Reading Time: 3 minutes

After the first announce in August (Nakivo annouce v4) and some intermediate versions (v3.8 and v3.9) with some of the announced features, and with also a good beta period, now the NAKIVO Backup & Replication v4.0 is finally available.

Built for virtualization, this backup product is an all-in-one backup and replication solution that features a Web UI, protects live VMs running applications and databases, can run backup and replication jobs as often as every minute, reduces the backup size with deduplication and compression, speeds up data transfer with network acceleration, enables full VM and granular recovery, provides reporting, encryption, and cloud integration features.

continue reading…

Reading Time: 5 minutes

Now that the Dell Enterprise Forum EMEA at Frankfurt has finished is possible comment this event and compare with the previous EMEA editions. This year, due to work commitments I was able to attend only one day (Tuesday), and for this reason my evaluations will certainly influenced by this limited time (that of course cannot describe the entire event).

But the first impression (and partly also shared by some of the other attendees) is that this event was a bit ‘resigned (or undertone, if you prefer), certainly compared to the London event (where perhaps there were less people, but was really great, probably because was the first, but also for the excellent organization, and has been above my expectations) than the one in Paris. To be honest, however, this is a general impression that covers many of the events of this year.

Something was really missing, for example I definitely expected something more for bloggers and for the Dell TechCenter Rockstars, if only because in events like VMworld there arises a lot of attention to these aspects.

continue reading…

Reading Time: 2 minutes

Heartbleed is a software bug in the open-source cryptography library OpenSSL, which allows an attacker to read the memory of a server or a client, allowing (with special forget packets) reading (small) portition of the victim client. This could expose to lost of some data and potentially also confidendial data.

Heartbleed.com has a detailed explanation of the issue, which is related to the “heartbeat” section of OpenSSL’s transport layer security (TSL) protocols and has been in the wild since March 2012 and affect all version from OpenSSL 1.0.1 through 1.0.1f.

You need to upgrade the OpenSSL binaries if you are implementing services with SSL but also you have to change your password (or you certificates) if you are using (of have used) affected services (see also The Heartbleed Hit List: The Passwords You Need to Change Right Now).

continue reading…

Reading Time: 2 minutes

Heartbleed is a software bug in the open-source cryptography library OpenSSL, which allows an attacker to read the memory of a server or a client, allowing (with special forget packets) reading (small) portition of the victim client. This could expose to lost of some data and potentially also confidendial data.

Heartbleed.com has a detailed explanation of the issue, which is related to the “heartbeat” section of OpenSSL’s transport layer security (TSL) protocols and has been in the wild since March 2012 and affect all version from OpenSSL 1.0.1 through 1.0.1f.

You need to upgrade the OpenSSL binaries if you are implementing services with SSL but also you have to change your password (or you certificates) if you are using (of have used) affected services (see also The Heartbleed Hit List: The Passwords You Need to Change Right Now).

continue reading…

Reading Time: 3 minutes

Heartbleed is a software bug in the open-source cryptography library OpenSSL, which allows an attacker to read the memory of a server or a client, allowing (with special forget packets) reading (small) portition of the victim client. This could expose to lost of some data and potentially also confidendial data.

Heartbleed.com has a detailed explanation of the issue, which is related to the “heartbeat” section of OpenSSL’s transport layer security (TSL) protocols and has been in the wild since March 2012 and affect all version from OpenSSL 1.0.1 through 1.0.1f.

You need to upgrade the OpenSSL binaries if you are implementing services with SSL but also you have to change your password (or you certificates) if you are using (of have used) affected services (see also The Heartbleed Hit List: The Passwords You Need to Change Right Now).

continue reading…

Reading Time: 2 minutes

Also this time I’ll be attending the Dell Enterprise Forum EMEA (this third edition, after London and Paris,  will be in Frankfurt) and will be a good opportunity to spend some time with the technical Dell people, see latest products, hear about the new strategy and new products.

This is the first European Dell event, after the name rebrand and one year miss due to some changes in the period (previously was in Winter/Autumn, now in Spring).

continue reading…

Reading Time: 2 minutes

One year ago I’ve written about the VMware exams and related products version but in the past months something has changes in VMware exams and the described criteria is not (completely) valid.

Some month ago VMware has release a new VCP5-DCV exam based on vSphere 5.5 and I’ve (later) associated this with the new recertification policy for VCP.

But on April 7, VMware released a new exam to qualify candidates for the VMware Certified Advanced Professional 5 – Data Center Administration (VCAP5-DCA) Certification. This new exam (exam code VDCA550) is based on vSphere v5.5, where the existing exam (exam code VDCA510) is based on vSphere v5.0.

continue reading…

© 2024-2011 vInfrastructure Blog | Disclaimer & Copyright