Browsing Posts published in Giugno, 2024

Reading Time: 9 minutesVMware by Broadcom has just released vSphere 8.0 Update 3 (8.0.3). Note that ESXi 8.0 Update 3 release is an Initial Availability (IA) (and went in GA on on 07/26/2024). The vCenter Server 8.0 Update 3 release instead is a General Availability (GA). For more information on the vSphere 8.0 IA/GA Release Model of vSphere Update releases, see The vSphere 8 Release Model Evolves. Before planning any type of update, remember to check the entire hardware and software compatibility and, at least, could be safe wait for ESXi in GA. And don’t forget backup programs, actually […]

Reading Time: 3 minutesCentOS Linux was a freely available, community-supported Linux distribution that was developed, distributed, and maintained by the CentOS Project community contributors. It was derived based from Red Hat Enterprise Linux sources and released in alignment with the Red Hat Enterprise Linux production release cycle. For this reason was a great alternative to Red Hat Enterprise Linux. Note that CentOS Linux is not a Red Hat product and does not have Red Hat support. But in 2020, The CentOS Project, in coordination with Red Hat, announced that it would shift full investment to CentOS Stream, the upstream […]

Reading Time: 6 minutesMolte soluzioni di storage on-prem, di cloud storage e soluzioni di backup promettono sempre di più una sorta di immutabilità dei dati. Naturalmente, l’immutabilità è una funzionalità chiave importante, ma non implica automaticamente che la soluzione sia sicura (o che sia automaticamente più sicura). Può dare un falso senso di sicurezza se non implementato correttamente. In caso di configurazione errata, è possibile eliminare dati apparentemente immutabili, ad esempio manipolando le impostazioni di data/ora sul dispositivo di archiviazione per aggirare i meccanismi di applicazione della conservazione.

Reading Time: 2 minutesDiffent products are implementing a security model called “four-eyes principle“, also know as the two-person rule or also multi-user authorization (MUA). In the backup and data protection are, for example, Veeam Backup & Replication (starting with v12) has the Four-Eyes Authorization feature to protect some crucial operations. But what is the four-eyes (4-eyes) principle and how does it work? First to all is nothing related to software or security but instead a way to minimize the human errors and can be appliable also to non IT activities.

Reading Time: < 1 minuteDuring the last HPE Partner Summit (at HPE Discover 2024), HPE announced of a new KVM-based hypervisor capability for GreenLake private cloud. The new KVM hypervisor virtualization capability is being previewed at HPE Discover this week and will be available as a beta program, with the release scheduled as part of HPE Private Cloud Business Edition in the second half of 2024.

Reading Time: 2 minutesPure//Accelerate is the annual big event from Pure Storage, one of the first all flash storage company. Pure//Accelerate 2024 is planned on June 18-21, 2024 | Resorts World Las Vegas. The event will kick off with our opening reception on June 18. Additional events include the Pure//Partner Forum on June 18 and pre-conference training sessions on June 17-18.

Reading Time: 2 minutesStorMagic ha da poco annunciato una soluzione specific di HCI (hyperconverged infrastructure) chiamata SvHCI, che unisce un hypervisor e il networking virtuale alla tecnologia di storage virtuale utilizzata da migliaia di clienti in tutto il mondo. Tale soluzione HCI full stack è stata sviluppata appositamente per gli ambienti edge e per le PMI e include l’assistenza fornita direttamente da StorMagic 24/7/365..

© 2025-2011 vInfrastructure Blog | Disclaimer & Copyright