-
Kubernetes
Kubernetes Home Lab with Microk8s, Microceph, and Portainer
As you guys know I have been exploring what I think are really great setups from a standpoint of a home lab and also for learning purposes in production. Recently, I explored how viable it…
Read More »
Latest articles
-
vSAN
vSAN Witness Appliance Deployment
One of the powerful deployments of VMware vSAN is the vSAN stretched cluster configuration. With vSAN stretched cluster, the vSAN…
-
vRealize Suite
VMware vRealize Automation 8.9 Released New Features with Kubernetes Automation
Automation is king today in the enterprise data center to get things done consistently, quickly, and in a way that…
-
Backup Software
5 reasons why you need an offsite data backup
It is not something businesses like to think about – disasters, requiring organizations to recover data. However, losing critical files…
-
home lab
NVMe server for vSAN virtual machines
Just a few years ago, an NVMe server would have been a premium to have either in the enterprise or…
-
NSX
VMware NSX-T 4.0.0.1 has a new name and new features!
In case you missed the announcement a few days back, the latest release of VMware NSX-T has landed with new…
-
VMware
ESXi Change Hostname with GUI and Command Line
When it comes to the day-to-day management of VMware ESXi hosts, there are many activities a VI admin may need…
-
Windows Server 2022
Windows Server 2022 Essentials Edition Download and Pricing
Windows Server 2022 is Microsoft’s newest operating system with many different options for business environments. When it comes to Microsoft…
-
Security
I created ESXi ransomware its scary easy and why you need proper security
As I am sure you have been reading about a lot lately, ESXi ransomware is gaining momentum and is becoming…
-
Workstation
VMware Workstation 22H2 New features including Windows 11 and Fast Encryption
Workstation virtualization solutions are powerful in what they can allow you to do in the home lab, production environments, development,…
-
Security
Remote Desktop Multi-factor Authentication with ThinMan Smart Identity
Modern security is based around verifying and only granting access to critical systems once identity has been verified. Attackers realize…