Archives


Introduction to Docker, Part 4: Persistent Storage

Tom examines different ways to store persistent data such as volume and bind mounts (or host volumes).

Research: AWS Edges Ahead in Cloud Database Management Systems

Research firm Gartner's "Magic Quadrant" series of reports on cloud database management systems has long seen a crowded "Leaders" field populated with the usual cast of cloud giants and wannabes, but this year AWS has slightly edged ahead of the pack.

Introduction to Docker, Part 3: Networking

Tom Fenton explains how networking works with containers.

'Disconcerting' Survey Report Reveals Cloud Security Warnings

"Fully 75 percent of respondents say that cloud computing represents the single greatest expansion of the enterprise attack surface in the last 20 years!"

Introduction to Docker, Part 2: Repos and Resource Consumption

After introducing the basics, Tom Fenton looks at the ephemeral nature of container instances and how to use networking and persistent storage with them.

Kasten by Veeam Tops Kubernetes Backup/Data Protection Poll

A new survey-based Kubernetes backup and data protection report shows Kasten by Veeam was identified as a leader in the field, though many respondents couldn't name any organization as a leader.

Introduction to Docker, Part 1: Getting Started

Tom Fenton begins a series on how to install Docker containers on a Linux system while discussing images, performance hits and how to use network/storage with containers.

Hands-On Review of the Maxtang NX6412 Small-Format Computer

Tom Fenton looks at specs, design and build quality before discussing how well this low-priced device performs as a thin client, KVM server, Docker server and repository for edge device data.

Azure AD B2B Direct Connect

Paul takes a look at newly released Azure AD B2B Direct Connect and Microsoft Teams Connect shared channels.

Dollar Bill Graphic

How Cyber Insurance Is Evolving Amid Ransomware Tsunami

With the recent upsurge in ransomware attacks have come a few huge payouts from insurance companies, so they are cracking down on rules and regulations to lessen their exposure.

Take Five with Tom Fenton: Must-See VMware Explore 2022 Sessions

After earlier sharing his Horizon-themed picks, Tom lists his five must-see VMware Explore session on the technologies he finds most interesting.

Threat Intelligence CISO Touts Zero Trust for Metaverse Security

How Zero Trust fits the bill as a security model for the emerging metaverse despite the architectural sins of our past (the internet).

Take Five with Tom Fenton: Must-See VMware Explore 2022 Horizon Sessions

From the Horizon Cloud Service on Microsoft Azure to Architecting Horizon: The Official Reference Architecture, VMware Explore (formerly VMworld) is returning to an in-person format with many Horizon sessions of interest to Tom Fenton.

Feds Warn Log4Shell Exploits Still Hitting VMware Horizon, UAG Systems

The Cybersecurity and Infrastructure Security Agency (CISA) this week updated last month's advisory about threat actors continuing to exploit Log4Shell vulnerabilities in VMware Horizon and Unified Access Gateway (UAG) systems.

Does EC2 Support Windows Server Core Deployments?

Brien shows how to perform Windows Server core deployments in AWS without having to build your own custom Amazon Machine Image (AMI).

Buildings Grapic

New Microsoft Cloud for Sovereignty Helps Government Customers Meet Requirements

Announced at this week's big Inspire partner event, the new Microsoft Cloud for Sovereignty has arrived to help public sector customers meet compliance, security and policy requirements when processing data and workloads in the company's cloud.

Installing the Phoronix Test Suite on Windows

After being questioned on how to install the suite after a recent article, Tom provides step-by-step instructions.

The Public Cloud 'Sensitive Data' Problem

Most organizations already have sensitive data in the cloud. The majority of organizations surveyed (67%) in a new report host sensitive data or workloads in the public cloud.

Why an AWS EC2 Instance May Slow Down over Time, Part 2: Troubleshooting

After earlier describing some of the storage types that are used by EC2 instances, Brien now shows how this information plays into the troubleshooting process.

Security-Conscious Open Source Devs Now Wrestle with Government Requirements

Technologists using open source software, long plagued by security concerns, are now facing a new challenge: meeting government requirements enacted to mitigate those concerns.

Subscribe on YouTube