Connecting Hyper-V Virtual Machines to the Physical Network

BRANDON LEE | March 28, 2019

article image
There are many crucial components that make up any virtualization environment including the physical hosts, the storage, and the networking components. Focusing more on the networking side of things, the networking components allow the physical hosts to communicate with one another, with management tools, with storage and allows the virtual machines to communicate within the constructs of the virtual environment and the physical network. Microsoft Windows Server Hyper-V networking has powerful capabilities built right into the hypervisor that allows plumbing network traffic between virtual machines and into the physical network in a very granular and manageable way.

Spotlight

Birst

Birst, an Infor company, provides an advanced networked business analytics platform. Organizations can achieve a new level of trusted insight and decision making by connecting their data and people via a network of analytics services. Birst scales from individuals to the enterprise in a manner that is smart, connected, and scalable.

OTHER ARTICLES

Successful Cloud Migrations Made Easy

Article | March 16, 2020

TransAlta, an energy producer with gas, hydro, solar, wind, and coal facilities across the U.S., Canada, and Australia, leveraged data virtualization with the company’s cloud strategy. A few years ago, TransAlta decided to move 100% of its data to the cloud. The company centralized its data to reduce infrastructure, simplify data access, and scale storage. The biggest hidden challenge many companies face when trying to be completely cloud based is connecting the applications they accumulate over time. Whether they were developed and configured for on-premises environments, have specific security requirements, or are too old and complex to connect to data in the cloud, this presents a challenge.

Read More

ProtonVPN iOS app now supports the OpenVPN protocol

Article | March 16, 2020

Your ProtonVPN iOS app is now better equipped to fight censorship and offers more flexible connection options with the launch of OpenVPN for iOS. The OpenVPN protocol is one of the best VPN protocols because of its flexibility, security, and because it is more resistant to blocks. You now have the option to switch between the faster IKEv2 protocol and the more stable and censorship-resistant OpenVPN protocol.

Read More

Security that’s Designed for the Modern Data Center

Article | March 16, 2020

The last 12 months have been incredibly exciting for the security business at VMware. Last year at RSA Conference 2019, VMware CEO Pat Gelsinger outlined our Intrinsic Security strategy in his keynote presentation, “3 Things the Security Industry Isn’t Talking About”. We also announced the VMware Service-defined Firewall, a stateful Layer 7 data center firewall. As pioneers of micro-segmentation, the Service-defined Firewall extended our leadership in protecting east-west traffic in the data center. Later in the year, we announced two major acquisitions –Avi Networks and Carbon Black. The acquisition of Carbon Black brought to VMware an industry-leading endpoint security platform, and made the entire industry take notice of VMware’s intentions to transform security. With Avi Networks, we acquired a software-defined, elastic, and high-performance load balancer that comes equipped with a full-featured web application firewall (WAF). Maintaining the momentum in building out our security portfolio for the digital enterprise, we announced the VMware NSX Distributed Intrusion Detection and Prevention System which will bring advanced threat controls to the Service-defined Firewall.

Read More

Go beyond Docker with WebAssembly on the server-side

Article | March 16, 2020

Docker changed the way services and applications are designed, implemented and deployed. Before Docker, applications and services had to work cooperatively on the same machine. Sometimes they did, sometimes they didn’t. If something went wrong an entire machine, virtual or real, needed to be re-provisioned. It was an expensive and time-consuming way to go about application deployment. Nowadays, a Docker container thinks it’s the only process that runs on a machine. The result is that companies can run thousands of isolated containers on a single machine. Containers can also be created and destroyed at a moment’s notice to meet load demands. Docker opened a whole new movement in enterprise computing that’s both efficient and cost-effective.

Read More

Spotlight

Birst

Birst, an Infor company, provides an advanced networked business analytics platform. Organizations can achieve a new level of trusted insight and decision making by connecting their data and people via a network of analytics services. Birst scales from individuals to the enterprise in a manner that is smart, connected, and scalable.

Events