2,500 Results for:VM

  • Sort by: 

Tintri Cloud Connector writes VM backups to AWS, IBM

By Garry Kranz 17 Aug 2017

Tintri Enterprise Cloud enhances VMstore snapshots to cloud and expands predictive analytics for compute and storage. Cloud Connector treats the cloud as a tertiary repository. Read More

Using Azure Site Recovery for data and VM replication

By Kurt Marko 31 Jan 2017

Data replication is a critical part of a disaster recovery plan, and the devil is in the details. Ease your plan with automation through Azure Site Recovery. Read More

How to create snapshots for Azure VMs and managed disks

By Stuart Burns 26 Feb 2021

Learn best practices for creating VM snapshots in Microsoft Azure. Follow along with these step-by-step examples to try in your Azure environment. Read More

Easily transfer VMs to the cloud with Microsoft Azure Migrate

By Robert Sheldon 09 Jun 2021

It takes time to plan, assess and set up a VM migration. Microsoft's Azure Migrate gives you a central dashboard to efficiently get your VMware and Hyper-V VMs into the cloud. Read More

Change boot settings from a VM BIOS

By Brien Posey 22 Oct 2015

Often overlooked, a VM's BIOS is more limited than a physical machine's BIOS, but will allow you to adjust boot settings. Read More

Podcast: What are snapshots? Can they replace backup?

By Antony Adshead 13 Feb 2024

We talk to Shawn Meyers, field CTO at Tintri, who defines snapshots, why they are no substitute for backups, and the effect on recovery of snapshot granularity Read More

Top five issues in VM backup

By Chris Evans 09 Jan 2015

Virtual machine backup is a vital task for IT departments. But pitfalls abound. We look at the top five issues encountered in VM backup Read More

HUS VM SAN array platform

By Aditya Gune 10 Aug 2015

The Hitachi Unified Storage VM is a storage array designed for enterprise SAN environments requiring high storage capacities. Read More

Cloud account hijacking: How it works and how to prevent it

By Ed Moyle 25 Mar 2024

The ability to identify the various methods of cloud account hijacking is key to prevention. Explore three ways to limit potential consequences of cloud credential compromise. Read More