Free Webinar
April 2 | 11am PT / 2pm ET
Get to Know ZFS
Speaker: Orest Lesyuk, Solutions Engineer, StarWind
Posted by Alex Samoylenko on March 26, 2020
VMware vSAN Cluster Rebalancing: Automatic & Proactive

VMware vSAN clusters are typically aggregates of several ESXi hosts. Local disks with VM data are divided into groups there. It’s preferable that each disk’s load variance doesn’t reach 30%. If it does, there are two options: Automatic and Proactive rebalancing. Each of them has its own pros and cons; you decide which to choose.

Learn More

Posted by Florent Appointaire on March 24, 2020
Azure Cost Management

Having credits in Azure in advance is a great option that you choose how to unfold. You can invest in credits, allocate them to necessary features and tools, and set the billing. And to do that conveniently, Azure Cost Management is there to help. You can plan your finances, redistribute the billing, and see how cost-effective your choices are.

Learn More

Posted by Romain Serre on March 18, 2020
Implement a file server in Azure without using a single VM

It’s usually quite a chore to manage file servers by using VMs. Migrating between file servers in the cloud, enacting replication with DFS-R, and such would require using redundancy mechanisms. All this makes the implementation of file servers in Azure unnecessarily complex. Well, that ship has finally sailed!

Learn More

Posted by Benoit Voirin on March 12, 2020
How to Use Snyk to Scan Images for Vulnerabilities

When people think “cybersecurity,” images will be the last thing to come to mind. Usually, users tend to focus on things like cyber-attacks, viruses, or malware. Well, regular images, depending on where they come from, their integrity, and the routing can become a micro-gap in your security which can then result in a breach.

Learn More

Posted by Romain Serre on March 10, 2020
Backup your NAS with Veeam Backup & Replication 10

Veeam Backup and Replication 10 has just recently been released, and one of its more exciting features is the ability to back up a NAS. The latter is frequently used for diverse workloads, which include huge amounts of unstructured data. It’s often served chaotically, and it’s in a risk of being lost if there’s no specific fast redundancy mechanism in place.

Learn More

Posted by Vladan Seget on March 5, 2020
How to Automate the Upgrade of VMware Tools and VM Compatibility

Each new VMware vSphere release introduces new features and functions in addition to fixing the drawbacks that may have been in the previous version. With each new one, you need to upgrade VMware Tools in all your VMs and check if you need to upgrade their VM compatibility, otherwise they won’t have access to the desired perks.

Learn More

Posted by Nicolas Prigent on March 3, 2020
What is Azure Private Link (Preview)?

Bypassing conjunctions with public networks is easier said than done. Especially, if your endpoints are in faraway regions or even have different tenants, keeping the bandwidth high and cybersecurity tight can be an issue. Microsoft introduced Azure Private Link specifically for that reason, allowing users to create private endpoints within their virtual network.

Learn More

Posted by Florent Appointaire on February 25, 2020
Azure CDN to increase the user experience

Content delivery networks (CDN) cover a set of network servers distributed across farther areas. The idea is to have point-of-presence (POP) servers in edge locations. That way, you can cache your web application content in designated servers to have your users enjoy it at high bandwidth. Azure CDN is one such tool that can help you with that.

Learn More

Posted by Florent Appointaire on February 20, 2020
AKS, where to start?

Using containers to host software processes or applications is starting to become more of a thing. They have the necessary binary code, executables, configuration files, and libraries but without the OS images. They’re lightweight, portable, have a more consistent operation. One has to start somewhere, and AZK is a great container orchestrator to help you with that.

Learn More

Posted by Benoit Voirin on February 18, 2020
Cyber Security – Where to Start – Part 3

In the previous parts, we talked about general cybersecurity boundaries and staff education on the topic. The third crucial aspect is preparation, which allows minimizing the aftermaths if a cyber-attack does happen. Backups and crisis planning are two key activities that you have to manage so that you can effectively recover in case your cybersecurity is compromised.

Learn More