• OpenShift for Developers – Part I: Open sour...

    In this article We’d like to introduce to you set of Openshift Container Platform developer tools which can accelerate application development. New developer oriented Web Console perspective OpenShift Container Platform 4.2 introduces an alternative perspective in the OpenShift Web Console that will sit beside the admin console and focus on developer use cases. This is

  • Safer DNS, e-mail and other improvements of RHEL 8

    In the first part of this article, we wrote about high-performance packet processing at the network adapter level using XDP and eBPF, and about the possibility of achieving greater throughput with lower latency, thanks to the BBR algorithm for TCP. These two new possibilities of the RHEL8 system bring benefits to everyone, regardless of the

  • Why to choose Red Hat Enterprise Linux 8?

    No one likes renovations. Changes in IT systems and data centers will continue to be more and more noticeable and expensive. The reason for this is the increasing complexity of these environments, as well as the growing amount of data, services and applications. This year, on May 7 2019, the 8th version of Red Hat

  • Self-Service Backup Automation using CloudForms wi...

    Growing market expectations to deliver services on demand with minimized waiting time has strong influence on IT services. It can be observed that during past years the central point of interest of IT services is automation of all parts that can be automated. Most business processes went through transformation to exclude as many wastes as

  • How and why vProtect displaced Bacula for protecti...

    After years of almost exponential growth, with many businesses virtualizing over 80% of their workloads, the virtualization industry has hit a tipping point. Now more than ever, organizations are questioning the value proposition of the “Big Two”, VMware and Hyper-V, and looking at alternative hypervisors. And this means looking at backup eco-system alternatives as well.

  • How to use Roles. Ansible for oVirt/RHV – Part I...

    Last time we spent some time to understand how Ansible works with RHV/oVirt infrastructure. We discussed all necessary packages and tools we need to start our first automation task. Then finally we were able to write and execute out first playbook against our demo RHV infrastructure. That was last time. In this post we will

Webinars

Latest from Virtualization

  • Safer DNS, e-mail and other improvements of RHEL 8

    • 10:09 AM, Oct 1

    In the first part of this article, we wrote about high-performance packet processing at the network adapter level using XDP and eBPF, and about the possibility of achieving greater throughput with lower latency, thanks to the BBR algorithm for TCP. These two new possibilities of the RHEL8 system bring benefits to everyone, regardless of the

    READ MORE
  • Why to choose Red Hat Enterprise Linux 8?

    • 1:04 PM, Sep 24

    No one likes renovations. Changes in IT systems and data centers will continue to be more and more noticeable and expensive. The reason for this is the increasing complexity of these environments, as well as the growing amount of data, services and applications. This year, on May 7 2019, the 8th version of Red Hat

    READ MORE
  • Agent-less backup strategies for oVirt/RHV

    • 8:59 AM, Feb 18

    For oVirt and RHV, like for almost any other virtualization platform, it is possible to provide agent-less backup solution. Actually, there is even more than one way to do this. In this short article I’ll explain 3 different ways to backup VMs in these environments using snapshot mechanism. Let me tell you a short story…

    READ MORE

News

  • Almost £9m wasted on under-utilised cloud tech ev...

    • 9:24 AM, Oct 4

    “In Europe, organisations are spending £29.48 million on cloud computing, but the survey suggests 30% of that is being wasted.” – says Bobby Hellard from Cloud Pro. READ MORE!

    READ MORE
  • Private, Public, or Hybrid: Where should the workl...

    • 9:22 AM, Oct 4

    “Cloud technologies have improved time to market, lowered operational and capital expenditures, and provided organizations with the ability to dynamically adjust provisioning to meet changing needs. But it can still be difficult at times to discern how to optimize a cloud solution to meet your business needs. So what are the key aspects of a

    READ MORE
  • Top 5 tips to prevent ransomware

    • 8:51 AM, Oct 3

    Tom Merritt from TechRepublic gives us 5 tips to prevent ransomware: Secure every device in your operation Educate your staff Make sure IT knows when employees are traveling Disable unnecessary Windows processes Make good and frequent #backups READ MORE!

    READ MORE
  • Executives have to make cybersecurity a priority i...

    • 8:33 AM, Oct 3

    “Businesses and organizations of all sizes have steadily begun to recognize the importance of cybersecurity to their success. As spending and awareness of the importance of cybersecurity increases, so does the demand for intelligence about how best to spend those funds and what security leaders can expect in today’s constantly evolving attack surfaces.” – read

    READ MORE
  • Multi-cloud security: 7 issues to watch

    • 8:36 AM, Oct 2

    “Using multiple cloud providers is not riskier than using one: Each arrangement has its pros and cons. Prioritize these security areas in the multi-cloud environment.” – says Mike Bursell from The Enterprisers Project. READ MORE!

    READ MORE
  • Data breaches now cost companies an average of $1....

    • 8:19 AM, Oct 2

    “The average cost of enterprise data breaches has risen to $1.41 million in 2018, up from $1.23 million in 2017, according to new research from Kaspersky. It’s estimated that there have already been 4,000 data breaches in the first half of 2019, affecting four billion users’ data.” – read more at TechRepublic.

    READ MORE