Browsing Posts in Prodotti

Reading Time: 3 minutesPiù di dieci anni fa avevo scritto un posto su come sia meglio evitare i dischi dinamici di Windows (specialmente Windows Server)… ma a quanto pare c’è ancora chi si ostina ad usarli pensado siano utili e non pensado alle conseguenze. Microsoft Windows Dynamic Disks (chiamati anche Dynamic Volumes) sono un livello di astrazione (introdotto in Windows 2000) sulle partizioni (simile a LVM in ambiente Linux/Unix) per disaccoppiare i volumi (con i relativi dati NTFS) dalle partizioni del disco e avere un maggiore flessibilità, come l’estensione a caldo di un volume semplicemente aggiungendo nuove partizioni […]

Reading Time: 4 minutesVeeam Continuous data protection (CDP) is a technology that helps you protect mission-critical VMware virtual machines when data loss for seconds or minutes is unacceptable. CDP also provides minimum recovery time objective (RTO) in case a disaster strikes because CDP replicas are in a ready-to-start state. First, CDP creates replicas and, then, keeps these replicas up to date. CDP constantly replicates I/O operations performed on VMs. To read and process I/O operations in transit between the protected VMs and their underlying datastore, CDP uses vSphere APIs for I/O filtering (VAIO) that gives an option not […]

Reading Time: < 1 minuteUsing Veeam Backup & Replication, sometimes you may find a strange failure error in your backup jobs: The job will fail and the related VM is not saved.

Reading Time: 5 minutesPalo Alto Networks ha pubblicato una interessante ricerca sull’evoluzione dei ransomware focalizzata su cosa aspettarsi dai gruppi di estorsione in futuro. Chiedendo a loro analisti di incident response e threat intelligence cosa ci aspetta in termini di estorsioni, ecco alcune previsioni chiave.

Logo Commvault

Reading Time: 4 minutesOn June, 7th Commvault announces new security capabilities across its entire portfolio signalling the next phase in its evolution helping businesses secure, defend, and recover their data to meet increasingly sophisticated cyberthreats head on. Why security must be coupled with data protection? Because data protection usually it’s just the ‘last line of defense’… but it’s no more enough.

Reading Time: 2 minutesNutanix acquired Frame in late 2018 to be able to deliver desktops-as-a-service (DaaS) from multiple clouds, combining the consumer-grade simplicity and web-scale design of cloud applications with the functionality of traditional virtual desktop applications. Founded in 2012, Frame (Mainframe2, Inc.) pioneered the ability to stream applications and desktops from the cloud to a standard web browser, turning Windows apps into Web apps.  As part of Nutanix, Frame expanded its supported infrastructure options to include Nutanix Hybrid Cloud Platform in addition to AWS, Azure, and Google Cloud. Visit www.fra.me for more information.  But on 6 June 2023, Dizzion, […]

Reading Time: 4 minutesNot all the different CPUs are the same: they may have a different Instruction Set Architecture (ISA). An Instruction Set Architecture (ISA) is part of the abstract model of a computer that defines how the CPU is controlled by the software. The ISA acts as an interface between the hardware and the software, specifying both what the processor is capable of doing as well as how it gets done. The ISA provides the only way through which a user is able to interact with the hardware. It can be viewed as a programmer’s manual because […]

© 2025-2011 vInfrastructure Blog | Disclaimer & Copyright