Browsing Posts in Highlights

Reading Time: 3 minutesMinimum viability refers to the set of essential resources and capabilities (combination of critical applications, assets, processes, and people) an organization needs to maintain critical operations and fulfill its core mission after a disruption like a cyberattack or disaster. It’s about identifying what’s absolutely necessary to get back up and running quickly and efficiently, rather than trying to restore everything at once. The rise of cyberattacks is forcing organizations to rethink their recovery strategies. While detecting threats remains critical, a more significant challenge has emerged: making sure protected data is clean and available to bring a […]

Reading Time: 5 minutesCybersecurity is a focal point of enterprises and governments globally. The longstanding approach of protecting critical data via firewalls or using segregated/dedicated networks is no longer sufficient! This also includes Fibre Channel (FC) SAN where security was historically considered intrinsic in the SAN, due to the usage of fiber cables and dedicated (and isolated) fabrics.

Reading Time: 2 minutesMost of the client and server now don’t have anymore the DVD/CD reader and in order to install an OS (or an hypervisor) you may need a bootable USB device. Note: for some server models you can use the out of band management interface (iDRAC for Dell, ILO for HPE, EMM for Lenovo, …). But how is possible build a bootable USB device starting from the ISO file?

Reading Time: 5 minutesSystem virtualization remain the foundation of several datacenter infrastructures, although somebody thinkgs that virtualization is not cool anymore. For the on-prem deployment VMware (by Broadcom) vSphere is still the main solution with a large adoption (over 60% according with several analyst), but after Broadcom acquisition and all the changes in the licensing model and licensing price, some customers are looking for some alternatives.

Reading Time: 2 minutesSometimes you need to verify your security products to be sure that they are working properly and they are able to recognize malware patterns. For example, to just verify that Malware detection methods in Veeam Backup & Replication 12 are working as expected!

Reading Time: 4 minutesIPv4 (Internet Protocol version 4) is a widely used protocol for network communication and is a core component of the TCP/IP stack. But it has some limits, one is the limit in terms of available addresses, expecially if we are talking about public IP. IPv6 (Internet Protocol version 6) was design to resolve all the limitation of IPv4. IPv6 is designated by the Internet Engineering Task Force (IETF) as the successor to IPv4 providing the following benefits:

Reading Time: 3 minutesCentOS Linux was a freely available, community-supported Linux distribution that was developed, distributed, and maintained by the CentOS Project community contributors. It was derived based from Red Hat Enterprise Linux sources and released in alignment with the Red Hat Enterprise Linux production release cycle. For this reason was a great alternative to Red Hat Enterprise Linux. Note that CentOS Linux is not a Red Hat product and does not have Red Hat support. But in 2020, The CentOS Project, in coordination with Red Hat, announced that it would shift full investment to CentOS Stream, the upstream […]

© 2025-2011 vInfrastructure Blog | Disclaimer & Copyright