EMC's rebranded management line - now known as "Ionix" - is aimed directly at cloud vendors such as HP, CA and IBM.
Organisations are leaping head first into virtualisation, given the technology's purported benefits. But those that do it without considering security are taking wild risks.
Before you can secure your virtual environments, you must be able track down your machines.
Hyper-V R2 includes hot-add and remove capabilities.
This guide explains how to use Hyper-V R2's new Cluster Shared Voumes feaure.
Some very big name enterprises are taking their entire server farm into the realm of virtualisation. But some pundits maintain that mainframes still have their place.
The company behind the intrusion prevention tool, Snort, will soon launch a virtualisation security product.
While virtualisation eases many common IT pains, it makes delivering applications over the network much harder. We explain how to cope.
Learn how to use VMMCA - Virtual Machine Manager Configuration Analyzer - to configure your host servers for use with Hyper-V R2.
Hyper-V can be managed via its included scripting capabilities. This tip explains how to automate and configure your virtual environments using Powershell or VBScript.
Learn how server virtualisation can help you design networks to better support applications.
VMware's vStorage API for Data Protection can help you back up your precious virtual machines. This guide explains how.
Virtualisation can be a daunting technology to implement. This guide explains how to build and configure a virtualised environment, and the things you need to watch out for.
A new approach of treating network security as a software application has produced better flexibility in deployment.
IBM has launched its Virtual Server Recovery (VSR) and Information Protection Service (IPS) offering which has been researched and developed in Australia for local businesses.