Browsing Posts in Generale

Reading Time: < 1 minuteVMware Explore is the new brand name of VMworld event: from cloud infrastructure to the software-defined edge to Private AI innovation, you’ll gain perspective, find answers, and see what’s possible with the right cloud solutions. But why attend at this kind of events?

Reading Time: 2 minutesVMware Explore is the new brand name of VMworld event, and as usual, after the US edition there will be an EU edition. VMware Explore 2024 EU will be at Barcelona from 4th to 7th November! From cloud infrastructure to the software-defined edge to Private AI innovation, you’ll gain perspective, find answers, and see what’s possible with the right cloud solutions.

Reading Time: < 1 minuteLinus Torvalds ha annunciato oggi il rilascio della versione ufficiale del kernel Linux 6.10, l’ultima versione stabile del kernel. Alcune delle novità sono descritte in questo post e questo post.

Reading Time: 3 minutesCentOS Linux was a freely available, community-supported Linux distribution that was developed, distributed, and maintained by the CentOS Project community contributors. It was derived based from Red Hat Enterprise Linux sources and released in alignment with the Red Hat Enterprise Linux production release cycle. For this reason was a great alternative to Red Hat Enterprise Linux. Note that CentOS Linux is not a Red Hat product and does not have Red Hat support. But in 2020, The CentOS Project, in coordination with Red Hat, announced that it would shift full investment to CentOS Stream, the upstream […]

Reading Time: 6 minutesMolte soluzioni di storage on-prem, di cloud storage e soluzioni di backup promettono sempre di più una sorta di immutabilità dei dati. Naturalmente, l’immutabilità è una funzionalità chiave importante, ma non implica automaticamente che la soluzione sia sicura (o che sia automaticamente più sicura). Può dare un falso senso di sicurezza se non implementato correttamente. In caso di configurazione errata, è possibile eliminare dati apparentemente immutabili, ad esempio manipolando le impostazioni di data/ora sul dispositivo di archiviazione per aggirare i meccanismi di applicazione della conservazione.

Reading Time: 2 minutesDiffent products are implementing a security model called “four-eyes principle“, also know as the two-person rule or also multi-user authorization (MUA). In the backup and data protection are, for example, Veeam Backup & Replication (starting with v12) has the Four-Eyes Authorization feature to protect some crucial operations. But what is the four-eyes (4-eyes) principle and how does it work? First to all is nothing related to software or security but instead a way to minimize the human errors and can be appliable also to non IT activities.

Reading Time: 2 minutesPure//Accelerate is the annual big event from Pure Storage, one of the first all flash storage company. Pure//Accelerate 2024 is planned on June 18-21, 2024 | Resorts World Las Vegas. The event will kick off with our opening reception on June 18. Additional events include the Pure//Partner Forum on June 18 and pre-conference training sessions on June 17-18.

© 2025-2011 vInfrastructure Blog | Disclaimer & Copyright