Search

Educational Episodes: Hyperconverged Infrastructure (HCI)

Featured blog posts

Trending topics you shouldn't miss

All blog posts

Every post, every insight, all in one place
View:
Romain Serre
  • Romain Serre
  • January 27, 2022

Restore M365 Data from Dell Druva

Previously, we discussed how to backup Microsoft 365 using Druva, a backup software as a service from Dell that leverages Amazon cloud. While Druva proves a bit fussy in terms of configuration and backup, it is rather simple when it comes to data restore, regardless of whether it’s OneDrive, Teams, Sharepoint, or whatever you want to restore.
Read more
Vladan Seget
  • Vladan Seget
  • January 26, 2022

Securing VMware ESXi Hosts

You can’t be too close to comfort whenever cybersecurity is involved. Despite ESXi being pretty secure even after out-of-the-box installation, its security can be tightened more. Certain common, baseline hardware elements can be added and several tweaks to ESXi security itself will make all the difference you didn’t know they could.
Read more
Brandon Lee
  • Brandon Lee
  • January 25, 2022

Kubernetes persistent vs ephemeral storage volumes and their uses

Businesses continue on their journey of moving from monolithic applications to cloud-native micro-services. Kubernetes becomes more common, allowing you to orchestrate and manage containers in an intelligent, easily scalable, and highly available manner. But how does storage work exactly when it comes to containers?
Read more
Romain Serre
  • Romain Serre
  • January 20, 2022

Backup M365 with Dell Druva

Dell Druva is among the newer players when it comes to data management as a service. Essentially, Dell Druva is a backup SaaS for other SaaS, such as Microsoft 365, Google Workspace, and Amazon Web Services. Apart from a great GUI and useful features, what’s great is that Druva stores data in AWS, not in Azure.
Read more
Florent Appointaire
  • Florent Appointaire
  • January 19, 2022

Get Azure Key vault values from AKS

Keeping a secret is hard not only for humans but for computer systems, too. When it comes to security, keys, and secrets, there’s a myriad of threats that can target them. Microsoft has recently released a feature that allows getting secrets from Azure Kubernetes Service (AKS) into an Azure Key Vault by simply using a driver.
Read more
Brandon Lee
  • Brandon Lee
  • January 18, 2022

Group Policy vs. Microsoft Intune Configuration Profiles and how to migrate

Remote work isn’t going anywhere. With that in mind, the legacy means of provisioning services and enforcing policies and governance for end-users often fall short of standard in terms of remote workforce. Microsoft Intune Configuration Profiles attempts to provide an alternative for ensuring compliance when it comes to a hybrid work environment.
Read more
Alex Williams
  • Alex Williams
  • January 13, 2022

BI Dashboard Best Practices

It is impossible to stay aware of the latest trends and guide your business to the future without collecting and analyzing data. However, it’s not easy to cherry-pick important things from massive information blocks. Luckily, these days you can leave long and tedious reports in the past and move straight to the point with BI Dashboards.
Read more
Vladan Seget
  • Vladan Seget
  • January 11, 2022

How to secure a small VMware environment

When implementing virtualization into your IT environment, you need first to take care of the security of your virtual and physical infrastructure. In the VMware vSphere environment, the vCenter server appliance (VCSA) is a key management element, so should be as secure as possible.
Read more
Alex Samoylenko
  • Alex Samoylenko
  • January 6, 2022

VMware vSphere 7 Security Configuration Guide: 15 Things to Know About

VMware vSphere is one of the most widespread VMware products. No wonder the company takes its security issues seriously. Another update of VMware vSphere 7 Security Configuration Guide will explain how to make your vSphere environment even more protected.
Read more