News

VMware Explore is extending across the globe as 1 to 1.5 day events that will highlight the top content and insights from Explore in Las Vegas. Each event will include a curated subset of sessions and ...
Reading Time: 3 minutesOne year ago I wrote a post about Keepit and their solution (Why is Keepit an intereresting SaaS backup solution?). Now, at last A3 Communications Technology Live! – Munich 2025 ...
Reading Time: < 1 minuteA3 Technology Live! is a one-day event, organized by A3 Communications, where up to four vendors showcase their technologies in action to a group of technical journalists, ...
Every major version of VMware Cloud Foundation has pushed automation farther up the stack. Version 9.0 draws a clear line in ...
Reading Time: 2 minutesCloud-init is a powerful configuration tools used in several Linux distributions, but his implementation is not always the best. And on some version of Ubuntu Server it’s making ...
Reading Time: 4 minutesThe Dell Boot Optimized Storage Solution (BOSS) is a new option for the installation of the hypervisor part, in a virtualization enviroment, or more important in a ...
Reading Time: 5 minutesThe VMware ESXi partitions layout on the system disk has remained almost the same for several years. VMware ESXi 6.x partitions layout was the same from previous 5.x versions ...
Reading Time: 2 minutesOne of the big advantages of the virtual appliance version of VMware vCenter (vCSA) is the ability to update both the OS components and the VMware parts with a simple menu. Just ...
Reading Time: 2 minutesOne year ago, Broadcom killed the Free vSphere Hypervisor, but now, with the last VMware ESXi 8.0 Update 3e, the free (and limited) version is back again! Broadcom makes again ...
Reading Time: 4 minutesThe Veeam Hardened Repository ISO (VHRISO) is a Managed Hardened Repository delivered as bootable ISO with a Rocky Linux distribution preconfigured by Veeam. The idea is to ...
Reading Time: 7 minutesMeltdown and Spectre are critical vulnerabilities existing in several modern CPU: these hardware bugs allow programs to steal data which is currently processed on the computer.