Archives


VMware Study: Kubernetes Thrives, But Expertise Is Top Challenge

VMware's new Kubernetes study shows the fast-growing open source project continues to thrive, though a lack of expertise is a big challenge for enterprise adoption.

What Is dHCI, Part 1: Topology, Benefits and a Look at HPE's Solution

Tom Fenton discuss disaggregated hyperconverged infrastructure (dHCI), an interesting emerging technology in the datacenter that can address limitations of HCI while still embracing its attractive features.

Hands-on with ControlUp Edge DX, Part 2: Advanced Features

Tom Fenton looks at Edge DX, a new product from ControlUp that was designed to monitor and manage Windows, macOS, Linux and IGEL OS endpoint devices. He explains the information it gathers, how it displays logon and processes to help troubleshoot and diagnose issues that end users might be having.

Migrating On-Premises Applications to AWS, Part 3: Replication, Testing & Final Cutover

Brien Posey completes his 3-part series, including an 18-hour server replication process.

Hands-On with ControlUp Edge DX, Part 1: Architecture & Monitoring

Tom Fenton begins a 3-part series on this new offering, used for monitoring and managing physical devices.

Migrating On-Premises Applications to AWS, Part 2: A Sample App Migration

Brien Posey details how to set up a replication settings template, replication agent and more.

Azure Spreads its Wings at Build 2021

Paul Schnackenburg takes an IT view of the developer conference, focusing on two main themes and several releases.

Migrating On-Premises Applications to AWS, Part 1: Overview

Brien Posey outlines the five-step process involved in migrating an application.

Ransomware: What To Do If You Don't Have a Plan

Nothing vaults ransomware into the IT discussion like a $4.4 million payout accompanied by a crippling gas shortage and $7-per-gallon price gouging.

Keeping Track of Your AWS EC2 Instances

Having received surprise bills for forgotten instances, Brien Posey creates a PowerShell Script to display them all, regardless of which region they are in.

Microsoft Azure Blockchain Is Ending Sept. 10

Microsoft is ending its Azure Blockchain Service in September, advising users to migrate to other offerings.

What's the Future of Network Security? Zero Trust, SASE & Automation

Survey polls 500 directors, vice presidents and C-Suite execs involved in IT security for organizations of between 1,001 to 10,000-plus employees.

Getting Started with Blockchain on AWS, Part 2: Access Data, Create Tables/Indexes

After earlier demonstrating how to create a new ledger and then populate the database with sample data, Brien Posey shows how to access that data, and how to create some new tables and indexes.

2.5GbE Networking on Linux

After detailing using 2.5GbE NICs in his home lab on Windows 10, Tom Fenton does the same thing on Linux.

Getting Started with Blockchain on AWS, Part 1: Creating and Configuring a Ledger

Blockchain has rapidly gained popularity because of its ability to store transactions in an immutable format, and Amazon makes it really easy to create your own Blockchain ledger within the AWS console. Brien Posey shows you how it's done.

Azure in a Hybrid World

With hybrid becoming the norm, cloud expert Paul Schnackenburg looks at the different flavors of hybrid Azure and how they compare, in which scenarios you'd use each one and links to learn more.

Capturing HDMI Video Output, Part 3: Sharper Capture Card

For a slightly higher price, Tom Fenton finds a sharper card that he will be using to create content from now on.

2.5GbE Networking: Setup and 1GbE Performance Comparison

Tom Fenton details setting up and using a 2.5GbE NIC and compares its performance to a 1GbE NIC, finding "The cost is the bugaboo in the equation."

ARM in the Datacenter

Tom Fenton highlights some different ARM devices and discusses ways that they have made their way into the datacenter.

Misconfigurations Continue to Plague Cloud Security, New Reports Say

Despite all the publicity, increased guidance from major cloud platforms and others, along with numerous outreach and education attempts, users are still leaving their organizations open to data breaches, attacks or outages.

Subscribe on YouTube