-
Paul Schnackenburg looks at Microsoft's entry in the Secure Services Edge (SSE) market, Global Secure Access (GSA), and the different flavors of it, Internet Access and Private Access. Another buzzword for this kind of technology is Zero Trust Network Access, ZTNA.
-
By Tom Fenton
With his home network a mess, Tom Fenton explores how to bring some sense of order using readily available, easy-to-use, free tools.
-
By Tom Fenton
Tom Fenton waited 23 years for Linux software installation CLI functionality to come to Windows.
-
By Tom Fenton
Concluding his series, Tom Fenton provides step-by-step instructions for creating a VM from different Linux distributions and discusses issues with running Windows on it.
-
By Tom Fenton
In part three of his series, Tom Fenton configures ESXi to use an NTP server for precise time synchronization, enables SSH access, and adds a datastore for storing and running virtual machines.
-
By Tom Fenton
Tom Fenton walks through the process of installing and using ESXi 8 on the Raspberry Pi 5, providing a hands-on opportunity to explore VMware virtualization technology or to run ARM-based VMs.
-
By Tom Fenton
Tom Fenton, who literally wrote the book about ESXi 7 on a Raspberry Pi 4 hobbyist computer, now tackles ESXi 8 on a Pi 5, the new "computer in a keyboard."
-
By Tom Fenton
Tom Fenton concludes his exploration of Flatcar Container Linux, recently accepted as an incubating project by the Cloud Native Computing Foundation.
-
By Tom Fenton
After it catches his attention at KubeCon, where it was accepted by the Cloud Native Computing Foundation as an incubating project, Tom Fenton tackles deployment.
-
By Tom Fenton
Tom Fenton discovers a plugin that has CSV support and uses it to quickly create a bar chart.
-
By Tom Fenton
Tom provides an overview of Grafana and how to use it, including the Grafana plugin that lets you use CSV data sources to create a dashboard.
-
By Tom Fenton
Although Workstation has a GUI interface that is easy to use and very powerful, sometimes it is more useful to perform an action using the command line or a script than using a GUI.
-
AWS expert Brien Posey demonstrates how to automate EC2 instance customization by using PowerShell to simplify post-deployment tasks.
-
A new tool called the IAM Access Analyzer can help you to find IAM resources with unused permissions, IAM settings that allow for external access, and more.
-
Brient Posey recommends important tasks before experimenting with the Migration Hub.
-
Brien Posey provides step-by-step instructions for creating a firewall to prevent or allow specific DNS queries.
-
By Tom Fenton
Tom tests the desktop hypervisor recently made free for personal use to students, hobbyists and casual users who want to run multiple OSes on a single computer.
-
By Tom Fenton
Tom steps through the process of downloading, installing and licensing Workstation Pro 17 on his personal laptop.
-
Brien Posey explains how to use the AWS Tools for PowerShell to make AWS services accessible through the PowerShell interface, providing extra capabilities.
-
The process of setting up a logon notification is more involved than what you might reasonably expect, but Brien shows the way.
-
By Tom Fenton
After a series of articles on the enterprise-grade Tailscale VPN whose free version suits his needs just fine, Tom demonstrate his quick-and-easy process of utilizing the VPN on a home network-attached storage setup.
-
By Tom Fenton
Tom continues to be impressed by Tailscale, which saved his skiiing trip when a co-worker urgently needed some files from his home server.
-
By Tom Fenton
Tom and a friend come up with an exciting proposition: Could the Moonstone NUC replace one of the Dell R630 servers in his lab rack?
-
By Tom Fenton
Tom didn't think remotely accessing local computing resources would be as easy as advertised, but it was: "It just worked out of the box."
-
By Tom Fenton
Tom walks through the installation and use of "a must-have tool" that can save desktop administrators in Dell shops a lot of time and aggravation.