Robert Sheldon Technical consultant and writer Search Storage 6 features your multi-cloud management tools should have 22 Aug 2018 Search Cloud Computing Incorporate virtual private clouds in a hybrid IT environment 21 Aug 2018 Search Data Center Datrium open converged infrastructure makes HCI flexible 16 Aug 2018 Search Virtual Desktop How desktop and app virtualization vendors handle mobile devices 09 Aug 2018 Search ITOperations Should you virtualize an edge computing server? 08 Aug 2018 Search Mobile Computing How middleware platforms can benefit mobile apps 08 Aug 2018 Search Enterprise Desktop 7 features for managing Windows 10 updates and upgrades 02 Aug 2018 Search Storage Storage networking technologies explained 31 Jul 2018 Search Storage Storage class memory advances could be a game-changer 30 Jul 2018 Search Storage 5D data storage and the future of optical technology 30 Jul 2018 Search Storage Why object storage is becoming an alternative to RAID 26 Jul 2018 Search Cloud Computing Serverless infrastructure demands new roles for IT admins 26 Jul 2018 Search Data Management A quick tutorial on SQL Server maintenance plans 16 Jul 2018 Search Oracle The future of SPARC/Solaris is cloudy -- in multiple ways 16 Jul 2018 Search Data Center Craft a converged secondary storage strategy with care 12 Jul 2018 Search Enterprise Desktop How can IT turn off Windows 10 automatic updates? 11 Jul 2018 Search Data Center How to ensure hyper-converged infrastructure security 10 Jul 2018 Search Virtual Desktop Can IT add digital watermarks to its virtual desktops? 06 Jul 2018 Search Oracle How Oracle DBA responsibilities change with Autonomous Database 02 Jul 2018 Search Mobile Computing How to avoid wasting time in a mobile app development project 26 Jun 2018 Search Virtual Desktop Put application virtualization products under the microscope 25 Jun 2018 Search Virtual Desktop How to select the right VDI hypervisor 19 Jun 2018 Search Storage Four common SSD form factors and where they work best 18 Jun 2018 Search Enterprise Desktop Discover three key exploit protection features in Windows 10 12 Jun 2018 Search Virtual Desktop How should IT evaluate application virtualization products? 07 Jun 2018 Search Enterprise Desktop How do the Windows 10 servicing channels work? 07 Jun 2018 Search Cloud Computing Hybrid cloud adoption trends and strategies explained 05 Jun 2018 Search Storage MAMR hard drives could shake up the storage industry 04 Jun 2018 Search Mobile Computing Explore options for automatic device enrollment 17 May 2018 Search Data Center Which Windows Server deployment features work best with HCI? 11 May 2018 Search Storage AFA storage tackles big data analytics challenges 30 Apr 2018 Search Data Center Use Windows Server deployment for feature-filled HCI 27 Apr 2018 Search Enterprise Desktop Manage Windows 10 desktops, mobile devices with EMM software 25 Apr 2018 Search Storage SSDs vs. HDDs: When is all-flash storage overkill? 19 Apr 2018 Search Storage Four situations where a multi-cloud strategy makes sense 12 Apr 2018 Search Virtual Desktop Survey the desktop and application virtualization market 10 Apr 2018 Search Data Center How software-defined networking layers work with HCI 09 Apr 2018 Search Virtual Desktop How does user location affect VDI capacity planning? 22 Mar 2018 Search Oracle Seven to-do items for managing an Oracle cloud migration 15 Mar 2018 Search Virtual Desktop Compare top desktop and application virtualization products 14 Mar 2018 Search Storage How to mitigate SSD vulnerabilities 13 Mar 2018 Search Enterprise Desktop How to take advantage of SCCM and Intune co-management 06 Mar 2018 Search Data Center Windows Server 2016 hyper-converged options are here 28 Feb 2018 Search Mobile Computing Explore the pros and cons of identity federation management 23 Feb 2018 Search Data Center Virtualization layer is HCI's secret sauce 21 Feb 2018 Search Virtual Desktop The key features in an app, desktop virtualization product 16 Feb 2018 Search Virtual Desktop What are the differences between TCP and UDP? 15 Feb 2018 Search Mobile Computing Five steps to effective usability testing for mobile apps 14 Feb 2018 Search Virtual Desktop Why deploy desktop and application virtualization? 