-
By Tom Fenton
Anybody who has installed a Linux OS knows how tricky that can be, but Tom Fenton is pleasantly surprised by the high-flying lobster.
-
By Tom Fenton
The marquee feature in Windows 365 Frontline, now in public preview, allowing each Frontline license purchased to have up to three users access the Cloud PC, albeit not at the same time.
-
By Tom Fenton
Tom Fenton explores what resources are required to run a VDI client on top of a generic OS vs. a thin client
-
Surprisingly, most Windows EC2 instances do not support TPM 2.0, but thankfully there is a way to enable TPM support, explains Brien Posey.
-
By Tom Fenton
Tom Fenton says VMware's free solution has been proven over the years and is a viable option for even the most cash-strapped vSphere deployments.
-
It allows you to create a secure access portal that will allow authorized users to access your organization's internal web applications, even if users are working remotely.
-
By Tom Fenton
"If you have a business that has seasonal spikes, DaaS makes a lot of sense."
-
By Tom Fenton
Tom Fenton takes a look at Microsoft's Desktop-as-a-Service (DaaS), which provides desktops that run in the cloud and which are managed and administrated by the cloud provider.
-
By Tom Fenton
Tom adds a DIY fan to cool the small-format Linux computer for students, hobbyist and anyone else interested in learning about the fundamentals of computing.
-
By Tom Fenton
"It is certainly a tool that every system administrator should be aware of and use to automate mundane routine tasks such as backups and taking applications offline."
-
By Tom Fenton
Tom explains that most multi-tiered apps are dynamic and deployed in multiple locations so their components also will need to be updated.
-
One of the things that you can do with the Fault Injection Simulator is to force an EC2 instance offline as a way of testing your high-availability strategy.
-
By Tom Fenton
Tom shows how to use Docker Compose to deploy PostgreSQL and pgAdmin from a file.
-
By Tom Fenton
Tom demos table joins, shell scripts for repetitive tasks and using "exec" to run commands inside a container from the host system.
-
By Tom Fenton
After his introductory series, Tom Fenton deploys a database on Docker and integrates it with other apps deployed from other Docker images.
-
By Tom Fenton
The less-expensive Quadra is a better fit than Raspberry Pi for those who want/need a low-cost software platform to use and experiment with.
-
Setting up a peering connection between VPCs in two different regions can help to simplify your disaster recovery efforts.
-
By Tom Fenton
Tom examines different ways to store persistent data such as volume and bind mounts (or host volumes).
-
By Tom Fenton
Tom Fenton explains how networking works with containers.
-
By Tom Fenton
After introducing the basics, Tom Fenton looks at the ephemeral nature of container instances and how to use networking and persistent storage with them.
-
By Tom Fenton
Tom Fenton begins a series on how to install Docker containers on a Linux system while discussing images, performance hits and how to use network/storage with containers.
-
By Tom Fenton
Tom Fenton looks at specs, design and build quality before discussing how well this low-priced device performs as a thin client, KVM server, Docker server and repository for edge device data.
-
By Tom Fenton
Tom Fenton looks at companies he found especially interesting this year.
-
Brien Posey details several reasons why a container image should not be dynamically updated.
-
Microsoft is no longer primarily relying on ISV partners to innovate and provide security solutions. Here's an overview of enhanced Defender offerings.