fbpx
 

Category: IT Asset Management

Microsoft Software Assurance and Microsoft

There is little that can be discussed about Microsoft software licensing without mentioning Software Assurance. And, of course, this applies to virtualization rights. In citing two of the examples above, we now explore Microsoft continues to evolve Software Assurance. In order to permit the primary user of a licensed instance of Windows Desktop to access that instance remotely – such as a from a kiosk, a rented device, or a personal device (i.e., tablets, smartphones) – the device must be […]

Microsoft Windows Server Virtualization

Infrastructure grows and its mission evolves. To accommodate increasing workloads, faster, denser (i.e., more cores) processors are deployed, translating into additional investment in software. When Windows Server 2008R2 was released, Microsoft introduced new virtualization rights: – For Standard Edition, one (1) physical operating system environment (“OSE”) and one (1) virtual OSE. This is known as the “1+1” rule. – For Enterprise Edition, one (1) physical OSE and up to four (4) virtual OSEs. This is known as the “1+4” rule. […]

Desktop virtualization and licensing

Software management, hardware imaging and refreshment, and BYOD (the “edge devices”) are not only cost containment strategies, they can be key business differentiators. By ensuring anytime, anywhere access, executives, account managers, and technicians are able to remain connected to the information they require. This connectivity introduces a multitude of devices that must be managed, utilized, and, in some cases, transported. And that introduces the problem of multiple versions. Licensing all these different devices introduces excess cost. Desktop virtualization eases these […]

Who should track Oracle licensing changes?

Who is responsible for tracking Oracle licensing? Whose job is it to notify organizations about these changes? Eliot Arlo Colon, President of Miro Consulting, discusses the tracking of Oracle license changes.

Using Oracle Database Firewall

We’re all familiar with network firewalls, which prevent unauthorized access to your network from external sources. However, network firewalls don’t protect your databases from malicious attacks, which sometimes come disguised as privileged internal users. Web applications are a major source of data attacks, through stratagems such as SQL Injection, for example. Oracle’s Database Firewall (a product Oracle gained through its acquisition of Secerno, a British firm, in 2010) offers a solid defensive perimeter to monitor and enforce accepted behavior on […]

Data Loss Prevention

Data Loss Prevention (DLP) is something companies are devoting considerable attention to in recent years, and for good reason. DLP refers to efforts to keep confidential information from being leaked or stolen. Whether an employee sends secret documents and data to a rival or an employee accidentally exposes social security numbers on the wide open internet it’s all considered a failure of a company’s DLP efforts. DLP seeks to protect various types of data, including data relating to regulatory compliance, […]

In Archive