa Palmer, Virtualization, VMWare
by Melissa Palmer In our recent article titled Everything You Need to Know about Getting Started with Docker, we looked at the basics of Docker and how to get a quick environment up and running using Boot2Docker. This was a nice start, but really only touches lightly...