There is a new book that shall be interesting to read for VMware admins that want to learn more about DevOps and some step-by-steps for deployments and managing applications at scale with Docker containers and Google Kubernetes. DevOps for VMware Administrators is the first book focused on using DevOps tools and practices with VMware technologies. […]
How to use Chocolatey to install PowerCLI module and connect to your vCenter Server
In the past, I have published some really useful blog posts for ESXi CLI commands. You were absolutely delighted to find some of those in the past, and going. Those posts are the pillars that I’m building on. So today’s post try to add some more ESXi, vCenter CLI commands to the list of the […]
5 Easy Steps to be more resilient with Two Hosts only – StarWind VSAN
In small environments usually with an “All-in-one” server or with Remote Office Branch Office (ROBO) locations, the question of resiliency often comes. What if my server loses a hard drive (SSD drive) or a whole RAID card? What if my CPU burns or what if my Power Supply Unit (PSU) dies? Anything can happen. Even […]
Windows Server 2025 Azure Arc Taskbar Icon
Windows Server 2025 (currently called vNEXT by Microsoft) latest eval build 26010.1000 (Windows Server vNext LTSC Preview – Build 26010 English) has a new icon in the taskbar. After installing it as a VM in my lab, I noticed a new taskbar icon Azure Arc. This post will detail a bit more about it. If you’re wondering […]
How to Make Veeam Backup and Replication 12.1 More Secure
Veeam Backup and Replication is a powerful solution for data protection and disaster recovery. It allows you to backup, replicate, and restore your virtual, physical, and cloud workloads with ease and efficiency. However, like any other software, it also requires proper security measures to prevent unauthorized access, data loss, or corruption. In this blog post, […]
Nakivo Backup and Replication 10.11 Beta release adding more features and improvements
Nakivo Backup and Replication is a powerful and reliable solution for protecting your virtual, physical, cloud, and SaaS environments. With Nakivo Backup and Replication, you can perform backup, replication, recovery, and disaster recovery for VMware, Hyper-V, Nutanix AHV, Amazon EC2, Microsoft 365, Oracle Database, and file shares. Nakivo Backup and Replication 10.11 is the latest […]
Why You Should Use Runecast Platform for Agentless OS Scanning of Your VMware vSphere VMs
Runecast Platform is a security and operations platform for VMware, cloud, and containerized infrastructures. It helps you to identify, manage, and remediate vulnerabilities and misconfigurations in your environment, as well as to ensure compliance with various standards and best practices. One of the features of Runecast Platform is the ability to perform agent-less scanning of vSphere […]
How StarWind VSAN solution can save you money and energy in ROBO environments
Remote Office/Branch Office (ROBO) environments are becoming more common as businesses expand their operations across different locations. However, managing IT infrastructure in ROBO environments can be challenging, especially when it comes to storage. Traditional storage solutions, such as physical shared storage or SAN, can be expensive, complex, and inefficient for ROBO scenarios. They require dedicated […]
Veeam 12.1 Four-Eyes Authorization – prevent accidental deletion of backups and other operations with two different persons only
Veeam 12.1 Four-Eyes is a configuration where by using a new control mechanism, you’ll be able to approve certain operations in Veeam Backup and Replication, but only with the help of another Veeam admin. In other words, for example, you want to delete some backups. With this feature activated, you’ll need another admin who will […]
What is Inline Entropy Analysis in Veeam Backup and Replication 12.1
Veeam Backup and Replication 12.1 introduced an interesting feature. This feature is called Encryption Detection and it is an Inline entropy analysis that uses Artificial Intelligence and Machine learning (AI/ML) to detect previously unencrypted data which becomes encrypted within the processed disk images. This shows that you possibly starting to be a victim of a […]
- « Previous Page
- 1
- …
- 4
- 5
- 6
- 7
- 8
- …
- 150
- Next Page »