In small environments usually with an “All-in-one” server or with Remote Office Branch Office (ROBO) locations, the question of resiliency often comes. What if my server loses a hard drive (SSD drive) or a whole RAID card? What if my CPU burns or what if my Power Supply Unit (PSU) dies? Anything can happen. Even […]
Windows Server 2025 Azure Arc Taskbar Icon
Windows Server 2025 (currently called vNEXT by Microsoft) latest eval build 26010.1000 (Windows Server vNext LTSC Preview – Build 26010 English) has a new icon in the taskbar. After installing it as a VM in my lab, I noticed a new taskbar icon Azure Arc. This post will detail a bit more about it. If you’re wondering […]
Malware Fighter Pro from IObit software uses Two Anti-Virus Engines – Did you know?
In this quick post, I wanted to give it a try to the IObit Malware Fighter software. I have to warn you a bit here, because when I have installed the Free version, it also installs two other software without my consent. (not very nice indeed). It also installs iTop VPN and iTop Screen Recorder. […]
How to Make Veeam Backup and Replication 12.1 More Secure
Veeam Backup and Replication is a powerful solution for data protection and disaster recovery. It allows you to backup, replicate, and restore your virtual, physical, and cloud workloads with ease and efficiency. However, like any other software, it also requires proper security measures to prevent unauthorized access, data loss, or corruption. In this blog post, […]
Nakivo Backup and Replication 10.11 Beta release adding more features and improvements
Nakivo Backup and Replication is a powerful and reliable solution for protecting your virtual, physical, cloud, and SaaS environments. With Nakivo Backup and Replication, you can perform backup, replication, recovery, and disaster recovery for VMware, Hyper-V, Nutanix AHV, Amazon EC2, Microsoft 365, Oracle Database, and file shares. Nakivo Backup and Replication 10.11 is the latest […]
Why You Should Use Runecast Platform for Agentless OS Scanning of Your VMware vSphere VMs
Runecast Platform is a security and operations platform for VMware, cloud, and containerized infrastructures. It helps you to identify, manage, and remediate vulnerabilities and misconfigurations in your environment, as well as to ensure compliance with various standards and best practices. One of the features of Runecast Platform is the ability to perform agent-less scanning of vSphere […]
End of one Era – no more VMware perpetual licenses
This was quite expected even if I did not expect this to happen that fast. VMware by Broadcom has announced a Simplification of VMware licensing. There will be two primary offers only (VMware Cloud Foundation and VMware vSphere Foundation). Both are available as subscriptions only. Perpetual licenses are no longer available for purchase. This was […]
How StarWind VSAN solution can save you money and energy in ROBO environments
Remote Office/Branch Office (ROBO) environments are becoming more common as businesses expand their operations across different locations. However, managing IT infrastructure in ROBO environments can be challenging, especially when it comes to storage. Traditional storage solutions, such as physical shared storage or SAN, can be expensive, complex, and inefficient for ROBO scenarios. They require dedicated […]
Veeam 12.1 Four-Eyes Authorization – prevent accidental deletion of backups and other operations with two different persons only
Veeam 12.1 Four-Eyes is a configuration where by using a new control mechanism, you’ll be able to approve certain operations in Veeam Backup and Replication, but only with the help of another Veeam admin. In other words, for example, you want to delete some backups. With this feature activated, you’ll need another admin who will […]
What is Inline Entropy Analysis in Veeam Backup and Replication 12.1
Veeam Backup and Replication 12.1 introduced an interesting feature. This feature is called Encryption Detection and it is an Inline entropy analysis that uses Artificial Intelligence and Machine learning (AI/ML) to detect previously unencrypted data which becomes encrypted within the processed disk images. This shows that you possibly starting to be a victim of a […]
- « Previous Page
- 1
- …
- 7
- 8
- 9
- 10
- 11
- …
- 304
- Next Page »