Who Owns Your Data, Really?

I’ll forgive you if you think my asking who owns your data is a rhetorical question. I’m quite sure that an esteemed reader such as yourself has asserted your company’s ownership of data in any cloud or hosted contract you’ve entered. It is not my intent to disparage your abilities in any way. It is my intent, however, to point out hidden…

How to Rank Your Apps and Processes According to the Fire Alarm Scale

There you stand, figuratively speaking, with a fistful of sticky labels all bearing the words “mission critical.” Now, what to affix them to? Which applications and processes are truly mission critical and which are not? Ha! That’s a trick question, right?! Yeah, actually it is.
“There are many stories where a failure in an unimportant system…

How to Reduce Your Mission Critical Footprint

Abstract labels are useful in conversation but no so much in practice. Take the mission critical label, for example. In abstract, mission critical applications means the applications your business absolutely could not function without. In practice, you’ve already argued in business case after business case that every application you spent the…

Combining High-Availability and BCA Best Practices

There are no simple answers to everything in life.

A tool that might work great for one task might be a poor fit for another task. A hammer, for instance, is perfect for building a shelf, yet not so useful when trying to fix a computer. (Unless your definition of “fix” has deteriorated to “utterly destroy” at that point.)

Virtualization and High-Performance Computing

Virtualization has a strong appeal for high-availability computing, given the capabilities to scale and mirror resources on virtual machines with relative ease.

But in the realm of high-performance computing (HPC), virtualization has had a slower rate of adoption for HPC tasks.

Building a Public Cloud for Business Continuity

Cloud computing has been eyed for some time as a solution for business continuity needs, as the thought of setting up new virtual servers on an automated, on-demand basis seems highly appealing.

But when it comes to figuring out the kind of cloud offerings that will work best for business continuity, typically private cloud options are usually the…

Next RWW Live Chat Tuesday 11/1 @ 10am PT & Chance to Win an iPad

Mark your calendars for the next ReadWriteWeb live chat on November 1st! The first two live chats here on the ReadWriteWeb Solution Series have focused on The Changing Nature of Storage Virtualization and Virtualized Storage and High Availability Made Easy.

This chat’s topic is Intelligence Matters: Virtualize your Business Critical Workloads…

Using High Availability in VMware

Things, as we know, fail. No matter how well you’ve set up the hardware or the software, something’s going to break in your infrastructure. That’s what you get for living in an entropic universe.

The best thing you can do is be as ready as you can for when that universe throws you a curve ball. In IT, that means a proper disaster recovery and…

Moving Beyond Disaster Recovery with Business Continuity Appliances

At first glance, disaster recovery and business continuity may sound like the same thing. In a sense, they are, because their real difference is a matter of scale.

Disasters are just that: disasters. Full-blown events that pick up your company and drop it on the ground like it was a toy (sometimes, quite literally). But business continuity is…

Disaster Recovery and the Cloud: Best Practices

Now that the notion of cloud computing has gained some stature in the IT community, a lot of vendors are looking at cloud computing as a disaster recovery solution.

After all, if you can provision a cloud to take over for your IT operations after a disaster strikes, there are a lot of benefits. You can have the cloud systems properly configured…

Basic Disaster Recovery Practices

While you may or may not take stock in the effects of global warming, one thing has been made abundantly clear in recent years: when nature strikes, practically nothing can withstand it. The best thing to do, of course, is prepare for the worst. As unsavory as that might sound, it’s critical to get a plan together before the worst does…

How to Secure a VMware Environment

Whether you are operating a virtual datacenter or a full-blown private cloud, you will need to ensure the security of your VMware systems just as you would your physical servers.

Virtual server security has the same rules of the road as any other type of IT security: protect the machine, reduce access, patch often: there’s nothing new here. But…

How SMBs Can Best Use VMware

You might think that using VMware in a small- to medium-sized business (SMB) might be a bit of overkill, since it’s usually enterprises that can get the most out of virtualization tools.

But SMBs can get just as much benefit from virtualization, if not more, because the savings on the SMB’s IT bottom line could be a great percentage than that of a…

Comparing Desktop VMs In The Cloud

Many companies still need, or prefer having, traditional Windows or other desktop OS environments for their employees. For example, they may need to run applications that are not available as Web apps or using SaaS services. But you may prefer not to provision and administer the hardware.

A growing number of companies are offering entire…

Boingo Expands HotSpot Options For Mobile Devices

If you need to access WiFi hotspots or other WiFi services, you know by now that they are plentiful. And while many of them are free, many are fee-based. Rather than paying for each hotspot, consider an aggregator. Hotspot aggregators like can help reduce these costs, by charging a single fee for access to tens of thousands of national and global…

Tablets Become IT Admin New Mobility Tool

Enterprise IT may or may not be doing its best to stifle the end user adoption of iPads and other tablets in the workplace and on the road. Security, synching, and file format compatibility — and a second dose of security — are all legitimate IT concerns. Meanwhile, tablets devices can have a useful role to play within IT proper. Let’s take a…

Geminare Offers Real-Time Cloud Failover

Replicating your company’s data off-site in real time or close to it is important — reconstructing munged or lost data is a headache at best, and that’s assuming you can do it. But protecting the data and keeping it available isn’t that useful if you don’t have systems to run it on, as anybody whose desktop crashes at two in the morning knows…

Ask the Experts About Virtualized Storage and Win an iPad 2

On October 18, ReadWriteWeb will be hosting a live chat with experts on virtualized storage from VMware and Symantec. To kick-off the chat, “Virtualized Storage and High Availability Made Easy,” we’d like to get some great questions ahead of time – and if you submit the best question, you could win an iPad 2!

The chat will be moderated by…