Posts

The Technical Benefits of a DRaaS Solution

Image
  Introduction Modern IT infrastructures must be resilient against disruptions caused by cyberattacks, natural disasters, and hardware failures. Disaster Recovery as a Service (DRaaS) provides a cloud-based approach to disaster recovery, enabling automated failover, data replication, and rapid restoration of critical systems. Unlike traditional disaster recovery methods, which require extensive on-premises hardware, DRaaS offers a scalable, cost-effective, and efficient alternative for businesses of all sizes. What is DRaaS? DRaaS is a cloud-based disaster recovery solution that replicates and hosts virtualized copies of IT workloads to ensure minimal downtime during an outage. Unlike traditional disaster recovery, which relies on on-premises hardware and manual intervention, DRaaS automates failover and failback processes for seamless continuity. By leveraging cloud computing, organizations can eliminate the need for dedicated secondary data centers while benefiting from high av...

Strengthening Security: Why Companies Need a Secure Infrastructure

Image
Introduction In today's interconnected world, where digital assets and data have become the lifeblood of businesses, ensuring robust cybersecurity measures has become a top priority. With an increasing number of cyber threats and sophisticated attacks, companies must invest in a secure infrastructure that enhances their security posture. This blog post explores the importance of a secure infrastructure and provides insights into how companies can strengthen their security measures. Understanding the Significance of a Secure Infrastructure A secure infrastructure serves as the foundation for an organization's overall security strategy. It encompasses the hardware, software, networks, and processes that enable businesses to protect their assets, data, and operations from unauthorized access, data breaches, and other cyber threats. A robust infrastructure provides the following benefits: a) Protecting Sensitive Data: A secure infrastructure ensures the confidentiality, integrity, ...

What is Zero Trust?

Image
You may have seen a lot of buzz lately about a term Zero Trust. So, that is all the hype about, and why should you care? Some have taken a stance around zero trust as a product, but it is more of a strategy. A strategy mostly taken by IT of not trusting devices and users that are not on the same network. For example, network administrators would take the stance of trusting devices that are on the same subnet, or network. Devices had control to keep the bad actors on the outside and good people on the inside. But in today’s internet-driven economy, and an always-on IT environment, the challenge of deciding who or what is good and bad is more difficult. The idea of zero trust is now about users proving they are who they say they are. Often this requires biometric authentication, like Face ID on your iPhone, or using some other authentication method only known to you, thus trusting no one. Image by FLY:D on Unsplash

Compilation of Hyper-V related PowerShell script

Image
  Originally posted in 2014, but I have updated this post to reflex the current state of available resrounces. I have complied a nice list of some very useful scripts that have been handy to have over the years. I am sharing them here, for a simple, easy to find place for them all.  You will see that I have given Credit to the authors were available and time permitted, and is given to the originating author/creator and not this site.  This list was a lot longer, but over time it has been reduced, as sites have moved or consolidated.  The best place for details would be via the link at the bottom. Powershellscript to get a detailed report of your Hyper-v Vhost and VM’s hosted on it, works for standalone Datacenter 2012 Servers Powersehllscript to easily create hyper-v Vm in stand alone Datacenter 2012 Servers Powershell Script to Shutdown and Export Hyper-V VMs on Windows Server 2012, one at a time Detect which virtual machines are using ...

VMworld 2012 HOL BYOD requirements

Image
 I am excited for yet another VMworld which this year will be held in San Francisco.  Some things I was unable to do last year are higher on my list this year, and the number one thing is the Hands on Labs.  This year there will be a new twist with I am sure most of you already know about.  Bring Your Own Device (BYOD).  I got some information on that and thought I would share in case you might be planning on doing a BYOD lab. Things you will need: Windows Laptop Mac Laptop Android Tablet Apple iPad Laptops: For the Windows system, you will need to have Windows 7, Firefox V13 or higher or Chrome V19 or higher browser and the VMware View Client 5.1.0 installed.  For the Mac system you will need OS X 10.6 (Snow Leopard) or higher, Firefox V13 or higher or Chrome V19 or higher browser and the VMware View Client 5.1.0 installed. ( View Client Download Page ) Tablets: For the Android tablet you will need OS Android 4.0 (Ice Cream Sandwich) or higher, Chrome brow...