Cloud forensics involves exploring issues a company and its forensic examiner may face when suffering a breach of company information in the cloud. What issues will they face, and, if needed, how can they collect information from the cloud?
Learn how Hyper-V Replicas make it possible to copy Hyper-V virtual machines across a LAN or WAN even if you don't have a failover cluster or shared storage between the virtual machines.
Explore how to secure your data by using public key infrastructure (PKI).
Learn how to set up Amazon Relational Database Service (Amazon RDS) and use it as a drop-in replacement for traditional Database Management Systems (DBMS), with all the cost, scaling, and agility advantages of deploying software in the cloud.
Understand Cisco FabricPath find out why routing at Layer 2 can be an acceptable description of Cisco FabricPath.
With Microsoft SQL Server 2016, you can distribute your data to the cloud using the Stretch Database feature to improve local access.
Examine the different types of cloud computing and learn what cloud computing has to offer you as either a consumer or producer.
Examine addressing classifications for IPV6 in detail and outline their functions within the context of the protocol.
This whitepaper outlines some of the important fundamentals of Microsoft SQL Server 2008 that every DBA should know.
Sphere 5.5 is now available with myriad small improvements such as a faster Web Client, LACP, Autoscale, and higher configuration maximums, and my goal is to point out the few changes that might apply in your company or organization.