It has been quite some time since I have written about the Azure Network Adapter. This is a feature that is exposed in Windows Admin Center managed…
Read moreIn this past year and a half, organizations have been required to use new solutions to empower remote employees to communicate, collaborate, and ac…
Read moreThere are many great platforms out there that provide automation server capabilities, including making use of CI/CD pipelines. Many familiar names …
Read moreSecurity concerns related to our VMware vSphere environments keep us up at night, and with good reason. Critical security bugs that affect your hyp…
Read moreThere are many ways to install Windows Server 2022 in the enterprise. However, for most, you will want to have an automated deployment of the Windo…
Read moreData backups are the most crucial part of any disaster recovery plan and are essential to recovering data to your environment after a disaster or r…
Read moreMany organizations are looking at VDI these days. Windows 365 Enterprise may be a great fit for many organizations looking for a hosted VDI solutio…
Read moreMost organizations have the need to have an automated way to deploy Windows images to clients. Instead of walking around with a USB key that client…
Read moreCompanies are moving to the cloud in drove for housing many business-critical processes, including employee collaboration and productivity tools. T…
Read moreWell it is finally official. After months of waiting and using the Preview release of Windows Server 2022, the final GA bits have arrived. Windows S…
Read moreMigrating to the cloud is a topic that most businesses are in the middle of, if not already there. The pandemic has pushed businesses to find new w…
Read moreIf you are like me, after the official release of Windows Server 2022, you may have been wondering about the story on Hyper-V Server 2022. Where is…
Read moreIn my opinion, there is no better way to learn any technology than getting your “hands dirty” and playing around with it – installing, configuring, a…
Read moreRemote access technologies widely used today were originally built for remote access in a different time – prev-COVID, pre-ransomware, pre-security c…
Read moreAs with all VMware environments with various solutions layered on top of the core vSphere infrastructure, there is an order of operations. This order…
Read moreThe data protection space for enterprise workloads is a crowded one with many different solutions for businesses to choose from. Many of the backup s…
Read moreAs businesses aggressively move to the cloud for housing business-critical data, the cloud is becoming a target for hackers launching ransomware …
Read moreWindows 365 is a brand new offering from Microsoft that you have no doubt heard about. Microsoft is trying to capitalize on the new way employees a…
Read moreI have been revisiting a few things in the lab environment, including monitoring and other alerting that I have had set for a while. I had an outsi…
Read moreAmazon AWS has a wide range of services that many organizations today are making use of. One of those is Amazon RDS. Amazon provides a customized e…
Read moreIf you are like me, you may be a bit of a monitoring geek when it comes to your home lab and production environments. Proper monitoring can help t…
Read moreAll too often we hear the breaking news of a major ransomware attack shutting down the services of a major company. Alarmingly, it is becoming even…
Read moreBusinesses today are migrating to cloud Software-as-a-Service (SaaS) offerings in droves. Businesses require moving at a rapid pace and cloud inf…
Read moreMany organizations today have migrated their business-critical data to the Microsoft Office 365 (Microsoft 365) cloud. This past year or so has pro…
Read moreMobile e-commerce (m-commerce) is a term that describes online sales transactions that use wireless electronic devices such as hand-held computers,…
Read moreA near field communication tag (NFC tag) is a sticker or wristband with small microchips that can be read by in range mobile devices. Information i…
Read moreWindows 365 Cloud PC is a new VDI offering from Microsoft that allows businesses to have a simple and seamless way to easily provision desktop PC f…
Read moreHave you been in a situation where you are installing a brand new VMware ESXi host, and when you get to the point of the installer scanning for the…
Read moreNot long ago, we covered the release of NAKIVO Backup & Replication v10.4 Beta which contained great new features in the realm of cybersecurity…
Read moreMany organizations are making use of VMware Horizon as the solution to enable a successful, effective, and efficient remote work environment. VMwar…
Read moreSince the beginning of last year, cloud adoption has surged with organizations feeling the pressure to enable remote workers with the tools and sol…
Read moreUbuntu cloud is an online platform that is designed to allow users to create their own private or public cloud infrastructure. Ubuntu cloud users can…
Read moreSelf-supervised learning (SSL) is an approach to machine learning allows machine learning algorithms to use observed inputs to predict unknown inputs…
Read moreA non-fungible token (NFT) is a programmable unit of unique data that cannot be changed once it has been recorded in a distributed ledger . Because N…
Read moreDistributed cloud is a business model that extends a public cloud provider’s infrastructure and services to geographically distributed satellite lo…
Read moreFLoC (Federated Learning of Cohorts) is an alternative to third-party cookies that Google rolled out to a small number of Chrome users beginning in…
Read moreYou may be at the point in your learning, lab environment, or even a production environment where you are ready to setup Kubernetes. Ubuntu is arg…
Read moreYou may be in a position where you have multiple network adapters assigned to your Windows 10 workstation. You may need to connect to multiple phy…
Read moreThere are many who are looking at ways to automate the process to apply the currently recommended remediation using a script. With Windows, PowerSh…
Read moreThere are a couple of things that I think are game changers with the Windows Server Core version of Windows Server 2019 and the very soon to be GA Wi…
Read moreFederated Identity Manager (FIM) is a system that assists in managing identities and providing access to resources across different security domain…
Read moreWindows Server 2022 is the next version of the Windows Server operating system. It is in the RTM phase currently and is soon to be released as GA. …
Read moreThe Universal Coded Character Set (UCS) is a character encoding standard defined by ISO/IEC 10646. It is a standard set of characters which are use…
Read moreMany of us run VMware home labs and these no doubt have many different architectures and hardware configurations across the entire landscape, and t…
