All posts by Michelle Bentley

How Azure Blueprints Implement Governance

Share this post:

Just like that, out of nowhere, a neon green Camaro cut Kara off forcing a mash of the brake pedal and a slight jerk. Their vehicles didn’t collide and there were a solid 3 inches of clearance between their bumpers in the sea of brake lights. Such a close call would alarm most people, or at least get some adrenaline pumping, but Kara had bigger fish to fry.

Continue reading How Azure Blueprints Implement Governance

Does my IT certification expire and how do I recertify?  

Share this post:

The life cycle of a certification 

Your certification proves your knowledge of a skill or product. To stay competitive in your career and prove your expertise, it’s important that you keep your certifications up to date.  

Earning a certification is no small feat. After putting in the hours to study and practice for your exam, it’s important to know how long the value of that certification will last for you and what you’ll need to do to maintain it. Here, we’ll review when and how to renew some of the most popular IT certifications 

Why does my IT certification expire?  

Continue reading Does my IT certification expire and how do I recertify?  

Maximizing Virtualization Requires Minimizing Vulnerabilities

Share this post:

Virtualization has proven to be one of the most transformative technologies of recent years, offering significant improvements to efficiency as well as cost savings and a high return on investment within the data center environment. However, for all of the benefits of virtualization, there are still risks, and unfortunately, many businesses underestimate the security risks of virtualization, or believe that they can use the same security tactics in a virtualized environment as they do in others.

That isn’t necessarily the case. While virtualization is inherently more secure in some ways, it also has a few vulnerabilities that must be addressed. Various industry groups have investigated the vulnerabilities and identified a rather extensive list, but the following are some of the biggest priorities when it comes to security.

Continue reading Maximizing Virtualization Requires Minimizing Vulnerabilities