• Protect VMs in Nutanix Acropolis and other hypervi...

    In a world that seems to be dominated by “next big thing” messaging, VMware and Microsoft Hyper-V have found a way for the last decade or so to dominate the hypervisor market share – maintaining over 80% of the market share throughout the last ten years. However, based on the emergence of several other competitors,

  • Backup strategies for OpenStack environments

    Even though OpenStack environments were meant to be stateless by design (so that VMs could be easily recovered from templates) – in many cases are used as a regular virtualization platform. Stateful VMs still need to be protected and in this short article I’ll give you several ideas how you can accomplish it. Agent-based backup

  • OpenShift for Developers. Streamline Application D...

    The Red Hat OpenShift 4 release focuses on tooling that is designed to deliver a developer-centric user experience. In previous blog we’ve introduced number of developer tools and now we’ll look at wider ecosystem of application development and deployment solutions which are available in OpenShift. Service Mesh Based on the Istio, Kiali and Jaeger projects

  • RHEL 8 for data centers and cloud environments. Wh...

    In the next part of this article, we will go mostly through the better handling of software packages and more functional and safer support for containers and images. These elements are increasingly important in data centers and cloud environments. Before we get to it, let’s start with the most interesting feature for bare metal servers

  • Backup and Restore of Kubernetes containers

    In an earlier blog post, I discussed the transformation that is occurring in the virtualization industry. That article went on to describe the increased adoption of various open-source hypervisor platforms and how the virtualization market continues to grow at a remarkable rate. Along with that growth and increased adoption comes evolution and new ideas. One

  • Web-based management interface, sessions recording...

    In the third part of this article, we will go through further improvements of the RHEL8 system, like: more efficient and secure graphic environment (GNOME and Wayland), recording of administrative sessions (terminal session recording), web-based management interface (Cockpit and its integration with Red Hat Satellite), simplified support for advanced disk system functions, better use of

Webinars

Latest from Virtualization

  • RHEL 8 for data centers and cloud environments. Wh...

    • 2:09 PM, Dec 4

    In the next part of this article, we will go mostly through the better handling of software packages and more functional and safer support for containers and images. These elements are increasingly important in data centers and cloud environments. Before we get to it, let’s start with the most interesting feature for bare metal servers

    READ MORE
  • Web-based management interface, sessions recording...

    • 10:15 AM, Oct 24

    In the third part of this article, we will go through further improvements of the RHEL8 system, like: more efficient and secure graphic environment (GNOME and Wayland), recording of administrative sessions (terminal session recording), web-based management interface (Cockpit and its integration with Red Hat Satellite), simplified support for advanced disk system functions, better use of

    READ MORE
  • Safer DNS, e-mail and other improvements of RHEL 8

    • 10:09 AM, Oct 1

    In the first part of this article, we wrote about high-performance packet processing at the network adapter level using XDP and eBPF, and about the possibility of achieving greater throughput with lower latency, thanks to the BBR algorithm for TCP. These two new possibilities of the RHEL8 system bring benefits to everyone, regardless of the

    READ MORE
  • Why to choose Red Hat Enterprise Linux 8?

    • 1:04 PM, Sep 24

    No one likes renovations. Changes in IT systems and data centers will continue to be more and more noticeable and expensive. The reason for this is the increasing complexity of these environments, as well as the growing amount of data, services and applications. This year, on May 7 2019, the 8th version of Red Hat

    READ MORE
  • Agent-less backup strategies for oVirt/RHV

    • 8:59 AM, Feb 18

    For oVirt and RHV, like for almost any other virtualization platform, it is possible to provide agent-less backup solution. Actually, there is even more than one way to do this. In this short article I’ll explain 3 different ways to backup VMs in these environments using snapshot mechanism. Let me tell you a short story…

    READ MORE

News

  • Ensure your backup infrastructure has sufficient n...

    • 3:13 PM, Feb 14

    “Managing today’s highly sophisticated backup infrastructure is a 24/7 proposition. A data center handles so many activities each day that your network must be strong enough to manage the demand.” – says Paul Kirvan from TechTarget. READ MORE!

    READ MORE
  • What to know about open source security

    • 3:11 PM, Feb 14

    “The ‘open source’ aspect refers to the code, and can be found within databases, applications and operating systems, among other software. This code can be changed to suit the needs of the business.” – read more at Information Age!

    READ MORE
  • 3 tips to keep Kubernetes safe at scale

    • 1:50 PM, Feb 13

    “Kubernetes should not be deployed in business-critical environments or for applications that manage sensitive data without dedicated container security tools. As we’ve seen in the past year, the Kubernetes system’s containers themselves–such as the critical api server–can have vulnerabilities that enable an attacker to bring down the orchestration infrastructure itself,” – said Gary Duan, CTO

    READ MORE
  • Ransomware uses vulnerable, signed driver to disab...

    • 1:46 PM, Feb 13

    “Ransomware-wielding attackers have devised a novel tactic for disabling security protections that might get in their way: they are using a deprecated, vulnerable but signed driver to deliver a malicious, unsigned one that allows them to kill processes and files belonging to Windows endpoint security products.” – read more at HelpNetSecurity!

    READ MORE
  • Kubernetes rollouts: 5 security best practices

    • 2:28 PM, Feb 12

    “Anyone that has followed Kubernetes and containers over the past few years knows that security has become a central point of failure for this technology. Security issues can arise from nearly any point—from container images, runtime engines, poorly secured networks, etc. So for any business looking to adopt container technology, the importance of security cannot

    READ MORE
  • vProtect 3.9 update 1 RELEASED

    • 2:21 PM, Feb 12

    Version 3.9 of vProtect introduced, among others, VMware and Hyper-V support and Google Cloud Storage as a new backup destination. Update 1 introduces a new strategy for OpenStack, which uses Cinder-based disk-attachment to perform backups and several enhancements for #KVM stand-alone environments. LEARN MORE!

    READ MORE

Latest Posts

Categories

Tags