Read moreThe Unicode Transformation Format (UTF) is a character encoding format which is able to encode all of the possible character code points in Unicode…
Read moreWell, it has been quite a year so far in many ways. Including the fun we have had as system administrators is the seemingly record number of zero-d…
Read moreA federated network identity is a scheme permitting multiple digital identifications through a single login. As a type of identity architecture, a …
Read moreHome labs comes in many shapes and sizes. One of the first types of labs that many are able to invest in is running VMware Workstation on top of a …
Read moreKeyword stuffing refers to the practice of inserting many instances of particular keywords into Web content to try to get better search engine rank…
Read moreI do a lot of work in the home lab environment and this includes building up Active Directory domains for various types of testing and building out…
Read moreIf you are like me, you may interact with multiple network segments and VLANS configured for different purposes. However, what if you have a workst…
Read moreAs I have mentioned in numerous blog posts posted here on VHT, Runecast is arguably one of the best tools that you can have in your data center, …
Read moreA degenerate strategy is a way of playing a video game that exploits an oversight in gameplay mechanics or design. Degenerate strategies apply to p…
Read moreMalware and specifically ransomware are getting more sophisticated and crafty in locking up your data AND deleting your backups. In fact, there are…
Read moreBuilding out a Kubernetes lab is a great way to learn the technology. I am a huge advocate of lab environments. Building out a Kubernetes lab can m…
Read moreReal-time strategy (RTS) refers to a time-based video game that centers around using resources to build units and defeat an opponent. Real-time str…
Read moreAn error occurred while attempting to start the selected virtual machines after a restore operation. Symptoms Symptom 1: You may receive …
Read moreA texture element (texel) is the basic unit of texture space that is used in computer graphics. An array of texels make up a texture, lust like a p…
Read moreA hyperconverged infrastructure is an infrastructure model that utilizes a software-centric architecture and has a tight integration with the stora…
Read moreIf you have been to an airport, bank, or mall and used a special-purpose computer that allows you to do a specific task such as check-in for your…
Read moreA superconverged cloud infrastructure, or superconvergence, is an approach to IT resources that integrates network, storage, compute, virtualizatio…
Read moreA quality of storage service (QoSS) is a service that is geared toward accommodating disk storage by optimizing a storage system. The quality of st…
Read moreLately, I have been playing around a lot with Kubernetes in the lab and containers in general. I have been using full Ubuntu 20.04 virtual machines…
Read moreThe Kerr effect is a phenomenon in which the refractive index of a material changes because of an applied electrical field, and the change in the r…
Read moreSilicon photonics is the innovative study and application of photonic systems for generating, processing, manipulating and otherwise using light fo…
Read moreNanophotonics refers to the use of light in nanoscale projects. This field is associated with some specific breakthroughs in using light in new tec…
Read moreI have been doing quite a bit of DevOps work the past few months and have found myself working with Linux tools more and more. With this being sa…
Read moreFor those of you running VMware vSAN environments, have you seen a pesky error on your vSAN cluster referencing a vSAN Build Recommendation Alarm v…
Read moreMany are starting their journey working with Kubernetes aside from myself. I have been playing around a lot with Kubernetes in the home lab and els…
Read moreSo as most of you have heard the rumblings over the past few days, Microsoft has now officially announced Windows 11 at the special Windows event …
Read moreI have been working with Kubernetes quite a bit lately playing around with the lab environment and learning the ins and outs of connecting to and w…
Read moreThis day and age is all about the applications. The cloud-driven era has allowed businesses to move quickly and with tremendous agility. Over the…
Read moreThe “software-defined” revolution has transformed just about every area of the data center in the past few years. One of the latecomers to the game…
Read moreHave you wanted to get a Kubernetes Home lab setup to start learning Kubernetes? It can be an intimidating subject if you simply start Googling aro…
Read moreWindows Subsystem for Linux (WSL) is a great tool to have access to all your NIX tools and even run more Linux native solutions on the Windows plat…
Read moreRansomware is a terrifying thought for business-critical data. It seems like new reports, television news spots, Internet ads, and others are lit…
Read moreIn order to export your Paint 3D project to a .stl or .obj formats that are compatible with 3D printers, you will need to download and install …
Read moreSteps to convert a 3D model from OBJ to FBX format using the Paint 3D app in Windows 10. OBJ is a 3D file format developed by Wavefront Technolo…
Read moreThe FAT_FILE_SYSTEM bug check has a value of 0x00000023. This indicates that a problem occurred in the FAT file system. You may see FAT FILE SYSTEM …
Read moreWhen you open Microsoft Edge on your Windows 10 computer you’ll notice at the upper left part of the browser, depending on the time of the day, a…
Read moreAn internet exchange point (IXP) is a physical network access point through which major network providers connect their networks and exchange traffic…
Read moreA network access point (NAP) is a major point where internet service providers (ISPs) can connect with one another in peering arrangements. NAPs were…
Read moreWith the upcoming release of Windows Server 2022 , many are going to be contemplating upgrading to the latest and greatest Microsoft Windows Server…
Read moreWhile containers and containerized workloads are certainly gaining momentum with organizations redesigning business-critical applications for the f…
Read moreReasons unable to connect to WiFi networks- Incorrect IP & DNS address. WiFi services Disabled. Different types of malware attack. Network drive…
Read moreContainers are becoming more relevant to what everyone is doing these days in the enterprise. Businesses are developing microservice architectures …
Read moreUsers getting the error message connecting to OneDrive 0x8004de40 while trying to log in to their OneDrive desktop client. Solve this annoyin…
Read moreIt is important to check your Internet speed as you want to make sure you get what you pay for in terms of bandwidth. Residential connections are ge…
Read moreThere are certain ways to make Windows 7 genuine again. Here you will see some real ways to fix this issue without using any crack like KMS Pico. T…
Read more