Browsing Posts published in 2018

Reading Time: 4 minutesRedfish is the new standard, promoted by Distributed Management Task Force (DMTF), for secure and scalable server management automation. With Redfish, the challenges of expanded scale, higher security, and multi-vendor openness are managed, while also enabling automation with modern DevOps tools and processes. Historically, in Dell(EMC) servers the out-of-band management function is implemented by the integrated Dell Remote Access Controller (iDRAC) with Lifecycle Controller component, embedded in every PowerEdge server (with different version, starting from the express to the different enterprise). For modular servers there is also another component called Chassis Management Controller (CMC) that provide […]

Reading Time: 4 minutesRedfish is an open industry standard specification, API and schema developed by DMTF (SPMF) group that specifies RESTful interface and utilizes JSON and OData. Redfish has been designed to deliver simple and secure management for converged, hybrid IT and the Software Defined Data Center (SDDC). Created in September 2014 with the first standard and specification in 2015, now there are 16 member companies. Promoters of this standard are: Broadcom, Dell, Emerson, Hewlett-Packard, Intel, Lenovo, Microsoft, Supermicro, and VMware.

Reading Time: 3 minutesDataWorks Summit (formelly Hadoop Summit) is the industry’s premier big data community event with both an European and US edition, organized annualy by Hortonworks Inc, an independent company, formed in June 2011 and funded by $23 million venture capital from Yahoo! and Benchmark Capital. The last European event was in Munich, during April 4-6, with over 1,400 attendees. This will be probably much bigger.

Reading Time: 3 minutesMany people probably remember Violin Memory and it’s products, probably one of the first in the All Flash Array (AFA) field. Founded in 2005 as Violin Technologies by Donpaul Stephens and Jon Bennett. I’ve talk about them several times (see for example this 2012 post: Powering the cloud report – Violin Memory), because they got interesting technologies. But when they enter in the stock exchange, the journey wasn’t lucky enough: On December 14, 2016 Violin Memory filed for Chapter 11 Federal Bankruptcy protection.

Reading Time: 2 minutesOra che il problema di Meltdown and Spectre è stato quasi del tutto sistemato, compare una nuova criticità su molti processori Intel. Quattro ricercatori di altrettante università, la College of William and Mary, la Carnegie Mellon University, la UC Riverside e la Binghamton University, hanno individuato una nuova possibile falla dei processori, chiamata BranchScope. Come per le vulnerabilità precedenti rientra nella categoria “speculative execution” e la feature di “branch prediction” (Branch prediction units) dei moderni processori, un sistema predittivo per anticipare le possibile operazioni da effettuare al fine di risponderne più velocemente.

Reading Time: 2 minutesOne year ago, VMware has started the bifurcation of VMware Tools for Legacy and Current Guests using of two separate delivery vehicles: VMware Tools 10.1 is available for OEM-supported guest OSs only VMware Tools 10.0.12 was for the guests OS that have fallen out of support by their respective vendors are offered “frozen”. VMware Tools 10.2 branch is the new evolution of 10.1 versions, and now it’s arrived at version 10.2.5! This version is only for supported OSes, VMware Tools ISO images are frozen for some end of life guest operating systems.

Reading Time: 2 minutesVMware has acquired the technology and team of E8 Security. With this acquisition, VMware is further reinforcing its commitment to deliver the industry’s first intelligence-driven digital workspace to empower the employee experience and drive predictive security. Adding E8 Security’s capabilities to VMware’s digital workspace platform, VMware Workspace ONE, will enable customers to get a single platform approach that simplifies management and security by correlating data to accurately detect and respond to advanced threats using analytics.

© 2025-2011 vInfrastructure Blog | Disclaimer & Copyright