News

When using Veeam with a deduplicating storage system, a best practice can be to have a non-duplicating storage system as the ...
Reading Time: 3 minutes Rocky Linux (and also all the other RHEL clones) does not use the latest Linux kernel version. Some weeks ago the Linux kernel 6.16 has been released, but also the latest Rocky ...
Reading Time: 3 minutesScale Computing today (August 7th) has announced that Veeam Backup & Replication is officially delivering full agentless hypervisor backup for the Scale Computing Platform ...
Reading Time: 4 minutesProxmox Server Solutions GmbH (henceforth “Proxmox”) today announced the release of Proxmox Virtual Environment (VE) 9.0. Main highlight of this update is a modernized core ...
Reading Time: 2 minutesLike every hardware and software components, before apply a VMware vSphere upgrade or update you have to check all compatibility aspects. One is related to the backup software ...
With the recenter release of Rocky Linux 10.0, could be interesting talk about the product life cycle and for how many years the previous versions are still supported. Of course, Rocky Linux follows ...
Debian like distributions have a nice option to manage distribution upgrade (apt-get dist-upgrade), not always available on RedHat like distributions… in-place upgrade are still possible, but maybe ...
Rocky Linux is a Red Hat Enterprise Linux (RHEL) “clone” and one of the best CentOS Linux alternatives. But compared to RHEL, does not support upgrades to any major release. The answer is always the ...
Reading Time: 3 minutesIn Veeam Backup & Replication 13 (actually in Beta 2) there will be some interesting changes in the different Veeam components. One of those changes is related to the Mount ...
Recon Scanner by Coveware is a security feature of Veeam Data Platform that enable customers to proactively identify threats before they can cause damage. Recon Scanner is a forensic triage utility.
Backup content can be safe during the backup, but maybe there are some security threads that are not yet been identify (like 0-day attack) or maybe the backup data are corrupoted (like guest ...