Browsing Posts in Evidenza

Reading Time: 3 minutesMinimum viability refers to the set of essential resources and capabilities (combination of critical applications, assets, processes, and people) an organization needs to maintain critical operations and fulfill its core mission after a disruption like a cyberattack or disaster. It’s about identifying what’s absolutely necessary to get back up and running quickly and efficiently, rather than trying to restore everything at once. The rise of cyberattacks is forcing organizations to rethink their recovery strategies. While detecting threats remains critical, a more significant challenge has emerged: making sure protected data is clean and available to bring a […]

Reading Time: 5 minutesCybersecurity is a focal point of enterprises and governments globally. The longstanding approach of protecting critical data via firewalls or using segregated/dedicated networks is no longer sufficient! This also includes Fibre Channel (FC) SAN where security was historically considered intrinsic in the SAN, due to the usage of fiber cables and dedicated (and isolated) fabrics.

Reading Time: 2 minutesMost of the client and server now don’t have anymore the DVD/CD reader and in order to install an OS (or an hypervisor) you may need a bootable USB device. Note: for some server models you can use the out of band management interface (iDRAC for Dell, ILO for HPE, EMM for Lenovo, …). But how is possible build a bootable USB device starting from the ISO file?

Reading Time: 5 minutesLa virtualizzazione di sistema (e nello specifico la virtualizzazione dei server) rimane fondamentale per numerose infrastrutture di data center, anche se qualcuno pensa che la virtualization non è più così importane, o persino che possa essere una commodity. Nelle soluzioni on-premise, VMware (by Broadcom) rimane ancora la soluzione principale con un’ampia adozione (oltre il 60% degli utenti utilizza VMware vSphere, secondo diversi analisti), ma dopo l’acquisizione di Broadcom e tutti i cambiamenti nel modello e nel prezzo di licenza, alcuni clienti stanno valutando qualche alternativa.

Reading Time: 2 minutesSometimes you need to verify your security products to be sure that they are working properly and they are able to recognize malware patterns. For example, to just verify that Malware detection methods in Veeam Backup & Replication 12 are working as expected!

Reading Time: 4 minutesIPv4 (Internet Protocol version 4) is a widely used protocol for network communication and is a core component of the TCP/IP stack. But it has some limits, one is the limit in terms of available addresses, expecially if we are talking about public IP. IPv6 (Internet Protocol version 6) was design to resolve all the limitation of IPv4. IPv6 is designated by the Internet Engineering Task Force (IETF) as the successor to IPv4 providing the following benefits:

Reading Time: 7 minutesA meno che venerdì scorso non eravate in vacanza in modalità completamente off-line (beati voi), di sicuro saprete del venerdì nero (informaticamente parlando) che ha letteralmente paralizzato molti servizi informatici in tutto il mondo (ad esempio il settore trasporto, con voli cancellati o in ritardo di molte ore). Il problema, secondo stime di Microsoft, ha interessato 8,5 milioni di computer basati su Windows. Ma Microsoft non centra, se non indirettamente (perchè solo i sistemi Windows sono stati colpiti). Il blocco informatico non è dovuto ad un attacco, ma è bensì stato causato da un problema […]

© 2025-2011 vInfrastructure Blog | Disclaimer & Copyright