Is a DevOps strategy a prerequisite for IT transformation?

Earlier this week I was fortunate enough to speak on a panel at AIM Infotec on the topic of IT transformation. My role on the
5 reasons why Azure Site Recovery is the best place to start your migration to Azure

For larger companies, the hardest part about looking at using Azure is picking a good place to start. Conventional wisdom has been to start with
Linux on Azure not only isn’t an after-thought, it’s a first-class citizen

Microsoft isn’t joking when they say they love Linux. If you’ve been in technology for a while then this whole new open Microsoft that’s progressive
Azure Site Recovery for VMware disaster recovery just got a lot easier (and cheaper)

Azure Site Recovery (ASR) is an extremely powerful disaster recovery (DR) service that’s built into Microsoft Azure. Unlike Azure Backup, which is very inexpensive and
FAQ: Achieving compliance with newly released Azure disk encryption for Windows and Linux

Early this year, we wrote about encryption-at-rest as part of our security series. Traditionally, encryption-at-rest, or disk encryption as we’ll refer to it going forward,
Cloud API’s aren’t just for developers, IT ops and security may see the greatest gains

IDG (parent company to media brands such as CIO, CSO, Network World, and more) recently released their 2015 Cloud Computing Study in which they survey
Red Hat on Azure: A Case Study for Cloud Transformation
On the heels of the recent announcement of Red Hat Linux becoming available on Azure, I feel like it’s the perfect time to share our
Highly secure, highly available virtual machines on Azure
Microsoft’s Azure public cloud offers hyper-scale infrastructure and availability around the globe; a feat that’s difficult for even large enterprises to achieve. One of the
3 tips for making your multi-cloud approach wildly successful

As I speak with customers and partners, it’s striking how many of them are no longer making the choice between infrastructure in their own datacenter’s
What to think about when considering data-at-rest encryption

In our previous post in our security best-practices series we addressed data-in-flight encryption, what it means, and offered some tips for implementing it in your environment.