• Backup and Restore of Kubernetes containers

    In an earlier blog post, I discussed the transformation that is occurring in the virtualization industry. That article went on to describe the increased adoption of various open-source hypervisor platforms and how the virtualization market continues to grow at a remarkable rate. Along with that growth and increased adoption comes evolution and new ideas. One

  • Web-based management interface, sessions recording...

    In the third part of this article, we will go through further improvements of the RHEL8 system, like: more efficient and secure graphic environment (GNOME and Wayland), recording of administrative sessions (terminal session recording), web-based management interface (Cockpit and its integration with Red Hat Satellite), simplified support for advanced disk system functions, better use of

  • OpenShift for Developers – Part I: Open sour...

    In this article We’d like to introduce to you set of Openshift Container Platform developer tools which can accelerate application development. New developer oriented Web Console perspective OpenShift Container Platform 4.2 introduces an alternative perspective in the OpenShift Web Console that will sit beside the admin console and focus on developer use cases. This is

  • Safer DNS, e-mail and other improvements of RHEL 8

    In the first part of this article, we wrote about high-performance packet processing at the network adapter level using XDP and eBPF, and about the possibility of achieving greater throughput with lower latency, thanks to the BBR algorithm for TCP. These two new possibilities of the RHEL8 system bring benefits to everyone, regardless of the

  • Why to choose Red Hat Enterprise Linux 8?

    No one likes renovations. Changes in IT systems and data centers will continue to be more and more noticeable and expensive. The reason for this is the increasing complexity of these environments, as well as the growing amount of data, services and applications. This year, on May 7 2019, the 8th version of Red Hat

  • Self-Service Backup Automation using CloudForms wi...

    Growing market expectations to deliver services on demand with minimized waiting time has strong influence on IT services. It can be observed that during past years the central point of interest of IT services is automation of all parts that can be automated. Most business processes went through transformation to exclude as many wastes as

Webinars

Latest from Virtualization

  • Web-based management interface, sessions recording...

    • 10:15 AM, Oct 24

    In the third part of this article, we will go through further improvements of the RHEL8 system, like: more efficient and secure graphic environment (GNOME and Wayland), recording of administrative sessions (terminal session recording), web-based management interface (Cockpit and its integration with Red Hat Satellite), simplified support for advanced disk system functions, better use of

    READ MORE
  • Safer DNS, e-mail and other improvements of RHEL 8

    • 10:09 AM, Oct 1

    In the first part of this article, we wrote about high-performance packet processing at the network adapter level using XDP and eBPF, and about the possibility of achieving greater throughput with lower latency, thanks to the BBR algorithm for TCP. These two new possibilities of the RHEL8 system bring benefits to everyone, regardless of the

    READ MORE
  • Why to choose Red Hat Enterprise Linux 8?

    • 1:04 PM, Sep 24

    No one likes renovations. Changes in IT systems and data centers will continue to be more and more noticeable and expensive. The reason for this is the increasing complexity of these environments, as well as the growing amount of data, services and applications. This year, on May 7 2019, the 8th version of Red Hat

    READ MORE
  • Agent-less backup strategies for oVirt/RHV

    • 8:59 AM, Feb 18

    For oVirt and RHV, like for almost any other virtualization platform, it is possible to provide agent-less backup solution. Actually, there is even more than one way to do this. In this short article I’ll explain 3 different ways to backup VMs in these environments using snapshot mechanism. Let me tell you a short story…

    READ MORE

News

  • How to Integrate Mobile Device Security Into Your ...

    • 9:30 AM, Nov 8

    “Mobile security encompasses the protective capabilities for portable devices and the data they contain; they work to deflect and deter malware attacks and unauthorized users attacking mobile devices. These portable devices can include smartphones, laptops, tablets, and wearables.” – says Ben Canner from Solutions Review. READ MORE!

    READ MORE
  • How data breaches happen and why it takes so long ...

    • 9:26 AM, Nov 8

    “When the term “data breaches” is used today, it generally refers to incidents where millions of confidential records have been stolen. These incidents are primarily perpetrated for financial gain and often involve months of “scoping-out” an organization to find any glitches, loopholes, or vulnerabilities that can be exploited.” – says Twain Taylor from TechGenix. READ

    READ MORE
  • As more companies deploy cloud apps, they must als...

    • 8:12 AM, Nov 7

    “86% of enterprises have deployed cloud-based tools, but only 34% have implemented single sign-on (SSO), one of the most basic and critically important cloud security tools, according to Bitglass.” – read more at Help Net Security!

    READ MORE
  • Important questions about DRaaS you’re not a...

    • 8:11 AM, Nov 7

    “Disaster recovery as a service has always looked good on paper. DRaaS enables an organization to avoid the costs associated with owning or leasing a DR site, as well as the cost of equipping that site with the necessary data protection storage and ready-to-go servers.” – says George Crump from TechTarget! READ MORE!

    READ MORE
  • Cyber threats set to double in 2020

    • 9:46 AM, Nov 6

    “Many organisations are expecting the number of cybersecurity incidents to grow next year, but still aren’t willing to purchase insurance and protect themselves, according to FireEye’s inaugural Trendscape Report. ” – says Sead Fadilpašić from ITProPortal. READ MORE!

    READ MORE
  • Archive vs. backup and why you need to know the di...

    • 9:41 AM, Nov 6

    “Backups are primarily used for operational recoveries, to quickly recover an overwritten file or corrupted database. Archives, on the other hand, typically store a version of a file that’s no longer changing or shouldn’t be changing.” – read more at TechTarget!

    READ MORE