EqualLogic iSCSI SAN Concepts for the Experienced Fibre Channel Storage Professional

As data storage has become central to any successful computer based solution, advanced technologies for connecting computing resources to data have matured over the...

Optimizing Data Protection for Virtual Environments

Virtualization technology works across all sizes of business to reduce costs, control management overhead, and increase flexibility.

The CIO’s Guide to Optimizing Virtual Desktops

As information technology continually evolves, there is a cycle of tendencies between central and distributed control. You could envision mainframe technology with terminal services...

Overcoming the Storage Challenges of Virtual Desktops with Dell EqualLogic and Unidesk

Dell Desktop Virtualization Solutions (DVS) Enterprise Infrastructure Overview DVS Enterprise Infrastructure is designed and optimized to deliver a highly robust, highly scalable and highly available...

Microsoft Exchange 2010 on VMware – Availability and Recovery Options

By leveraging the inherent benefits of a VMware-based platform, a Microsoft Exchange Server 2010 deployment on VMware vSphere offers a choice of several availability and recovery options, each providing varying levels of protection and cost.

Red Hat Cloud 101

In a remarkably short time, cloud computing has emerged as a hugely important evolution in the way that businesses and individuals consume and operate...

Taking the Next Steps with Virtualization

Whether your organization is new to virtualization or you’ve been deploying it for years, the reality is that virtualization is a technology that should...

Microsoft Exchange, SQL, SharePoint Server Mixed Workload on Hyper-V and NetApp Fabric MetroCluster

IT organizations today face major challenges in achieving maximum utilization, efficiency, and availability with ever-growing demands. Microsoft Hyper-V and NetApp MetroCluster address this demand by delivering a simple, low-cost, highly available, and efficient solution, which can be scaled as required, and increase the availability of the business critical systems and applications.

Blog & Tutorials