Cloud Computing
4 min read
7

Cloud Security Standards in eNlight Cloud Services

August 31, 2015
0

Summary: Examining cloud computing security standards, guidelines and features in eNlight Cloud Services. 1) How does eNlight Cloud comply with regulations and legal requirements? A monthly audit is carried out to ensure that eNlight complies with all necessary regulations and legal requirements, as well as to ensure that ESDS is

Continue Reading
Tutorials
2 min read
6

Enabling WMI on Windows Machine for adding in eMagic

July 27, 2015
0

Summary: Before we head towards how to enable WMI on your Windows machine for adding in eMagic, we will take a look at what exactly WMI is and use of WMI (Windows Management Instrumentation). Presentation: WMI is a technology that is built into all the latest operating systems of Windows

Continue Reading
Data Center Services
3 min read
9

Network Management with eMagic

July 10, 2015
0

Presentation: The data center management solutions (DCIM) lounge is increasingly successful for several years now and a network management system (NMS) is an important element of it. With eMagic DCIM system, IT professionals can easily monitor the individual component within a larger network management framework. Basically, eMagic provides a full

Continue Reading
Virtualization Techniques
2 min read
34

The Best Ways to Utilize Smart Paging in Hyper-V

June 26, 2015
0

Intro Previously we saw tutorial about Dynamic Memory in Hyper-V. Today, we will see Smart Paging in Hyper-V. We strongly advise you to consult this tutorial before coming to it in order to better understand it. We will now see what exactly Smart Paging is and its contribution in this

Continue Reading
Virtualization Techniques
4 min read
14

Hyper-V Dynamic Memory Best Practices

June 23, 2015
0

  Introduction: Hyper-V version 3 with Windows Server 2012 has a new feature which dynamically allocates memory (RAM) on a Windows virtual machine. What is that? And is it a complicated process? It is simple; it adds memory to a VM as needed up to a limit defined in the

Continue Reading