Advanced Search

Open Menu Open Menu
  • Home
  • Papers
  • Webcasts
  • Newsletters
  • Advertise
  • Summits
  • More
    • News
    • How-To
    • Dan's Take
    • VMworld 2013
    • Virtual Insider
    • Everyday Virt
    • Paul on Hyper-V
    • How To Guy
    • Cloud Report
    • Admin
    • Apps
    • Backup
    • Desktop
    • Server
    • Storage
    • White Papers
    • Webcasts
    • Advertise
    • Contact Us
    • Site Map

  • Topics

  • vSphere
  • Hyper-V
  • SDN/SD-WAN
  • Server
  • Cloud
  • Containers
  • Desktop
  • Admin
  • Storage
  • Backup
  • How-To

  • Don't Get Fired: How to Sell Max Cybersecurity to the C-Suite

    By David Ramel

    Avoid this: IT Pro: "We need max security." Suit: "Costs too much." IT Pro: "We were hit with huge ransomware attack." Suit: "You're fired!" 06/27/2022

  • Fad or the Future? What Developers Think of Web3

    By David Ramel
    06/27/2022
  • Study: Look to Cloud for Better Risk Management

    By David Ramel
    06/24/2022
  • Gartner Predicts Big Zero Trust Uptake, but Most Won't Benefit

    By David Ramel
    06/23/2022
  • Report: Open Source Security Ignored by Many Organizations

    By David Ramel
    06/22/2022
  • How to Capture HDMI Video Output

    By Tom Fenton

    Tom Fenton tries out an inexpensive HDMI video capture device that lets him take screenshots regardless of the OS.

  • A Script to Automatically Mount USB Storage on an ESXi System

    By Tom Fenton

    Tom Fenton offers up his personal, time-saving, 94-line bash script, complete with code on GitHub.

  • What Is Azure Purview?

    By Paul Schnackenburg

    Paul Schnackenburg looks at the new public preview of the cloud giant's unified data governance service.

  • What to Do When AWS Quota Requests Are Denied

    By Brien Posey

    Brien Posey explains how the default quota for macOS dedicated instances in the AWS cloud caused him problems and how he addressed them.

  • Hands on with VMware Horizon 8 (2012)

    By Tom Fenton

    After covering some of the new features and changes in the connection server and clients with version 2012 of the desktop and app virtualization product, Tom Fenton updates his environment and takes a closer look at changes.

  • What's New in VMware Horizon 8 Version 2012

    By Tom Fenton

    Tom Fenton explains some of the new features and changes in the connection server and clients with version 2012 of the desktop and app virtualization product.

  • Using RDSH with Horizon

    By Tom Fenton

    Tom Fenton enables a Windows server to stream applications, configures VMware Horizon to broker these applications to specific users and shows how to monitor streaming applications.

  • A Total Beginner's Guide to macOS X on AWS, Part 3: Connect to Instance

    By Brien Posey

    After detailing the need for dedicated hosts, how to handle quotas and creating instances, Brien Posey walks you through the instance connection process.

  • Power Ranking Microsoft PowerToys

    By Tom Fenton

    Tom Fenton walks you through the process of installing PowerToys, explains how to use each, and then gives you his Power Ranking of these PowerToys.

  • A Total Beginner's Guide to macOS X on AWS Part 2: Provisioning Instances

    By Brien Posey

    After covering the need for dedicated hosts and how to handle quotas, Brien Posey walks you through the instance creation process.

  • A Total Beginner's Guide to macOS X on AWS, Part 1: Dedicated Hosts and Quotas

    By Brien Posey

    Brien Posey explains the need for a dedicated host, quotas and more in this first installment.

  • Enabling Virtual Multi-Factor Authentication for AWS

    By Brien Posey

    Brien Posey shows how to set up multi-factor authentication for an AWS user in a way that allows the use of a smartphone as an access key.

  • Using Windows 10 Multiple Desktops

    By Tom Fenton

    Tom Fenton believes that multiple desktops will increase your productivity and decrease the clutter on your desktop as it allows you to group your desktops by different workflows.