13 Feb 2018 Search Virtual Desktop How desktop virtualization vendors are improving management 06 Feb 2018 Search Virtual Desktop Four root cause analysis benefits VDI shops should know 25 Jan 2018 Search Storage Key factors that affect NAND flash memory endurance 23 Jan 2018 Search Oracle Oracle Blockchain Cloud Service: What it is and what it does 22 Jan 2018 Search Enterprise Desktop Ten Windows 10 Fall Creators Update features to know 17 Jan 2018 Search Data Center How Red Hat assembled an open source hyper-converged platform 16 Jan 2018 Search Mobile Computing Pros and cons of a multi-factor authentication mobile app 15 Jan 2018 Search Mobile Computing What are the advantages of rapid application development? 05 Jan 2018 Search Mobile Computing Explore the top vendors who offer enterprise mobile devices 04 Jan 2018 Search Mobile Computing A mobile app security checklist for developers 27 Dec 2017 Search Data Management How SQL Server containers in Docker can ease database deployment 21 Dec 2017 Search Storage Software-defined data center architecture basics for beginners 19 Dec 2017 Search Mobile Computing Enterprise mobile devices and how the leaders stack up 12 Dec 2017 Search Storage NAND flash memory basics: Comparing SLC, MLC and TLC NAND 20 Nov 2017 Search Storage Solid-state drive performance metrics go beyond latency, IOPS 01 Nov 2017 Search Mobile Computing The business case for mobile app development platforms 31 Aug 2017 Search Storage Compare XtremIO vs. Unity all-flash storage system for VDI 15 Aug 2017 Search Enterprise Desktop 12 Windows 10 GPO settings IT must know 13 Jul 2017 Search Enterprise Desktop How can you access Windows 10 advanced repair options? 14 Jun 2017 Search Oracle MySQL Community Server vs. Oracle MySQL databases 14 Jun 2017 Search Data Center Reference architecture vs. converged infrastructure: Know the difference 13 Jun 2017 Search Mobile Computing Evaluate the three EMM security options: MDM, MAM and MIM 31 Mar 2017 Search Enterprise Desktop How to use WMI and the CIM standard with Windows PowerShell 06 Oct 2016 Search Oracle Oracle in the cloud holds possibilities for users 06 Jul 2016 Search Mobile Computing Eight factors when choosing mobile application development tools 31 May 2016 Search Virtual Desktop How Citrix USB redirection supports stylus peripherals 10 Mar 2016 Search Mobile Computing An introduction to mobile application design 12 Feb 2016 Search Mobile Computing Understanding HTML5 mobile application development 26 Jan 2016 Search Virtual Desktop How VMware App Volumes works 21 Jan 2016 Search Virtual Desktop What's the difference between a VM clone and a template? 22 Sep 2015 Search Enterprise Desktop What to expect from Macs in the enterprise 11 Jun 2015 Search Enterprise Desktop How do I build Apportals in Windows 8.1? 20 May 2015 Search Virtual Desktop Comparing three options for VDI endpoints 13 Apr 2015 Search Mobile Computing Rooted Android device risks include network access, data theft 25 Sep 2014 Search Mobile Computing Google Glass at Work could make some jobs easier 12 Aug 2014 Search Enterprise Desktop Office Telemetry reports on Office 2013 docs and apps 21 Jul 2014 Search Enterprise Desktop Windows 9 features may address unified apps and the cloud 16 Jul 2014 Search Enterprise Desktop How to perform a Windows XP upgrade to Windows 8.1 17 Jun 2014 Search Mobile Computing Five alternatives to Microsoft for mobile office applications 12 May 2014 Search Mobile Computing App delivery techniques: Virtualization and Web-based apps 12 Feb 2014 Search Enterprise Desktop Using Active Directory activation and other new Office 2013 tools 31 May 2013 Search Mobile Computing How iPhone encryption and data protection work 11 Feb 2013 1 2 3 4 5 6 7 8