Browsing Posts in Highlights

Reading Time: 3 minutesThe 140 series of Federal Information Processing Standards (FIPS) are U.S. government computer security standards that specify requirements for cryptography modules. The National Institute of Standards and Technology (NIST) issues the 140 Publication Series to coordinate the requirements and standards for cryptographic modules which include both hardware and software components for use by departments and agencies of the United States federal government. The requirements cover not only the cryptographic modules themselves but also their documentation and (at the highest security level) some aspects of the comments contained in the source code.

Reading Time: 4 minutesRecently, during VMworld US 2018, VMware has celebrated the 20 years of the company. But there is another virtualization project that has a lot of history like VMware: the Xen Project and this October marks our 15th anniversary. On October 2003, Ian Pratt (founder of the Xen Project) announces the first stable release of the Xen virtual machine monitor for x86, and port of Linux 2.4.22 as a guest OS. It was one of the most popular open source hypervisors and amasses more than 10 million users; but now there is a clear rise of KVM and also […]

Reading Time: 5 minutesMost people probably already know the terms Converged infrastructures (CI) and HyperConverged Infrastructures (HCI) that are both become quite common in the IT world, with several products and solutions that aim to be fit in those classifications. HCI has become a hot topic with several vendors that aim to be a leader in this area, or with several “magic quadrants” that try to define who is in. But like happens with the Software Defined Something (especially the Software Defined Software) it’s not always easy to determine what really can fit in a classification and what not. […]

Reading Time: 11 minutesThis is an article realized for StarWind blog and focused on the pro and cons of using GUI or CLI, with the example of VMware environment. See also the original post. In several cases, a user can choose to use the CLI or GUI, in other cases, for example for some specific tasks, maybe it’s possible to use only one type of interface. Also note that there are other types of interfaces like the API, but in this case, we cannot really consider a user interface. And sometimes the boundary it’s not so clear and easy to be defined, […]

Reading Time: 3 minutesIncrease a virtual machine disk size it’s so easy, on almost all hypervisor: just click and increase the space on the virtual disk. But it’s just one part of the game, the second part it does the same inside the virtual machine, and maybe it’s not so easy or fast increase the partition and the filesystem inside the related guest OS. For Windows OSes, starting with 2008 (Windows Server 2008 and Vista) it’s quite easy and totally manageable from the GUI (with the Disk Manager MMC). For Linux, it could be easy with LVM, but […]

Reading Time: 17 minutesThis is an article realized for StarWind blog and focused on the design and implementation of a stretched cluster. A stretched cluster, sometimes called metro-cluster, is a deployment model in which two or more host servers are part of the same logical cluster but are located in separate geographical locations, usually two sites. In order to be in the same cluster, the shared storage must be reachable in both sites. Stretched cluster, usually, are used and provided high availability (HA) and load balancing features and capabilities and build active-active sites.

Reading Time: 12 minutesThis is the last part of a set of posts realized for StarWind blog and focused on the design and implementation of a ROBO infrastructure. See also the original post. Design a ROBO infrastructure. Part 5: Data protection solutions Business continuity aspects In previous posts we have already discuss about several business continuity aspects in ROBO scenarios. For example, a reasonable availability level could be between 99% and 99,99%, but there are some workloads that may require higher level (or other that are not critical at all). But availability could be achieved by a good infrastructure design and […]

© 2025-2011 vInfrastructure Blog | Disclaimer & Copyright