-
By Tom Fenton
After previously writing about installing ESXi on Arm on a Raspberry Pi, Tom Fenton walks through the process of using a USB flash drive as a local datastore on the Pi.
-
After previously demonstrating how to create a CSV file that can be used to create a custom classifier for the AWS Comprehend natural language processing service, Brien Posey shows how to use that file to build and train the classifier, along with how to create a document classification job.
-
By Tom Fenton
After earlier discussing VMware's ESXi on Arm Fling, Tom Fenton details an overview of his experience installing it.
-
Brien Posey shows how to use the Comprehend natural language processing service to classify documents based on their content, building a custom classifier to identify spam.
-
By Tom Fenton
VMware has been teasing ESXi on Arm for years, and the community is excited to see that VMware has finally delivered on this promise, albeit in a Fling format.
-
By Tom Fenton
Amid the massive work-from-home surge, Tom Fenton says organizations planning for long-term remote work may be better off with VDI, while those who will see workers returning to their offices may like an HDI scheme.
-
Paul Schnackenburg details the security-related news coming out of the Microsoft Ignite 2020 event, ranging from Microsoft 365 Defender to Azure Sentinel to Azure Active Directory (AAD) and much more.
-
Brien Posey explains how to address problems caused when your EC2 instances happen to be in a different region from the one that AWS Tools for PowerShell is configured to use.
-
After using step-by-step instructions and screenshots to detail how to create a WorkLink fleet amid the COVID-19 remote work surge, Brien Posey wraps up the discussion by showing you the remainder of the configuration process.
-
Amid the COVID-19 remote work surge, Amazon WorkLink can provide a better alternative to VPNs for enabling remote workers to access internal web content. Brien Posey explains how with illustrated, step-by-step instructions.
-
Paul Schnackenburg looks at the current capabilities of the public preview of Azure Arc -- extending Azure Resource Manager capabilities to Linux and Windows servers, as well as Kubernetes clusters on any infrastructure across on-premises, multicloud, and edge -- and why you should care.
-
By Tom Fenton
Tom Fenton concludes his three-part series on SD-WAN by outlining some different deployment modes.
-
By Tom Fenton
After explaining why organizations are choosing SD-WAN over MPLS in part one of this series, Tom Fenton now takes a look at the components underlying the technology approach and how they work.
-
By Tom Fenton
Tom Fenton begins a three-part primer on the technology that is revolutionizing enterprise networking, explaining the last-gen way and the new way, marked by benefits such as lower costs and better flexibility and manageability.
-
Brien Posey shares best practices for keeping a handle on EC2 security groups -- essentially software firewalls -- to avoid confusion about which ones are actually needed.
-
By Tom Fenton
Tom Fenton gets a peek at what's coming in the commercial desktop and app virtualization product and offers his opinions on the best new features, including broader Instant Clone support and more.
-
Paul Schnackenburg looks at the issue with passwords and different attacks, modern approaches to password policies and management and how you can improve your (Office 365) organization's security posture with just a few clicks by banning bad passwords.
-
Brien Posey cuts through the confusion associated with allocating IP addresses to EC2 instances on the Amazon cloud, which is done automatically though users can also associate elastic IP addresses with instances.
-
By Tom Fenton
Tom Fenton details step-by-step directions to configure Windows 10 to allow running Task Scheduler and how to set up an automated task to run a PowerShell script every four hours.
-
Although Amazon's AWS Route 53 can be used to enable run-of-the-mill, static DNS routing, it can also be used to bring some intelligence to the routing process. For example, Route 53 makes it easy to perform weighted routing, useful in situations where you need to distribute traffic unevenly.
-
Aside from third-party solutions, snapshots are the best option for backing up your EC2 virtual machines, says Brien Posey, who explains how managing the process is something of an art form.
-
By Tom Fenton
While Tom was learning PowerShell, he found himself trying to translate the bash commands he was familiar with into the PowerShell commands that accomplish the same task, coming up with this handy cheat sheet.
-
If you host a lot of services on AWS, it can sometimes be useful to let Amazon's Route 53 handle your DNS hosting rather than letting a domain registry service handle it, because sometimes it's just nice to be able to manage your DNS record from within the same environment that you use to manage your other AWS resources.
-
By Tom Fenton
Tom follows up on his previous article about installing FreeNAS and using it to create an NFS share to back a VM, now creating an iSCSI target on FreeNAS and using that target as backing for a vSphere VM.
-
The days of relying solely on a "blinky light firewall" to give you a sense of security are gone, and you need a cloud-based security solution for controlling your users' cloud access, such as Microsoft Cloud App Security. Paul Schnackenburg details what MCAS can do for your business, how it integrates with other security technologies and the different flavors it's available in.