I just gave someone the advice without being asked (ignoring all i know about „nonviolent communication“ – sorry for that!) to include a „Scope“ in his blog: he wrote an article how to setup a Raspberry-Pi but skipped all security considerations about how to setup a productive computer system. I assume many readers of his blog don’t have a clue how to harden a linux-operated Raspberry-Pi. I assume: those readers need at least a hint: „there are additional steps required“ or even better, concrete advice: „what to do next“ – maybe in a follow-up article. How many people are part of a bot-net since the’veRead More →

Use-Case Investment-Protection VM-Migration Fibre-Channel   Ethernet iSCSI FCoE FC-Setup VSAN WWNN/WWPN-Pool vHBA templates FC-SAN Zoning / LUN-Masking FC-Switch Directly connected FC-Storage supported zoning within UCS-FI HyperFlex SAN Connectivity Policy iSCSI Setup VLAN MAC-Pool/vNIC-Template(s) HyperFlex LAN-Connectivity Policy  Read More →