Join us on May 2nd, as we discuss preparing for DDoS attacks, building resiliency, overcoming obstacles and key preparations to make now before ransomware attacks.
As someone wise once noted, when swinging through the trees, Tarzan didn’t let go of the last vine before he had grasped the next one. It goes without saying that it’s critically important to test a migration before performing the...
When Windows Server 2003 was released, most Windows Server deployments were physical rather than virtual. Back when the majority of workload deployments were to bare metal hardware, most organizations isolated workloads. A production server would...
Sponsored Blog
Cybercriminals are relentless in their efforts to cash in by compromising your network. It’s a reality that’s unlikely to change for the better—that’s why your approach to security needs to change, Marc Thaler writes.
Whenever ...
Sponsored Blog
When will my passwords go away?
Don’t hold your breath. There are some interesting changes happening that may move in that direction, but username/password pairs are here to stay, at least for the foreseeable future. Keepin...
One unusual problem that turns up when migration occurs, especially workloads have been moved off “bare metal” hardware and virtualized, is “what do we do with the bare metal hardware once the workload is migrated?&rdquo...
Just because it's automated, doesn't mean it has to be lifeless. There are a couple of quick and easy methods to begin to make automated emails much more personal, which will increase their effectiveness dramatically...
A recent report, "The Science of Email", analyzes the trends of email marketing and usage in 2014, and packs an awesome amount of data into a digestible format. Understanding these trends will allow marketers to experiment and improve...