Browsing Posts in General

Reading Time: 7 minutesTo implement some encryption solutions (like VM encryption, backup encryption, storage encryption) you need to manage symmetric keys in a secure way. Key management has always been solved with proprietary solutions. Each vendor have offered in the past their own key management server/client combination, but as the complexity of datacenters increased, this designed has shown its limits. If you have multiple components, all in need of security keys, why you would need to run multiple key management solutions? But in order to have a common solution, you first would need a protocol to let all […]

Reading Time: 2 minutesSome years ago, I’ve published a post about the Hyperconverged infrastructure market share (2018)… but what about now? How HCI has grow? HCI has become a hot topic with several vendors that aim to be a leader in this area, or with several “magic quadrants” that try to define who is in.

Reading Time: 2 minutesMore than ten years ago I wrote a post on Why Dynamic Disks are a bad choice… but they are still used too much without know the impact. Microsoft Windows Dynamic Disks (or Dynamic Volumes) are an abstraction layer (introduced in Windows 2000) over the partitions (similar to the LVM layer on Linux environment) to decoupled the volumes (with their NTFS data) from the disk partitions and have a greater flexibility, like hot-extend a volume by simple add new partitions (but also several other advantages). It’s something really old and obsolete… you can hot-extend a […]

Reading Time: < 1 minuteAlso this year Runecast will manage its own event focused this time on security aspects. SecOps 360 Day will be a virtual event bringing together senior security specialists and managers to improve collaboration between IT and security teams – on June 22, 2023.

Reading Time: 4 minutesNot all the different CPUs are the same: they may have a different Instruction Set Architecture (ISA). An Instruction Set Architecture (ISA) is part of the abstract model of a computer that defines how the CPU is controlled by the software. The ISA acts as an interface between the hardware and the software, specifying both what the processor is capable of doing as well as how it gets done. The ISA provides the only way through which a user is able to interact with the hardware. It can be viewed as a programmer’s manual because […]

Reading Time: 2 minutesVeeamON 2023 will start next week in Miami May 22-25. There are two different way to attend it: in person and online. The online way is totally free but is limited to:

Reading Time: < 1 minuteVeeamON Update 2022 is only one day away! It’s time to block your calendar and attend our must‑see, virtual event to get updates on products, talk to our solution experts and level up your skills. It’s a jam‑packed agenda you won’t want to miss on Nov. 3.

© 2025-2011 vInfrastructure Blog | Disclaimer & Copyright