AI-powered audio editors are specialized tools used by content creators, sound engineers, and music producers to enhance various aspects of the creative process.
A Public Key Infrastructure (PKI) is a security component. It signs certificates for different purposes such as encryption, signature or authentication. Because PKI is a security component, the ...
In the previous parts of this series, I have talked about encryption and signature algorithms and why Public Key Infrastructure exists. Next I have shown you step by step how to install a simple ...
AI-powered audio editors are specialized tools used by content creators, sound engineers, and music producers to enhance various aspects of the creative process. These tools help with melody creation, ...
This topic aims to explain the Quorum configuration in a Failover Clustering. As part of my job, I work with Hyper-V Clusters where the Quorum is not well configured and so my customers have not the ...
Last week, Microsoft announced the final release of Windows Server 2016 (the bits can be downloaded here). In addition, Microsoft has announced that Windows Server 2016 supports now a 2-node ...
If you read the news regularly, you probably have heard something about converged network. This is a model where the same network adapters are used to handle several kinds of traffics such as storage, ...
Nutanix AHV is a custom KVM hypervisor integrated to Nutanix ecosystem such as Prism. This is an enterprise-class hypervisor and an alternative solution to VMware ESXi or Microsoft Hyper-V when ...
Today I have installed and set Data Protection Manager 2012R2 (with Cumulative Update 2)for my client and when I have created a system state protection, I came across ...
Storage Replica is a new feature in Windows Server 2016 that enables to replicate data from the storage level when you are using Windows Storage solution. Storage Replica uses SMB3 to replicate and ...
These CA management accounts are important to increase the security level of your PKI. PKI is a security component and should be managed by security officers. But it is not always the same security ...
Most of my customers try to backup their infrastructure at night to avoid impacting the user workloads. Sometimes there are so much data that the night is not enough to backup the whole infrastructure ...