Browsing Posts in Highlights

Reading Time: 2 minutesMore than ten years ago I wrote a post on Why Dynamic Disks are a bad choice… but they are still used too much without know the impact. Microsoft Windows Dynamic Disks (or Dynamic Volumes) are an abstraction layer (introduced in Windows 2000) over the partitions (similar to the LVM layer on Linux environment) to decoupled the volumes (with their NTFS data) from the disk partitions and have a greater flexibility, like hot-extend a volume by simple add new partitions (but also several other advantages). It’s something really old and obsolete… you can hot-extend a […]

Reading Time: 4 minutesNot all the different CPUs are the same: they may have a different Instruction Set Architecture (ISA). An Instruction Set Architecture (ISA) is part of the abstract model of a computer that defines how the CPU is controlled by the software. The ISA acts as an interface between the hardware and the software, specifying both what the processor is capable of doing as well as how it gets done. The ISA provides the only way through which a user is able to interact with the hardware. It can be viewed as a programmer’s manual because […]

Reading Time: 4 minutesEvolution of the security landscape The digital security landscape has changed faster in the last years and more in the last months with the COVID-19 pandemic. People are working more and more from home with smart working, but not all companies are prepared to secure those access and their digital workspace. The consequence is that there are more attack and threads the are focused on people instead of corporate services or infrastructures. But also, the rising of the cloud services model makes the attack easier and more effective… You can buy them as a service… […]

Reading Time: 4 minutesOne important concept of virtual networking is that the virtual network adapter (vNIC) speed it’s just a “soft” limit used to provide a common model comparable with the physical world. The real limit depends by several aspects, included the hpyervisor, the CPU speed, the available RAM and (for external comunication) also by the physical NIC speed. For this reason, the Intel e1000 and e1000e vNIC can reach a real bandwidth bigger than the canonical 1 Gpbs link speed. But what about the vmxnet3 vNIC that can advertise also the 10 Gpbs link speed. What is […]

Reading Time: 9 minutesAmong the recent trends and buzzwords, one of the latest concepts is the idea of composable infrastructures. But, the question is what does it really stand for: just another fancy word (because the cloud has been used far too often), HCI 2.0, Blade 2.0, or something more? In a recent article for the StarWind blog, I’m going to take a closer look at composable infrastructures to understand why they are such a hot topic. Read the rest of the article on StarWind blog site: https://www.starwindsoftware.com/blog/what-are-composable-infrastructures

Reading Time: 3 minutesThe VMware vExpert is an award is given to individuals who have significantly contributed to the community of VMware users over the past year. Basically the VMware vExpert program is VMware’s global evangelism and advocacy program. The program is designed to put VMware’s marketing resources towards your advocacy efforts. The awards are for individuals, not companies, and last for one year. Employees of both customers and partners can receive the awards.

Reading Time: 3 minutesThe 140 series of Federal Information Processing Standards (FIPS) are U.S. government computer security standards that specify requirements for cryptography modules. The National Institute of Standards and Technology (NIST) issues the 140 Publication Series to coordinate the requirements and standards for cryptographic modules which include both hardware and software components for use by departments and agencies of the United States federal government. The requirements cover not only the cryptographic modules themselves but also their documentation and (at the highest security level) some aspects of the comments contained in the source code.

© 2025-2011 vInfrastructure Blog | Disclaimer & Copyright