15 Sep 2016 | Rebecca Fitzhugh
VMware’s vRealize and NSX: Better Together

VMware vRealize Automation allows for unified cloud management by automating personalized infrastructure delivery. VMware NSX is a component of the software-defined data center (SDDC) that provides a network virtualization platform. NSX abstracts security and networking functionality and embeds it into the hypervisor rather than handling it in the hardware.

Read the full story »
23 Sep 2016 | Johnny Bass | CCNP, Certification, Cisco, Data Center
CCNP Data Center Question of the Week: Cisco IMC

If you select Shared LOM NIC mode in the Cisco IMC Configuration Utility, which ports can access the Cisco IMC?

continue
21 Sep 2016 | James Michael Stewart | Certification, CompTIA, Security+
Security+ Question of the Week: LDAP Port

LDAP is based on x.500 standard naming conventions, is an Internet standard and uses which of the following ports?

continue
14 Sep 2016 | James Michael Stewart | Certification, CompTIA, Security+
Security+ Question of the Week: Data Processed by an Application

Managing data security and preventing data loss is a high priority in today’s business world. Which of the following terms refers to an application actively processed data?

continue
13 Sep 2016 | Rebecca Fitzhugh | Conference, VMware
VMworld 2016: Top Announcements

Some saw this coming, others were surprised, but VMware did not announce any new vSphere, Horizon, vRealize, or NSX releases at VMworld 2016 in Las Vegas last week. The general sessions focused more on the direction of the company rather than specific product lines.

continue
9 Sep 2016 | Johnny Bass | CCNP, Certification, Cisco, Data Center
CCNP Data Center Question of the Week: Upgrading a Cisco UCS C-Series Server

Which tool would you use when upgrading a Cisco UCS C-Series server?

continue
7 Sep 2016 | James Michael Stewart | Certification, CompTIA, Security+
Security+ Question of the Week: Missing Storage Devices

Your organization has a policy which prohibits USB storage devices from entering or leaving the building. However, they are authorized for use within the internal environment. Everyone entering the building is subject to package inspection, container x‐ray and metal detectors. USB storage devices are checked out to users in library fashion when needed and are returned at the end of each day. The librarian properly keeps strict records for each device and verifies that every device is returned before the end of each day. After a long weekend, the librarian discovers that most of the storage devices are now missing. What could have prevented this?

continue