When someone mentions the term ransomware, the majority of people think about modern types of malware such as CryptoLocker (2013), WannaCry (2017), Petya (2017), or similar. However, the first trace of ransomware was reported in the late 1980s. It was created by Dr. Joseph Popp [...]
On July 28th, the world comes together to celebrate System Administrator (SysAdmin) Day, a special occasion dedicated to honoring the unsung heroes of the IT world. As we celebrate SysAdmin Day, let us take a moment to recognize the hard work, dedication, and expertise of [...]
Introduction BDRSuite is a robust backup and disaster recovery solution that caters to businesses of all sizes. One of the many features of BDRSuite is its powerful Application Programming Interfaces (APIs), which allow developers and IT professionals to interact with the platform programmatically. This blog [...]
As the Fourth of July approaches, many people are looking forward to a fun and delightful holiday. To make the most of this time and ensure a peaceful celebration, it's essential to prioritize the 'Data Protection', which is crucial for businesses. Recently, There has been [...]
Read on: Microsoft Azure for Beginners: A Guide to Azure Cost Optimization – Part 12 The software development industry is a dynamic marketplace, filled with technological advancements that can be as complex as they are innovative. containers have distinguished themselves as a significant tool. Containers, [...]
Read on: Virtualization Trends Series: What is Edge Computing: Part 5 Storage virtualization and data protection Welcome to part 6 of our virtualization trends series in which we will discuss storage virtualization and data protection. Those are pretty big topics that are very relevant to [...]
The number of tools and resources used in your average IT infrastructure is getting out of hand. Microsoft SCVMM 2016 was built to address this. To understand what SCVMM, we need to know what is a Virtual Machine Manager is. What is a Virtual Machine [...]
This article will walk you through how to take the RedShift snapshot, ship it to the disaster recovery region and recover the cluster using the transferred snapshot. AWS Redshift is a fully managed, petabyte-scale data warehouse service in the cloud offered by Amazon. Amazon Redshift [...]
Table of Contents What is TRIM & UNMAP? What is SSD TRIM? What is SCSI UNMAP? Space Reclamation with Windows Servers Space Reclamation in Storage Array UNMAP Requests from the Hyper-V Guest Operating System Optimize Storage In Windows Most legacy operating systems integrally do not [...]
Table of Contents Types of Hypervisors What is KVM What is VMware(vSphere) Difference between vSphere & ESXi ESXi vs KVM Minimum System Requirements Deploying Hypervisor Setting Up KVM Hypervisor Accessing Hypervisor Supported Guest OS Load Balancing & Clustering Table comparing vSphere vs KVM Costs, Licensing, [...]