Search

Educational Episodes: Hyperconverged Infrastructure (HCI)

Featured blog posts

Trending topics you shouldn't miss

All blog posts

Every post, every insight, all in one place
View:
Vladan Seget
  • Vladan Seget
  • July 22, 2021

Quick tips for shares and file migrations with share and NTFS permissions

File servers and hosted shares on Microsoft Windows have shares and permissions not necessarily known to everybody in the environment. With cybersecurity in mind, you’ll sooner or later have to share and/or migrate files, folders, and user profiles. There is no one solution, but you can consider several to keep in mind when it comes to migration.
Read more
Romain Serre
  • Romain Serre
  • July 20, 2021

Use Azure Policy to Allow Only Certain Resource Types in Resource Groups

Managing and ensuring the compliance of departments in your tenant is important to cybersecurity and smooth workflow. This is especially relevant for medium and large deployments. Combining Azure resources into groups and using Role-Based Access Management (RBAC) will reduce threats and increase work efficacy. Azure Policy can help enhance those processes further.
Read more
Didier Van Hoye
  • Didier Van Hoye
  • July 15, 2021

SMB over QUIC Testing Guide – Part II

In Part 1 we focused on overall information on SMB over QUIC and how to make the necessary preparations for all to function well. Today, we’ll focus on the technicalities. It will be somewhat a tedious process but we’ve laid out everything in minute detail, so you don’t have to break your neck trying to figure it all out 😉
Read more
Didier Van Hoye
  • Didier Van Hoye
  • July 13, 2021

SMB over QUIC Testing Guide – Part I

Previously, we discussed how Windows Server 2022 is continuing to push the QUIC networking transport protocol on top of UDP. In this article, we’ll focus on SMB storage protocol over QUIC, how it prevents server spoofing, how it’s integrated into the client and the server, how to prepare for its work, and other related topics.
Read more
Florent Appointaire
  • Florent Appointaire
  • July 8, 2021

Kubectl with Azure CLI

Microsoft has recently added a new feature, which is the possibility to issue Kubernetes command-line interface (CLI) commands directly from Azure CLI. This is a serious step forward in the direction of further simplification of Azure workload and routine, which can be appreciated by Azure Kubernetes Services (AKS).
Read more
Alex Samoylenko
  • Alex Samoylenko
  • July 6, 2021

Brand new VMware Customer Connect instead of the old My VMware: What’s Changed?

VMware Customer Connect is definitely better than its predecessor, My VMware. The new Customer Connect portal is powered by a novel AI and machine learning for elevated user experience. It also allows you to manage user assets, licenses, teams and user rights, monitor infrastructure health, create support tickets and do a host of other things within a sleek new design.
Read more
Didier Van Hoye
  • Didier Van Hoye
  • June 30, 2021

QUIC, HURRY UP!

Windows Server 2022 will see various novelties. Among others, it will push its QUIC, TLS 1.3, HTTP/3, and SMB 3.1.1 protocols as new standards. QUIC, specifically, is presented as an alternative to TCP and is often dubbed “TCP/2.” But are these protocols worth being standardized? And what are the challenges?
Read more
Benoit Voirin
  • Benoit Voirin
  • June 24, 2021

How to Increase Security in Remote Work Conditions Using Mobile Device Management

Having unmanaged remote endpoints, overall, and in remote work specifically, can lead to unauthorized data access, data leakage, or even worse security compromise cases. Mobile Device Management solutions will allow you to tailor security policies, push security policies, settings and software on your employee remote-access devices, and identify potential vulnerabilities.
Read more
Karim Buzdar
  • Karim Buzdar
  • June 22, 2021

How to Setup Multi-Factor Authentication for SSH in Linux

Cybersecurity threats increase by the day, especially, with the widespread adoption of remote work. To reduce compromise odds, you can add multi-factor authentication to any applications that require logging in. Adding a token-based security layer, for example, to your Linux SSH will boost your chances against threats via the network.
Read more