Browsing Posts in Highlights

Reading Time: 4 minutesEach big vendor has some kind of “community award” for individuals who have significantly contributed to the community of the specific vendor. Note that each award is usually annually and related to users contributions over the past 12 months and must be reconfirmed with a candidate submission (almost similar to the submission for new candidates). Those kinds of “technologies experts” could be book authors, bloggers (in most cases), leaders in some communities, tool builders, and other IT professionals who share their knowledge and passion with others. These people have gone above and beyond their day […]

Reading Time: 2 minutesMost of the client and server now don’t have anymore the DVD/CD reader and in order to install an OS (or an hypervisor) you may need a bootable USB device. Note: for some server models you can use the out of band management interface (iDRAC for Dell, ILO for HPE, EMM for Lenovo, …). But how is possible build a bootable USB device starting from the ISO file?

Reading Time: 5 minutesSystem virtualization remain the foundation of several datacenter infrastructures, although somebody thinkgs that virtualization is not cool anymore. For the on-prem deployment VMware (by Broadcom) vSphere is still the main solution with a large adoption (over 60% according with several analyst), but after Broadcom acquisition and all the changes in the licensing model and licensing price, some customers are looking for some alternatives.

Reading Time: 4 minutesIPv4 (Internet Protocol version 4) is a widely used protocol for network communication and is a core component of the TCP/IP stack. But it has some limits, one is the limit in terms of available addresses, expecially if we are talking about public IP. IPv6 (Internet Protocol version 6) was design to resolve all the limitation of IPv4. IPv6 is designated by the Internet Engineering Task Force (IETF) as the successor to IPv4 providing the following benefits:

Reading Time: 3 minutesCentOS Linux was a freely available, community-supported Linux distribution that was developed, distributed, and maintained by the CentOS Project community contributors. It was derived based from Red Hat Enterprise Linux sources and released in alignment with the Red Hat Enterprise Linux production release cycle. For this reason was a great alternative to Red Hat Enterprise Linux. Note that CentOS Linux is not a Red Hat product and does not have Red Hat support. But in 2020, The CentOS Project, in coordination with Red Hat, announced that it would shift full investment to CentOS Stream, the upstream […]

Reading Time: 5 minutesLot of storage, cloud and backup solutions are promising some kind of data immutability. Of course, immutability is an important key capability, but it does not imply automatically that your solution is secure (or more secure). It can give a false sense of security if not implemented properly. When misconfigured, it is possible to delete supposedly immutable data, for example, by manipulating time/date settings on the storage device to bypass retention enforcement mechanisms.

Reading Time: 2 minutesDiffent products are implementing a security model called “four-eyes principle” (also know as the two-person rule). In the backup and data protection are, for example, Veeam Backup & Replication (starting with v12) has the Four-Eyes Authorization feature to protect some crucial operations. But what is the four-eyes (4-eyes) principle and how does it work? First to all is nothing related to software or security but instead a way to minimize the human errors and can be appliable also to non IT activities.

© 2025-2011 vInfrastructure Blog | Disclaimer & Copyright