Part 3 of my series on setting up a SharePoint 2016 development farm on Azure. In this article, we will create a SQL Server 2014 virtual machine (sqlVM) in the virtual network we created in Part 2 of this series. We will make sqlVM a member of the Windows Server AD domain, and prepare it for SharePoint.
Cloud Computing
Setting up a SharePoint 2016 dev farm in Azure – Part 2: Domain Controller
Part 2 of my series on setting up a SharePoint 2016 development or test farm on Azure using Azure PowerShell. This article focuses on the domain controller virtual machine deployment and configuration. It includes lots of details that are re-used in the subsequent parts.
Setting up a SharePoint 2016 dev farm in Azure – Part 1: Introduction
In this multi-part “tutorial”, we build a single-server SharePoint Server 2016 farm inside a subnet of a Microsoft Azure virtual network. The purpose of this server will be for development and testing and as a basis for demonstrating what’s possible in SharePoint 2016. This is the introduction article.
The Case Against Cloud Computing: Under-Represented Cons
Cloud computing has become one of the most talked-about subjects in the world of corporate IT. However, in spite of the hype, there’s also a strong case against cloud-based services, particularly in certain situations. This article takes a look at the more problematic side of cloud computing while comparing it directly to its on-premises alternatives.
Securing Your Amazon EC2 Instance
Many individuals and organizations implement virtual machines and dedicated servers using Amazon Elastic Cloud Compute (EC2). Like any other host on the Internet, your Amazon EC2 instances can be vulnerable to attack if you don’t take special precautions. In this article, I explain some of the most important things you should do to secure your Amazon EC2 instance.
How to Keep Your Data Safe in the Cloud
Recent events have demonstrated just how insecure cloud storage can be. But there are steps you can take to keep yourself and your data safe. This post takes a look at several steps users can take to protect their most sensitive images and documents.