ABOUT THE AUTHOR:Mike Laverick is a professional
instructor with 15 years of experience with technologies such as Novell, Windows and Citrix, and
has been involved with the VMware community since 2003. Laverick is a VMware forum moderator and
member of the London VMware User Group Steering Committee. In addition to teaching, Laverick is the
owner and author of the virtualisation website and blog RTFM Education, where he publishes free guides and utilities aimed at VMware
ESX/VirtualCenter users. In 2009, Laverick received the VMware vExpert award and helped found the
Irish and Scottish user groups. Laverick has had books published on VMware Virtual Infrastructure
3, VMware vSphere 4 and VMware Site Recovery Manager.
Register now to receive ComputerWeekly.com IT-related news, guides and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
In this Ask the Expert from the Catalyst conference in San Diego, Gartner Analyst Mario de Boer talks about secure enterprise mobile collaboration, including why MDM and AV aren't effective security measures.
Crafting a specific, clearly defined cloud contract with your provider is crucial to staving off security problems and SLA breaches. In this tweet jam recap, participants shared tips on how to best communicate needs to cloud providers.
Bigger, more diverse networks mean a larger attack surface for hackers. Today's networking pros must update security strategies to account for new vulnerabilities and respond to inevitable attacks. But first, they need a clear view into their network.
With sales sagging, legacy hardware suppliers are scurrying to form partnerships with a new generation of converged infrastructure vendors. But will these newly minted converged systems convince IT to open up the purse strings?