Archives


Connecting an IoT Device to AWS Cloud

Brien Posey provides step-by-step instructions to install an agent onto a device so that AWS can discover and manage it.

Collecting on Ransomware Cyber Insurance: 'It Was Really Awful'

"I'm not gonna lie, it's not really pretty. I could say it was really awful, because cyber insurance vendors are so hammered with claims that it's taking a long time for them to react."

Using Oracle Cloud, Part 4: Creating an Arm-Based Cloud Desktop

Tom Fenton started this four-part series because he was interested in the Oracle Cloud's new ability to offer Arm-based compute instances, but limited "Always Free" capacity leads to disappointment in the final installment.

Using AWS to Manage Your IoT Devices

Brien Posey explains how to manage AWS "things" -- digital representations of IoT devices -- by categorize them so they can be easily tracked.

SASE and AI Are Coming to a SD-WAN Deployment Near You

Enterprise SD-WAN deployments will see big jumps in the use of SASE and AI over the next few years, predicts research firm Gartner.

Windows Server 2022 Is Here!

"Overall, there's not really a huge number of new features, and what there is, isn't all available for your traditional on-premises Windows Server," says our hands-on review expert, Paul Schnackenburg.

Hybrid Cloud Expert Lists Top Do's and Don'ts

"A ransomware attack for your organization is not the same as traditional DR; it's not like you just press the big button and get yourself out of it."

Using Oracle Cloud, Part 3: Checking Network Performance on VMs

Tom Fenton decides to set up and test the network between a VM and the outside world after previously detailing the Oracle Cloud's "Always Free" offering and using VMs as a web server.

Architecture Small Graphic

DevOps App Security Expert: 'Use Microservices'

"If you can get away with it, use microservices as your preferred architecture," advised DevOps application security expert Carlos Rivas in an online presentation last week.

'Ransomware Sommelier' Crowdsources Initial Access Vulnerability List

Finding no one-stop-shop for a list of initial access vulnerabilities used by ransomware attackers, cybersecurity expert and <i>Virtualization & Cloud Review</i> tech event presenter Allan Liska started one on his own and crowdsourced the effort on Twitter.

Using Oracle Cloud, Part 2: An 'Always Free' Web Server Platform

Tom Fenton details the web server work he did in his experiment to use an "Always Free" Ubuntu 18.04 VM on Oracle Cloud to host a small web site.

CNCF Incubates Kubernetes Add-on 'Crossplane,' a Universal Control Plane

The Cloud Native Computing Foundation (CNCF) is now incubating Crossplane, an open source project providing a Kubernetes add-on that acts as a universal control plane with which enterprises can consume infrastructure.

Quarterly Report: Cisco Retains SD-WAN Market Lead, VMware Slips Further

Research firm Dell'Oro Group said Cisco retained its market share lead in the SD-WAN space, but there was some movement among the rest of the top five vendors in its latest quarterly report.

Using Oracle Cloud, Part 1: The 'Always Free' Offering

To get a feel for the Oracle Cloud, Tom Fenton shows how easy it is to sign up for and create a web site on an x86 VM and a desktop on an Arm VM, here using the "Always Free" option.

Take Five: 5 Must-See KubeCon 2021 Sessions

Tom Fenton sneakily works around his 5-item limit to showcase even more goodies you need to check out in what might be the first big post-pandemic tech show allowing the option of in-person attendance.

Creating an AWS Cloud S3 Inventory Report

Brien Posey explains the process, which can help you to better manage data growth and the corresponding cost, along with providing other benefits.

Quick Tip: Starting the VMware Horizon Client from the Command Line

VMware makes it possible to launch the Horizon client from the command line and specify the desired screen resolution.

Ransomware Protection: Use MFA and 'Don't Trust Anyone or Anything'

Two key ways to protect cloud data from ransomware and other attacks are to use Multi-Factor Authentication (MFA) and "don't trust anyone or anything," says cloud data protection expert Joey D'Antoni.

Installing MMR on IGEL OS

Multimedia redirection can greatly increase the number of virtual desktops your VDI hosts can accommodate and lower the cost of your VDI environment.

VMware Tanzu Powers New Java Offering: Azure Spring Cloud Enterprise

Microsoft is previewing a new enterprise Java service for its Azure cloud platform, powered by VMware Tanzu components.

Subscribe on YouTube