  • How to Secure Azure Deployments

    By Paul Schnackenburg

    Paul Schnackenburg examines the comprehensive guidance Microsoft offers for "how to do security" in Azure and demonstrates how to use the tool that brings it all together: Azure Security Center (ASC).

  • Using AWS Honeycode to Create Codeless Apps, Part 2

    By Brien Posey

    After previously explaining how to create a workbook that could be used as the basis for creating a custom application, Brien Posey now shows you what the actual application development process looks like.

  • Hands on with VMware Horizon 8 (2006)

    By Tom Fenton

    The two biggest changes in Horizon 8 are that it now includes instant clones as a standard feature, and the capability to use Horizon 8 in public clouds.

  • Research Shows Cloud Giants Lead Huge Database Exodus from On-Premises

    By David Ramel

    The usual cast of cloud giant characters tops the list of cloud database management systems in a new report from research firm Gartner, which is charting a rapid shift to the cloud.

  • AWS Advances Containers on Four Fronts

    By David Ramel

    Amazon web Services (AWS) announced four new advances for containers on its cloud computing platform during this week's re:Invent conference.

  • Using AWS Honeycode to Create Codeless Apps, Part 1

    By Brien Posey

    Brien Posey shows how to use this AWS service that lets you take a drag-and-drop approach to application development, allowing for the creation of apps without ever writing a single line of code.

  • Research Reveals What's Hindering Hybrid Cloud Adoption

    By David Ramel

    For the third year in a row, research commissioned by Nutanix indicates the hybrid model is preferred by enterprises for cloud computing. However, adoption of hybrid -- a mix of both public and private cloud platforms -- remains relatively flat.

  • « previous
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • next »
More
Most   Popular
  • Most Popular Articles
  • Most Emailed Articles

Don't Get Fired: How to Sell Max Cybersecurity to the C-Suite

Q: How Often Should SMBs Do Security Audits with Zero Trust? A: Constantly

Industry Heavyweights Form Metaverse Standards Forum

Data Scientists vs. AI Pros: Who Makes the Most Money?

Mounting Data Breaches Cause Huge Encryption Spike

Virtualization Review
Sign up for our newsletter.
Email Address*Country*
I agree to this site's Privacy Policy
Please type the letters/numbers you see above.

Free White Papers

  • 7 Critical Reasons for Office 365 Backup
  • The Ultimate Ransomware Battle Kit
  • Remote Work Environments Optimization Checklist
  • 5 Reasons to Implement a Backup Solution

More Tech Library

  • Most Popular Articles
  • Most Emailed Articles

Don't Get Fired: How to Sell Max Cybersecurity to the C-Suite

Q: How Often Should SMBs Do Security Audits with Zero Trust? A: Constantly

Industry Heavyweights Form Metaverse Standards Forum

Data Scientists vs. AI Pros: Who Makes the Most Money?

Mounting Data Breaches Cause Huge Encryption Spike

Sponsored Webcasts

  • Getting Started with Zero Trust Security Summit
  • AWS Cloud Security Summit
  • AWS Architecture & Containers Summit
  • Top Tips & Best Practices for Improving Your AWS Cloud Performance

More Webcasts

  • Contact Us
  • Advertise
  • Archives
  • Events
  • Print Issues Online
  • Free Newsletters
  • Reprints
  • List Rental

  • Application Development Trends
  • AWSInsider.net
  • Enterprise Systems
  • FutureTech360
  • Live! 360
  • MCPmag.com
  • MedCloudInsider
  • Prophyts
  • Pure AI
  • Redmond
  • Redmond Channel Partner
  • TechMentor Events
  • Virtualization & Cloud Review
  • Visual Studio Magazine
  • Visual Studio Live!

© 1105 Media Inc. See our Privacy Policy, Cookie Policy and Terms of Use. CA: Do Not Sell My Personal Info

Problems? Questions? Feedback? E-mail us.