Search

Educational Episodes: Hyperconverged Infrastructure (HCI)

Featured blog posts

Trending topics you shouldn't miss

All blog posts

Every post, every insight, all in one place
View:
Nicolas Prigent
  • Nicolas Prigent
  • July 26, 2022

Introduction to Azure Bicep

Azure Bicep is a declarative Infrastructure-as-Code language for deploying Azure resources. There are various ways to deploy them, via Azure Portal, ARM Template, Azure CLI, Azure PowerShell, Terraform, and other means. However, unlike Azure Resource Manager Templates, Bicep is very intuitive and understandable even for non-programmers.
Read more
Volodymyr Khrystenko
  • Volodymyr Khrystenko
  • July 20, 2022

StarWind SAN & NAS over Fibre Channel: MDRAID vs GRAID

The new build of StarWind SAN & NAS is already here! Installed on top of a dedicated storage node full of NVMe drives, it now can be accessed over FC (Fibre Channel). The best way to see how fast it can go is to test its performance using two different RAID5 arrays, such as MDRAID and GRAID.
Read more
Brandon Lee
  • Brandon Lee
  • July 14, 2022

Windows 11 22H2 new features

Windows 11 22H2 is a major update package that Microsoft recently published for its latest operating system. The long-anticipated release does not disappoint. There are many new features and upgrades that are introduced to make the performance, operation, and user experience with the OS better than with the initial release.
Read more
Vladan Seget
  • Vladan Seget
  • July 12, 2022

How to use Microsoft Deployment Toolkit to deploy Windows 11 within your organization

Microsoft Deployment Toolkit (MDT) is one of the tools you can use to install the vendor’s operating systems, including Windows Server, Windows 10 and 11. You will be able to personalize the deployment configuration and then carry it out over your business’ network. Once you’ve worked on the desired setup, the rest is straightforward.
Read more
Romain Serre
  • Romain Serre
  • July 7, 2022

Detect Shadow IT with Microsoft Defender for Cloud Apps

Microsoft Defender for Cloud Apps collects information from Firewall log inputs or traffic redirected from Microsoft Defender for Endpoint. As a result, it can help you identify users, accessing your systems, who are using applications that are not included in your compliance. That way, you can detect such shadow IT activity and prevent breaches.
Read more
Nicolas Prigent
  • Nicolas Prigent
  • July 5, 2022

Serverless platform with Azure Container Apps

Azure Kubernetes Service (AKS) is constantly expanding. It might seem overwhelming to a beginner or redundant to a pro, but Azure Container Apps, actually, introduces simplicity. If you want to test out applications or are not skilled in AKS, the new service allows you to deploy containerized apps without complex infrastructure.
Read more
Benoit Voirin
  • Benoit Voirin
  • June 30, 2022

How to secure data in the cloud?

The topic of cybersecurity can be overloaded, especially when it comes to cloud. That’s why, when things get too loud, it’s good to return to the basics. Knowing the most common threats to cloud storage and the established strategies to deal with them will make a good foundation for building your own data security.
Read more
Vladan Seget
  • Vladan Seget
  • June 28, 2022

How to use Cockpit to Manage Linux Server with Ease

Cockpit graphical user interface (GUI) provides all the basic configs for Linux server management without the need for text-based commands. Working in an enterprise, for an admin, will most likely mean working in a heterogeneous IT environment. Frequently, Windows services will be primary, so managing a Linux server can be a bit of a drag for someone who’s not too well-versed in it.
Read more
Romain Serre
  • Romain Serre
  • June 23, 2022

Restrict some Activities in Office Online by using Microsoft Defender for Cloud Apps

Remote work is continuing to penetrate the fabric of the regular workflow ever more. Microsoft Defender for Cloud Apps is a Cloud Access Security Broker (CASB) that functions as a gatekeeper between your users and cloud resources they have access to. Among others, it allows to tap into Shador IT and app use to prevent malicious behavior.
Read more