Posted by Florent Appointaire on February 20, 2020
AKS, where to start?

Using containers to host software processes or applications is starting to become more of a thing. They have the necessary binary code, executables, configuration files, and libraries but without the OS images. They’re lightweight, portable, have a more consistent operation. One has to start somewhere, and AZK is a great container orchestrator to help you with that.

Learn More

Posted by Benoit Voirin on February 18, 2020
Cyber Security – Where to Start – Part 3

In the previous parts, we talked about general cybersecurity boundaries and staff education on the topic. The third crucial aspect is preparation, which allows minimizing the aftermaths if a cyber-attack does happen. Backups and crisis planning are two key activities that you have to manage so that you can effectively recover in case your cybersecurity is compromised.

Learn More

Posted by Paolo Valsecchi on February 13, 2020
Upgrade AD FS 3.0 to Windows Server 2016/2019

Everybody knows Microsoft is one of the flagships of industry, and as an enterprise with such a reputation, they intend to keep it up. Yet another new upgrade shows how you can find out for yourself in practice what new can offer Active Directory Federation Services for Windows Server 2019!

Learn More

Posted by Alex Samoylenko on February 12, 2020
An ESXi host shows as Not Responding in vCenter Server – Now what might be the problem?

Every admin knows that however perfect an environment may be, it’s bound to encounter certain problems along the way. One of the most confusing issues for a VMware vSphere admin is VMware ESXi hosts in vCenter Server being nor responding since there can be too many different reasons. Luckily, you have a chance now to find out the most common ones and means to deal with them!

Learn More

Posted by Vladan Seget on February 6, 2020
Veeam Backup and Replication 10 with Linux Proxy

Although you still won’t be able to install Veeam on Linux and the new Linux proxy won’t be superior to Windows Proxy in performance, there are certain benefits to consider still. For example, Linux has a smaller disk footprint, it doesn’t need a license, and it can act as a gateway server. Subsequently, there will be easier ways to maneuver within you backup.

Learn More

Posted by Nicolas Prigent on February 4, 2020
Sharing Data Using Azure Data Share

There isn’t always time or reason to remake data into convenient presentations, complications, and other content. Sometimes, you just need to get the job done quickly and effectively. Microsoft has thought about it and, now, you can easily control what you share, who receives your data, and on what terms with a single tool.

Learn More

Posted by Romain Serre on January 30, 2020
Schedule the Start and Stop of Your Windows Virtual Desktop VMs

Nothing in life comes for free and, certainly, not all the little things used in Azure. Such components as RD Broker or RD Web Access, for example, are “hidden.” You won’t see their apparent activity in Azure Portal, unlike the RD Host Session or Windows 10 VMs. As a result, your Azure credit will be spent without you actually using the productivity of such VMs.

Learn More

Posted by Mikhail Rodionov on January 28, 2020
Deploying Django Project to AWS Elastic Beanstalk, Part 2: Database Settings Configuration

Part 1 of this topic covered why using AWS Elastic Beanstalk (EB) can be more beneficial for making apps if you are using Django. It showcased how to prepare your Django project for correct deployment via AWS EB. Part 2 will explain how to configure the EB environment and the Django project to use Postgres database.

Learn More

Posted by Nicolas Prigent on January 23, 2020
Sign in to Virtual Machine in Azure using Azure Active Directory Authentication

Online activities using malware and viruses increase exponentially every year. Even the smallest mishaps in cybersecurity policies may result in substantial damage. Therefore, who / how / and the way someone accesses your virtual machines is also important. Fortunately, Microsoft created a tool that allows using Azure RBAC and AD Conditional Access to control all of that. Read the guide by Nicolas Prigent, a Swiss Systems Engineer, to learn how to use Azure Active Directory to sign in to your VMs so that other Azure security tools are involved in the process.

Learn More

Posted by Romain Serre on January 21, 2020
Getting started with Azure AD Connect

Keeping your credentials and online behavior safe is key to upholding corporate cybersecurity. But the number of applications that are used on-premises and in the Web grow every day. Such conditions require employees to have various access identities with different credentials. Consequently, it causes unnecessary work complexity and potential online threats. Read the article by Romain Serre about using Azure AD Connect to synchronize identities across your on-premises and web application directories to enhance your cybersecurity.

Learn More