Browsing Posts in Highlights

Reading Time: 3 minutesAfter cloning VMs that are running “recent” version of Ubuntu as Guest Operating System (OS) from VM template or a parent VM, the new VMs acquire the same DHCP IP addresses from the DHCP server, no matter if guest customization is applied or not… also if the two VMs have different MAC addressess. And doesn’t matter the type of hypervisor that you are using… but, of course, VMware has documented this issue in this article: Cloned VM acquires the same DHCP IP address towards guest customization process (KB 82229).

Reading Time: 2 minutesGreenfield and brownfield are terms usually used in factory planning and facilities engineering to describe two different approaches to developing or expanding manufacturing facilities. But they are also used in IT to define different deployment scenarios.

Reading Time: 7 minutesTo implement some encryption solutions (like VM encryption, backup encryption, storage encryption) you need to manage symmetric keys in a secure way. Key management has always been solved with proprietary solutions. Each vendor have offered in the past their own key management server/client combination, but as the complexity of datacenters increased, this designed has shown its limits. If you have multiple components, all in need of security keys, why you would need to run multiple key management solutions? But in order to have a common solution, you first would need a protocol to let all […]

Reading Time: 2 minutesSome years ago, I’ve published a post about the Hyperconverged infrastructure market share (2018)… but what about now? How HCI has grow? HCI has become a hot topic with several vendors that aim to be a leader in this area, or with several “magic quadrants” that try to define who is in.

Reading Time: 2 minutesMore than ten years ago I wrote a post on Why Dynamic Disks are a bad choice… but they are still used too much without know the impact. Microsoft Windows Dynamic Disks (or Dynamic Volumes) are an abstraction layer (introduced in Windows 2000) over the partitions (similar to the LVM layer on Linux environment) to decoupled the volumes (with their NTFS data) from the disk partitions and have a greater flexibility, like hot-extend a volume by simple add new partitions (but also several other advantages). It’s something really old and obsolete… you can hot-extend a […]

Reading Time: 4 minutesNot all the different CPUs are the same: they may have a different Instruction Set Architecture (ISA). An Instruction Set Architecture (ISA) is part of the abstract model of a computer that defines how the CPU is controlled by the software. The ISA acts as an interface between the hardware and the software, specifying both what the processor is capable of doing as well as how it gets done. The ISA provides the only way through which a user is able to interact with the hardware. It can be viewed as a programmer’s manual because […]

Reading Time: 4 minutesEvolution of the security landscape The digital security landscape has changed faster in the last years and more in the last months with the COVID-19 pandemic. People are working more and more from home with smart working, but not all companies are prepared to secure those access and their digital workspace. The consequence is that there are more attack and threads the are focused on people instead of corporate services or infrastructures. But also, the rising of the cloud services model makes the attack easier and more effective… You can buy them as a service… […]

© 2025-2011 vInfrastructure Blog | Disclaimer & Copyright