Search

Educational Episodes: Hyperconverged Infrastructure (HCI)

Featured blog posts

Trending topics you shouldn't miss

All blog posts

Every post, every insight, all in one place
View:
Brandon Lee
  • Brandon Lee
  • October 25, 2022

Enhanced phishing protection in Windows 11 22H2

Microsoft Defender SmartScreen provides a host of new cybersecurity features in Windows 11 22H2, including better protection against phishing. Enterprises often overlook the threat of phishing, which is unfortunate because it’s a matter of human error, i.e. users lacking cybersecurity awareness. Windows 11 now helps tackle that.
Read more
Vladan Seget
  • Vladan Seget
  • October 20, 2022

How to Test and Run Amazon AWS Applications Locally Without Connecting to a Remote Cloud Provider

LocalStack is a free cloud service emulator that you can deploy locally. It runs in a single container and, emulating Amazon Web Services (AWS), allows you to test applications or play around with workflow without having to commit to paying for actual cloud services. It’s a great solution for cloud-based testing and learning.
Read more
Didier Van Hoye
  • Didier Van Hoye
  • October 18, 2022

Mutual TLS (mTLS) or client certificate authentication with an Azure Application Gateway and an App Service application

Mutual Transport Layer Security (mTLS) in Azure Application Gateway and Application Servers / Web App is a mandatory modern security layer. It allows the server and the client to mutually identify each other’s identity and credibility to enhance cybersecurity. But what it is exactly, what does it do and how does it help your IT security?
Read more
Romain Serre
  • Romain Serre
  • October 13, 2022

Enable and use Temporary Access Pass in Azure AD

Temporary Access Pass (TAP) can be used to register another authentication method during new-user onboarding or to recover a lost or forgotten stronger authentication method. TAP is a time-limited passcode, issued by admins, that satisfies strong authentication requirements. You can use a TAP password for new users who can then register their passwordless authentication method.
Read more
Vladan Seget
  • Vladan Seget
  • October 11, 2022

VMware Virtual Hardware 20 details in vSphere 8

vSphere 8 brings an abundance of cool new features. Among them, VMware Virtual Hardware Version 20 is even more efficient: newer CPU cores support, more VM count, ESXi instance on Smart NICs, higher VM density, up to 8 vGPU devices support, aware migration, NUMA nodes exposed in vSphere Client, and many many more!
Read more
Alex Samoylenko
  • Alex Samoylenko
  • October 6, 2022

VMware Aria Instead of vRealize: What is It?

Unlike the previous years’ events, the VMware Explore 2022 was marked with the announcements of numerous novel projects, including the rebranding of previous ones. One of those is VMware Aria, formerly known as vRealize Cloud Management, which works both for the cloud and on-premises.
Read more
Brandon Lee
  • Brandon Lee
  • October 4, 2022

Windows Server 2022 Container Improvements

Containers and containerized applications are becoming more and more popular by the day, which is why they are part of the latest Windows Server operating system release. Moreover, Microsoft has also included several modifications designed to improve customer experience working with containerized apps.
Read more
Nicolas Prigent
  • Nicolas Prigent
  • September 29, 2022

Using Adaptive Cards in Microsoft Teams

Microsoft Adaptive Cards are a platform-agnostic method of sharing and displaying information that cloud apps can openly exchange. In essence, this occurs as snippets of a chosen UI being generated by the user in JSON format. This file can then be delivered to another app where it’ll adaptively transform the data into a native UI that adapts to its surroundings.
Read more
Florent Appointaire
  • Florent Appointaire
  • September 27, 2022

Copy an Azure Image from a subscription to another

Having only the desired users access necessary services in Azure Production Subscription is vital to the security and smoothness of your IT environment operation. You can have your people working on new projects in a sandbox subscription. When you’re ready to transfer such projects to production, a set of easy steps will help you do that.
Read more